Rihu Software Consulting Pvt Ltd, Hyderabad, INDIA
  • +91 90009 18024
  • Mon - Fri IST


Commonly used Blockchain Terms and their Definitions.

Decentralization

The movement of departments of a large organization away from a single administrative centre to other locations
                              (or)
decentralization refers to the process of something not being under the control of a single center of administration.

PoW

A proof-of-work (PoW) system (or protocol, or function) is an economic measure to deter denial of service attacks and other service abuses such as spam on a network by requiring some work from the service requester, usually meaning processing time by a computer.

PoS

Proof-of-stake (PoS) is a type of algorithm by which a cryptocurrency blockchain network aims to achieve distributed consensus. In PoS-based cryptocurrencies the creator of the next block is chosen via various combinations of random selection and wealth or age (i.e. the stake).

Nonrepudiation

Is the assurance that someone cannot deny something. Typically, it refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.

Ledger

A book or other collection of financial accounts, record book, register, registry, log book.
                      (or)
it is just a group of transactions.

Digital ledger

A special database, where each new data block entry in the database is cryptographically linked to the previous block and becomes thereby dependent on all previous blocks.

Miners

CPU/GPU cycles spent checking hashes

Immutable

Unable to change.

Irrefutable

Impossible to deny or disprove

Integrity

Data integrity is a fundamental component of information security. In its broadest use, “data integrity” refers to the accuracy and consistency of data stored in a database, data warehouse, data mart or other construct.

Provenance

A official record of origin of a document or work of art where the document was created or received initially or it is placed where the document is now stored. A provenance can be proved by following the record of ownership.

Confidentiality

Confidential information (CI) is data that must be protected from unauthorized disclosure or public release based on state or federal law. Since systems are sometimes used to manage sensitive information, Data Confidentiality is often a measure of the ability of the system to protect its data.



© 2016 Rihu Software Consulting Pvt Ltd. All rights reserved | Design by W3layouts