Decentralization and web3 technologies



EOI: 10.11242/viva-tech.01.05.MCA_05

Download Full Text here



Citation

KRUTIKA VARTAK, VISHAL YADAV,RUSHABH PRAKASH PAWAR, "Decentralization and web3 technologies", VIVA-IJRI Volume 1, Issue 6, Article MCA_05, pp. 1-9, 2023. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.

Abstract

These days, most of the people of the net’s content material cloth and user statistics are managed with the aid of some huge tech groups. There can be a developing movement to devolve this control lightly across the whole net, representing the transition to Web3. For this motion to be successful, era and protocols ought to be superior to allow internet customers to use the net securely without trusting every other consumer. These days, the internet depends simply so customers must accept as true one corporation, so accepting as true with fewer options hasn't already been superior. Considerably, this movement emphasizes growing peer-to-peer networks, blockchains, and distributed garage structures. Those structures appoint cryptographic primitives to assure security.

Keywords

Philosophy, Sociology, Schooling, Technology, Web 3. zero

References

  1. P. Baran, “On disbursed communications networks,” IEEE Transactions on Communications structures, vol. 12, no. 1, pp. 1–nine, 1964.
  2. C. Baribas, N. Narula, and E. Zuckerman, “The Decentralized web,” Aug. 2017. [Online]. available: https://dci.mit.edu/decentralizedweb
  3. “Webinar series - Imagining a better online world: Exploring the Decentralized net.” [Online]. available: https://archive.org/details/ net-webinar-collection
  4. A. Gervais, G. O. Karama, V. Capcom, and S. Capcom, “Is Bitcoin a Decentralized forex?” IEEE protection & privacy, vol. 12, no. three, pp. fifty-four–60, may also 2014. [Online]. to be had: HTTP: //ieeexplore.ieee.org/document/6824541
  5. R. Macdonald, “Locking the web Open, A call for a Decentralized internet,” Feb. 2015. [Online]. available: https://weblog.archive.org/2015/02/ eleven/locking-the-net-open-a-name-for-a-dispensed-internet/
  6. “web community.” [Online]. available: https://getdweb.internet/ beginning-story/
  7. “disbursed Press.” [Online]. available: https://dispensed.press/
  8. M. Murray, “Blockchain defined - Reuters visual guide,” Jun. 2018. [Online]. available: http://photographs.reuters.com/ generation-BLOCKCHAIN/010070P11GN/index.html
  9. S. Nakamoto, “Bitcoin: A Peer-to-Peer digital coins system,” Oct. 2008. [Online]. to be had: https://bitcoin.org/bitcoin.pdf
  10. V. Buterin, “Ethereum Whitepaper,” 2014. [Online]. available: https://github.com/ethereum/wiki/blob/ f83c4692be242ad350bef0c5f8757b7b3c27b2d9/%5BEnglish% 5D-White-Paper.md
  11. G. C. Schipper, R. Seelt, and N.-A. Le-Khac, "Forensic evaluation of matrix protocol and revolt application," Forensic science international: virtual research, vol. 36, p. 301118, 2021, draw’s 2021 European - selected Papers and prolonged Abstracts of the eighth Annual DFRWS Europe convention. [Online]. to be had: https: //www.sciencedirect.com/science/article/pii/S2666281721000159
  12. A. Kosha, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, "Hawk: The Blockchain Model of Cryptography and privateness-preserving clever Contracts," in 2016 IEEE Symposium on protection and privateness (SP), May additionally 2016, pp. 839–858, assn.: 2375-1207.
  13. L. Us, X. Shen, X. Du, X. Liao, X. Wang, L. Xing, and B. Liu, “Evil beneath the solar: information and discovering assaults on Ethereum decentralized applications,” in 30th USENIX safety Symposium (USENIX security 21). USENIX association, Aug. 2021, pp. 1307–1324. [Online]. to be had: https://www.usenix.org/conference/ usenixsecurity21/presentation/us
  14. okay. Karagiannis, “superior clever settlement Hacking,” San Francisco, CA, Mar. 2019, https://www.rsaconference.com/Library/presentation/u.s.a./2019/advancedsmart-contract-hacking. [Online]. to be had: https://www.youtube.com/ watch=IOUnhCTw6tE
  15. C. Pataki’s and F. online casino, "Hydras and IPFS: a decentralized playground for malware," worldwide magazine of data security, vol. 18, no. 6, pp. 787–799, Dec. 2019. [Online]. to be had: https://doi.org/10.1007/s10207-019-00443-0
  16. C. Kara papas, I. Pitters, N. Fotiou, and G. C. Polyzos, "Ransomware as a service the use of smart contracts and IPFS," in 2020 IEEE global convention on Blockchain and Cryptocurrency (ICBC). Toronto, ON, Canada: IEEE, might also 2020, pp. 1–five. [Online]. available: https://ieeexplore.ieee.org/report/9169451/
  17. P. Goyal, R. Netravali, M. Alizadeh, and H. Balakrishnan, “relaxed incentivization for decentralized content material shipping,” in 2d USENIX Workshop on warm subjects in side Computing (Hot Edge 19). Renton, WA: USENIX affiliation, Jul. 2019. [Online]. to be had: https://www.usenix.org/conference/hotedge19/presentation/goyal
  18. N. V. Keizer, O. assail, I. Psaras, and G. Pavlou, “FLOCK: rapid, lightweight, and Scalable Allocation for Decentralized services on Blockchain,” in 2021 IEEE global convention on Blockchain and Cryptocurrency (ICBC), may also 2021, pp. 1–9.