20702
20702
com
https://ebookmeta.com/product/blockchain-for-information-
security-and-privacy-1st-edition/
OR CLICK HERE
DOWLOAD EBOOK
https://ebookmeta.com/product/recent-trends-in-blockchain-for-
information-systems-security-and-privacy-1st-edition-ajith-abraham/
ebookmeta.com
https://ebookmeta.com/product/legal-and-privacy-issues-in-information-
security-3rd-edition-grama-joanna-lyn/
ebookmeta.com
https://ebookmeta.com/product/heterologous-expression-of-membrane-
proteins-methods-and-protocols-3rd-edition-isabelle-mus-veteau/
ebookmeta.com
100 The Story Of A Patriot 1st Edition Upton Sinclair.
https://ebookmeta.com/product/100-the-story-of-a-patriot-1st-edition-
upton-sinclair/
ebookmeta.com
https://ebookmeta.com/product/caravaggio-and-the-creation-of-
modernity-1st-edition-troy-thomas/
ebookmeta.com
https://ebookmeta.com/product/drug-repurposing-and-computational-drug-
discovery-strategies-and-advances-1st-edition-mithun-rudrapal/
ebookmeta.com
Practical Electronics and Arduino in 8 Hours (2020
Edition) Jim Fragos
https://ebookmeta.com/product/practical-electronics-and-arduino-
in-8-hours-2020-edition-jim-fragos/
ebookmeta.com
Blockchain for
Information Security
and Privacy
Blockchain for
Information Security
and Privacy
Edited by
Udai Pratap Rao
Piyush Kumar Shukla
Chandan Trivedi
Sweta Gupta
Zelalem Sintayehu Shibeshi
First edition published 2022
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
and by CRC Press
2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
© 2022 Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, LLC
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of
their use. The authors and publishers have attempted to trace the copyright holders of all material
reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and
let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, repro-
duced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now
known or hereafter invented, including photocopying, microfilming, and recording, or in any
information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.
com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA
01923, 978-750-8400. For works that are not available on CCC please contact mpkbookspermis-
[email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are
used only for identification and explanation without intent to infringe.
ISBN: 978-0-367-65448-1 (hbk)
ISBN: 978-1-032-14628-7 (pbk)
ISBN: 978-1-003-12948-6 (ebk)
DOI: 10.1201/9781003129486
Typeset in Garamond
by SPi Technologies India Pvt Ltd (Straive)
Contents
Preface.............................................................................................................ix
Editors.............................................................................................................xi
Contributors..................................................................................................xiii
1 Blockchain Impact in Education and Society...........................................1
S. GOMATHI, MUKESH SONI, UTKARSH NIGAM,
BHAVNA BAJPAI, AND SUBRATA CHOWDHURY
v
vi ◾ Contents
Index.............................................................................................................401
Preface
This book provides the reader with the most up-to-date knowledge of blockchain in
mainstream areas of security, trust, and privacy in the decentralized domain, some-
thing which is both timely and essential. This is because the distributed and P2P
applications are increasing on an almost daily basis, and the attackers adopt new
mechanisms to threaten the security and privacy of the users in those environments.
This book also provides technical information regarding blockchain-oriented soft-
ware, applications, and tools required for the researcher and developer experts in
both computing and software engineering to provide solutions and automated sys-
tems against current security, trust, and privacy issues in cyberspace.
Blockchain, a decentralized cryptographic-based technology, is promising for
the Internet of Things (IoT) security, affecting many areas, including manufactur-
ing, finance, healthcare, supply chain, identity management, e-governance, defence,
education, banking, and trading. This book gives an overview of blockchain technol-
ogy application domains in IoT, such as Vehicle Web, Power Web, Cloud Internet,
Edge Computing, etc. This book also include categorization and side-by-side com-
parison of modern methods towards secure and privacy-preserving blockchain tech-
nology concerning specific safety objectives, efficiency, limitations, computational
complexity, and communication overhead.
Trust is a crucial factor as cyber-physical systems need to depend on resources
and assets controlled by various organizations, such as Edge, Fog, and Cloud com-
puting. While numerous real-world frameworks attempt to assist such integration,
they have platform independence, security, resource management, and multi-appli-
cation execution limitations that provide insights to application based solutions.
Decentralized digital ledger technology also allows people to create encrypted digital
identities easily accessible via mobile applications and can verify identity as and
when necessary. This book will discuss how blockchain can be used in various iden-
tity management applications and authentication in election voting.
In blockchain-based finance, security and privacy challenges can be solved at a
more customized level with significantly less time. On the security aspect, it has dis-
tributed consensus, which reduces data theft by an intermediary. It showcases driving
instruments to granular information security over each product stack layer, permit-
ting certain information sharing in business systems. The expanding prominence
ix
x ◾ Preface
of a keen, smart meter, smart home, smart city, and smart services applications has
presented exceptional interest for improving the hidden data innovation framework
to guarantee the straightforwardness, security, and protection of client information.
Blockchain is a promising innovation fit for tending to such requests. This book
will also focus on the security and privacy concerns of various smart applications,
present existing issues and challenges with case studies related to these applications.
The rising blockchain innovation demonstrates the promising potential to
upgrade modern frameworks and IoT by giving applications with repetition,
changeless capacity, and encryption. In this book, we address the combination of
blockchain and IoT from concerning industrial perspective. This book presents
blockchain empowered IoT structure that included basic methods, principles,
applications, and critical difficulties. This book also explore the various blockchain-
based systems such as the Internet of Vehicles (IoV), Electronic Healthcare Records
(EHR), Copyrights Management, and Domain Name Broker services for ensuring
security, protection, and high accessibility.
Editors
xi
Contributors
Madhuri Bhavsar
Department of Computer Science and Narendra Kumar Dewangan
Engineering Department of Computer Science and
Institute of Technology Engineering
Nirma University National Institute of Technology
Ahmedabad, India Raipur, India
xiii
xiv ◾ Contributors
Blockchain Impact in
Education and Society
S. Gomathi
UK International Qualifications, Ltd., UAE
Mukesh Soni
Jagran Lackecity University, India
Utkarsh Nigam
L.D. College of Engineering, India
Bhavna Bajpai
Dr. C.V. Raman University, India
Subrata Chowdhury
Sri Venkateswara College of Engineering and Technology (Autonomous), India
Contents
1.1 Introduction�������������������������������������������������������������������������������������������������2
1.2 Topics Covered in This Section ��������������������������������������������������������������������3
1.2.1 Finding the Relevant Article �������������������������������������������������������������4
1.3 Blockchain in Education �����������������������������������������������������������������������������5
1.3.1 Categories of Application �����������������������������������������������������������������6
1.3.2 Benefits ��������������������������������������������������������������������������������������������7
1.3.3 Challenges Faced during the Adoption of Blockchain
Technology in Education �����������������������������������������������������������������7
1.4 Discussion ���������������������������������������������������������������������������������������������������9
DOI: 10.1201/9781003129486-1 1
2 ◾ Blockchain for Information Security and Privacy
1.1 Introduction
Blockchain was launched in 2008 as an emerging technology. The first time the
transactions were registered in Bitcoin cryptocurrency [1] was used as a peer-to-peer
ledger. The goal was to remove any intermediary (or third) parties and to allow users
to transact directly. Blockchain has been developed to achieve this as a decentral-
ized peer-node network. Every network node: (1) contains a copy of the transaction
records; (2) writes an entry into the network’s own record when it receives con-
sensus from other network nodes; (3) broadcasts any transaction that the network
user transmits to other nodes on the network; and (4) verifies periodically that the
network’s records are similar to those in the entire web [2]. As Bitcoin is continu-
ing to grow in popularity, the tremendous potential of its underlying technology is
realized by both researchers and practitioners [3]. Blockchain is used as a service in
many other areas, not only in cryptocurrencies, since it has several key advantages:
immutability, transparency, and trustworthiness.
Consequently, a growing number of Blockchain-based applications in vari-
ous fields were developed [4]. The development of Blockchain-based applications,
according to Gatteschi et al. [5], can be split into three key stages: 1.0, 2.0, and
3.0. Initially, it was used to allow single cash transactions, with Blockchain 1.0 for
cryptocurrencies. Blockchain 2.0 for properties and smart contracts was eventually
launched. These intelligent contracts enforce specific requirements and standards to
be satisfied before being registered in the Blockchain. Registration happens without
a third party’s involvement. Many applications in different sectors, such as govern-
ment [6], education [7], health [8], and science[9], were built in to Blockchain 3.0.
Blockchain remains in its early stages in its application for education. A small
number of educational institutions rely entirely upon Blockchain technology. Most
of these institutions use it to validate and share their students’ academic and learning
outcomes. However, field researchers believe Blockchain technology has a lot more
to offer and will revolutionize the field. Blockchain may be able to undermine the
critical position played by educational institutions as certification officers, accord-
ing to Nespor [10]. While the literature on Blockchain application has increased in
recent years, there is currently no systematic analysis of the topic. Such a study is
beneficial for an up-to-date analysis of the subject and informs evidence-based prac-
tices. Through research into how Blockchain technologies are used in education, this
Blockchain Impact in Education and Society ◾ 3
The following paragraphs explain how these five measures were carried out in this
systematic review. The following research questions were formulated based on the
intent of this report.
[All: Blockchain] AND [All: education], [All: Taylor & Francis online
Blockchain] AND [All: teaching],[All: Blockchain]
AND [All: learning]
during the initial quest for databases. But, since the search requires references not
checked by peers, Google Scholar has been limited to articles by well-known pub-
lishers, e.g., the AACE, the Australasian Society for the Advancement of Education
Computers, the Canadian Education Innovation Network, Consortia Academia
Publishing, and Distance Editorial. Google Scholar’s Advanced Search page has
been used to limit the search to specific editors. The publishers’ names were entered
in the field “Return published objects,” while the question stings were entered into
the field “with all the words” using the following query strings for this search.
1. The researchers reviewed the titles and abstracts for the papers searched with
the pre-defined requirements of inclusion and exclusion after the conclusion
of their search. The search was completed.
a. An essay was omitted where the complete text was not accessible online.
b. Blockchain technology did not apply in education.
c. The application being tabled was not practical; i.e., opinion.
The application was not submitted. EndNote has inserted the remaining
products and duplicates have been excluded. Finally, the full text of every
document has been read to ensure that all the details relevant to this sys-
tematic analysis are included. There has been no consistency evaluation.
Through using empirical bases as a main source for finding the related
papers, the accuracy of this analysis has been assured. Only peer-reviewed
papers written by leading publishers have then been deemed to be part of
this analysis for the search on Google Scholar. We were thus able to include
high-quality papers.
2. Data Extraction – For the extraction of data from the studies included, a data
extraction form was used. The type was specifically developed for this review
and was piloted on a sample of documents.
3. Data Analysis – Data analysis was carried out after extracting the data from
documents. The extracted information was analysed on four key themes which
emerged from the questions of study. The topics included: application, advan-
tages, threats, and the future. Several sub-topics arose from data analyses for
each of these key themes.
1.3 Blockchain in Education
Several Blockchain applications for educational purposes have been developed, as
shown in Section 2.2. Such applications can be grouped into 12 distinct categories:
management of qualifications, competence management, and learning results man-
agement, assessment of students’ abilities, the security of learning objects, safeguard-
ing of shared learning environment, transferring fees and credits, gaining digital
custodial consent, management of competitions, copyright management, enhanc-
ing interactions between students.
6 ◾ Blockchain for Information Security and Privacy
1.3.1 Categories of Application
criteria indicator), the courses’ weight, etc. The transition from the assessment of
students’ achievement to the post-jobs assessment results is completed, and coun-
terparts from the evaluation of student skills are sent to the program, in which the
curriculum is continually improved. Some more articles based on Competencies
and learning outcomes management are given in three articles [20–22].
1.3.2 Benefits
Blockchain could bring education to seven different types of benefits. Blockchain
could bring to education were highlighted in the checked papers. Security is the
first advantage [23, 24]. Seventeen articles (55%) defined protection as an essen-
tial advantage of incorporating Blockchain education technology. Data protection,
privacy, and dignity are all part of security. A second significant advantage of using
Blockchain in education is greater control over how and by whom student data are
accessed. Twelve papers (39%) highlighted this gain. Increased accountability and
openness is the third benefits highlighted in 11 articles (36%). The fourth advan-
tage of Blockchain technology in education is increasing trust. Blockchain can cre-
ate trust between all parties involved and promote contact with them, according
to 10 articles (32%). A fifth advantage of using Blockchain in education lowers
costs. Nine reports (29%) documented this gain. The type of Blockchain technol-
ogy, according to these papers, can help reduce the unnecessary costs of transactions
and data storage. Authentication is the sixth advantage. Nine studies (29%) indi-
cate that Blockchain technology will identify students and render digital certificates
authenticated. The seventh benefit is correlated with the tests of students. Eight
papers (26%) suggested that Blockchain technology might change how student per-
formance and learning results are evaluated [25].
