PDF Blockchain, Big Data and Machine Learning: Trends and Applications First Edition Kumar Download
PDF Blockchain, Big Data and Machine Learning: Trends and Applications First Edition Kumar Download
PDF Blockchain, Big Data and Machine Learning: Trends and Applications First Edition Kumar Download
com
https://textbookfull.com/product/blockchain-
big-data-and-machine-learning-trends-and-
applications-first-edition-kumar/
textbookfull
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://textbookfull.com/product/machine-learning-and-big-data-
analytics-paradigms-analysis-applications-and-challenges-aboul-
ella-hassanien/
https://textbookfull.com/product/demystifying-big-data-and-
machine-learning-for-healthcare-1st-edition-frenzel/
https://textbookfull.com/product/big-data-iot-and-machine-
learning-tools-and-applications-internet-of-everything-ioe-1st-
edition-rashmi-agrawal-editor/
https://textbookfull.com/product/proceedings-of-international-
conference-on-recent-trends-in-machine-learning-iot-smart-cities-
and-applications-icmisc-2020-vinit-kumar-gunjan/
Machine Learning Algorithms for Industrial Applications
Santosh Kumar Das
https://textbookfull.com/product/machine-learning-algorithms-for-
industrial-applications-santosh-kumar-das/
https://textbookfull.com/product/introducing-data-science-big-
data-machine-learning-and-more-using-python-tools-1st-edition-
davy-cielen/
https://textbookfull.com/product/sql-server-2019-revealed-
including-big-data-clusters-and-machine-learning-bob-ward/
https://textbookfull.com/product/feature-engineering-for-machine-
learning-and-data-analytics-first-edition-dong/
https://textbookfull.com/product/machine-learning-and-ai-for-
healthcare-big-data-for-improved-health-outcomes-arjun-panesar/
Blockchain, Big Data
and Machine Learning
Blockchain, Big Data
and Machine Learning
Trends and Applications
Edited by
Neeraj Kumar
N. Gayathri
Md. Arafatur Rahman
B. Balamurugan
First edition published 2020
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
Reasonable efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication and
apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright
material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or
contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-
8400. For works that are not available on CCC please contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Typeset in Times
by Lumina Datamatics Limited
Contents
Preface......................................................................................................................vii
Editors........................................................................................................................ix
Contributors...............................................................................................................xi
v
vi Contents
Index....................................................................................................................... 339
Preface
Blockchain is viewed as a revolutionary technology which addresses the modern
techniques of decentralization, identity, data driven decisions, and data owner-
ship. While blockchain applications and use cases are still in its nascent stages, the
potential for digital transformation is immense. Blockchain influences Big Data and
machine learning to find solution for storing and managing data in a distributed
fashion on a P2P network. Blockchain technology can be a new part of the sur-
rounding ecosystem of tools that Big Data uses. Actually, it can play a crucial role in
security for user authentication, restricting access based on a user’s need, recording
data access histories, and proper use of encryption on data. Moreover, privacy and
security are the two major concerns in Big Data analytics that should be significantly
considered to safeguard the network. The main objective of this book is to explore
threat intelligence, forensics and cyber security challenges in Big Data systems
applying machine learning concepts. In particular, we are heading for providing
solutions for the secured Big Data environment. This book is going to explicitly say
all about the dead fusion in realizing the privacy and security of blockchain based
data analytic environment.
vii
Editors
Dr. Neeraj Kumar received his PhD in CSE from SMVD University, Katra (J & K),
India, and was a postdoctoral research fellow in Coventry University, Coventry, UK.
He is working as a Full professor in the department of computer science and engi-
neering, Thapar Institute of Engineering & Technology, Patiala (Pb.), India since
2014. He has published more than 400 technical research papers, 10 edited/authored
books, and 100 conferences publications with more than 10000 citations and h-index
of 56. He has guided many research scholars leading to earn their PhD and ME/
MTech degrees. His research is supported by funding from TCS, CSIT, UGC, and
UGC in the area of smart grid, energy management, VANETs, and cloud computing.
He is a member of the Cyber-Physical Systems and Security (CPSS) research group.
He has research funding from DST, CSIR, UGC, and TCS of more than six crores
from GOI. He has supervised 12 Ph.D students and guided 25 ME/MTech students
with their thesis. He is a senior member of IEEE.
Md. Arafatur Rahman received his PhD degree in electronics and telecommunica-
tions engineering from the University of Naples Federico II, Naples, Italy in 2013.
He has more than 10 years of research and teaching experience in the domain of
computer and communications engineering. Currently, he is an associate professor
with the Faculty of Computing, Universiti Malaysia Pahang, where he has conducted
undergraduate and master’s courses and supervised more than 21 BSc, 5 MSc, and
5 PhD students. He worked as a postdoctoral research fellow with University of
Naples Federico II in 2014 and visiting researcher with the Sapienza University of
Rome in 2016. His research interests include the Internet-of-Things (IoT), wireless
communication networks, cognitive radio network, 5G, vehicular communication,
cyber-physical systems, big data, cloud-fog-edge computing, machine learning,
and security. He has developed an excellent track record of academic leadership as
well as management and execution of international ICT projects that are supported
by agencies in Italy, the EU, and Malaysia. Dr. Rahman has received number of
prestigious international research awards, notably the Best Paper Award at ICNS
2015 (Italy), IC0902 Grant (France), Italian Government PhD Research Scholarship
and IIUM Best Masters Student Award, Best Supervisor Award at UMP, Awards
in International Exhibitions including Diamond and Gold in BiS 2017 UK, Best of
the Best Innovation Award and Most Commercial IT Innovation Award, Malaysia,
ix
x Editors
and Gold and Silver medals in iENA 2017 Germany. Dr. Rahman has co-authored
articles in around 100 prestigious IEEE and Elsevier journals (e.g., IEEE TII, IEEE
TSC, IEEE COMMAG, Elsevier JNCA, and Elsevier FGCS) and conference publi-
cations (e.g., IEEE Globecom, IEEE DASC) and has served as an advisory board
member, editor (Computers, MDPI), lead guest editor (IEEE ACCESS, Computers),
associate editor (IEEE ACCESS), chair, publicity chair, session chair, and member
of Technical Programme Committee (TPC) in numerous leading conferences world-
wide (e.g., IEEE Globecom, IEEE DASC, IEEE iSCI) and journal editorial boards.
He is a fellow of IBM Center of Excellence and Earth Resources & Sustainability
Center, Malaysia and a senior member of IEEE.
S. Dhivya J. Janet
Department of Computer Science and Department of Computer Science and
Engineering Engineering
Sri Shakthi Institute of Engineering and Sri Krishna College of Engineering and
Technology Technology
Coimbatore, India Coimbatore, India
xi
xii Contributors
K. Shoukath Ali
Bannari Amman Institute of
Technology
Erode, India
1 Introduction to
Blockchain and Big Data
Robbi Rahim, Rizwan Patan,
R. Manikandan, and S. Rakesh Kumar
CONTENTS
1.1 Blockchain Basic Technologies......................................................................... 2
1.1.1 Basics of Blockchain and Its Architecture............................................ 2
1.1.1.1 Block Header...........................................................................4
1.1.1.2 Block Identifiers......................................................................5
1.1.1.3 Merkle Trees........................................................................... 5
1.1.1.4 Features of Blockchain...........................................................5
1.1.2 Blockchain and Bitcoin Transactions....................................................7
1.1.3 Hyperledger Frameworks......................................................................7
1.1.4 Smart Contract Framework and Its Working........................................8
1.2 Big Data Source for Blockchain........................................................................9
1.2.1 Blockchain and Big Data to Secure Data............................................ 10
1.2.2 Blockhain and Big Data Technologies for Data Analysis................... 11
1.2.3 Blockchain for Private Big Data Management.................................... 11
1.2.4 Confidentiality, Data integrity, and Authentication............................. 12
1.2.4.1 Data Confidentiality.............................................................. 12
1.2.4.2 Data Integrity........................................................................ 12
1.2.4.3 Data Authentication.............................................................. 12
1.2.4.4 Security Management Scenario for User Big Data
in Blockchain........................................................................ 12
1.3 Blockchain Use Cases in Big Data.................................................................. 13
1.3.1 Ensuring Data Integrity....................................................................... 14
1.3.2 Preventing Malicious Activities........................................................... 15
1.3.3 Predictive Analysis.............................................................................. 16
1.3.4 Real-Time Data Analysis..................................................................... 17
1.3.5 Managing Data Sharing....................................................................... 17
1.4 Applications of Blockchain Technology with Big Data Analytics.................. 18
1.4.1 Anti Money Laundering......................................................................20
1.4.2 Cyber Security..................................................................................... 21
1.4.3 Supply Chain Monitoring.................................................................... 21
1.4.4 Financial AI Systems........................................................................... 22
1.4.5 Medical Records.................................................................................. 22
References................................................................................................................. 22
1
2 Blockchain, Big Data and Machine Learning
TABLE 1.1
Block Structure
Field Description Size
Block size Size of block in bytes 4 bytes
Block header Several fields comprises of block header 80 byes
Transaction counters Frequency of transactions 1–9 bytes
Transaction Actual transactions recorded Variable
Header
Transaction counter
Transactions
Transaction Data
• Blockchain types
• Node
• Consensus algorithm
• Block
• Header
• Transaction counter
• Transaction data
block hash. It also includes a 32-byte long Merkle root supporting a 4-byte long time-
stamp with a 4-byte long nonce utilized by the cryptography miners. Along with the
above description, the block header includes the following:
• Cryptographic hash
• Mining competition
• Data structure to summarize the transactions in the block
Dispersed
estimation
Blockchain Informationre
Agreement features pository
Source Stability
• Agreement
• Dispersed estimation
• Information repository
• Source
• Stability
and are then sent through several nodes across the network. One of the
most important aspects about the blockchain’s dispersed estimation is that
there is not central node in the network to process and distribute the data.
However, every node forming the block in the blockchain is said to be exe-
cuted in an independent manner.
Information repository: The third paramount feature of blockchain is the infor-
mation repository. Here, the information repository refers to the information
storage area. For example, in Bitcoin blockchain, the information repository
here refers to the information related to the Bitcoin transactional data.
Source: Blockchains ensures source in a preprogrammed manner. In conven-
tional type of banking, the customer is aware that the money deposited
or the jewels kept in the locker are safe in the bank. However, in case of
blockchain transaction, each activity performed by the user is traced, doc-
umented and fully identifiable without the aid of third-party required to
attest for a specific action to be taken.
Stability: The blockchain transaction are said to be stable because of the rea-
son that it is highly said to be stable. In that sense, the transaction pertain-
ing to blockchain cannot be changed as soon as the transaction is recorded.
Even in the case of erroneous record, the record cannot be deleted and is
said to be noticeable cannot be deleted. Furthermore, in order to make cor-
rections in the recorded transactions, a new transaction is said to be gener-
ated. That generated transaction is then said to refer the erroneous record.
1.1.3 Hyperledger Frameworks
The hyperledger framework refers to an open source collective endeavor to provide
cross industry blockchain technologies, hosted by Linux Foundation. Hyperledger
simply refers to the type of software that everyone are said to use with the objective
of creating one’s own personalized blockchain. Figure 1.5 shows the figurative rep-
resentation of hyperledger framework.
As shown in Figure 1.5, using personalized software with the support of specialized
developers, software is developed for healthcare industry.
1. Smart contracts are written in the form of code. With the code written, it
is submitted to the blockchain. Both the code and the rules and regulations
pertaining to the usage of the contract are available on the digital ledger in
a public manner.
2. Whenever an event presented in the contract is triggered, to name a few are,
expiry date or arrival of target price for purchasing a product, the event of
code is said to be executed.
3. The regulators have the provision to look into the contract activity on the
blockchain. This is performed with the objective of obtaining an under-
standing about the market. This is said to be attained with higher rate of
privacy for the individual users.
• Blockchain healthcare
• Blockchain music
• Blockchain government
Trigger
• Decentralization
• Transparency
• Immutability
10 Blockchain, Big Data and Machine Learning
information provided multiple permissions are obtained from the network to access
the big data. Hence, it becomes highly complex and complicated from a cybercrimi-
nal point of view to seize it.
This is because of the reason that instead of uploading the big data or information
to a database server or to a cloud server, blockchain subdivided into finite number
of chunks and distributes them across the entire network of computers. In this way,
the presence of middleman or third party is avoided for processing a transaction.
Therefore, instead of placing the trust on a service provider, decentralization is said
to be achieved or ensured via immutable ledger. Besides, the big data in blockchain
is said to be in the encrypted form. Hence, it is said to be highly secured.
Data integrity
Data Data
Confidentiality authentication
Security
Key Key
generation generation
Blockchain
FIGURE 1.9 Security management scenario for block user data in blockchain.
Data integrity
Preventing
Predictive
malicious
analysis
activities
The above said use cases in big data are described in the following sections.