Abstract

Nowadays, Block chain is one of the most promising application areas in the field of privacy protection where its scope of applications can almost be limited. The use of the Block series in the field of education is currently of great interest to researchers and scientists, and is the focus of our study. In the age of data security and strict compliance: it has become crucial for education Institutes to store and share their information with other institutes. The main objective of this research is to highlight the existing privacy issues in educational data and use block chain as a solution to resolve these issues. This paper identifies and analyzes relevant books, research papers and articles to determine their classification in the field of education, to find the best ways to use the Block chain in education, and to determine its current and future use.. We have adopted a systematic literature review approach. This survey paper describes various techniques for privacy preservation and block chain as a solution to share data securely.

Highlights

  • Block chain is a type of link list in which every node is connected through cryptographic hash functions

  • Types of Block chain Public block chain is the block chain with no restrictions. Anybody can access this type of block chain

  • In private block chain user can do with permission

Read more

Summary

Introduction

Block chain is a type of link list in which every node is connected through cryptographic hash functions. Block chain is a distributed database that stores a growing list of ordered records called blocks. There is no need of trust all users in the network. Record Keeping and searching is a complete task. Types of Block chain Public block chain is the block chain with no restrictions Anybody can access this type of block chain. In private block chain user can do with permission. In this a single organization has a control. Consortium block chain is permissioned block chain only difference is that in consortium block chain much organization has control the access of block chain.

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call