Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Blockchain

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 38

Full-Text Articles in Physical Sciences and Mathematics

Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin Dec 2023

Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin

Journal of System Simulation

Abstract: Natural disasters may unpredictably disrupt ground communication infrastructure and transportation systems, and UAVs emergency response can deal with such uncertainties and highly dynamic scenarios. Aiming at the robustness requirements of decentralized rescue systems. UAV emergency rescue chain (UERChain) based on blockchain technology is proposed. By deploying UAV backbone nodes within a layered local network, the smart contracts for managing reputation considering UAV social relationships are designed. The blockchain is employed as a trust mechanism to realize the trustworthy interactions among distributed UAVs. Experimental results show that, UERChain has higher robustness, and within controllable resource constraints, the reputation management and …


Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane Aug 2023

Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane

Engineering Management & Systems Engineering Theses & Dissertations

Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.

With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …


Research On Collaborative Task Allocation Method Of Multiple Uavs Based On Blockchain, Shuangcheng Niu, Yuqiang Jin, Kunhu Kou May 2023

Research On Collaborative Task Allocation Method Of Multiple Uavs Based On Blockchain, Shuangcheng Niu, Yuqiang Jin, Kunhu Kou

Journal of System Simulation

Abstract: The autonomous collaborative control of a multi-unmanned aerial vehicle (UAV) system lacks a unified underlying technology platform and faces single point failure and information security threats. In order to solve these problems, an idea to build collaborative task planning platforms based on blockchain technology is proposed. With thecollaborative task allocation of multiple UAVs as research objects, an online, safe, high-efficiency, and real-time task allocation method is designed. The contract network task allocation algorithm is described as a smart contract, and system consensus is reached based on the blockchain consensus algorithm. In addition, …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii May 2023

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano Jan 2023

Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano

Department of Information Systems & Computer Science Faculty Publications

There are cases of corruption and fraud within the Philippine government that have gone under the radar, often due to a lack of transparency and verifiability. The objective of this study is to prototype a blockchain network that can run a government process as a decentralized application such that it can enhance transparency and verifiability in the public sector. This can be accomplished by identifying a government process that would be converted into a decentralized application. One of these processes would be converted into a decentralized application. Afterwards, a blockchain framework should be identified one which can create a public …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon Nov 2022

Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon

Information Technology & Decision Sciences Faculty Publications

Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …


Blockchain And Federated Learning-Based Security Solutions For Telesurgery System: A Comprehensive Review, Sachi Chaudjary, Riya Kakkar, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, Ravi Sharma Nov 2022

Blockchain And Federated Learning-Based Security Solutions For Telesurgery System: A Comprehensive Review, Sachi Chaudjary, Riya Kakkar, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, Ravi Sharma

Turkish Journal of Electrical Engineering and Computer Sciences

The advent of telemedicine with its remote surgical procedures has effectively transformed the working of healthcare professionals. The evolution of telemedicine facilitates the remote monitoring of patients that lead to the advent of telesurgery systems, i.e. one of the most critical applications in telemedicine systems. Apart from gaining popularity, the telesurgery system may encounter security and trust issues of patients? data while communicating with the surgeon for their remote treatment. Motivated by this, we have presented a comprehensive survey on secure telesurgery systems comprising healthcare, surgical robots, traditional telesurgery systems, and the role of artificial intelligence to deal with the …


Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani Sep 2022

Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani

Turkish Journal of Electrical Engineering and Computer Sciences

Blockchain (BC) has been used as a new solution to overcome security and privacy challenges in the Internet of Things (IoT). However, recent studies have indicated that the BC has a limited scalability and is computationally costly. Also, it has significant overhead and delay in the network, which is not suitable to the nature of IoT. This article aims at implementing BC in the IoT context for smart home management, as the integration of these two technologies ensures the IoT's security and privacy. Therefore, we proposed an overlay network in private BC to optimize its compatibility with IoT by increasing …


Two-Layered Blockchain-Based Admission Control For Secure Uav Networks, Müge Özçevi̇k Sep 2022

Two-Layered Blockchain-Based Admission Control For Secure Uav Networks, Müge Özçevi̇k

Turkish Journal of Electrical Engineering and Computer Sciences

The frequent replacement requirement of UAVs for recharging outputs an extreme number of messaging for admission control of end-users. There are many studies that try to optimize the network capacity in an energy-efficient manner. However, they do not consider the security of data and control channels, which is the urgent requirement of 5G. Blockchain handles secure systems. However, the high numbered transactions in blockchain may cause bottlenecks while considering computational delay and throughput of end-user. In UAVs, a high percentage of battery is consumed for computational tasks instead of communication tasks. Therefore, to handle security by considering the computational needs, …


Verification Of Transaction Ordering Dependence Vulnerability Of Smart Contract Based On Cpn, Hong Zheng, Zerun Liu, Jianhua Huang, Shihui Qian Jul 2022

Verification Of Transaction Ordering Dependence Vulnerability Of Smart Contract Based On Cpn, Hong Zheng, Zerun Liu, Jianhua Huang, Shihui Qian

Journal of System Simulation

Abstract: The formal verification of smart contracts researches mainly focus on programming language-level vulnerabilities, and the transaction ordering dependence is more difficult to be detected as a blockchain-level vulnerability.The latent transaction ordering dependence vulnerability in smart contracts is formally verified based on colored Petri nets.The latent vulnerability in the Decode reward contractis analyzed, anda colored Petri net model of the contract itself and its execution environment is established from top to bottom.The attacker model is introduced to consider the situation that the contract is attacked. By running the model to verify the existence of transaction ordering dependence vulnerability in …


Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones May 2022

Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones

Other Student Works

This project will analyze the results of trials implementing various storage methods on Geth nodes to synchronize and maintain a full-archive state of the Ethereum blockchain. The purpose of these trials is to gain deeper insight to the process of lowering cost and increasing efficiency of blockchain storage using available technologies, analyzing results of various storage drives under similar conditions. It provides performance analysis and describes performance of each trial in relation to the others.


How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar May 2022

How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar

Information Systems Undergraduate Honors Theses

Since the founding of computers, data scientists have been able to engineer devices that increase individuals’ opportunities to communicate with each other. In the 1990s, the internet took over with many people not understanding its utility. Flash forward 30 years, and we cannot live without our connection to the internet. The internet of information is what we called early adopters with individuals posting blogs for others to read, this was known as Web 1.0. As we progress, platforms became social allowing individuals in different areas to communicate and engage with each other, this was known as Web 2.0. As Dr. …


Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou Mar 2022

Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou

Big Data Mining and Analytics

The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. Because of these characteristics, the blockchain is suitable for solving certain open problems in the service-oriented social network, where the unreliability of submitted reviews of service vendors can cause serious security problems. To solve the unreliability problems of submitted reviews, this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model. The new …


Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer Feb 2022

Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer

Turkish Journal of Electrical Engineering and Computer Sciences

Potential integration or cooperation of the Internet of things (IoT) systems and the blockchain technology is nowadays attracting remarkable interest from the researchers. These inter-operating systems often have to rely on lowcost, low-power, and robust IoT devices that can communicate with the blockchain network through smart contracts. In this work, we designed and ran a benchmark study for ESP32-based lightweight IoT devices interacting within the Quorum blockchain. A software library was built for ESP32 devices to enable elliptic-curve digital signing, Keccak-256 hashing, decoding, encoding, and secure private key generation capabilities, which all are the basic functional requirements for running a …


Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan Feb 2022

Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan

Turkish Journal of Electrical Engineering and Computer Sciences

Blockchain-based applications come up with cryptocurrencies, especially Bitcoin, introducing a distributed ledger technologies for peer-to-peer networks and essentially records the transactions in blocks containing hash value of the previous blocks. Block generation constitutes the basis of this technology, and the optimization of such systems is among the most crucial concerns. Determining either the block size or the number of transactions in the block brings out a remarkable problem that has been solved by the miners in recent years. First, higher block size results in higher transaction time, on the other hand, smaller block size has many disadvantages such as security, …


Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk Feb 2022

Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk

Turkish Journal of Electrical Engineering and Computer Sciences

Privacy of blockchains has been a matter of discussion since the inception of Bitcoin. Various techniques with a varying degree of privacy protection and complexity have been proposed over the past decade. In this survey, we present a systematic analysis of these proposals in four categories: (i) identity, (ii) transaction, (iii) consensus, and (iv) smart contract privacy. Each of these categories have privacy requirements of its own, and various solutions have been proposed to meet these requirements. Almost every technique in the literature of privacy enhancing technologies have been applied to blockchains: mix networks, zero-knowledge proofs, blind signatures, ring signatures, …


Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü Feb 2022

Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü

Turkish Journal of Electrical Engineering and Computer Sciences

In distributed computations and cryptography, it is desirable to record events on a public ledger, such that later alterations are computationally infeasible. An implementation of this idea is called blockchain, which is a distributed protocol that allows the creation of an immutable ledger. While such an idea is very appealing, the ledger may be contaminated with incorrect, illegal, or even dangerous data, and everyone running the blockchain protocol has no option but to store and propagate the unwanted data. The ledger is bloated over time, and it is not possible to remove redundant information. Finally, missing data cannot be inserted …


Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari Feb 2022

Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari

Turkish Journal of Electrical Engineering and Computer Sciences

There is a trend toward decentralized systems, but these systems are developed without conducting enough software tests. Also, the performance, scalability, and sustainability of the decentralized systems are not taken into account. One of the reasons is the time-consuming testing process. The other is the hardware requirements and the complexity of the software installations of the testing environment. Developer communities need stable and secure research networks to test and develop prototypes before releasing the working versions. Cloud-based blockchain test networks are available, but it allows using a specific framework. Also, users are required to learn how to use each framework. …


Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk Feb 2022

Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of things (IoT) is the key enabler of the smart systems used in many areas, from agriculture to aviation, industrial automation to autonomous vehicles. Most IoT deployments employ cost-efficient lightweight devices with limited resources (e.g., bandwidth, energy, storage). Although an IoT network must be built in its simplest form, engineers include more sophisticated devices like gateways and servers to provide web-based services and benefit from cloud systems. So, although the nodes can be widely distributed geographically or topologically, the system becomes centralized, which causes bottlenecks and single-points-of-failure. Furthermore, providing data integrity, nonrepudiation, and event management becomes tricky. In …


A Collaborative Knowledge-Based Security Risk Assessments Solution Using Blockchains, Tara Thaer Salman May 2021

A Collaborative Knowledge-Based Security Risk Assessments Solution Using Blockchains, Tara Thaer Salman

McKelvey School of Engineering Theses & Dissertations

Artificial intelligence and machine learning have recently gained wide adaptation in building intelligent yet simple and proactive security risk assessment solutions. Intrusion identification, malware detection, and threat intelligence are examples of security risk assessment applications that have been revolutionized with these breakthrough technologies. With the increased risk and severity of cyber-attacks and the distributed nature of modern threats and vulnerabilities, it becomes critical to pose a distributed intelligent assessment solution that evaluates security risks collaboratively. Blockchain, as a decade-old successful distributed ledger technology, has the potential to build such collaborative solutions. However, in order to be used for such solutions, …


Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri May 2021

Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri

Graduate Theses and Dissertations

As the technological revolution advanced information security evolved with an increased need for confidential data protection on the internet. Individuals and organizations typically prefer outsourcing their confidential data to the cloud for processing and storage. As promising as the cloud computing paradigm is, it creates challenges; everything from data security to time latency issues with data computation and delivery to end-users. In response to these challenges CISCO introduced the fog computing paradigm in 2012. The intent was to overcome issues such as time latency and communication overhead and to bring computing and storage resources close to the ground and the …


Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin Jan 2021

Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin

Engineering Management & Systems Engineering Faculty Publications

In the modern acquisition, it is unrealistic to consider single entities as producing and delivering a product independently. Acquisitions usually take place through supply networks. Resiliency, efficiency, and effectiveness of supply networks directly contribute to the acquisition system's resiliency, efficiency, and effectiveness. All the involved firms form a part of a supply network essential to producing the product or service. The decision-makers have to look for new methodologies for supply chain management. Blockchain technology introduces new methods of decentralization and delegation of services, which can transform supply chains and result in a more resilient, efficient, and effective supply chain. This …


Attribute Proxy Re-Encryption For Ciphertext Storage Sharing Scheme On Blockchain, Xiaohong Zhang, Lanlan Sun Jun 2020

Attribute Proxy Re-Encryption For Ciphertext Storage Sharing Scheme On Blockchain, Xiaohong Zhang, Lanlan Sun

Journal of System Simulation

Abstract: In order to implement the information storage sharing service safely and efficiently, a blockchain storage sharing scheme supporting the attribute proxy re-encryption and keyword retrieval is proposed. By the nodes classification and ciphertext storage separation, the anti-collusion attack is better implemented. The smart contract design of the information transaction is introduced and the information sharing parties can communicate spontaneously without the participation of the central organization. By the attribute-based proxy re-encryption algorithm, the information owner can share the information with other users without re-encrypting, uploading, and downloading information, and relieves the burden of the high-frequency access of the cloud …


Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern smart homes are being equipped with certain renewable energy resources that can produce their own electric energy. From time to time, these smart homes or microgrids are also capable of supplying energy to other houses, buildings, or energy grid in the time of available self-produced renewable energy. Therefore, researches have been carried out to develop optimal trading strategies, and many recent technologies are also being used in combination with microgrids. One such technology is blockchain, which works over decentralized distributed ledger. In this paper, we develop a blockchain based approach for microgrid energy auction. To make this auction more …


Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla Jan 2020

Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla

VMASC Publications

Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid Nov 2019

Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid

FIU Electronic Theses and Dissertations

Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity …


A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay Oct 2019

A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay

FIU Electronic Theses and Dissertations

With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …


Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv Sep 2019

Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv

Houbing Song

With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …