Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (4)
- Computer and Systems Architecture (4)
- Physical Sciences and Mathematics (4)
- Data Storage Systems (3)
- Digital Communications and Networking (3)
-
- Electrical and Computer Engineering (3)
- Business (2)
- Business Intelligence (2)
- Management Information Systems (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Social and Behavioral Sciences (2)
- Artificial Intelligence and Robotics (1)
- Behavioral Economics (1)
- Business Administration, Management, and Operations (1)
- Business Analytics (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computational Engineering (1)
- E-Commerce (1)
- Economics (1)
- Hardware Systems (1)
- Health Information Technology (1)
- Information Literacy (1)
- Intellectual Property Law (1)
- Internet Law (1)
- Law (1)
- Law and Economics (1)
- Library and Information Science (1)
- Institution
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Computer Engineering
Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed
Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed
Electronic Theses, Projects, and Dissertations
With the increase in the data breaches and cyber hacks, organizations have come to realize that cyber security alone would not help as the attacks are becoming more sophisticated and complex than ever. E-Healthcare industry has shown a promising improvement in terms of security over the past, but the threat remains. Thus, the E-Healthcare industries are aiming towards a Defense in Depth Strategy approach.
The project here describes how a Defense in Depth Strategy for E-Healthcare system can provide an environment for better security of the data and peer-to-peer interaction with stakeholders. The legacy systems have at some point failed …
Leveraging Smart Contracts For Asynchronous Group Key Agreement In Internet Of Things, Victor Youdom Kemmoe, Junggab Son
Leveraging Smart Contracts For Asynchronous Group Key Agreement In Internet Of Things, Victor Youdom Kemmoe, Junggab Son
Master of Science in Computer Science Theses
Group Key Agreement (GKA) mechanism plays a crucial role in the realization of various secure applications in various networks such as, but not limited to, sensor networks, Internet of Things (IoT), vehicular networks, social networks, and so on. To be suitable for IoT, GKA must satisfy several critical requirements. First, a GKA mechanism must be robust against a compromised device attack and satisfy essential secrecy definitions without the existence of a Trusted Third Party (TTP). TTP is often used by IoT devices in the establishment of ad hoc networks and usually, these devices are resource-constrained. Second, the GKA mechanism must …
Attribute Proxy Re-Encryption For Ciphertext Storage Sharing Scheme On Blockchain, Xiaohong Zhang, Lanlan Sun
Attribute Proxy Re-Encryption For Ciphertext Storage Sharing Scheme On Blockchain, Xiaohong Zhang, Lanlan Sun
Journal of System Simulation
Abstract: In order to implement the information storage sharing service safely and efficiently, a blockchain storage sharing scheme supporting the attribute proxy re-encryption and keyword retrieval is proposed. By the nodes classification and ciphertext storage separation, the anti-collusion attack is better implemented. The smart contract design of the information transaction is introduced and the information sharing parties can communicate spontaneously without the participation of the central organization. By the attribute-based proxy re-encryption algorithm, the information owner can share the information with other users without re-encrypting, uploading, and downloading information, and relieves the burden of the high-frequency access of the cloud …
A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin
A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin
FIU Electronic Theses and Dissertations
Since its introduction, Bitcoin cryptocurrency has revolutionized the way payment systems can be designed in a purely distributed manner through its novel Blockchain data structure. While Bitcoin has opened new opportunities, it has been long criticized for its slow transaction confirmation times and high transaction fees. To address this issue, one of the recently emerging solutions is to build a payment channel network (PCN) on top of Bitcoin where the transactions can be made without writing to blockchain. Specifically, a PCN is a network where the users connect either directly or indirectly to send payments to each other in a …
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
SMU Data Science Review
The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain distributed …
Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily
Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily
Doctoral Dissertations
Processor-based embedded systems are integrated into many aspects of everyday life such as industrial control, automotive systems, healthcare, the Internet of Things, etc. As Moore’s law progresses, these embedded systems have moved from simple microcontrollers to full-scale embedded computing systems with multiple processor cores and operating systems support. At the same time, the security of these devices has also become a key concern. Our main focus in this work is the security and privacy of the embedded systems used in IoT systems. In the first part of this work, we take a look at the security of embedded systems from …
Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Publications
Modern smart homes are being equipped with certain renewable energy resources that can produce their own electric energy. From time to time, these smart homes or microgrids are also capable of supplying energy to other houses, buildings, or energy grid in the time of available self-produced renewable energy. Therefore, researches have been carried out to develop optimal trading strategies, and many recent technologies are also being used in combination with microgrids. One such technology is blockchain, which works over decentralized distributed ledger. In this paper, we develop a blockchain based approach for microgrid energy auction. To make this auction more …
A Blockchain Approach To Social Responsibility, Augusto Bedin, Wander Queiroz, Miriam A M Capretz, London Hydro
A Blockchain Approach To Social Responsibility, Augusto Bedin, Wander Queiroz, Miriam A M Capretz, London Hydro
Electrical and Computer Engineering Publications
As blockchain technology matures, more sophisticated solutions arise regarding complex problems. Blockchain continues to spread towards various niches such as government, IoT, energy, and environmental industries. One often overlooked opportunity for blockchain is the social responsibility sector. Presented in this paper is a permissioned blockchain model that enables enterprises to come together and cooperate to optimize their environmental and societal impacts. This is made possible through a private or permissioned blockchain. Permissioned blockchains are blockchain networks where all the participants are known and trust relationships among them can be fostered more smoothly. An example of what a permissioned blockchain would …
Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla
Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla
VMASC Publications
Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …
Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd
Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd
Journal of International Technology and Information Management
Blockchain has become the new hype term in the business world for the last decade. Due to the new technology’s characteristics and innovative applications, it is being adopted globally in a wide number of industries including the banking industry, yet no adoption model is provided to guide this process. This research aims to contribute to facilitating the successful adoption and implementation of the blockchain new technology in the banking industry. Building on the assumption that the blockchain’s adoption in banking will be directed by the regulations and best practices guidelines of the global banking regulatory bodies and practitioner, this research …
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
Computational Modeling & Simulation Engineering Faculty Publications
The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …