Page 129 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 129

Chapter 4 A critical review on using blockchain technology in education domain 117




               (c) Hypergraph-based partitioning: In conventional BCs, the
                   ledger details are maintained in all the nodes. When hyper-
                   graphs are used, a set of nodes form a hyperedge. The ledger
                   is split and maintained on different hyperedges [36]. So trans-
                   actions are stored only on certain nodes corresponding to a
                   hyperedge. Hence, storage space is reduced. When a new
                   traction comes in, a vector is generated in linear-
                   independent matrix (LIM). This vector decides the sub-BC/
                   hyperedge to which the block is to be attached. When a trans-
                   action occurs, all nodes search for related records in sub-BCs,
                   and the nodes having the transaction information verify and
                   inform all other nodes. So all nodes need not take part in veri-
                   fication process (Fig. 4.9).


               7. Security challenges
               Major security challenge in blockchain is against quantum
               attacks due to Shor’s and Grover’s algorithm. For this, postquan-
               tum cryptography approaches can be used. Quantum resistant
               approaches such as Merkle hash trees reduce chances of quan-
               tum attacks. Public key digital signatures are prone to quantum
               attacks due to Shor’s algorithm. This can be prevented using
               McElisce system, code-based cryptography, and lattice-based
               cryptography approaches such as learning with errors.


               8. Conclusion

               BC is a disruptive technology that can be used to store and share
               information securely in a decentralized and distributed manner.
               This technology can be used in e-governance in various domains
               such as finance, asset management, Internet of things, health-
               care, agriculture, and education. This chapter introduces the
               readers to the working of a BC. A detailed discussion on various
               consensus mechanisms along with its suitability in education
               system is also provided. The advantages and challenges in using
               BC-based applications in education are also discussed in this
               chapter. The major security vulnerabilities along with how it
               can be overcome are also provided in this chapter. Scalability is
               a major challenge in using BC technology for university system.
               The approaches that can be used to enhance scalability of exist-
               ing BCs are also discussed in this chapter. This chapter thus pro-
               vides approaches that can be used to enhance existing BCs to
               make them more suitable in an education domain.
   124   125   126   127   128   129   130   131   132   133   134