Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Blockchain

Discipline
Institution
Publication
Publication Type

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed Dec 2020

Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed

Electronic Theses, Projects, and Dissertations

With the increase in the data breaches and cyber hacks, organizations have come to realize that cyber security alone would not help as the attacks are becoming more sophisticated and complex than ever. E-Healthcare industry has shown a promising improvement in terms of security over the past, but the threat remains. Thus, the E-Healthcare industries are aiming towards a Defense in Depth Strategy approach.

The project here describes how a Defense in Depth Strategy for E-Healthcare system can provide an environment for better security of the data and peer-to-peer interaction with stakeholders. The legacy systems have at some point failed …


Leveraging Smart Contracts For Asynchronous Group Key Agreement In Internet Of Things, Victor Youdom Kemmoe, Junggab Son Jul 2020

Leveraging Smart Contracts For Asynchronous Group Key Agreement In Internet Of Things, Victor Youdom Kemmoe, Junggab Son

Master of Science in Computer Science Theses

Group Key Agreement (GKA) mechanism plays a crucial role in the realization of various secure applications in various networks such as, but not limited to, sensor networks, Internet of Things (IoT), vehicular networks, social networks, and so on. To be suitable for IoT, GKA must satisfy several critical requirements. First, a GKA mechanism must be robust against a compromised device attack and satisfy essential secrecy definitions without the existence of a Trusted Third Party (TTP). TTP is often used by IoT devices in the establishment of ad hoc networks and usually, these devices are resource-constrained. Second, the GKA mechanism must …


Attribute Proxy Re-Encryption For Ciphertext Storage Sharing Scheme On Blockchain, Xiaohong Zhang, Lanlan Sun Jun 2020

Attribute Proxy Re-Encryption For Ciphertext Storage Sharing Scheme On Blockchain, Xiaohong Zhang, Lanlan Sun

Journal of System Simulation

Abstract: In order to implement the information storage sharing service safely and efficiently, a blockchain storage sharing scheme supporting the attribute proxy re-encryption and keyword retrieval is proposed. By the nodes classification and ciphertext storage separation, the anti-collusion attack is better implemented. The smart contract design of the information transaction is introduced and the information sharing parties can communicate spontaneously without the participation of the central organization. By the attribute-based proxy re-encryption algorithm, the information owner can share the information with other users without re-encrypting, uploading, and downloading information, and relieves the burden of the high-frequency access of the cloud …


A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin Jun 2020

A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin

FIU Electronic Theses and Dissertations

Since its introduction, Bitcoin cryptocurrency has revolutionized the way payment systems can be designed in a purely distributed manner through its novel Blockchain data structure. While Bitcoin has opened new opportunities, it has been long criticized for its slow transaction confirmation times and high transaction fees. To address this issue, one of the recently emerging solutions is to build a payment channel network (PCN) on top of Bitcoin where the transactions can be made without writing to blockchain. Specifically, a PCN is a network where the users connect either directly or indirectly to send payments to each other in a …


The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels Apr 2020

The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels

SMU Data Science Review

The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain distributed …


Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily Mar 2020

Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily

Doctoral Dissertations

Processor-based embedded systems are integrated into many aspects of everyday life such as industrial control, automotive systems, healthcare, the Internet of Things, etc. As Moore’s law progresses, these embedded systems have moved from simple microcontrollers to full-scale embedded computing systems with multiple processor cores and operating systems support. At the same time, the security of these devices has also become a key concern. Our main focus in this work is the security and privacy of the embedded systems used in IoT systems. In the first part of this work, we take a look at the security of embedded systems from …


Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern smart homes are being equipped with certain renewable energy resources that can produce their own electric energy. From time to time, these smart homes or microgrids are also capable of supplying energy to other houses, buildings, or energy grid in the time of available self-produced renewable energy. Therefore, researches have been carried out to develop optimal trading strategies, and many recent technologies are also being used in combination with microgrids. One such technology is blockchain, which works over decentralized distributed ledger. In this paper, we develop a blockchain based approach for microgrid energy auction. To make this auction more …


A Blockchain Approach To Social Responsibility, Augusto Bedin, Wander Queiroz, Miriam A M Capretz, London Hydro Mar 2020

A Blockchain Approach To Social Responsibility, Augusto Bedin, Wander Queiroz, Miriam A M Capretz, London Hydro

Electrical and Computer Engineering Publications

As blockchain technology matures, more sophisticated solutions arise regarding complex problems. Blockchain continues to spread towards various niches such as government, IoT, energy, and environmental industries. One often overlooked opportunity for blockchain is the social responsibility sector. Presented in this paper is a permissioned blockchain model that enables enterprises to come together and cooperate to optimize their environmental and societal impacts. This is made possible through a private or permissioned blockchain. Permissioned blockchains are blockchain networks where all the participants are known and trust relationships among them can be fostered more smoothly. An example of what a permissioned blockchain would …


Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla Jan 2020

Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla

VMASC Publications

Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …


Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd Jan 2020

Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd

Journal of International Technology and Information Management

Blockchain has become the new hype term in the business world for the last decade. Due to the new technology’s characteristics and innovative applications, it is being adopted globally in a wide number of industries including the banking industry, yet no adoption model is provided to guide this process. This research aims to contribute to facilitating the successful adoption and implementation of the blockchain new technology in the banking industry. Building on the assumption that the blockchain’s adoption in banking will be directed by the regulations and best practices guidelines of the global banking regulatory bodies and practitioner, this research …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …