CCF-B
【影响因子】9.551
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】The rising connection of vehicles with the road infrastructure enables the creation of data-driven applications to offer drivers customized services. At the same time, these opportunities require innovative solutions to protect the drivers' privacy in a complex environment like an Intelligent Transportation System (ITS). This need is even more relevant when data are used to retrieve personal behaviors or attitudes. In our work, we propose a privacy-preserving solution, called Private Driver DNA, which designs a possible architecture, allowing drivers of an ITS to receive customized services. The proposed solution is based on the concept of Driver DNA as characterization of driver's driving style. To assure privacy, we perform the operations directly on sanitized data, using the Order Revealing Encryption (ORE) method. Besides, the proposed solution is integrated with ITS architecture defined in the European project E-Corridor. The result is an effective privacy-preserving architecture for ITS to offer customized products, which can be used to address drivers' behaviors, for example, to environmental-friendly attitudes or a more safe driving style. We test Private Driver DNA using a synthetic dataset generated with the vehicle simulator CARLA. We compare ORE with another encryption method like Homomorphic Encryption (HE) and some other privacy-preserving schemas. Besides, we quantify privacy gain and data loss utility after the data sanitization process.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Vehicles; DNA; Authentication; Privacy; Data privacy; Measurement; Blockchains; ITS; privacy; driver DNA; order revealing encryption; homomorphic encryption
【发表时间】
【收录时间】2022-12-05
【文献类型】 实证数据
【Author】 Badshah, Akhtar Waqas, Muhammad Muhammad, Fazal Abbas, Ghulam Abbas, Ziaul Haq Chaudhry, Shehzad Ashraf Chen, Sheng
CCF-B
【影响因子】9.551
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】The next-generation Internet of vehicles (IoVs) seamlessly connects humans, vehicles, roadside units (RSUs), and service platforms, to improve road safety, enhance transit efficiency, and deliver comfort while conserving the environment. Currently, numerous entities communicate in the IoVs environment via insecure public channels that are susceptible to a variety of security assaults and threats. To address these security challenges, we design an anonymous authenticated key exchange mechanism for the IoVs in smart transportation supported by blockchain, referred to as AAKE-BIVT. AAKE-BIVT securely transmits traffic information to a cluster head, before heading to a nearby RSU utilizing the established secret session keys via mutual authentication and key agreement. A cloud server (CS) then securely aggregates data from related RSUs and generates transactions. The CS combines the transactions into blocks in a peer-to-peer network of CSs, and the blocks are confirmed and added to the blockchain via a voting-based consensus method. By means of rigorous informal security studies and formal security analysis through the random oracle model, we reveal that the proposed AAKE-BIVT is resistant to a broad range of potential security assaults in the IoVs environment. Furthermore, a comparative study reveals that AAKE-BIVT outperforms existing state-of-the-art techniques, in terms of security and functionality while being more efficient in terms of communication and computation. Additionally, the blockchain simulation validates the implementation viability of our proposed AAKE-BIVT.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of Vehicles; blockchain; security; authentication; key exchange; PUF
【发表时间】
【收录时间】2022-12-05
【文献类型】 实验仿真
【Author】 Wang, Na Fu, Junsong Zhang, Shancheng Zhang, Zheng Qiao, Jiawen Liu, Jianwei Bhargava, Bharat K.
