Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024)

Permissioned Blockchain: Leveraging Controlled Access for Diverse Sectorial Applications

Authors
Run Yan1, *
1School of Computing, Engineering & Physical Sciences, University of the West of Scotland Lanarkshire Campus, Scotland, G72 0LH, United Kingdom
*Corresponding author. Email: 1807050102@stu.hrbust.edu.cn
Corresponding Author
Run Yan
Available Online 16 October 2024.
DOI
10.2991/978-94-6463-540-9_36How to use a DOI?
Keywords
Permissioned Blockchain; Permissionless Blockchain; Application; Industries
Abstract

As technology advances, both institutions and individuals are increasingly prioritizing information security. Consequently, many enterprises and institutions are turning to distributed technologies that offer enhanced security for data storage and sharing, with blockchain technology emerging as a critical solution. This paper discusses the application of permissioned blockchain technology across various industries and compares its attributes with those of permissionless blockchains. The research indicates that permissioned blockchains provide distinct advantages in numerous sectors. Unlike typical blockchains, permissioned blockchains enhance data security and privacy through stringent access controls and authorization mechanisms. Furthermore, permissioned blockchains facilitate accurate authentication processes, reduce operational costs for enterprises and institutions, enable resource sharing, and provide robust protections against information theft. However, this paper also highlights some limitations in the current development of permissioned blockchains, including constraints on scalability, challenges in maintaining information trustworthiness, and impacts on decentralization. These issues require careful consideration as the technology continues to evolve.

Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024)
Series
Advances in Computer Science Research
Publication Date
16 October 2024
ISBN
978-94-6463-540-9
ISSN
2352-538X
DOI
10.2991/978-94-6463-540-9_36How to use a DOI?
Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Run Yan
PY  - 2024
DA  - 2024/10/16
TI  - Permissioned Blockchain: Leveraging Controlled Access for Diverse Sectorial Applications
BT  - Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024)
PB  - Atlantis Press
SP  - 356
EP  - 365
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-540-9_36
DO  - 10.2991/978-94-6463-540-9_36
ID  - Yan2024
ER  -