CCF-B
【影响因子】8.233
【主题类别】
区块链技术-协同技术-物联网
【Abstract】Blockchain of Things (BCoT), as a new paradigm that incorporates blockchain with the Internet of Things (IoT), can address the privacy and extensibility issues in IoT systems and effectively enhance the data management of IoT devices. Asmost of theIoT devices are resource-constrained in terms of computing power, storage capacity, and energy con-sumption. Meanwhile,the enormous computational consumption in the consensus process of the blockchain makes it difficult to integrate with IoT closely and exert the great poten-tial of BCoT. latterly, the "cloud mining" mechanism has been proposed to address these issues, however,some potential problems still exist, such as data privacy and dishonest cloud mining pools, etc. In this paper, we propose a verifiable and privacy-preserving cloud mining pool selection scheme in BCoT (namely, VPP-CMPS). To obtain a better solution for cloud mining pool selection, we implement an improved time-locked puzzles technique to identify dishonest mining pools and perform the authenticity for mining pool selection. Afterwards,we obtain the privacy protection of the data during the entire selection process by adopting additively homomorphic ElGamal cryptosystem. Meanwhile, considering the resource-constrained case in IoT devices, we use a semi-honest cloud server to cooperate in dealing with the selection procedure, thereby reducing the computational overhead of IoT devices. Experimental results indicate that our scheme is more efficient and provides less computational cost.(c) 2022 Published by Elsevier Inc. [Zhang, Mingwu; Yang, Mingxuan; Shen, Gang] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China; [Zhang, Mingwu] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China; [Xia, Zhe] Wuhan Univ Techonl, Sch Comp Sci & Engn, Wuhan 430070, Peoples R China; [Wang, Yuntao] Osaka Univ, Grad Sch Engn, Suita, Japan Hubei University of Technology; Guilin University of Electronic Technology; Wuhan University of Technology; Osaka University Shen, G (通讯作者),Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China. mzhang@hbut.edu.cn; ymx@hbut.edu.cn; shengang@hbut.edu.cn; xiazhe@whut.edu.cn; wang@comm.eng.osaka-u.ac.jp National Natural Science Foundation of China [62072134, U2001205]; Key Research Development Program of Hubei Province [2021BEA163] National Natural Science Foundation of China(National Natural Science Foundation of China (NSFC)); Key Research Development Program of Hubei Province This work is in part supported by the National Natural Science Foundation of China under grants 62072134 and U2001205, and the Key Research Development Program of Hubei Province under Grant 2021BEA163. 46 0 0 0 0 ELSEVIER SCIENCE INC NEW YORK STE 800, 230 PARK AVE, NEW YORK, NY 10169 USA 0020-0255 1872-6291 INFORM SCIENCES Inf. Sci. APR 2023 623 293 310 10.1016/j.ins.2022.11.169 http://dx.doi.org/10.1016/j.ins.2022.11.169 DEC 2022 18 Computer Science, Information Systems Science Citation Index Expanded (SCI-EXPANDED) Computer Science E0HK3 2023-05-06 WOS:000972446200001
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Data aggregation; Privacy preservation; Cloud mining pool; Verifiable selection; Blockchain of things
【发表时间】2023
【收录时间】2023-05-14
【文献类型】 理论模型
【影响因子】7.307
【主题类别】
区块链技术-协同技术-物联网
【Abstract】With the extensive application of the Internet of Things (IoT), multi-domain IoT appears as the additional coordination and control ability of IoT. However, the emerging multi-domain IoT suffers from some security challenges, such as insider threats and cross-domain data exchange issues. In this paper, we propose a data exchange model for the multi-domain IoT environment driven by blockchain, addressing expensive cross-domain access control and low data exchange throughput issues. At the core of this model is a chaincode-based cross-domain access control scheme and a domain-as-a-shard (DaaS) high parallel throughput optimization technology. In particular, the access control scheme is maintained by multiple blockchain nodes to ensure access control strategy distributed storage and data cross-domain controllability. The data in this model cannot be exchanged across domains until all nodes jointly verify that the access control strategy is valid. Moreover, the throughput optimization technology sets the IoT domain as the blockchain shard to process data exchange in parallel and scale up the throughput dramatically. In each shard, data exchange is processed in the form of the blockchain transaction independently to improve the transaction throughput of our model. Finally, security analysis proves that our model successfully ensures access control strategy non-repudiation and cross-domain data controllability. Extensive experiments on Hyperledger Fabric show that the transaction throughput of our model is nearly three times that of the original Fabric v1.4. (c) 2022 Elsevier B.V. All rights reserved.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Multi-domain IoT; Data exchange; Cross-domain access control; Throughput optimization; Domain-as-a-shard; Blockchain
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
【Author】 Xu, Shengmin Ning, Jianting Li, Yingjiu Zhang, Yinghui Xu, Guowen Huang, Xinyi Deng, Robert H.
CCF-A
【影响因子】6.791
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】To reduce the cost of human and material resources and improve the collaborations among medical systems, research laboratories and insurance companies for healthcare researches and commercial activities, electronic medical records (EMRs) have been proposed to shift from paperwork to friendly shareable electronic records. To take advantage of EMRs efficiently and reduce the cost of local storage, EMRs are usually outsourced to the remote cloud for sharing medical data with authorized users. However, cloud service providers are untrustworthy. In this paper, we propose an efficient, secure, and flexible EMR sharing system by introducing a novel cryptosystem called dual-policy revocable attribute-based encryption and tamper resistance blockchain technology. Our proposed system enables EMRs to be shared at a fine-grained level and allows data users to detect any unauthorized manipulation. Moreover, the key generation center can revoke malicious users without affecting the honest users. We provide the formal security model as well as the concrete scheme with security analysis. The experimental simulation and experimental analysis of our proposed scheme demonstrate that our proposed system has superior performances to the most relevant solutions.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Biomedical imaging; Access control; Encryption; Standards; Costs; Complexity theory; Insurance; Dual-polocy attribute-based encryption; user revocation; blockchain; electronic medical records
【发表时间】2023
【收录时间】2023-05-14
【文献类型】 理论模型
【Author】 Zheng, Jieheng Zhang, Lin Feng, Yan Wu, Zhiqiang
【影响因子】5.033
【主题类别】
区块链技术-协同技术-物联网
【Abstract】Internet of Things (IoT) systems have the great advantage of connecting massive low energy-consumption devices for the information delivery via wireless channels. However, IoT devices suffer from malicious attacks or eavesdropping due to the broadcasting property of wireless channels. With the aim of enhancing the security performances, we first propose a chaotic scrambler, which utilizes the natural high security property of chaotic sequences being aperiodic and sensitive to initial values, to improve the security of signal transmissions. Then, we propose to utilize the traceable and tamper-proof blockchain to integrate the confidential chaotic key into the chain for user identify management and authentications. Subsequently, theoretical security, reliability and throughput capacities are analyzed, and simulation results are provided to validate the design and the theoretical analysis. Furthermore, we present the practical hardware implementation board for the proposed secure chaotic scrambling following the long range wide area network (LoRaWAN) specifications, which demonstrates that the security performances of IoT devices can be effectively enhanced.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Security; Internet of Things; Blockchains; Chaotic communication; Authentication; Wireless communication; Performance evaluation; Chaos-based scrambler; hash function and blockchain; key management and authentication mechanism; security
【发表时间】2023
【收录时间】2023-05-14
【文献类型】 理论模型
CCF-C
【影响因子】4.758
【主题类别】
区块链技术-核心技术-扩展方案
【Abstract】Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while significantly mitigating cybersecurity risks. Tradeoffs between availability and security arise at implementation, however, triggered by the additional resources (e.g., memory and computation) required by blockchain-enabled hosts. This paper applies an energy-reducing algorithmic engineering technique for Merkle Tree (MT) root calculations and the Proof of Work (PoW) algorithm, two principal elements of blockchain computations, as a means to preserve the promised security benefits but with less compromise to system availability. Using pyRAPL, a python library to measure the energy consumption of a computation, we experiment with both the standard and energy-reduced implementations of both algorithms for different input sizes. Our results show that up to 98% reduction in energy consumption is possible within the blockchain's MT construction module, with the benefits typically increasing with larger input sizes. For the PoW algorithm, our results show up to 20% reduction in energy consumption, with the benefits being lower for higher difficulty levels. The proposed energy-reducing technique is also applicable to other key elements of blockchain computations, potentially affording even "greener " blockchain-powered systems than implied by only the results obtained thus far on the MT and PoW algorithms. [Escobar, Cesar Castellon; Roy, Swapnoneel; Dutta, Ayan] Univ North Florida, Sch Comp, Jacksonville, FL 32224 USA; [Kreidl, O. Patrick] Univ North Florida, Sch Engn, Jacksonville, FL 32224 USA; [Boloni, Ladislau] Univ Cent Florida, Dept Comp Sci, Orlando, FL 32816 USA State University System of Florida; University of North Florida; State University System of Florida; University of North Florida; State University System of Florida; University of Central Florida Dutta, A (通讯作者),Univ North Florida, Sch Comp, Jacksonville, FL 32224 USA. a.dutta@unf.edu NSF CPS [1932300, 1931767]; Fidelity National Financial Distinguished Professorship in CIS [0583-5504-51]; Cyber Florida [220408]; Division Of Computer and Network Systems; Direct For Computer & Info Scie & Enginr [1931767, 1932300] Funding Source: National Science Foundation NSF CPS(National Science Foundation (NSF)NSF - Directorate for Engineering (ENG)); Fidelity National Financial Distinguished Professorship in CIS; Cyber Florida; Division Of Computer and Network Systems; Direct For Computer & Info Scie & Enginr(National Science Foundation (NSF)NSF - Directorate for Computer & Information Science & Engineering (CISE)) This research study is supported in part by NSF CPS #1932300 and #1931767, Fidelity National Financial Distinguished Professorship in CIS #0583-5504-51, and Cyber Florida #220408 grants. 64 0 0 0 0 IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC PISCATAWAY 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA 1932-4537 IEEE T NETW SERV MAN IEEE Trans. Netw. Serv. Manag. DEC 2022 19 4 3847 3857 10.1109/TNSM.2022.3219494 http://dx.doi.org/10.1109/TNSM.2022.3219494 11 Computer Science, Information Systems Science Citation Index Expanded (SCI-EXPANDED) Computer Science 8V3TC 2023-05-06 WOS:000930555700013
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Energy consumption; Proof of Work; Security; Optimization; Energy measurement; Consensus protocol; Blockchain; Merkle tree; proof of work; energy optimization
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 实验仿真
【Author】 Demirbaga, Umit Aujla, Gagangeet Singh
CCF-C
【影响因子】4.758
【主题类别】
区块链应用-实体经济-医疗领域
区块链技术-协同技术-物联网
【Abstract】Internet of Things (IoT)-based Healthcare services, which are becoming more widespread today, continuously generate huge amounts of data which is often called big data. Due to the magnitude and intricacy of the data, it is difficult to find valuable information that can be used for decision-making and prediction. Big data systems take on a significant infrastructure service to better serve the purpose of IoT systems and support critical decision making. On the other hand, privacy preservation, data integrity, and identity verification are essential requirements in healthcare big data service management. To overcome these problems, this article offers a scalable computing system that provides verifiable data access mechanism for IoT-enabled health data analytics in the big data ecosystem. There are two primary sub-architectures in the proposed architecture, namely a big data analytics tracking system and a derived blockchain-based data storage/access system. This approach leverages big data systems and blockchain architecture to analyze, and securely store data from IoT-enabled devices and allow verified access to the stored data. The zero-knowledge protocol is used to ensure that no information is accessible to unauthenticated users alongside avoiding data linkability. The results demonstrate the effectiveness of the our method to solve the problems of big data analytics and privacy issues in healthcare.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Medical services; Big Data; Data privacy; Blockchains; Data integrity; Cloud computing; Internet of Things; Big data; Internet of Things (IoT); Index Terms; MapReduce; blockchain; healthcare
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
CCF-C
【影响因子】4.758
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】Vehicular Fog Computing (VFC) is a paradigm of vehicular networks that has a set of advantages such as agility, efficiency, and reduced latency. The VFC is vulnerable to a variety of attacks, and existing security measures in traditional networks are not necessarily applicable to VFC. Among these attacks, we can find the Sybil attack that allows a vehicle to create multiple identities to perform malicious operations. In this paper, we propose a blockchain-based mechanism to detect Sybil attacks in VFC networks. The detection process consists of two levels; the first one is targeted toward the verification of the vehicle's position by the FN using the Received Signal Strength Indicator (RSSI) technique. The FN delivers a position proof, if its position is valid, and stores it in the blockchain. At this point, the set of the obtained position proofs constitutes a trajectory. The second level is projected toward a comparison between the trajectories of the vehicles reporting an event. Two trajectories that pass through the same FNs at the same time, will be considered as Sybil trajectories. The objective of these two-level detections is to identify the Sybil attack in several attack scenarios performed by a powerful adversary. Our analysis shows that existing proposals cannot deal with such an adversary. Moreover, simulation results show the efficiency of our proposal in terms of communication, computation, and detection rate. Indeed, our system can reach a detection rate of 98% when the malicious vehicle generates several aliases simultaneously and sends position requests to the FN for each generated pseudonym.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Trajectory; Proposals; Cloud computing; Blockchains; Roads; Received signal strength indicator; Edge computing; Blockchain; RSSI; sybil attack; proof of location; trajectory; vehicular fog computing
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 实验仿真
CCF-C
【影响因子】4.758
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】In federated learning, multiple parties may use their data to cooperatively train a model without exchanging raw data. Federated learning protects the privacy of users to a certain extent. However, model parameters may still expose private information. Moreover, existing encrypted federated learning systems need a trusted third party to generate and distribute key pairs to connected participants, making them unsuitable for federated learning and vulnerable to security risks. To mitigate these issues, we propose a privacy-preserving oriented no trusted third party federated learning system based on blockchain (NttpFL). The initiator of the federated learning task and the partners negotiate keys through the conference key agreement and do not need to distribute keys through a trusted third party. We design a double-layer encryption mechanism to ensure privacy. Partners cannot obtain any private information other than their information. The decentralized nature of blockchain suits our system. In addition, blockchain makes the entire process transparent and traceable and avoids the single node failure problem. Experimental results confirm that the proposed method significantly reduces the communication costs and computational complexity compared to existing encrypted federated learning without compromising the performance and security.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Federated learning; blockchain; privacypreserving
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 实验仿真
【Author】 Zhang, Xinhua You, Lin Hu, Gengran
CCF-C
【影响因子】4.758
【主题类别】
区块链应用-实体经济-电力领域
【Abstract】In order to analyze real-time power data without revealing users' privacy, privacy-preserving data aggregation schemes have been extensively researched in smart grid. However, most of the existing schemes either can only allow stationary users, or require a trusted center. In this paper, we propose an efficient and robust multidimensional data aggregation scheme based on blockchain. In our scheme, a leader election algorithm in Raft protocol is used to select a mining node from all smart meters to aggregate data. A dynamically verifiable secret sharing homomorphism scheme is adopted to realize flexible dynamic user management. In addition, our scheme can not only resist internal and external attacks but also support multidimensional data aggregation and fault tolerance. The security analysis shows that our proposed scheme is IND-CPA secure and can meet stronger security features. The experimental results show that compared with other schemes, our scheme can be implemented with lower computation and communication overhead.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Data aggregation; Blockchains; Cryptography; Smart meters; Data privacy; Real-time systems; Fault tolerant systems; Privacy-preserving; smart grid; blockchain; secret sharing homomorphism
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
CCF-C
【影响因子】4.758
【主题类别】
区块链应用-实体经济-通信领域
【Abstract】Blockchain technologies are gradually being deployed in a variety of industries, including telecommunications. In this paper, due to the strict governance of telecommunication infrastructure, we propose a permissioned distributed ledger (PDL)-based blockchain supported architecture for a network management and orchestration platform. The work focuses on creating a trusted environment for both Cloud Service Providers (CSPs) and Mobile Network Operators (MNOs) for managing the lifecycle of network services (e.g., instantiation, scaling, termination, etc.) in a multi-cloud environment. We also validate our proposed approach with an experimental scenario using the Quorum blockchain network (BCN) to measure various performance metrics (e.g., number of transactions and blocks, time to write, and transactions per second) of different service orchestrator (SO)-related instantiation metrics. Our evaluation results show that the values for the service instantiation time and the corresponding BCN metrics can be completely different, suggesting that some logs arrive very quickly and generate a high transaction load, while others take longer and generate a low number of transactions. As a solution, at the end of the paper, we also provide some recommendations for appropriate optimizations during transfer of SO-related logs to BCNs and some observed challenges.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Cloud computing; Telecommunications; Security; Internet of Things; Industries; Computer architecture; Blockchain; service orchestration; vertical services; network management
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
CCF-C
【影响因子】4.758
【主题类别】
区块链技术-协同技术-边缘计算
【Abstract】Mobile Edge Computing (MEC) is a promising and fast-developing paradigm that provides cloud services at the edge of the network. MEC enables IoT devices to offload and execute their real-time applications at the proximity of these devices with low latency. Such applications include efficient manufacture inspection, virtual/augmented reality, image recognition, Internet of Vehicles (IoV), and e-Health. However, task offloading experiences security and privacy attacks such as data tampering, private data leakage, data replication, etc. To this end, in this paper, we propose a new blockchain-based framework for secure task offloading in MEC systems with guaranteed performance in terms of execution delay and energy consumption. First, blockchain technology is introduced as a platform to achieve data confidentiality, integrity, authentication, and privacy of task offloading in MEC. Second, we formulate an integration model of resource allocation and task offloading for a multi-user with multi-task MEC systems to optimize the energy and time cost. This is an NP-hard problem because of the curse-of-dimensionality and dynamic characteristics challenges of the considered scenario. Therefore, a deep reinforcement learning-based algorithm is developed to derive the close-optimal task offloading decision efficiently. Theoretical analysis and experimental results demonstrate that the proposed framework is resilient to several task offloading security attacks and it can save about 22.2% and 19.4% of system consumption with respect to the local and edge execution scenarios. Moreover, the benchmark analysis proves that the framework consumes few resources in terms of memory and disk usage, CPU utilization, and transaction throughput.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Task analysis; Blockchains; Internet of Things; Peer-to-peer computing; Security; Hafnium; Privacy; Blockchain; mobile edge computing; task offloading; security; privacy; deep reinforcement learning
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
CCF-C
【影响因子】4.758
【主题类别】
区块链应用-实体经济-车联网
【Abstract】Aiming at the problems of computing power, reliability and cost when intelligent vehicles deal with computationally intensive and delay-sensitive emerging applications in multiple business scenarios in the Internet of Vehicles, an intelligent computing offloading model is proposed. This can minimize the total system cost under the constraint of time delay and energy consumption. Considering the cost of blockchain and the cost of intelligent vehicles, the DDPG algorithm is used to solve the proposed model. Simulation results show that the method proposed in this paper can effectively reduce the total cost of computing offload and further improve the success rate of computational offloading under the premise of computational offloading safety.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Task analysis; Computational modeling; Intelligent vehicles; Costs; Delays; Energy consumption; Internet of Vehicles; computing offloading; Index Terms; blockchain; reinforcement learning
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
CCF-C
【影响因子】4.758
【主题类别】
区块链应用-实体经济-工业互联网
【Abstract】With the increasing demand for digitalization and participation in Industry 4.0, new challenges have emerged concerning the market of digital services to compensate for the lack of processing, computation, and other resources within Industrial Internet of Things (IIoTs). At the same time, the complexity of interplay among stakeholders has grown in size, granularity, and variation of trust. In this paper, we consider an IIoT resource market with heterogeneous buyers such as manufacturer owners. The buyers interact with the resource supplier dynamically with specific resource demands. This work introduces a broker between the supplier and the buyers, equipped with Distributed Ledger Technologies (DLT) providing a service for market security and trustworthiness. We first model the DLT-assisted IIoT market analytically to determine an offline solution and understand the selfish interactions among different entities (buyers, supplier, broker). Considering the non-cooperative heterogeneous buyers in the dynamic market, we then follow an independent learners framework to determine an online solution. In particular, the decision-making procedures of buyers are modeled as a Partially Observable Markov Decision Process which is solved using independent Q-learning. We evaluate both the offline and online solutions with analytical simulations, and the results show that the proposed approaches successfully maximize players' satisfaction. The results further demonstrate that independent Q-learners achieve equilibrium in a dynamic market even without the availability of complete information and communication, and reach a better solution compared to that of centralized Q-learning.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Industrial Internet of Things; Distributed ledger; Security; Q-learning; Fourth Industrial Revolution; Analytical models; Stakeholders; DLT; dynamic pricing; IIoT marketplace; independent learning; POMDP
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 实验仿真
CCF-C
【影响因子】4.758
【主题类别】
区块链技术-核心技术-存储策略
【Abstract】Distribution, security, and immutability have led to the great success of blockchain in many applications, while contributing to major increases in ledger size. The storage challenge is one of the major barriers to the adoption of blockchain in the Internet of Things (IoT), which consists of many resource constrained devices. In this paper, we propose Multi-Level Distributed Caching (MLDC) for blockchain storage optimisation which reduces data replication based on data access patterns in a decentralised manner. For storage optimisation of data-centric blockchains, MLDC introduces a hierarchical storage class (SC), in which every node is assigned to an SC with its own Access Frequency (AF) threshold based on node availability. To reduce the number of replications shared among participant nodes, each node in a SC continues to remove unaccessed data from local storage based on a threshold time determined by the AF threshold of the SC, while maintaining all block hashes for consistency. Eventually, all nodes in MLDC store the most frequently accessed data in their local storage, so MLDC effectively reduces the storage and query costs while minimising network overhead. We also analyse the security of MLDC and quantitatively evaluate its performance for both the uniform access and exponentially decaying access patterns. The evaluation was carried out on a representative blockchain simulator with 15 storage nodes. Our results from 11 hours of experiments producing 6667 blocks and 39997 transactions show good performance for MLDC. The results of the experimentation for the exponentially decaying assess pattern show that MLDC can reduce the total storage cost by 83% compared to conventional blockchain systems, while maintaining blockchain consistency and data availability with a slight increase in network overhead and query cost.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Security; Optimization; Costs; Internet of Things; Computer science; Australia; Blockchain; Internet of Things (IoT); storage optimisation; distributed caching
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
【Author】 Qiu, Jin
【影响因子】3.474
【主题类别】
区块链技术-协同技术-数据审计
【Abstract】The study aims to solve the problems in auditing ciphertext data, improve audit efficiency, and increase the security of audit data in the audit server. First, the existing encryption algorithms are analyzed. Second, the searchable encryption algorithm is proposed to audit the ciphertext data, and an audit server scheme is made based on blockchain technology (BT). Finally, the two schemes are compared with the traditional audit technology. The results show that the server's inspection efficiency of the searchable encryption algorithm is higher.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Ciphertext Audit; Homomorphic Encryption; Searchable Encryption
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
【DOI】 10.4018/JGIM.315014
【影响因子】3.474
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】The COVID-19 pandemic has heightened the necessity for pervasive data and system interoperability to manage healthcare information and knowledge. There is an urgent need to better understand the role of interoperability in improving the societal responses to the pandemic. This paper explores data and system interoperability, a very specific area that could contribute to fighting COVID-19. Specifically, the authors propose a unified health information system framework to connect data, systems, and devices to increase interoperability and manage healthcare information and knowledge. A blockchain-based solution is also provided as a recommendation for improving the data and system interoperability in healthcare.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】COVID-19; Data; Health Information System; Interoperability; System Integration
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
【DOI】 10.4018/JGIM.305239
【Author】 Wu, Yadi Tie, Guiyao Yu, Yao Li, Jianxin Song, Jun
【影响因子】3.000
【主题类别】
区块链应用-实体经济-房产领域
【Abstract】With the development of Internet finance, the real estate financial credentials have been extensively utilized in capital and trading markets. The extensive use of these private credentials, e.g., exchange, circulation or sharing on public clouds, can cause severe security and privacy problems. Existing security solutions for financial credentials may either introduce undesired overhead or fail to provide traceability and anonymity for data sharing. In this paper, we propose an enhanced blockchain-based secure sharing scheme for real estate financial credentials, providing the following three properties: credential confidentiality, anonymous authentication, identity tracking and transaction auditing. A comprehensive evaluation, including security analysis, efficiency analysis and simulation evaluation, is presented to show the security and feasibility of the proposed scheme.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; InterPlanetary File System (IPFS); Real estate; Finance credential; Secure sharing
【发表时间】
【收录时间】2023-05-14
【文献类型】 理论模型
【影响因子】1.140
【主题类别】
区块链技术-协同技术-物联网
【Abstract】Internet of Things (IoT) and sensor devices have been connected due to the development of the IoT and Information Communication Technology (ICT). It offers automatic environments in smart city and IoT scenarios and describes investments in advanced resources in futuristic human lives as sustainable growth of quality-wise life with intelligent infrastructure. Nowadays, IoT devices are continuously increasing and utilized in advanced IoT applications, including Smart Homes, Smart Farming, Smart Enterprises, and others. However, security and privacy are significant challenges with Ransomware-based Cyber-attack detection in IoT due to the lack of security design and heterogeneity of IoT devices. In the last few years, various advanced paradigms and technologies have been utilized to mitigate the security issues with Ransomware attack detection in IoT devices and data. This paper comprehensively surveys Ransomware-based Cyber Attacks and discusses solutions based on advanced technologies such as Artificial Intelligence (AI), Blockchain, and Software Defined Networks (SDN). Then, we design service scenarios for ransomware-based cyber-attack detection. Finally, we summarize the open research challenges and future directions for ransomware in IoT.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Ransomware; Cyber attack detection; AI; Blockchain; IoT
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 综述
【Author】 Campanelli, Matteo David, Bernardo Khoshakhlagh, Hamidreza Konring, Anders Nielsen, Jesper Buus
【影响因子】
【主题类别】
区块链技术-核心技术-加密算法
【Abstract】A number of recent works have constructed cryptographic protocols with flavors of adaptive security by having a randomly-chosen anonymous committee run at each round. Since most of these protocols are stateful, transferring secret states from past committees to future, but still unknown, committees is a crucial challenge. Previous works have tackled this problem with approaches tailor-made for their specific setting, which mostly rely on using a blockchain to orchestrate auxiliary committees that aid in the state hand-over process. In this work, we look at this challenge as an important problem on its own and initiate the study of Encryption to the Future (EtF) as a cryptographic primitive. First, we define a notion of an EtF scheme where time is determined with respect to an underlying blockchain and a lottery selects parties to receive a secret message at some point in the future. While this notion seems overly restrictive, we establish two important facts: 1. if used to encrypt towards parties selected in the "far future", EtF implies witness encryption for NP over a blockchain; 2. if used to encrypt only towards parties selected in the "near future", EtF is not only sufficient for transferring state among committees as required by previous works, but also captures previous tailor-made solutions. To corroborate these results, we provide a novel construction of EtF based on witness encryption over commitments (cWE), which we instantiate from a number of standard assumptions via a construction based on generic cryptographic primitives. Finally, we show how to use "near future" EtF to obtain "far future" EtF with a protocol based on an auxiliary committee whose communication complexity is independent of the length of plaintext messages being sent to the future. [Campanelli, Matteo] Protocol Labs, San Francisco, CA 94102 USA; [Campanelli, Matteo; Khoshakhlagh, Hamidreza; Nielsen, Jesper Buus] Aarhus Univ, Aarhus, Denmark; [David, Bernardo; Konring, Anders] IT Univ Copenhagen, Copenhagen, Denmark Aarhus University; IT University Copenhagen Campanelli, M (通讯作者),Protocol Labs, San Francisco, CA 94102 USA. matteo@protocol.ai; beda@itu.dk; hamidreza@cs.au.dk; konr@itu.dk; jbn@cs.au.dk Concordium Foundation; Independent Research Fund Denmark (IRFD) [9040-00399B, 9131-00075B, 0165-00079B]; Concordium Foundation under Concordium Blockchain Research Center, Aarhus; IRFD [9040-00399B]; Danish Independent Research Council [DFF-8021-00366B]; Carlsberg Foundation under the Semper Ardens Research Project [CF18-112] Concordium Foundation; Independent Research Fund Denmark (IRFD); Concordium Foundation under Concordium Blockchain Research Center, Aarhus; IRFD; Danish Independent Research Council(Det Frie Forskningsrad (DFF)); Carlsberg Foundation under the Semper Ardens Research Project Bernardo David is supported by the Concordium Foundation and by the Independent Research Fund Denmark (IRFD) grants number 9040-00399B (TrA2C), 9131-00075B (PUMA) and 0165-00079B. Hamidreza Khoshakhlagh has been funded by the Concordium Foundation under Concordium Blockchain Research Center, Aarhus. Anders Konring is supported by the IRFD grant number 9040-00399B (TrA2C). Jesper Buus Nielsen is partially funded by the Concordium Foundation; The Danish Independent Research Council under Grant-ID DFF-8021-00366B (BETHE); The Carlsberg Foundation under the Semper Ardens Research Project CF18-112 (BCM). 23 0 0 0 0 SPRINGER INTERNATIONAL PUBLISHING AG CHAM GEWERBESTRASSE 11, CHAM, CH-6330, SWITZERLAND 0302-9743 1611-3349 978-3-031-22968-8; 978-3-031-22969-5 LECT NOTES COMPUT SC 2022 13793 151 180 10.1007/978-3-031-22969-5_6 http://dx.doi.org/10.1007/978-3-031-22969-5_6 30 Computer Science, Information Systems; Computer Science, Theory & Methods; Mathematics, Applied Conference Proceedings Citation Index - Science (CPCI-S) Computer Science; Mathematics BU9WU Green Submitted 2023-05-06 WOS:000964580500006
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2023-05-14
【文献类型】 理论模型
【作者】 卫孜钻;王鑫;于丹;马垚;陈永乐;
【作者单位】太原理工大学信息与计算机学院;
【文献来源】计算机工程与应用
【复合影响因子】2.348
【综合影响因子】1.606
【主题类别】
区块链治理-技术治理-区块链安全
【摘要】日蚀攻击是区块链系统中一种恶意攻击手段,攻击者通过垄断受害节点网络,达到欺骗、控制目的。从实际区块链应用中得知,目前为止还没有防御日蚀攻击的好方法,因此为了解决该问题,设计了一种针对POW共识区块链系统的日蚀攻击动态防御模型,其基于节点间互相评价机制。具体来说,通过综合客户端之间互相评价的结果,基于kademlia算法和设计的等级值评估机制,为每个节点评估、存储一个等级,节点根据等级值和等级限定值之间的关系选择正常对等节点作为邻居,以避免恶意节点。经过实验证明,该方法可以有效抵御日蚀攻击。该方法改进了先前提出的一系列防御策略,无需对区块链系统协议、网络等进行更改,能够较高概率地成功抵御日蚀攻击,并且模型产生的开销也很小,非常适合实际部署。
【关键词】日蚀攻击;;POW共识机制;;动态防御;;等级值;;区块链协议
【文献类型】 理论模型
【发表时间】2023-05-14
【作者】 张艺;吴卿婧;胡伟;
【作者单位】上海电力大学经济与管理学院;
【文献来源】系统管理学报
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-环境领域
【摘要】针对目前能源交易体系存在安全性较低、平台管理成本较高以及碳配额交易空缺的问题,提出基于量子区块链的碳配额交易模型。通过建立碳排放权分配指标体系,采用灰色关联分析法,实现碳排放权配额的初次分配,保障参与节点碳配额初始分配的公平性。利用零和博弈数据包络分析(Zero Sum Gains-Data Envelopment Analysis, ZSG-DEA)模型,计算参与交易主体碳配额利用效率和优化方案,有效促进产业结构升级。嵌入碳配额交易奖惩系统,有效保障减排低碳主体的利益。采用量子纠缠态签名智能合约,保障碳配额交易的量子通信安全,进行交易节点间的身份验证。算例分析表明,该交易架构能够有效保障碳配额分配的公平性,提高碳配额的利用效率,保障碳配额交易过程中的交易数据和用户信息安全性,为推动后量子时代的碳配额交易进程提供理论支撑与决策支持。
【关键词】碳排放权配额;;量子区块链;;灰色关联分析法;;零和博弈;;数据包络分析
【文献类型】 理论模型
【发表时间】2023-05-14