Figures 1.1 and 1.2 represents the number of articles related to challenges and
benefits, respectively.
I. The first concern is the scalability of the Blockchain. Ten papers (32%) note
that the number of Blockchain network transactions contributes to block size
growth. Ultimately, the transaction latency will be increased.
II. The second issue relates to Blockchain privacy and security. Nine (29 percent)
papers discussed several concerns related to protection and privacy, for exam-
ple, malicious attacks and data leaks, by using Blockchain technology.
III. The cost of using this technology poses the third significant barrier to
Blockchain in education. Nine papers (29 percent) approached this problem
8 ◾ Blockchain for Information Security and Privacy
from different angles: power computation costs [26]; changing the current
infrastructure; slow transaction time; and large-scale data management costs.
IV. Trust is related to the fourth obstacle. Seven articles (23%) find that schools
are still unwilling to share their data in a Blockchain network.
V. A fifth challenge seen in four papers (13%) sets limits on the adoption of
Blockchain technology. These four posts make it difficult for educational insti-
tutions to decide which data and services should be delivered across the
Blockchain network. Two articles (6%) showed that immutability, a signifi-
cant characteristic of Blockchain, could challenge the implementation of
Blockchain technology for education. These papers explained that immutabil-
ity would make it impossible for educational institutions to enforce new infor-
mation storage rules or correct inaccurate data.
VI. The sixth problem concerns the immature existence of Blockchain technology.
One article (3%) stated that Blockchain still has immaturity problems, such as
weak usability and complicated setups. Data unavailability is also a problem
mentioned in one article (3%). This post will become inaccessible if data man-
agement is put in the user’s hands itself, and applications relying on this data
could impact. One final obstacle that has been illustrated in one of the papers
discussed (3%) is to weaken the importance of conventional school diplomas.
According to this report, Blockchain may allow students to serve as their life-
time education records, which may undermine education institutions’ central
position as certification agents.
1.4 Discussion
The publication trend shows that the use of Blockchain technology in education
is increasing worldwide because of the relatively limited number of studies found.
However, further research in this field is required. Overall, our three study question-
naires were supported by this systematic analysis of the 31 reports.
performances of these certificates benefitted from the great faith and protection that
Blockchain technology offers.
Bdiwi et al. [27] introduced the Ubiquitous Learning Framework (ULS), which
uses Blockchain technology to ensure a high degree of safety when students work
together. U-learning (Ubiquitous learning), therefore, include an immersive multi-
media environment to facilitate better teacher–student contact. Similarly, Bore et al.
[28] stressed the need to enhance schools’ educational climate by using Blockchain
as a School Information Platform (SIH). Such a framework may compile, evalu-
ate, and report information about school systems to improve decision-making. The
fifth category involves the transfer of charges and credit. It includes applications
with similar functions for the transfer of credentials or fees between institutions,
organizations, and even universities because of Blockchain’s high level of protection
and confidence. Educational institutions typically rely on a third party to manage
and authorize credit or fee transfer. Fortunately, the Blockchain can be used to share
information and remove the necessity for a high level of protection of certain third
parties or intermediaries. The tokens used to demonstrate the transfer process were
used in the EduCTX method [29]. These tokens can be in any digital format for
learning units, including diplomas, certificates, and training. Each school has its
EduCTX address for safe transferring processes. Some demands related to the acqui-
sition of digital guard consent were addressed in category six. Blockchain helped
to improve the conventional method of obtaining consent from parents instead
of electronically. The confidence Blockchain technology can bring great reflection.
The decentralized design of Blockchain helps speed up the consent process with-
out affecting its privacy. Through the adoption of this technology the selection and
switching process between several students, parents, and educational institutions
would be facilitated greatly. The mechanism for allowing public schools, which want
to meet their students without parents’ permission for every single occasion, is sug-
gested by Gilda and Mehrotra [30].
Nespor [10] suggested a certification platform that would offset the school’s
use as a certification agent for the project. This request would allow higher educa-
tion providers or employers to provide students with a high degree of information
privacy with official certificates. Students could thus explicitly share it with some-
one asking for their official documents. Similarly, Han et al. [31] use Blockchain
technology’s decentralized existence to supply new Blockchain-based educational
records to search and issue official transcripts or certificates. Individually, their data
can be accessed. However, the access and alteration of saved data in the system
under certain limited conditions and regulations are only allowable to accredited
businesses. Competencies and learning results management were based in the sec-
ond group. More focus has been given to developing Blockchain applications to
boost learning goals and enhance their skills. This will lead to better preparation and
enrich the field of education in a wide variety.
Farah et al. [17] have developed a framework for monitoring students’ success in
their multi-learning work. For each particular operation, it adds into a block inde-
pendently of all traces. This learning block may also be viewed as self-describing, as
Blockchain Impact in Education and Society ◾ 11
protection in the education sector. The consensus protocol was used in Comparison
to preserve the order of Application [27].
The ledger contents are checked, 12 of the 18 transactions, and there are decrease
in the risk of non-secured transactions. The security of transactions is ensured
through the use of cryptographical hatches and signatures. The beauty of the
Blockchain system depends on the data themselves being protected and on whether
or not they are not damaged. To demonstrate this, Blockchain traces, and records of
learning were signed and authenticated [17]. There are different types of data related
to a learning activity in each learning block. To secure these data before sending it
to other participants, an encryption algorithm was implemented [36]. Furthermore,
the field of education will benefit greatly from the Blockchain for cost reduction.
The costs include storage, transaction costs, and the handling and preservation of
educational documents. Costs are included. The cost of conventional cloud-based
storage is significantly reduced through using a public/private distributed network
which is accessible from anywhere. In general, it needs extra costs to check and
process academic certificates, while Blockchain reduces these costs [29]. The use of
Blockchain technology can also increase the evaluation of students. The Blockchain
was introduced with regard to calculating the learning output based on the results.
One of the significant characteristics and advantages of Blockchain is to restrict/
control access to stored documents. Transcripts, diplomas, or personal students/
teachers’ documents are included in educational records.
Arenas [37] demonstrated an excellent example in which a licensed Blockchain
platform was used to restrict access to academic credentials and limit them solely
to the intended participants. Only accredited organizations can access and change
stored data according to relevant regulations on the Blockchain platform. In addi-
tion, improving accountability and transparency are two benefits that Blockchain
technology has accomplished. Saving all educational and school information at one
readily available location [38] would make the use of these records more accountable
and transparent.
Bore et al. [28]establishes the framework for gathering and storing school
reports and records in the School Information Hub (SIH) based on Blockchain.
This framework helped make shared data more accessible and increase the flexibility
to interpret, compare, or distribute data. Blockchain also guarantees the validity and
identification of digital certificates. A digital curriculum was held in a Blockchain
in comparison [39]. The approved university signs this with a private key when
blocks have been formed. A cryptographic hash will then be provided to ensure
that nobody can interrupt the material. The university verifies these data’s valid-
ity, and use the initial institution’s key to confirm them. Trust is another benefit
of Blockchain technology. Only responsible parties can either add blocks to the
network, or access it. When engaging with authorities from various regions, trust is
a significant concern. Introducing stable and efficient systems based on Blockchain,
universities, or educational institutions can create a dedicated group. EduCTX was
launched in relation [40], which is a credit and grading Blockchain network. Tokens
Blockchain Impact in Education and Society ◾ 13
are passed to responsible parties. These tokens depend on the credits that are col-
lected in the records of students. This contributed to the establishment of higher
education organizations of an internationally trusted and cohesive structure.
Moreover, the enhancement of the quality of student record management is
one significant advantage of Blockchain technology. Using Blockchain in educa-
tion, the probability of trade errors between intended parties may theoretically be
minimized. It uses a ledger to share data quicker and more effectively. Because of
its simplicity and accountability, digital records and certificates can be best handled
by Blockchain. The “UZHBC,” a Blockchain system operated at the University of
Zurich, and taking into account multiple stakeholder criteria, was implemented by
Gresch et al. [13]. Also, the Application will achieve productivity and accountabil-
ity. The Blockchain Framework for Advisory Advice is shared in 2019 with 13 of 18
institutions, students, and job agencies. [21]. Another benefit of using Blockchain
technology is helping learners’ career choices.
For the engagement in learning events, they used a learning incentive scheme.
The study tools in the peer-to-peer network can be shared across all nodes. All learn-
ing records are compiled into a block and can easily be tracked to track the learners’
interactivity and interoperability progress. What are Blockchain Technology’s prob-
lems in education? While Blockchain has demonstrated its value in an educational
environment, there are many challenges to overcome when using such technology
in education. In this review paper we have outlined these problems in some fun-
damental categories. While protection is the key feature of Blockchain technology,
it is impossible to eliminate the possibility of malicious attacks. It is a challenge to
provide both security and confidentiality at the same time, and when an individual
is at risk (through the online authorization of educational qualifications and certifi-
cates), the problem becomes more critical [31]. Many systems use private and public
keys to ensure privacy. However, since each public key’s available details are publicly
accessible, Blockchain cannot guarantee transactional privacy, and user transactions
can therefore be attached to disclose information for users.
Many studies have been carried out in attempts to address this problem. Several
researchers have suggested concepts, including Zilliqa [41], a new Blockchain
framework focused on a shared mechanism for disconnecting the large Blockchain
network through multi-shard transactions. However, before the Blockchain can be
implemented on a large scale, scalability problems must be addressed effectively.
Blockchain is an evolving technology that must be incorporated into the existing
framework. But it can cost so much for adoption and execution. In addition to this
deployment expense, many Blockchain technologies are often costly for transac-
tions or computations [17]. The cost would increase as the block size increases with
users’ rise to handle and store such large student data. This approach would be dif-
ficult to use in conventional education systems without handling this growth and
running costs. To verify credentials, all entities must agree to share their records.
But how are all organizations prepared to share their data? The question remains.
In some cases, whether or not a DLT/Blockchain solution improves over a more
14 ◾ Blockchain for Information Security and Privacy
1.6 Conclusion
Taken as a whole, Blockchain will strengthen the education system in several ways.
The technology is ideal for the safe storage, sharing, and networking of informa-
tion. This advanced device will make many processes quicker, simpler, and safer. It
bridges the gap in credentials, security of copyright, and effective communication.
The Blockchain will soon benefit from these regular processes. New technology joins
our lives, and we can use it wisely to make progress in the right direction. Today’s
16 ◾ Blockchain for Information Security and Privacy
students are the ones living in a whole new world! We should help them, accept the
changes, and learn how to improve things.
References
[1] C. S. Wright, “Bitcoin: A peer-to-peer electronic cash system,” SSRN Electron. J.,
2019.
[2] S. Chowdhury, R. Govindaraj, S. S. Nath, and K. Solomon, “Analysis of the IoT sen-
sors and networks with big data and sharing the data through cloud platform,” Int. J.
Innov. Technol. Explor. Eng., 8, 405–408, 2019.
[3] R. Collins, “Blockchain: A new architecture for digital content,” Econtent, 39, 22–23,
2016.
[4] Y. J. Lee, and K. M. Lee, “Blockchain-based multi-purpose authentication method for
anonymity and privacy,” Int. J. Recent Technol. Eng., 8, 409–414, 2019.
[5] V. Gatteschi, F. Lamberti, C. Demartini, C. Pranteda, and V. Santamaria, “To
Blockchain or not to Blockchain: That Is the question,” IT Prof., 20, 62–74, 2018.
[6] S. Ølnes, J. Ubacht, and M. Janssen, “Blockchain in government: Benefits and impli-
cations of distributed ledger technology for information sharing,” Gov. Inf. Q., 34,
355–364, 2017.
[7] Chen, G., Xu, B., Lu, M. et al. “Exploring Blockchain technology and its potential
applications for education,” Smart Learn. Environ., 5, 1, 2018.
[8] R. J. Krawiecet al., “Blockchain: Opportunities for health care,” ComputerWeekly.com,
2016.
[9] A. Kamilaris, A. Fonts, and F. X. Prenafeta-Boldύ, “The rise of Blockchain technology
in agriculture and food supply chains,” Trends Food Sci. Technol., 91, 640–652, 2019.
[10] J. Nespor, “Cyber schooling and the accumulation of school time,” Pedagog. Cult. Soc.,
27, 325–341, 2019.
[11] Y. Xu, S. Zhao, L. Kong, Y. Zheng, S. Zhang, and Q. Li, “ECBC: A high performance
educational certificate Blockchain with efficient query,” in Lecture Notes in Computer
Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), 2017.
