Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (14)
- Computer Sciences (13)
- Data Storage Systems (9)
- Digital Communications and Networking (9)
- Other Computer Engineering (9)
-
- Information Security (8)
- Electrical and Computer Engineering (6)
- Business (5)
- Computer and Systems Architecture (5)
- Databases and Information Systems (2)
- Operations and Supply Chain Management (2)
- Social and Behavioral Sciences (2)
- Architectural Engineering (1)
- Architectural Technology (1)
- Architecture (1)
- Artificial Intelligence and Robotics (1)
- Civil and Environmental Engineering (1)
- Computational Engineering (1)
- Computer Law (1)
- Construction Engineering (1)
- Construction Engineering and Management (1)
- Data Science (1)
- E-Commerce (1)
- Engineering Education (1)
- Internet Law (1)
- Law (1)
- Library and Information Science (1)
- Management Sciences and Quantitative Methods (1)
- Institution
-
- Old Dominion University (7)
- Florida International University (5)
- Technological University Dublin (4)
- University of Nebraska - Lincoln (4)
- Walden University (2)
-
- Ateneo de Manila University (1)
- Embry-Riddle Aeronautical University (1)
- Harrisburg University of Science and Technology (1)
- Missouri University of Science and Technology (1)
- Munster Technological University (1)
- Singapore Management University (1)
- University of Mississippi (1)
- University of Pennsylvania Carey Law School (1)
- Western University (1)
- Publication
-
- FIU Electronic Theses and Dissertations (5)
- VMASC Publications (3)
- Department of Electrical and Computer Engineering: Faculty Publications (2)
- Library Philosophy and Practice (e-journal) (2)
- Publications (2)
-
- All Faculty Scholarship (1)
- Articles (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Faculty Research & Creative Works (1)
- Conference papers (1)
- Department of Information Systems & Computer Science Faculty Publications (1)
- Dissertations (1)
- Electrical and Computer Engineering Publications (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Faculty and Student Publications (1)
- Information Technology & Decision Sciences Faculty Publications (1)
- Other (1)
- Other Student Works (1)
- Research Collection School Of Computing and Information Systems (1)
- School of Cybersecurity Faculty Publications (1)
- School of Information Systems and Technology Publications (1)
- Walden Faculty and Staff Publications (1)
Articles 1 - 30 of 31
Full-Text Articles in Computer Engineering
Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, Nouman Ashraf, Sachin Sharma, Sheraz Aslam, Khursheed Aurangzeb
Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, Nouman Ashraf, Sachin Sharma, Sheraz Aslam, Khursheed Aurangzeb
Articles
Fossil fuel pollution has contributed to dramatic changes in the Earth’s climate, and this trend will continue as fossil fuels are burned at an ever-increasing rate. Many countries around the world are currently making efforts to reduce greenhouse gas emissions, and one of the methods is the Tradable White Certificate (TWC) mechanism. The mechanism allows organizations to reduce their energy consumption to generate energy savings certificates, and those that achieve greater energy savings can sell their certificates to those that fall short. However, there are some challenges to implementing this mechanism, such as the centralized and costly verification and control …
Enabling Third Layer Bitcoin Applications Using Lightning Network, Ahmet Kurt
Enabling Third Layer Bitcoin Applications Using Lightning Network, Ahmet Kurt
FIU Electronic Theses and Dissertations
When Bitcoin was introduced in 2009, it created a big sensation in the world as it was first of its kind. Since then, a lot of different cryptocurrencies were proposed. Today, cryptocurrencies can be used to pay for goods and services similar to using cash or credit cards. However, none of them could replace or supersede Bitcoin in usage or market capitalization. Current market conditions still imply that it will stay the same way. However, Bitcoin suffers from very low transaction per second (TPS) which limits its usability on large scale. There have been numerous proposals to increase its scalability …
Blockchain-Enabled Authenticated Key Agreement Scheme For Mobile Vehicles-Assisted Precision Agricultural Iot Networks, Anusha Vangala, Ashok Kumar Das, Ankush Mitra, Sajal K. Das, Youngho Park
Blockchain-Enabled Authenticated Key Agreement Scheme For Mobile Vehicles-Assisted Precision Agricultural Iot Networks, Anusha Vangala, Ashok Kumar Das, Ankush Mitra, Sajal K. Das, Youngho Park
Computer Science Faculty Research & Creative Works
Precision Farming Has a Positive Potential in the Agricultural Industry Regarding Water Conservation, Increased Productivity, Better Development of Rural Areas, and Increased Income. Blockchain Technology is a Better Alternative for Storing and Sharing Farm Data as It is Reliable, Transparent, Immutable, and Decentralized. Remote Monitoring of an Agricultural Field Requires Security Systems to Ensure that Any Sensitive Information is Exchanged Only among Authenticated Entities in the Network. to This End, We Design an Efficient Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural Internet of Things (IoT) Networks Called AgroMobiBlock. the Limited Existing Work on Authentication in Agricultural Networks …
Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano
Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano
Department of Information Systems & Computer Science Faculty Publications
