A Survey on Blockchain Based Smart Applications
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Information Technology | India | Volume 8 Issue 1, January 2019

A Survey on Blockchain Based Smart Applications

Saranya A, Mythili R

Most of commercial and industry applications are centralized and time consuming and also need third party to audit the information. Need of middle man in every application are prone to error sometimes. The Blockchain technology merely conquers the issues of centralized middle party communication. The decentralized computation and information sharing platform that enables multiple authoritative domains, to cooperate, coordinate and collaborate each other with rational decision making process. A Blockchain is an open distributed ledger, which can record transactions between two parties efficiently and in a verifiable and permanent way. A decentralized database with strong consistency support provides to update the local copy of the global information. Every transaction ensures the integrity at the last minute of the Blockchain to make the entire chain to be tamper proof. Here our study gives the overview of blockchain terminologies, consensus algorithms and various fields of applications of Blockchain. In this paper, we discussed smart contract based applications, government information sharing systems, healthcare, b-voting systems. Consensus algorithms will be differed based on the blockchain types. This paper will direct the researchers with correct path towards the blockchain.

Keywords: Distributed, Decentralized, Blockchain, Consensus algorithms, Applications

Edition: Volume 8 Issue 1, January 2019

Pages: 450 - 455

Share this Article

How to Cite this Article?

Saranya A, Mythili R, "A Survey on Blockchain Based Smart Applications", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20194166, Volume 8 Issue 1, January 2019, 450 - 455

176 PDF Views | 103 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Distributed'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Research Paper, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2497 - 2502

The Most Favourable Mobile Messaging Apps among IIUM Students

Ayn Nur Azhana Azhar Amanullah, Noor Azian Mohamad Ali

Share this Article

Comparative Studies, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 2013 - 2019

Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering

Prajna M.S., Sumana M.

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 1061 - 1065

Review On design and Implementation of Enhanced Security in Multicloud Storage System Using Distributed File System

Priyanka R. Raut, Vaidehi Baporikar

Share this Article

Similar Articles with Keyword 'Decentralized'

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 724 - 726

A Survey on Anonymous User Authentication using Decentralized Key Distribution Architecture

Purva Chavan, Prof. B. P. Vasgi

Share this Article

Survey Paper, Information Technology, India, Volume 8 Issue 11, November 2019

Pages: 923 - 925

A Gist of VANET Routing Protocols

Sidhant Gupta, Abhishek Swaroop

Share this Article

Research Paper, Information Technology, Indonesia, Volume 8 Issue 7, July 2019

Pages: 1228 - 1234

Accountability of Course Graduation Records using Permissioned Blockchain in Hyperledger Fabric

Linda Handayani, Avinanta Tarigan

Share this Article

Informative Article, Information Technology, India, Volume 7 Issue 5, May 2018

Pages: 489 - 491

Blockchains

Shanthi D L, Shruthi S R

Share this Article

Survey Paper, Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 450 - 455

A Survey on Blockchain Based Smart Applications

Saranya A, Mythili R

Share this Article

Similar Articles with Keyword 'Blockchain'

Research Paper, Information Technology, Indonesia, Volume 8 Issue 7, July 2019

Pages: 1228 - 1234

Accountability of Course Graduation Records using Permissioned Blockchain in Hyperledger Fabric

Linda Handayani, Avinanta Tarigan

Share this Article

Research Paper, Information Technology, India, Volume 8 Issue 8, August 2019

Pages: 703 - 705

Bitcoin and its Real Time Applications

Rishika Malli

Share this Article

Informative Article, Information Technology, India, Volume 7 Issue 5, May 2018

Pages: 489 - 491

Blockchains

Shanthi D L, Shruthi S R

Share this Article

Survey Paper, Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 450 - 455

A Survey on Blockchain Based Smart Applications

Saranya A, Mythili R

Share this Article

Research Paper, Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi

Share this Article

Similar Articles with Keyword 'Consensus algorithms'

Survey Paper, Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 450 - 455

A Survey on Blockchain Based Smart Applications

Saranya A, Mythili R

Share this Article

Research Paper, Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi

Share this Article

Similar Articles with Keyword 'Applications'

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1087 - 1088

Modern Warehouse Operations Execution Using Mobile Devices

Dhanesh Thatikonda

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1246 - 1249

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic

P. Sudha, K. Durairaj

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2438 - 2440

Design and Determination of Feasible Centroid for Meeting from Multiple Geo-Points: A Review

Nikhita Jambhule, Jagdish Pimple

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2077 - 2080

Image Embedding in QR Code

Swapnil Mahajan, Nisha Wankhade

Share this Article
Top