Blockchain Algorithm Literature Review

Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in collaborative and open systems. One of its main advantages is that it allows consensus to be reached on the new blocks of data that are added to...

Full description

Saved in:
Bibliographic Details
Published inESPOCH congresses Vol. 3; no. 2; pp. 2 - 10
Main Authors W, Chango, L, Ruiz, F, Chito, J, Jaramillo, M, Iguago
Format Journal Article
LanguageEnglish
Spanish
Published Knowledge E 18.04.2024
Subjects
Online AccessGet full text
ISSN2789-5009
2789-5009
DOI10.18502/espoch.v4i1.15795

Cover

Abstract Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in collaborative and open systems. One of its main advantages is that it allows consensus to be reached on the new blocks of data that are added to the chain. There are several other techniques in the literature that claim to be popular new mechanisms. Despite this, the number of these technologies has grown too quickly to separate all the possibilities. This work reviews the types of algorithms that can be implemented to have a network supervised by the participants that integrate it. Keywords: blockchain, integrity, consensus, algorithm. Resumen En la última década, blockchain se ha convertido en una tecnología de seguridad utilizada para proteger la integridad de la información contenida en una base de datos, especialmente en sistemas colaborativos y abiertos. Una de sus principales ventajas es que permite alcanzar un consenso sobre los nuevos bloques de datos que se añaden a la cadena. Existen muchas otras técnicas en la literatura que pretenden ser nuevos mecanismos populares. a pesar de ello, el número de estas tecnologías ha crecido demasiado rápido como para separar realmente todas las posibilidades. Este trabajo propone revisar los tipos de algoritmos que se pueden implementar para que una red sea supervisada por los participantes que la integran. Palabras Clave: Blockchain, Integridad, Consenso, algoritmo.
AbstractList Abstract Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in collaborative and open systems. One of its main advantages is that it allows consensus to be reached on the new blocks of data that are added to the chain. There are several other techniques in the literature that claim to be popular new mechanisms. Despite this, the number of these technologies has grown too quickly to separate all the possibilities. This work reviews the types of algorithms that can be implemented to have a network supervised by the participants that integrate it.
Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in collaborative and open systems. One of its main advantages is that it allows consensus to be reached on the new blocks of data that are added to the chain. There are several other techniques in the literature that claim to be popular new mechanisms. Despite this, the number of these technologies has grown too quickly to separate all the possibilities. This work reviews the types of algorithms that can be implemented to have a network supervised by the participants that integrate it. Keywords: blockchain, integrity, consensus, algorithm. Resumen En la última década, blockchain se ha convertido en una tecnología de seguridad utilizada para proteger la integridad de la información contenida en una base de datos, especialmente en sistemas colaborativos y abiertos. Una de sus principales ventajas es que permite alcanzar un consenso sobre los nuevos bloques de datos que se añaden a la cadena. Existen muchas otras técnicas en la literatura que pretenden ser nuevos mecanismos populares. a pesar de ello, el número de estas tecnologías ha crecido demasiado rápido como para separar realmente todas las posibilidades. Este trabajo propone revisar los tipos de algoritmos que se pueden implementar para que una red sea supervisada por los participantes que la integran. Palabras Clave: Blockchain, Integridad, Consenso, algoritmo.
Author J, Jaramillo
L, Ruiz
F, Chito
W, Chango
M, Iguago
Author_xml – sequence: 1
  givenname: Chango
  surname: W
  fullname: W, Chango
– sequence: 2
  givenname: Ruiz
  surname: L
  fullname: L, Ruiz
– sequence: 3
  givenname: Chito
  surname: F
  fullname: F, Chito
– sequence: 4
  givenname: Jaramillo
  surname: J
  fullname: J, Jaramillo
– sequence: 5
  givenname: Iguago
  surname: M
  fullname: M, Iguago
BookMark eNp9kE1LAzEQQINUsNb-AU89eduaSTa7ybEWPwoFQfQcJtnZNnXblOxa8d9bWwXx4GmGgfcY3jnrbeKGGLsEPgatuLimdhv9crzLA4xBlUadsL4otckU56b3az9jw7Zdcc6FLgtZ5H12ddNE_-qXGDajSbOIKXTL9WgeOkrYvSUaPdEu0PsFO62xaWn4PQfs5e72efqQzR_vZ9PJPPOCC5Uh5VDk2lOOHg0UAFoYXTpAZyoqyQiJyhGayqCrcmWwBo1VgQC14-TlgM2O3iriym5TWGP6sBGDPRxiWlhMXfANWSWlIkMlGKFy4IWrtHASpeQGpdNq79JHl0-xbRPV1ocOuxA3XcLQWOD2kM8e89mvfPaQb4-KP-jPK_9AnwTGd1k