【影响因子】3.796
【主题类别】
区块链技术-核心技术-分布式存储
【Abstract】With the rapid development of 5G/6G, most Internet of Things (IoT) devices will embrace wireless connection in the near future. A public concern is how to securely organize, store and retrieve data generated from IoT devices. Many cloud-based IoT data storage schemes have been proposed recently. However, for an untrusted or vulnerable cloud server, the stored IoT data can be easily accessed, modified and even destroyed given that the IoT data are stored in total centralization. Moreover, the servers in a cloud are generally homogeneous and thus vulnerable to attacks. For improvements, we design a novel framework for secure and efficient IoT data storage based on secret sharing and a collaborative blockchain. First, an ultra-lightweight secret sharing algorithm is designed to map original messages generated by IoT devices to a set of shorter message shares. Second, all the shares of IoT messages are separately delivered to different clouds for storage. To guarantee the security of shares, the delivery is notarized on a proposed blockchain. Specifically, both hash values of the shares and their information of location are embedded in blocks which are then chained to form a blockchain. Third, we create a balanced index structure about the shares for each cloud storage node based on the information in the blockchain, and we also propose a depth-first data search algorithm to improve IoT data retrieval efficiency. Theoretical analysis and simulation results illustrate that our scheme can store and retrieve the IoT data securely and efficiently.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cloud computing; Internet of Things; secure data storage; secret sharing; blockchain
【发表时间】
【收录时间】2022-12-05
【文献类型】 实验仿真
【Author】 Alzoubi, Yehia Ibrahim Gill, Asif Mishra, Alok
【影响因子】3.418
【主题类别】
区块链技术-协同技术-雾计算
【Abstract】The fog computing concept was proposed to help cloud computing for the data processing of Internet of Things (IoT) applications. However, fog computing faces several challenges such as security, privacy, and storage. One way to address these challenges is to integrate blockchain with fog computing. There are several applications of blockchain-fog computing integration that have been proposed, recently, due to their lucrative benefits such as enhancing security and privacy. There is a need to systematically review and synthesize the literature on this topic of blockchain-fog computing integration. The purposes of integrating blockchain and fog computing were determined using a systematic literature review approach and tailored search criteria established from the research questions. In this research, 181 relevant papers were found and reviewed. The results showed that the authors proposed the combination of blockchain and fog computing for several purposes such as security, privacy, access control, and trust management. A lack of standards and laws may make it difficult for blockchain and fog computing to be integrated in the future, particularly in light of newly developed technologies like quantum computing and artificial intelligence. The findings of this paper serve as a resource for researchers and practitioners of blockchain-fog computing integration for future research and designs.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Cloud computing; Fog computing; Integration; Internet of things (IoT); Security
【发表时间】2022
【收录时间】2022-12-05
【文献类型】 综述
【Author】 Li, Hongping Luo, Jun Zhou, Guangzhu
【影响因子】2.650
【主题类别】
区块链应用-实体经济-农牧领域
区块链应用-实体经济-可持续发展领域
【Abstract】To improve the effect of sustainable agricultural development, this paper reports on sustainable agricultural development with the support of big data technology, combines the Internet of Things technology to apply blockchain in sustainable agricultural development, and analyzes the economic effect model. Moreover, this paper proves that the introduction of third-party logistics in the vendor-managed inventory strategy can effectively reduce the total cost of the supply chain. Through model analysis and model transformation, the inventory transportation integration optimization problem model is decomposed into two sub-models: the transportation scheduling model and the replenishment delivery model. In addition, this paper designs a new solution algorithm based on the genetic algorithm and builds an intelligent blockchain model. The experimental research shows that the blockchain technology based on big data analysis proposed in this paper has certain effects.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】
【收录时间】2022-12-05
【文献类型】 实验仿真
【DOI】 10.1002/agj2.21105
CCF-C
【影响因子】2.577
【主题类别】
区块链技术-核心技术-区块传输
【Abstract】In recent times, technology development has greatly influenced the model of Blockchain for communication due to extensive digitalization worldwide. Moreover, blockchain technology plays an essential part in the role of an educational system for sharing important data between students and teachers. However, the security hazard is the main problem while transferring the data because the malicious attacker may be able to hack the essential data in communication. A novel Signature-based Rivest Shamir Framework (SbRSF) is proposed to overcome such issues for privacy limit maintenance and security action improvement. Also, the harmful attack in data transmission is estimated by this projected approach. The implementation of this research has been done on the python platform. Hence, the proposed model has gained 98.03% throughput, encryption, and decryption time of 5 ms and reduced the error rate to 0.2%. Moreover, the achieved results are compared with the conventional methods, such as the Elliptic curve model, sensitivity-based elliptic crypto scheme, and secure record sharing, to validate the significance of the projected approach in blockchain development.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Security; Digital Signature; Education system
【发表时间】
【收录时间】2022-12-05
【文献类型】 实证数据
【Author】 Ke, Zuqiang Park, Nohpill
【影响因子】2.303
【主题类别】
区块链技术-平台项目-Hyperledger Fabric
【Abstract】The performance of a permissioned blockchain, namely, Hyperledger Fabric, is modeled and analyzed in a quantitative manner in this paper. Various types of nodes contribute to the performance of Hyperledger Fabric, and each of those is modeled and tracked along the operational flow of the permissioned blockchain. There are nodes for endorsement, ordering, and commitment to realize the due decentralized network operations. A quantitative model for each type of nodes has been proposed in Ke and Park (Performance study on various Hyperledger Fabric node types and transaction flow, IEEE BCCA, 2021) along with numerical analysis. Each type of the nodes is characterized in terms of transaction/block queue size and waiting time, and the transaction/block arrival rates and the transaction/block service rates are considered for simulation purposes. The analysis is extended beyond the analysis in Ke and Park (Performance study on various Hyperledger Fabric node types and transaction flow, IEEE BCCA, 2021) in this paper to particularly demonstrate how the arrival rates and the service rates co-influence the performance and how the number of channels impacts the performance, in order to ultimately facilitate a more dynamic way of optimization, taking the co-relation across different types of nodes into account. The major contribution of this paper to the field of computer science by creating a series of queuing models to evaluate the performance of different types of nodes: Chaincode Execution and Endorsement, Block Creation and Delivery, Transaction Validation and Block Committing, and Transaction Processing.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Permissioned blockchain; Hyperldger fabric; Performance modeling; Endorsing; ordering; committing nodes; Queueing model
【发表时间】
【收录时间】2022-12-05
【文献类型】 理论模型
【影响因子】2.017
【主题类别】
区块链技术-协同技术-物联网
【Abstract】In recent years, networking systems have witnessed a breakthrough. Due to the advances in network and communication technology, new concepts such as the Internet of Things (IoT) have emerged in network configurations. The IoT framework connects devices such as computers, mobile phones, etc. Hence, there is a necessity to secure networks. One of the possible tools to secure such networks is the Intrusion Detection Systems (IDS). The idea of operation of these systems depends on anomaly detection tools and concepts. In this paper, we mainly concentrate on the Software-Defined Network (SDN) implementation of IoT networks. This implementation saves the large cost of many hardware components in the networks. The paper is targeted to the application of IDS in SDN-based IoT networks. Different studies are presented, explored, and compared. The main objective of this survey study is to introduce new research directions for SDN-based IoT networks. Moreover, the new concept of blockchain is exploited in this paper for security enhancement of SDN-based IoT networks.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Computer networks; IDS; SDN; IoT; Blockchain
【发表时间】
【收录时间】2022-12-05
【文献类型】 观点阐述
【Author】 Yuan, Jialiang Ma, Yan Luo, Wei Han, Gang
CCF-C
【影响因子】1.968
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】The application of blockchain technology in the medical information system is gradually triggering profound changes, which has heterogeneous, cross-domain, and open network characteristics. However, today's electronic medical systems fall short of ensuring the confidentiality and safe sharing of medical data, which poses serious threats to their authenticity and accuracy. Moreover, most of the current blockchain medical systems are under great transmission and storage pressure. Based on the aforementioned security and performance considerations, this paper proposes a fine-grained secure sharing scheme of medical data based on blockchain (B-SSMD). We design a three-chain model to store patient information, medical staff information, and medical records hierarchically. The integration of IPFS technology and the encryption algorithm ensures secure and efficient off-chain data storage. The user classification is realized by assigning attributes, and the attribute encryption technology is adopted for secondary encryption of the key and ciphertext path. Meanwhile, through hierarchical encryption, the risk of a system attack is greatly reduced. Our scheme not only solves the problems of low throughput and poor stability in the single chain model but also improves the data confidentiality and enables medical data to be managed more safely and efficiently in the sharing process. We provide the security and performance analysis and it is confirmed that our scheme has higher security and controllability.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2022-12-05
【文献类型】 实证数据
【DOI】 10.1155/2022/2719951
【Author】 Cali, Umit Kuzlu, Murat Sebastian-Cardenas, D. Jonathan Elma, Onur Pipattanasomporn, Manisa Reddi, Ramesh
【影响因子】1.630
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】Decarbonization of energy systems has been a recent trend during the last two decades where large-scale renewable energy sources (RES) are integrated into the modern power systems. Various countries have developed new energy policy instruments, such as Renewable Energy Certificates (RECs), to promote the growth of RES. RECs are tradable, non-tangible assets, which have a monetary value. Tracking and certification of the origin of an energy resource regardless of its type (e.g., a conventional power plant or RES) are a critical operation. In addition to the certification of origin, trading transactions must be performed using a secure method. Energy industry participants need to secure the data and applications related to RECs. Digitalization technologies such as artificial intelligence (AI) and distributed ledger technology (DLT) are among the most popular and promising options. DLT is a perfect framework that can support such REC functionalities. This paper addresses the cybersecurity aspects in REC trading using blockchain and distributed ledger technology, considering detailed cybersecurity perspectives and aspects of adopting technology from an organizational perspective.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Renewable energy certificate; Distributed ledger technology; NIST cybersecurity frameworks
【发表时间】
【收录时间】2022-12-05
【文献类型】 理论模型
【Author】 Ko, Taehyun Lee, Jaeram Park, Daehyeon Ryu, Doojin
【影响因子】1.379
【主题类别】
区块链应用-实体经济-供应链
【Abstract】We analyze firms' supply chain transparency and ethical production practices using a game-theoretic approach. If the rival's supply chain is more likely to be ethical and the technology used to ensure supply chain transparency is efficient, ethical suppliers prefer to disclose their supply chain information, whereas unethical suppliers do not. The supply chain transparency level can be a signal of the supplier's ethical quality level, as both consumers' demand for ethical production and R&D efficiency for supply chain transparency increase. Consumers can distinguish ethical suppliers through their level of supply chain transparency because blockchain technology improves R&D efficiency.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】
【收录时间】2022-12-05
【文献类型】 理论模型
【DOI】 10.1002/mde.3765
【Author】 Alshareef, Nasser
【影响因子】0.000
【主题类别】
区块链应用-实体经济-教育领域
【Abstract】The primary objective of this research is to explore the literature on blockchain technology and its investment opportunity in the education sector. Studies on the investment opportunities of blockchain technology in education have remained limited and little is known about the existing state of knowledge and practice of blockchain technology in the education sector of Saudi Arabia, especially for its sustainable development. In this study, the author tried to synthesise literature on blockchain technology to understand the difficulties and prospects of this technology in Saudi Arabia. A total of 15 empirical studies from 2017 to 2020 were reviewed. The descriptive and thematic analysis identified four types of challenges of blockchain technology in the education sector. They include leaking privacy and security, processing cost, setting the boundaries, and weakening school credentials. The review also revealed several opportunities for adopting blockchain technology such as certifying identity authentication, improving learning assessment, maintaining student records, enhancing trust, and reducing costs. Implications and recommendations related to education for sustainable development are provided accordingly.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain technology; blockchain in education; blockchain investment opportunity; Saudi Arabia; systematic literature review; education for sustainable development (ESD)
【发表时间】2022
【收录时间】2022-12-05
【文献类型】 综述
【Author】 Dursun, Elif Ulker, Yasemin Gunalay, Yavuz
【影响因子】0.000
【主题类别】
区块链应用-实体经济-可持续发展领域
【Abstract】PurposeAll supply chains must address waste management since it is a crucial step toward a sustainable world. This article aims to analyze the potential of blockchain technology in waste management by focusing on the textile sector, which is one of the polluting industries. The study's main objective is to realize businesses' waste management practices and sustainability initiatives and then to comprehend how practitioners perceive the implementation of blockchain technology to waste management.Design/methodology/approachThe waste management procedures and actors' perceptions of blockchain technology are examined using a qualitative study approach that adopts an in-depth interview methodology. The collected data is analyzed by a qualitative analysis software (e.g. MAXQDA).FindingsFindings of the study show that blockchain technology is still in its infancy and needs to be communicated to the actors of the sector. The technology has low potential due to the barriers it faces during the development phase. However, it is considered to be an important technological development for the textile sector stakeholders.Originality/valueThis study is important to notice at what stage the waste management practices and how to develop better with modern technologies like blockchain. Blockchain technology has essential potential for supply chains, but sustainability concerns are becoming a major issue to be solved. Waste management is therefore an important subject to be analyzed and provided with innovative solutions that will contribute to sustainability efforts. To the author's best knowledge, this is the first attempt to comprehend the potential of blockchain in the textile industry in terms of waste management.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Supply chain; Sustainability; Waste management; Textile industry; Qualitative study
【发表时间】
【收录时间】2022-12-05
【文献类型】 观点阐述
【DOI】 10.1108/MEQ-03-2022-0085
【Author】 Teng, Yan
【影响因子】0.000
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】This paper argues that the widespread belief that interactions between blockchains and their users are trust-free is inaccurate and misleading, since this belief not only overlooks the vital role played by trust in the lack of knowledge and control but also conceals the moral and normative relevance of relying on blockchain applications. The paper reaches this argument by providing a close philosophical examination of the concept referred to as trust in blockchain technology, clarifying the trustor group, the structure, and the normatively loaded nature of this trust relation. The paper ends by critically reflecting on two of the most promising values (decentralization and transparency) that can invite users' trust in blockchain technology, arguing that there is a tension between the pressing values that are intended to be achieved by developers and the predicament situations caused by current blockchain implementations.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain technology; blockchain trust; ethics and philosophy of blockchain; ethics of trust; trust and trustworthiness; trust technology
【发表时间】
【收录时间】2022-12-05
【文献类型】 观点阐述
【DOI】 10.1111/meta.12596