There are cases of corruption and fraud within the Philippine government that have gone under the radar, often due to a lack of transparency and verifiability. The objective of this study is to prototype a blockchain network that can run a government process as a decentralized application such that it can enhance transparency and verifiability in the public sector. This can be accomplished by identifying a government process that would be converted into a decentralized application. One of these processes would be converted into a decentralized application. Afterwards, a blockchain framework should be identified one which can create a public …
An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas
An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas
School of Cybersecurity Faculty Publications
Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …
Geohash-Based Rapid Query Method Of Regional Transactions In Blockchain For Internet Of Vehicles, Chang Zhou, Huimei Lu, Yong Xiang, Jingbang Wu, Feng Wang
Geohash-Based Rapid Query Method Of Regional Transactions In Blockchain For Internet Of Vehicles, Chang Zhou, Huimei Lu, Yong Xiang, Jingbang Wu, Feng Wang
Faculty and Student Publications
Many researchers have introduced blockchain into the Internet of Vehicles (IoV) to support trading or other authentication applications between vehicles. However, the traditional blockchain cannot well support the query of transactions that occur in a specified area which is important for vehicle users since they are bound to the geolocations. Therefore, the querying efficiency of the geolocation attribute of transactions is vital for blockchain-based applications. Existing work does not well handle the geolocation of vehicles in the blockchain, and thus the querying efficiency is questionable. In this paper, we design a rapid query method of regional transactions in blockchain for …
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Information Technology & Decision Sciences Faculty Publications
Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …
Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones
Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones
Other Student Works
This project will analyze the results of trials implementing various storage methods on Geth nodes to synchronize and maintain a full-archive state of the Ethereum blockchain. The purpose of these trials is to gain deeper insight to the process of lowering cost and increasing efficiency of blockchain storage using available technologies, analyzing results of various storage drives under similar conditions. It provides performance analysis and describes performance of each trial in relation to the others.
Performance Evaluation Of An Edge Computing Implementation Of Hyperledger Sawtooth For Iot Data Security, Sean Connolly
Performance Evaluation Of An Edge Computing Implementation Of Hyperledger Sawtooth For Iot Data Security, Sean Connolly
Dissertations
Blockchain offers a potential solution to some of the security challenges faced by the internet-of-things (IoT) by using its practically immutable ledger to store data transactions. However, past applications of blockchain in IoT encountered limitations in the rate at which transactions were committed to the chain as new blocks. These limitations were often the result of the time-consuming and computationally expensive consensus mechanisms found in public blockchains. Hyperledger Sawtooth is an open-source private blockchain platform that offers an efficient proof-of-elapsed-time (PoET) consensus mechanism. Sawtooth has performed well in benchmarks against other blockchains. However, a performance evaluation for a practical application …
A Systematic Review Of How Cloud Infrastructure And Gdpr Have Affected Digital Investigations In A Multinational Business Context, Stuart Fraser, A.Omar Portillo-Dominguez
A Systematic Review Of How Cloud Infrastructure And Gdpr Have Affected Digital Investigations In A Multinational Business Context, Stuart Fraser, A.Omar Portillo-Dominguez
Other
With cloud infrastructure becoming an ever more popular platform for business network implementations, and with ever-tightening data protection regulation, the ability to carry out digital investigations has become more difficult. This has led to areas of research that have looked to restore the balance to digital investigations in this environment. These areas include the use of blockchain, data tracing, and digital forensics as a service. With so many methods to consider, this article looks at how each method aims to return the balance and make it possible to carry out an investigation that complies with new privacy regulations (e.g., the …
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi
School of Information Systems and Technology Publications
This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi
Walden Faculty and Staff Publications
This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …
A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner
FIU Electronic Theses and Dissertations
Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …
Blockchain-Based Healthcare Portal – A Bibliometric Analysis, Aditi Goyal, Aditya Banerjee, Aniket Mulik, Yashika Chhabaria, Sonali Kothari Tidke Dr, Vijayshri Khedkar
Blockchain-Based Healthcare Portal – A Bibliometric Analysis, Aditi Goyal, Aditya Banerjee, Aniket Mulik, Yashika Chhabaria, Sonali Kothari Tidke Dr, Vijayshri Khedkar
Library Philosophy and Practice (e-journal)
User privacy has been a topmost priority and one such domain where this is neglected is the area of healthcare. Our solution focuses on the idea of using blockchain to provide a platform for healthcare experts and patients, giving patients full control over the data that will be shared. This paper focuses on identifying current research that has been conducted in this area in the form of a bibliometric analysis. A bibliometric study on a research area involves a detailed analysis of citations and papers across a domain of study. The purpose of this study is a statistical analysis of …
A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R.
A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R.
Library Philosophy and Practice (e-journal)
Access Control is mentioned to as the imprisonment of particular activities of an individual to carry out an action. Cloud storing similar to any other untrusted surroundings wants the capacity to protect the shared data. The one of the apparatus of access mechanism is ciphertext-policy attribute-based encryption system over and done with dynamic characteristics. With a blockchain based distributed ledger, the scheme offers immutable log of whole significant safety events, for example key generation, change or revocation, access policy assignment, access request etc. Number of different problems similar to single point of failure, security and privacy etc. were targeted through …
Vind: A Blockchain-Enabled Supply Chain Provenance Framework For Energy Delivery Systems, Eranga Bandara, Sachin Shetty, Deepak Tosh, Xueping Liang
Vind: A Blockchain-Enabled Supply Chain Provenance Framework For Energy Delivery Systems, Eranga Bandara, Sachin Shetty, Deepak Tosh, Xueping Liang
VMASC Publications
Enterprise-level energy delivery systems (EDSs) depend on different software or hardware vendors to achieve operational efficiency. Critical components of these systems are typically manufactured and integrated by overseas suppliers, which expands the attack surface to adversaries with additional opportunities to infiltrate into EDSs. Due to this reason, the risk management of the EDS supply chain is crucial to ensure that we are knowledgeable about the vulnerabilities in software and hardware components that comprise any critical part, quantifiable risk metrics to assess the severity and exploitability of the attack, and provide remediation solutions that can influence a prioritized mitigation plan. There …
Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin
Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin
Engineering Management & Systems Engineering Faculty Publications
In the modern acquisition, it is unrealistic to consider single entities as producing and delivering a product independently. Acquisitions usually take place through supply networks. Resiliency, efficiency, and effectiveness of supply networks directly contribute to the acquisition system's resiliency, efficiency, and effectiveness. All the involved firms form a part of a supply network essential to producing the product or service. The decision-makers have to look for new methodologies for supply chain management. Blockchain technology introduces new methods of decentralization and delegation of services, which can transform supply chains and result in a more resilient, efficient, and effective supply chain. This …
A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin
A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin
FIU Electronic Theses and Dissertations
Since its introduction, Bitcoin cryptocurrency has revolutionized the way payment systems can be designed in a purely distributed manner through its novel Blockchain data structure. While Bitcoin has opened new opportunities, it has been long criticized for its slow transaction confirmation times and high transaction fees. To address this issue, one of the recently emerging solutions is to build a payment channel network (PCN) on top of Bitcoin where the transactions can be made without writing to blockchain. Specifically, a PCN is a network where the users connect either directly or indirectly to send payments to each other in a …
Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Publications
Modern smart homes are being equipped with certain renewable energy resources that can produce their own electric energy. From time to time, these smart homes or microgrids are also capable of supplying energy to other houses, buildings, or energy grid in the time of available self-produced renewable energy. Therefore, researches have been carried out to develop optimal trading strategies, and many recent technologies are also being used in combination with microgrids. One such technology is blockchain, which works over decentralized distributed ledger. In this paper, we develop a blockchain based approach for microgrid energy auction. To make this auction more …
A Blockchain Approach To Social Responsibility, Augusto Bedin, Wander Queiroz, Miriam A M Capretz, London Hydro
A Blockchain Approach To Social Responsibility, Augusto Bedin, Wander Queiroz, Miriam A M Capretz, London Hydro
Electrical and Computer Engineering Publications
As blockchain technology matures, more sophisticated solutions arise regarding complex problems. Blockchain continues to spread towards various niches such as government, IoT, energy, and environmental industries. One often overlooked opportunity for blockchain is the social responsibility sector. Presented in this paper is a permissioned blockchain model that enables enterprises to come together and cooperate to optimize their environmental and societal impacts. This is made possible through a private or permissioned blockchain. Permissioned blockchains are blockchain networks where all the participants are known and trust relationships among them can be fostered more smoothly. An example of what a permissioned blockchain would …
