Blockchain Algorithm Literature Review
Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in collaborative and open systems. One of its main advantages is that it allows consensus to be reached on the new blocks of data that are added to...
Saved in:
Published in | ESPOCH congresses Vol. 3; no. 2; pp. 2 - 10 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English Spanish |
Published |
Knowledge E
18.04.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 2789-5009 2789-5009 |
DOI | 10.18502/espoch.v4i1.15795 |
Cover
Abstract | Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in collaborative and open systems. One of its main advantages is that it allows consensus to be reached on the new blocks of data that are added to the chain. There are several other techniques in the literature that claim to be popular new mechanisms. Despite this, the number of these technologies has grown too quickly to separate all the possibilities. This work reviews the types of algorithms that can be implemented to have a network supervised by the participants that integrate it.
Keywords: blockchain, integrity, consensus, algorithm.
Resumen
En la última década, blockchain se ha convertido en una tecnología de seguridad utilizada para proteger la integridad de la información contenida en una base de datos, especialmente en sistemas colaborativos y abiertos. Una de sus principales ventajas es que permite alcanzar un consenso sobre los nuevos bloques de datos que se añaden a la cadena. Existen muchas otras técnicas en la literatura que pretenden ser nuevos mecanismos populares. a pesar de ello, el número de estas tecnologías ha crecido demasiado rápido como para separar realmente todas las posibilidades. Este trabajo propone revisar los tipos de algoritmos que se pueden implementar para que una red sea supervisada por los participantes que la integran.
Palabras Clave: Blockchain, Integridad, Consenso, algoritmo. |
---|---|
AbstractList | Abstract Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in collaborative and open systems. One of its main advantages is that it allows consensus to be reached on the new blocks of data that are added to the chain. There are several other techniques in the literature that claim to be popular new mechanisms. Despite this, the number of these technologies has grown too quickly to separate all the possibilities. This work reviews the types of algorithms that can be implemented to have a network supervised by the participants that integrate it. Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in collaborative and open systems. One of its main advantages is that it allows consensus to be reached on the new blocks of data that are added to the chain. There are several other techniques in the literature that claim to be popular new mechanisms. Despite this, the number of these technologies has grown too quickly to separate all the possibilities. This work reviews the types of algorithms that can be implemented to have a network supervised by the participants that integrate it. Keywords: blockchain, integrity, consensus, algorithm. Resumen En la última década, blockchain se ha convertido en una tecnología de seguridad utilizada para proteger la integridad de la información contenida en una base de datos, especialmente en sistemas colaborativos y abiertos. Una de sus principales ventajas es que permite alcanzar un consenso sobre los nuevos bloques de datos que se añaden a la cadena. Existen muchas otras técnicas en la literatura que pretenden ser nuevos mecanismos populares. a pesar de ello, el número de estas tecnologías ha crecido demasiado rápido como para separar realmente todas las posibilidades. Este trabajo propone revisar los tipos de algoritmos que se pueden implementar para que una red sea supervisada por los participantes que la integran. Palabras Clave: Blockchain, Integridad, Consenso, algoritmo. |
Author | J, Jaramillo L, Ruiz F, Chito W, Chango M, Iguago |
Author_xml | – sequence: 1 givenname: Chango surname: W fullname: W, Chango – sequence: 2 givenname: Ruiz surname: L fullname: L, Ruiz – sequence: 3 givenname: Chito surname: F fullname: F, Chito – sequence: 4 givenname: Jaramillo surname: J fullname: J, Jaramillo – sequence: 5 givenname: Iguago surname: M fullname: M, Iguago |
BookMark | eNp9kE1LAzEQQINUsNb-AU89eduaSTa7ybEWPwoFQfQcJtnZNnXblOxa8d9bWwXx4GmGgfcY3jnrbeKGGLsEPgatuLimdhv9crzLA4xBlUadsL4otckU56b3az9jw7Zdcc6FLgtZ5H12ddNE_-qXGDajSbOIKXTL9WgeOkrYvSUaPdEu0PsFO62xaWn4PQfs5e72efqQzR_vZ9PJPPOCC5Uh5VDk2lOOHg0UAFoYXTpAZyoqyQiJyhGayqCrcmWwBo1VgQC14-TlgM2O3iriym5TWGP6sBGDPRxiWlhMXfANWSWlIkMlGKFy4IWrtHASpeQGpdNq79JHl0-xbRPV1ocOuxA3XcLQWOD2kM8e89mvfPaQb4-KP-jPK_9AnwTGd1k |
CitedBy_id | crossref_primary_10_56712_latam_v5i5_2935 |
Cites_doi | 10.1016/j.aei.2022.101620 10.1080/03772063.2022.2030252 10.1109/TVT.2022.3162075 10.1109/TSC.2021.3050717 10.1155/2022/7335390 10.1007/s10586-022-03535-0 10.1155/2022/6953125 10.32604/cmc.2022.020614 10.3390/s22051740 10.1016/j.jisa.2022.103182 10.1155/2022/7463513 10.32604/cmc.2022.020833 10.1007/s00354-021-00147-x 10.1007/978-3-031-16411-8_14 10.32604/iasc.2023.025719 |
ContentType | Journal Article |
DBID | AAYXX CITATION DOA |
DOI | 10.18502/espoch.v4i1.15795 |
DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sciences (General) |
EISSN | 2789-5009 |
EndPage | 10 |
ExternalDocumentID | oai_doaj_org_article_5335e9e719254106bd82b3a3309a3b85 10_18502_espoch_v4i1_15795 |
GroupedDBID | AAFWJ AAYXX AFPKN ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ M~E |
ID | FETCH-LOGICAL-c2025-ae41648ce4aca9161182987b1ab9de7e923a5bea9d9abd459af18ad6a11fb0ec3 |
IEDL.DBID | DOA |
ISSN | 2789-5009 |
IngestDate | Wed Aug 27 01:28:30 EDT 2025 Tue Jul 01 01:24:15 EDT 2025 Thu Apr 24 23:10:05 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English Spanish |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2025-ae41648ce4aca9161182987b1ab9de7e923a5bea9d9abd459af18ad6a11fb0ec3 |
OpenAccessLink | https://doaj.org/article/5335e9e719254106bd82b3a3309a3b85 |
PageCount | 9 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_5335e9e719254106bd82b3a3309a3b85 crossref_citationtrail_10_18502_espoch_v4i1_15795 crossref_primary_10_18502_espoch_v4i1_15795 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-04-18 |
PublicationDateYYYYMMDD | 2024-04-18 |
PublicationDate_xml | – month: 04 year: 2024 text: 2024-04-18 day: 18 |
PublicationDecade | 2020 |
PublicationTitle | ESPOCH congresses |
PublicationYear | 2024 |
Publisher | Knowledge E |
Publisher_xml | – name: Knowledge E |
References | 187448 187449 187444 187455 187445 187456 187446 187457 187447 187458 187451 187452 187442 187453 187443 187454 187450 |
References_xml | – ident: 187446 doi: 10.1016/j.aei.2022.101620 – ident: 187444 doi: 10.1080/03772063.2022.2030252 – ident: 187456 doi: 10.1109/TVT.2022.3162075 – ident: 187452 doi: 10.1109/TSC.2021.3050717 – ident: 187450 – ident: 187442 doi: 10.1155/2022/7335390 – ident: 187449 doi: 10.1007/s10586-022-03535-0 – ident: 187458 doi: 10.1155/2022/6953125 – ident: 187457 doi: 10.32604/cmc.2022.020614 – ident: 187448 doi: 10.3390/s22051740 – ident: 187453 doi: 10.1016/j.jisa.2022.103182 – ident: 187455 doi: 10.1155/2022/7463513 – ident: 187443 doi: 10.32604/cmc.2022.020833 – ident: 187445 – ident: 187454 doi: 10.1007/s00354-021-00147-x – ident: 187447 doi: 10.1007/978-3-031-16411-8_14 – ident: 187451 doi: 10.32604/iasc.2023.025719 |
SSID | ssj0002876364 |
Score | 2.2533855 |
Snippet | Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in... Abstract Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database,... |
SourceID | doaj crossref |
SourceType | Open Website Enrichment Source Index Database |
StartPage | 2 |
SubjectTerms | blockchain, integrity, consensus, algorithm |
Title | Blockchain Algorithm Literature Review |
URI | https://doaj.org/article/5335e9e719254106bd82b3a3309a3b85 |
Volume | 3 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxZE-RDlSxkQAqHQOLETe2xRqwpRJip1s84foUBpES2M_HbOSYgywcKSIXKs5NnOvWed3xFypn0hSiPyMGF5GqL-cvgf5DKkIGOIjRNC-8PJ4_t0NGG3Uz5tlPryOWGlPXAJXBfpCHfSZchEOEP9oq2IdQIowyUkWhTupZGMGmLqudgywnWTsuqUjOBR3PUppzhzPtkTvaY88wUlGpGoYdhfRJbhNtmqKGHQK1-lTTbcaoe0q0W3Ci4qZ-jLXXLex9DzYmao5oPe_HGJwn72GtzVzshBudO_RybDwcPNKKwKHYQm9uVkwSEtYsI4BgaQr3nSL0WmKWhpXeaQhAHXDqSVoC3jEnIqwKZAaa4jZ5J90losF-6ABBieKYjYpjqWzOUp9oEcw2ba6jTLGe0Q-vPRylQu4L4YxVx5NeCBUiVQygOlCqA65Kp-5q30wPi1dd9jWbf0_tXFDRxVVY2q-mtUD_-jkyOyifAWeTZUHJPW-v3DnSCFWOvTYrbgdfw1-AZ9LMON |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Blockchain+Algorithm+Literature+Review&rft.jtitle=ESPOCH+congresses&rft.au=Ruiz+L&rft.au=Chito+F&rft.au=Jaramillo+J&rft.au=Iguago+M&rft.date=2024-04-18&rft.pub=Knowledge+E&rft.eissn=2789-5009&rft.volume=3&rft.issue=2&rft.spage=2&rft.epage=10&rft_id=info:doi/10.18502%2Fespoch.v4i1.15795&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_5335e9e719254106bd82b3a3309a3b85 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2789-5009&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2789-5009&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2789-5009&client=summon |