[12] M. Hori, and M. Ohashi, “Adaptive Identity authentication of Blockchain system-the
collaborative cloud educational system,” in EdMedia+ InnovateLearning, 2018.
[13] J. Gresch, B. Rodrigues, E. Scheid, S. S. Kanhere, and B. Stiller, “The proposal of a
Blockchain-based architecture for transparent certificate handling,” in Lecture Notes in
Business Information Processing, 2019.
[14] D. Lizcano, J. A. Lara, B. White, and S. Aljawarneh, “Blockchain-based approach to
create a model of trust in open and ubiquitous higher education,” J. Comput. High.
Educ., 32, 109–134, 2020.
[15] E. Funk, J. Riddell, F. Ankel, and D. Cabrera, “Blockchain technology: A data frame-
work to improve validity, trust, and accountability of information exchange in health
professions education,” Acad. Med., 93, 1791–1794, 2018.
[16] N. Satheesh, G. R. K. Rao, S. Chowdhury, K. B. Prakash, and S. Sengan, “Blockchain-
facilitated iot built cleverer home with unrestricted validation arrangement,” Int. J.
Adv. Trends Comput. Sci. Eng., 9, 5398–5405, 2020.
[17] J. C. Farah, A. Vozniuk, M. J. Rodriguez-Triana, and D. Gillet, “A blueprint for a
Blockchain-based architecture to power a distributed network of tamper-evident learn-
ing trace repositories,” in Proceedings – IEEE 18th International Conference on Advanced
Learning Technologies, ICALT 2018, 2018.
Blockchain Impact in Education and Society ◾ 17
[18] R. Nair, and A. Bhagat, “Feature selection method to improve the accuracy of classifi-
cation algorithm,” Int. J. Innov. Technol. Explor. Eng., 8, 124–127, 2019.
[19] B. Duan, Y. Zhong, and D. Liu, “Education application of Blockchain technology:
Learning outcome and meta-diploma,” in Proceedings of the International Conference on
Parallel and Distributed Systems – ICPADS, 2018.
[20] W. Zhao, K. Liu, and K. Ma, “Design of student capability evaluation system merging
Blockchain technology,” J. Phys. Conf. Ser., 1168, 032123, 2019.
[21] Q. Liu, Q. Guan, X. Yang, H. Zhu, G. Green, and S. Yin, “Education-industry coop-
erative system based on Blockchain,” in Proceedings of 2018 1st IEEE International
Conference on Hot Information-Centric Networking, HotICN 2018, 2019.
[22] S. Chowdhury, P. Mayilvahanan, and R. Govindaraj, “Optimal feature extraction and
classification-oriented medical insurance prediction model: machine learning inte-
grated with the internet of things,” Int. J. Comput. Appl., 1–13, 2020.
[23] G. Arora, P. L. Pavani, R. Kohli, and V. Bibhu, “Multimodal biometrics for improvised
security,” in 2016 1st International Conference on Innovation and Challenges in Cyber
Security, ICICCS 2016, 2016.
[24] S. Chowdhury, and P. Mayilvahanan, “A survey on internet of things: Privacy with
security of sensors and wearable network ip/protocols,” Int. J. Eng. Technol., 7, 200–
205, 2018.
[25] A. Alammary, S. Alhazmi, M. Almasri, and S. Gillani, “Blockchain-based applications
in education: A systematic review,” Appl. Sci. (Switzerland), 9, 240, 2019.
[26] P. Sharma, R. Nair, and V. K. Dwivedi, “Power consumption reduction in iot devices
through field-programmable gate array with nanobridge switch,” in Lecture Notes in
Networks and Systems, 2021.
[27] R. Bdiwi, C. DeRunz, S. Faiz, and A. A. Cherif, “A Blockchain based decentralized plat-
form for ubiquitous learning environment,” in Proceedings – IEEE 18th International
Conference on Advanced Learning Technologies, ICALT 2018, 2018.
[28] N. Bore, S. Karumba, J. Mutahi, S. S. Darnell, C. Wayua, and K. Weldemariam,
“Towards Blockchain- enabled school information hub,” in ACM International
Conference Proceeding Series, 2017.
[29] M. Holbl, A. Kamisalic, M. Turkanovic, M. Kompara, B. Podgorelec, and M. Hericko,
“EduCTX: An ecosystem for managing digital micro- credentials,” in 2018 28th
EAEEIE Annual Conference, EAEEIE 2018, 2018.
[30] S. Gilda, and M. Mehrotra, “Blockchain for student data privacy and consent,” in
2018 International Conference on Computer Communication and Informatics, ICCCI
2018, 2018.
[31] M. Han, D. Wu, Z. Li, Y. Xie, J. S. He, and A. Baba, “A novel Blockchain-based edu-
cation records verification solution,” in SIGITE 2018 – Proceedings of the 19th Annual
SIG Conference on Information Technology Education, 2018.
[32] P. Williams, “Does competency-based education with Blockchain signal a new mission
for universities?,” J. High. Educ. Policy Manag., 41, 104–117, 2019.
[33] B. Wu, and Y. Li, “Design of evaluation system for digital education operational skill
competition based on Blockchain,” in Proceedings – 2018 IEEE 15th International
Conference on e-Business Engineering, ICEBE 2018, 2018.
[34] R. Nair, and A. Bhagat, “An Introduction to clustering algorithms in big data,” 559–
576, 2020.
[35] I. Mitchell, S. Hara, and M. Sheriff, “DAppER: Decentralised application for exami-
nation review,” in Proceedings of 12th International Conference on Global Security, Safety
and Sustainability, ICGS3 2019, 2019.
18 ◾ Blockchain for Information Security and Privacy
[36] A. Anand, A. Raj, R. Kohli, and V. Bibhu, “Proposed symmetric key cryptography
algorithm for data security,” in 2016 1st International Conference on Innovation and
Challenges in Cyber Security, ICICCS 2016, 2016.
[37] R. Arenas, and P. Fernandez, “CredenceLedger: A permissioned Blockchain for veri-
fiable academic credentials,” in 2018 IEEE International Conference on Engineering,
Technology and Innovation, ICE/ITMC 2018 – Proceedings, 2018.
[38] S. Saibabavali, B. Manikanta, S. N. Siddhu, and S. Chowdhury, “Application for
searching product nearby location,” Int. Res. J. Eng. Technol., 4, 2751–2755, 2017.
[39] I. Bandara, F. Ioras, and M. P. Arraiza, “The emerging trend of Blockchain for validat-
ing degree apprenticeship certification in cybersecurity education,” in INTED2018
Proceedings, 2018.
[40] M. Turkanović, M. Hölbl, K. Košič, M. Heričko, and A. Kamišalić, “EduCTX: A
Blockchain-based higher education credit platform,” IEEE Access, 6, 5112–5127,
2018.
[41] M. Sharples, and J. Domingue, “The Blockchain and kudos: A distributed sys-
tem for educational record, reputation and reward,” in Lecture Notes in Computer
Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), 9891, 490–496, 2016.
Chapter 2
Sarvesh Kumar
Babu Banarasi Das University, Lucknow, India
Aakanksha Jain
Poornima University, India
Contents
2.1 Blockchain Technology ������������������������������������������������������������������������������20
2.1.1 Centralized, Decentralized and Distributed ������������������������������������21
2.1.2 Types of Blockchain �����������������������������������������������������������������������22
2.2 Blockchains and IoT Systems ��������������������������������������������������������������������23
2.3 Blockchain IoT Platforms ��������������������������������������������������������������������������24
2.4 Need of IOTA �������������������������������������������������������������������������������������������24
2.5 Challenges to Address the Integration of Blockchain in IoT ����������������������25
2.5.1 Scalability ���������������������������������������������������������������������������������������25
2.5.2 Security ������������������������������������������������������������������������������������������26
DOI: 10.1201/9781003129486-2 19
20 ◾ Blockchain for Information Security and Privacy
2.1 Blockchain Technology
Blockchain innovation became a worldwide innovation in 2008 when it was utilized
for the Bitcoin digital currency. A Blockchain is a far-off object in information base
for taking care of a dynamical rundown of records called blocks. A square chain is
recreated in a decentralized design, where each center stores a copy of the entire
article or item. The geography of an advanced record is a chain of article since each
item, except for the principal object, the alleged Genesis Block or Object, contains a
connection to the former article realized as a hash of the past thing. Each square in
a Blockchain is likewise carefully time bound. The fundamental construction of the
Blockchain is shown in Figure 2.1.
Apply and Analyse Several Blockchain Techniques ◾ 21
(Continued)
Exploring the Variety of Random
Documents with Different Content
reference. But this interpretation is not absolutely necessary. John
might use this language either because the angels had been spoken
of before; or because it would be sufficiently understood, from the
common use of language, who would be referred to—as we now
might speak of “the seven members of the cabinet of the United
States,” or “the thirty-one governors of the states of the Union,”
though they had not been particularly mentioned; or he might speak
of them as just then disclosed to his view, and because his meaning
would be sufficiently definite by the circumstances which were to
follow—their agency in blowing the trumpets. It would be entirely in
accordance with the usage of the article for one to say that he saw
an army, and the commander-in-chief, and the four staff-officers,
and the five bands of music, and the six companies of sappers and
miners, &c. It is not absolutely necessary, therefore, to suppose that
these angels had been before referred to. There is, indeed, in the
use of the phrase “which stood before God,” the idea that they are
to be regarded as permanently standing there, or that that is their
proper place—as if they were angels who were particularly
designated to this high service. Comp. Lu. i. 19: “I am Gabriel, that
stand in the presence of God.” If this idea is involved in the phrase,
then there is a sufficient reason why the article is used, though they
had not before been mentioned. ¶ And to them were given seven
trumpets. One to each. By whom the trumpets were given is not
said. It may be supposed to have been done by Him who sat on the
throne. Trumpets were used then, as now, for various purposes; to
summon an assembly; to muster the hosts of battle; to inspirit and
animate troops in conflict. Here they are given to announce a series
of important events producing great changes in the world—as if God
summoned and led on his hosts to accomplish his designs.
Comp. Hag., ch. ii. 17. The destruction of the Assyrian army, it is
said, would be accomplished in the same way, Is. xxx. 30. Comp.
Eze. xiii. 11; xxxviii. 22. ¶ And fire. Lightning. This also is an
instrument and an emblem of destruction. ¶ Mingled with blood. By
blood “we must naturally understand,” says Professor Stuart, “in this
case, a shower of coloured rain; that is, rain of a rubidinous aspect,
an occurrence which is known sometimes to take place, and which,
like falling stars; eclipses, &c., was viewed with terror by the
ancients, because it was supposed to be indicative of blood that was
to be shed.” The appearance, doubtless, was that of a red shower,
apparently of hail, or snow—for rain is not mentioned. It is not a
rain-storm, it is a hail-storm that is the image here; and the image is
that of a driving hail-storm, where the lightnings flashed, and where
there was the intermingling of a reddish substance that resembled
blood, and that was an undoubted symbol of blood that was to be
shed. I do not know that there is red rain, or red hail, but red snow
is not very uncommon; and the image here would be complete if we
suppose that there was an intermingling of red snow in the driving
tempest. This species of snow was found by Captain Ross at Baffin’s
Bay on the 17th of August, 1819. The mountains that were dyed
with the snow were about eight miles long, and six hundred feet
high. The red colour reached to the ground in many places ten or
twelve feet deep, and continued for a great length of time. Although
red snow had not until this attracted much notice, yet it had been
long before observed in Alpine countries. Saussure discovered it on
Mount St. Bernard in 1778. Ramond found it on the Pyrenees; and
Summerfield discovered it in Norway. “In 1818 red snow fell on the
Italian Alps and Apennines. In March, 1808, the whole country about
Cadore, Belluno, and Feltri was covered with a red-coloured snow to
the depth of six and a half feet; but a white snow had fallen both
before and after it, the red formed a stratum in the middle of the
white. At the same time a similar fall took place in the mountains of
the Valteline, Brescia, Carinthia, and Tyrol” (Edin. Encyclo. art.
“Snow”). These facts show that what is referred to here in the
symbol might possibly occur. Such a symbol would be properly
expressive of blood and carnage. ¶ And they were cast upon the
earth. The hail, the fire, and the blood—denoting that the fulfilment
of this was to be on the earth. ¶ And the third part of trees was
burnt up. By the fire that came down with the hail and the blood.
¶ And all green grass was burnt up. Wherever this lighted on the
earth. The meaning would seem to be, that wherever this tempest
beat the effect was to destroy a third part—that is, a large portion of
the trees, and to consume all the grass. A portion of the trees—
strong and mighty—would stand against it; but that which was so
tender as grass is, would be consumed. The sense does not seem to
be that the tempest would be confined to a third part of the world,
and destroy all the trees and the grass there; but that it would be a
sweeping and general tempest, and that wherever it spread it would
prostrate a third part of the trees and consume all the grass. Thus
understood, it would seem to mean, that in reference to those things
in the world which were firm and established like trees, it would not
sweep them wholly away, though it would make great desolation;
but in reference to those which were delicate and feeble—like grass
—it would sweep them wholly away.—This would not be an inapt
description of the ordinary effects of invasion in time of war. A few of
those things which seem most firm and established in society—like
trees in a forest—weather out the storm; while the gentle virtues,
the domestic enjoyments, the arts of peace, like tender grass, are
wholly destroyed. The fulfilment of this we are undoubtedly to
expect to find in the terrors of invasion; the evils of war; the effusion
of blood; the march of armies. So far as the language is concerned,
the symbol would apply to any hostile invasion; but in pursuing the
exposition on the principles on which we have thus far conducted it,
we are to look for the fulfilment in one or more of those invasions of
the northern hordes that preceded the downfall of the Roman
empire and that contributed to it.—In the “Analysis” of the chapter,
some reasons were given why these four trumpet signals were
placed together, as pertaining to a series of events of the same
general character, and as distinguished from those which were to
follow. The natural place which they occupy, or the events which we
should suppose, from the views taken above of the first six seals,
would be represented, would be the successive invasions of the
northern hordes which ultimately accomplished the overthrow of the
Roman empire. There are four of these “trumpets,” and it would be a
matter of inquiry whether there were four events of sufficient
distinctness that would mark these invasions, or that would
constitute periods or epochs in the destruction of the Roman power.
At this point in writing, I looked on a chart of history, composed with
no reference to this prophecy, and found a singular and unexpected
prominence given to four such events extending from the first
invasion of the Goths and Vandals at the beginning of the fifth
century, to the fall of the Western empire, A.D. 476. The first was the
invasion of Alaric, king of the Goths, A.D. 410; the second was the
invasion of Attila, king of the Huns, “scourge of God,” A.D. 447; a
third was the sack of Rome by Genseric, king of the Vandals,
A.D. 455; and the fourth, resulting in the final conquest of Rome, was
that of Odoacer, king of the Heruli, who assumed the title of King of
Italy, A.D. 476. We shall see, however, on a closer examination, that
although two of these—Attila and Genseric—were, during a part of
their career, contemporary, yet the most prominent place is due to
Genseric in the events that attended the downfall of the empire, and
that the second trumpet probably related to him; the third to Attila.
These were, beyond doubt, four great periods or events attending
the fall of the Roman empire, which synchronize with the period
before us. If, therefore, we regard the opening of the sixth seal as
denoting the threatening aspect of these invading powers—the
gathering of the dark cloud that hovered over the borders of the
empire, and the consternation produced by that approaching storm;
and if we regard the transactions in the seventh chapter—the
holding of the winds in check, and the sealing of the chosen of God
—as denoting the suspension of the impending judgments in order
that a work might be done to save the church, and as referring to
the divine interposition in behalf of the church; then the appropriate
place of these four trumpets, under the seventh seal, will be when
that delayed and restrained storm burst in successive blasts upon
different parts of the empire—the successive invasions which were
so prominent in the overthrow of that vast power. History marks four
of these events—four heavy blows—four sweepings of the tempest
and the storm—under Alaric, Genseric, Attila, and Odoacer, whose
movements could not be better symbolized than by these successive
blasts of the trumpet.
The first of these is the invasion of Alaric; and the inquiry now is,
whether his invasion is such as would be properly symbolized by the
first trumpet. In illustrating this, it will be proper to notice some of
the movements of Alaric, and the alarm consequent on his invasion
of the empire; and then to inquire how far this corresponds with the
images employed in the description of the first trumpet. For these
illustrations I shall be indebted mainly to Mr. Gibbon. Alaric, the
Goth, was at first employed in the service of the emperor
Theodosius, in his attempt to oppose the usurper Arbogastes, after
the murder of Valentinian, emperor of the West. Theodosius, in
order to oppose the usurper, employed, among others, numerous
barbarians—Iberians, Arabs, and Goths. One of them was Alaric,
who, to use the language of Mr. Gibbon (ii. 179), “acquired in the
school of Theodosius the knowledge of the art of war, which he
afterwards so fatally exerted for the destruction of Rome,” A.D. 392‒
394. After the death of Theodosius (A.D. 395) the Goths revolted
from the Roman power, and Alaric, who had been disappointed in his
expectations of being raised to the command of the Roman armies,
became their leader (Decline and Fall, ii. 213). “That renowned
leader was descended from the noble race of the Balti; which yielded
only to the royal dignity of the Amali; he had solicited the command
of the Roman armies; and the imperial court provoked him to
demonstrate the folly of their refusal, and the importance of their
loss. In the midst of a divided court and a discontented people the
emperor Arcadius was terrified by the aspect of the Gothic
arms,” &c. Alaric then invaded and conquered Greece, laying it waste
in his progress, until he reached Athens, ii. 214, 215. “The fertile
fields of Phocis and Bœotia were instantly covered by a deluge of
barbarians, who massacred the males of age to bear arms, and
drove away the beautiful females, with the spoil and cattle of the
flaming villages.” Alaric then concluded a treaty with Theodosius, the
emperor of the East (ii. 216); was made master-general of Eastern
Illyricum, and created a magistrate (ii. 217); soon united under his
command the barbarous nations that had made the invasion, and
was solemnly declared to be the king of the Visigoths, ii. 217.
“Armed with this double power, seated on the verge of two empires,
he alternately sold his deceitful promises to the courts of Arcadius
and Honorius, till he declared and executed his purpose of invading
the dominions of the West. The provinces of Europe which belonged
to the Eastern empire were already exhausted; those of Asia were
inaccessible; and the strength of Constantinople had resisted his
attack. But he was tempted by the beauty, the wealth, and the fame
of Italy, which he had twice visited; and he secretly aspired to plant
the Gothic standard on the walls of Rome; and to enrich his army
with the accumulated spoils of three hundred triumphs,” ii. 217, 218.
In describing his march to the Danube, and his progress towards
Italy, having increased his army with a large number of barbarians,
Mr. Gibbon uses the remarkable language expressive of the general
consternation, already quoted in the description of the sixth seal.
Alaric approached rapidly towards the imperial city, resolved to
“conquer or die before the gates of Rome.” But he was checked by
Stilicho, and compelled to make peace, and retired (Decline and Fall,
ii. 222), and the threatening storm was for a time suspended. See
Notes on ch. vii. 1, seq. So great was the consternation, however,
that the Roman court, which then had its seat at Milan, thought it
necessary to remove to a safer place, and became fixed at Ravenna,
ii. 224. This calm, secured by the retreat of Alaric, was, however, of
short continuance. In A.D. 408 he again invaded Italy in a more
successful manner, attacked the capital, and more than once pillaged
Rome. The following facts, for which I am indebted to Mr. Gibbon,
will illustrate the progress of the events, and the effects of this blast
of the “first trumpet” in the series that announced the destruction of
the Western empire:—
(c) It is, perhaps, only necessary to add that the invasion of Alaric
was in fact but one of the great events that led to the fall of the
empire, and that, in announcing that fall, where a succession of
events was to occur, it would properly be represented by the blast of
one of the trumpets. The expressions employed in the symbol are,
indeed, such as might be applied to any invasion of hostile armies,
but they are such as would be used if the design were admitted to
be to describe the invasion of the Gothic conqueror. For (1) that
invasion, as we have seen, would be well represented by the storm
of hail and lightning that was seen in vision; (2) by the red colour
mingled in that storm—indicative of blood; (3) by the fact that it
consumed the trees and the grass. This, as we saw in the
exposition, would properly denote the desolation produced by war—
applicable, indeed, to all war, but as applicable to the invasion of
Alaric as any war that has occurred, and it is such an emblem as
would be used if it were admitted that it was the design to represent
his invasion. The sweeping storm, prostrating the trees of the forest,
is an apt emblem of the evils of war, and, as was remarked in the
exposition, no more striking illustration of the consequences of a
hostile invasion could be employed than the destruction of the
“green grass.” What is here represented in the symbol cannot,
perhaps, be better expressed than in the language of Mr. Gibbon,
when describing the invasion of the Roman empire under Alaric.
Speaking of that invasion, he says—“While the peace of Germany
was secured by the attachment of the Franks and the neutrality of
the Alemanni, the subjects of Rome, unconscious of their
approaching calamities, enjoyed the state of quiet and prosperity
which had seldom blessed the frontiers of Gaul. Their flocks and
herds were permitted to graze in the pastures of the barbarians;
their huntsmen penetrated, without fear or danger, into the darkest
recesses of the Hercynian wood. The banks of the Rhine were
crowned, like those of the Tiber, with elegant houses and well-
cultivated farms; and if a poet descended the river, he might express
his doubt on which side was situated the territory of the Romans.
This scene of peace and plenty was suddenly changed into a desert;
and the prospect of the smoking ruins could alone distinguish the
solitude of nature from the desolation of man. The flourishing city of
Mentz was surprised and destroyed; and many thousand Christians
were inhumanly massacred in the church. Worms perished after a
long and obstinate siege; Strasburg, Spires, Rheims, Tournay, Arras,
Amiens, experienced the cruel oppression of the German yoke; and
the consuming flames of war spread from the banks of the Rhine
over the greatest part of the seventeen provinces of Gaul. That rich
and extensive country, as far as the ocean, the Alps, and the
Pyrenees, was delivered to the barbarians, who drove before them,
in a promiscuous crowd, the bishop, the senator, and the virgin,
laden with the spoils of their houses and altars,” ii. 230. In
reference, also, to the invasion of Alaric, and the particular nature of
the desolation depicted under the first trumpet, a remarkable
passage which Mr. Gibbon has quoted from Claudian, as describing
the effects of the invasion of Alaric, may be here introduced. “The
old man,” says he, speaking of Claudian, “who had passed his simple
and innocent life in the neighbourhood of Verona, was a stranger to
the quarrels both of kings and of bishops; his pleasures, his desires,
his knowledge, were confined within the little circle of his paternal
farm; and a staff supported his aged steps on the same ground
where he had sported in infancy. Yet even this humble and rustic
felicity (which Claudian describes with so much truth and feeling)
was still exposed to the undistinguishing rage of war. His trees, his
old contemporary271 trees, must blaze in the conflagration of the
whole country; a detachment of Gothic cavalry must sweep away his
cottage and his family; and the power of Alaric could destroy this
happiness which he was not able either to taste or to bestow. ‘Fame,’
says the poet, ‘encircling with terror or gloomy wings, proclaimed
the march of the barbarian army, and filled Italy with
consternation,’” ii. 218. And (4) as to the extent of the calamity,
there is also a striking propriety in the language of the symbol as
applicable to the invasion of Alaric. I do not suppose, indeed, that it
is necessary, in order to find a proper fulfilment of the symbol, to be
able to show that exactly one-third part of the empire was made
desolate in this way; but it is a sufficient fulfilment if desolation
spread over a considerable portion of the Roman world—as if a third
part had been destroyed. No one who reads the account of the
invasion of Alaric can doubt that it would be an apt description of
the ravages of his arms to say that a third part was laid waste. That
the desolations produced by Alaric were such as would be properly
represented by this symbol may be fully seen by consulting the
whole account of that invasion in Gibbon, ii. 213‒266.
8 And the second angel sounded, and as it
were a great 272mountain burning with fire was
273
cast into the sea: and the third part of the
sea 274became blood;
8. And the second angel sounded. Comp. Notes on ver. 2‒7. This,
according to the interpretation proposed above, refers to the second
of the four great events which contributed to the downfall of the
Roman empire. It will be proper in this case, as in the former, to
inquire into the literal meaning of the symbol, and then whether
there was any event that corresponded with it. ¶ And as it were a
great mountain. A mountain is a natural symbol of strength, and
hence becomes a symbol of a strong and powerful kingdom; for
mountains are not only places of strength in themselves, but they
anciently answered the purposes of fortified places, and were the
seats of power. Hence they are properly symbols of strong nations.
“The stone that smote the image became a great mountain, and
filled the whole earth,” Da. ii. 35. Comp. Zec. iv. 7; Je. li. 25. We
naturally, then, apply this part of the symbol to some strong and
mighty nation—not a nation, necessarily, that issued from a
mountainous region, but a nation that in strength resembled a
mountain. ¶ Burning with fire. A mountain in a blaze; that is, with all
its woods on fire, or, more probably, a volcanic mountain. There
would perhaps be no more sublime image than such a mountain
lifted suddenly from its base and thrown into the sea. One of the
sublimest parts of the Paradise Lost is that where the poet
represents the angels in the great battle in heaven as lifting the
mountains—tearing them from their base—and hurling them on the
foe:—