Figure 4 - uploaded by Muhammad Johar Jaafar
Content may be subject to copyright.
Transaction block and hash to previous block.

Transaction block and hash to previous block.

Source publication
Article
Full-text available
Nowadays technologies are rapidly growth and it cover many areas. The traditional or legacy network architecture is no longer suited to meet today requirement ever since cloud era appeared. In order to fulfill the gap, the paradigm has shifted to edge computing where the usage of micro-services become mainstream. The needs of using edge computing b...

Context in source publication

Context 1
... is a set of protocol that use encryption for securely storing data on a distributed network. Each block carries a list of distributed data as well a hash to the previous block. Each of it, has its own references and make an interconnection between blocks. Once it fill, it push to the next chunk to overflow current block to create a new block. Figure 2, is the example of creation of block and how it is interconnected and carry list of data, and hash the previous block. By referring the above photo in Figure 4, the blockchain mechanism work as point-to-point as standard form of framework which it goes through block by block (in general form). In executions, in blockchain bottom line, it work 3 ways. Either as public, private or consortium/federated. In figure 5, the figure shows the flow of two separate type of blockchain (in conditional form). In general, Public provide the decentralized platform that anyone can read and send, but private provide centralized under one control (Shermin Voshmgir, 2017). The consensus define the blockchain shape as permission-less blockchain or permissioned blockchain. This two shapers create the new fabric to meet the network requirement, either it can run publically or privately. In this research, the possible component to implement the block on top on of it is smart contract. The smart contract works by using hashing algorithm functions whereby it only work when both end has the same key or condition are met. The rational reason for using the smart contract because the SDN is known for its vulnerabilities over vector. Whereby, the malicious can creates entries in the network flow and change the ownerships of the network (Guardtime). Once, its infected, the controller, network element or host connected will creates a room for its penetration. However, with smart contract it can keyed policy that only registered can provisioning the entire ...

Similar publications

Chapter
Full-text available
To provide better services and new future offerings to their customers, an enterprise in the financial services industry in Indonesia has decided to use Kubernetes, an application container technology, to serve their digital services through applications, developed with micro-services architecture concepts. The new services and technology were expe...