CitedBy_id crossref_primary_10_56712_latam_v5i5_2935
Cites_doi 10.1016/j.aei.2022.101620
10.1080/03772063.2022.2030252
10.1109/TVT.2022.3162075
10.1109/TSC.2021.3050717
10.1155/2022/7335390
10.1007/s10586-022-03535-0
10.1155/2022/6953125
10.32604/cmc.2022.020614
10.3390/s22051740
10.1016/j.jisa.2022.103182
10.1155/2022/7463513
10.32604/cmc.2022.020833
10.1007/s00354-021-00147-x
10.1007/978-3-031-16411-8_14
10.32604/iasc.2023.025719
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.18502/espoch.v4i1.15795
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 2789-5009
EndPage 10
ExternalDocumentID oai_doaj_org_article_5335e9e719254106bd82b3a3309a3b85
10_18502_espoch_v4i1_15795
GroupedDBID AAFWJ
AAYXX
AFPKN
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
M~E
ID FETCH-LOGICAL-c2025-ae41648ce4aca9161182987b1ab9de7e923a5bea9d9abd459af18ad6a11fb0ec3
IEDL.DBID DOA
ISSN 2789-5009
IngestDate Wed Aug 27 01:28:30 EDT 2025
Tue Jul 01 01:24:15 EDT 2025
Thu Apr 24 23:10:05 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
Spanish
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2025-ae41648ce4aca9161182987b1ab9de7e923a5bea9d9abd459af18ad6a11fb0ec3
OpenAccessLink https://doaj.org/article/5335e9e719254106bd82b3a3309a3b85
PageCount 9
ParticipantIDs doaj_primary_oai_doaj_org_article_5335e9e719254106bd82b3a3309a3b85
crossref_citationtrail_10_18502_espoch_v4i1_15795
crossref_primary_10_18502_espoch_v4i1_15795
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-04-18
PublicationDateYYYYMMDD 2024-04-18
PublicationDate_xml – month: 04
  year: 2024
  text: 2024-04-18
  day: 18
PublicationDecade 2020
PublicationTitle ESPOCH congresses
PublicationYear 2024
Publisher Knowledge E
Publisher_xml – name: Knowledge E
References 187448
187449
187444
187455
187445
187456
187446
187457
187447
187458
187451
187452
187442
187453
187443
187454
187450
References_xml – ident: 187446
  doi: 10.1016/j.aei.2022.101620
– ident: 187444
  doi: 10.1080/03772063.2022.2030252
– ident: 187456
  doi: 10.1109/TVT.2022.3162075
– ident: 187452
  doi: 10.1109/TSC.2021.3050717
– ident: 187450
– ident: 187442
  doi: 10.1155/2022/7335390
– ident: 187449
  doi: 10.1007/s10586-022-03535-0
– ident: 187458
  doi: 10.1155/2022/6953125
– ident: 187457
  doi: 10.32604/cmc.2022.020614
– ident: 187448
  doi: 10.3390/s22051740
– ident: 187453
  doi: 10.1016/j.jisa.2022.103182
– ident: 187455
  doi: 10.1155/2022/7463513
– ident: 187443
  doi: 10.32604/cmc.2022.020833
– ident: 187445
– ident: 187454
  doi: 10.1007/s00354-021-00147-x
– ident: 187447
  doi: 10.1007/978-3-031-16411-8_14
– ident: 187451
  doi: 10.32604/iasc.2023.025719
SSID ssj0002876364
Score 2.2533855
Snippet Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database, especially in...
Abstract Within the last decade, blockchain has become a security technology used to protect the integrity of the information contained in a database,...
SourceID doaj
crossref
SourceType Open Website
Enrichment Source
Index Database
StartPage 2
SubjectTerms blockchain, integrity, consensus, algorithm
Title Blockchain Algorithm Literature Review
URI https://doaj.org/article/5335e9e719254106bd82b3a3309a3b85
Volume 3
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxZE-RDlSxkQAqHQOLETe2xRqwpRJip1s84foUBpES2M_HbOSYgywcKSIXKs5NnOvWed3xFypn0hSiPyMGF5GqL-cvgf5DKkIGOIjRNC-8PJ4_t0NGG3Uz5tlPryOWGlPXAJXBfpCHfSZchEOEP9oq2IdQIowyUkWhTupZGMGmLqudgywnWTsuqUjOBR3PUppzhzPtkTvaY88wUlGpGoYdhfRJbhNtmqKGHQK1-lTTbcaoe0q0W3Ci4qZ-jLXXLex9DzYmao5oPe_HGJwn72GtzVzshBudO_RybDwcPNKKwKHYQm9uVkwSEtYsI4BgaQr3nSL0WmKWhpXeaQhAHXDqSVoC3jEnIqwKZAaa4jZ5J90losF-6ABBieKYjYpjqWzOUp9oEcw2ba6jTLGe0Q-vPRylQu4L4YxVx5NeCBUiVQygOlCqA65Kp-5q30wPi1dd9jWbf0_tXFDRxVVY2q-mtUD_-jkyOyifAWeTZUHJPW-v3DnSCFWOvTYrbgdfw1-AZ9LMON
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Blockchain+Algorithm+Literature+Review&rft.jtitle=ESPOCH+congresses&rft.au=Ruiz+L&rft.au=Chito+F&rft.au=Jaramillo+J&rft.au=Iguago+M&rft.date=2024-04-18&rft.pub=Knowledge+E&rft.eissn=2789-5009&rft.volume=3&rft.issue=2&rft.spage=2&rft.epage=10&rft_id=info:doi/10.18502%2Fespoch.v4i1.15795&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_5335e9e719254106bd82b3a3309a3b85
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2789-5009&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2789-5009&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2789-5009&client=summon