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
Computational Modeling & Simulation Engineering Faculty Publications
The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …
Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla
Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla
VMASC Publications
Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …
Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid
Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid
FIU Electronic Theses and Dissertations
Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity …
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
FIU Electronic Theses and Dissertations
With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Publications
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …
Blockchain Based Efficient And Robust Fair Payment For Outsourcing Services In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng
Blockchain Based Efficient And Robust Fair Payment For Outsourcing Services In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng
Research Collection School Of Computing and Information Systems
As an attractive business model of cloud computing, outsourcing services usually involve online payment and security issues. The mutual distrust between users and outsourcing service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing payment solutions only consider a specific type of outsourcing service and rely on a trusted third-party to realize fairness. In this paper, in order to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing. We first present the …
The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow
The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow
All Faculty Scholarship
In this report, Shakow explains how a decentralized autonomous organization functions and interacts with the U.S. tax system and presents the many tax issues that these structures raise. The possibility of using smart contracts to allow an entity to operate totally autonomously on a blockchain platform seems attractive. However, little thought has been given to how such an entity can comply with the requirements of a tax system. The DAO, the first major attempt to create such an organization, failed because of a programming error. If successful examples proliferate in the future, tax authorities will face significant problems in getting …
Optimal Computational Power Allocation In Multi-Access Mobile Edge Computing For Blockchain, Yuan Wu, Xiangxu Chen, Jiajun Shi, Kejie Ni, Liping Qian, Liang Huang, Kuan Zhang
Optimal Computational Power Allocation In Multi-Access Mobile Edge Computing For Blockchain, Yuan Wu, Xiangxu Chen, Jiajun Shi, Kejie Ni, Liping Qian, Liang Huang, Kuan Zhang
Department of Electrical and Computer Engineering: Faculty Publications
Blockchain has emerged as a decentralized and trustable ledger for recording and storing digital transactions. The mining process of Blockchain, however, incurs a heavy computational workload for miners to solve the proof-of-work puzzle (i.e., a series of the hashing computation), which is prohibitive from the perspective of the mobile terminals (MTs). The advanced multi-access mobile edge computing (MEC), which enables the MTs to offload part of the computational workloads (for solving the proof-of-work) to the nearby edge-servers (ESs), provides a promising approach to address this issue. By offloading the computational workloads via multi-access MEC, the MTs can effectively increase their …
Optimal Computational Power Allocation In Multi-Access Mobile Edge Computing For Blockchain, Yuan Wu, Xiangxu Chen, Jiajun Shi, Kejie Ni, Liping Qian, Liang Huang, Kuan Zhang
Optimal Computational Power Allocation In Multi-Access Mobile Edge Computing For Blockchain, Yuan Wu, Xiangxu Chen, Jiajun Shi, Kejie Ni, Liping Qian, Liang Huang, Kuan Zhang
Department of Electrical and Computer Engineering: Faculty Publications
Blockchain has emerged as a decentralized and trustable ledger for recording and storing digital transactions. The mining process of Blockchain, however, incurs a heavy computational workload for miners to solve the proof-of-work puzzle (i.e., a series of the hashing computation), which is prohibitive from the perspective of the mobile terminals (MTs). The advanced multi-access mobile edge computing (MEC), which enables the MTs to offload part of the computational workloads (for solving the proof-of-work) to the nearby edge-servers (ESs), provides a promising approach to address this issue. By offloading the computational workloads via multi-access MEC, the MTs can effectively increase their …
A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu
A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu
VMASC Publications
Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate …