Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Series

Blockchain

Institution
Publication Year
Publication
File Type

Articles 1 - 30 of 105

Full-Text Articles in Physical Sciences and Mathematics

A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla Apr 2024

A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla

Electrical and Computer Engineering Faculty Research & Creative Works

Blockchain systems have been successful in discerning truthful information from interagent interaction amidst possible attackers or conflicts, which is crucial for the completion of nontrivial tasks in distributed networking. However, the state-of-the-art blockchain protocols are limited to resource-rich applications where reliably connected nodes within the network are equipped with significant computing power to run lottery-based proof-of-work (pow) consensus. The purpose of this work is to address these challenges for implementation in a severely resource-constrained distributed network with internet of things (iot) devices. The contribution of this work is a novel lightweight alternative, called weight-based reputation (wbr) scheme, to classify new …


The Microverse: A Task-Oriented Edge-Scale Metaverse, Qian Qu, Mohsen Hatami, Ronghua Xu, Deeraj Nagothu, Yu Chen, Xiaohua Li, Erik Blasch, Erika Ardiles-Cruz, Genshe Chen Feb 2024

The Microverse: A Task-Oriented Edge-Scale Metaverse, Qian Qu, Mohsen Hatami, Ronghua Xu, Deeraj Nagothu, Yu Chen, Xiaohua Li, Erik Blasch, Erika Ardiles-Cruz, Genshe Chen

Michigan Tech Publications, Part 2

Over the past decade, there has been a remarkable acceleration in the evolution of smart cities and intelligent spaces, driven by breakthroughs in technologies such as the Internet of Things (IoT), edge–fog–cloud computing, and machine learning (ML)/artificial intelligence (AI). As society begins to harness the full potential of these smart environments, the horizon brightens with the promise of an immersive, interconnected 3D world. The forthcoming paradigm shift in how we live, work, and interact owes much to groundbreaking innovations in augmented reality (AR), virtual reality (VR), extended reality (XR), blockchain, and digital twins (DTs). However, realizing the expansive digital vista …


Janus: Toward Preventing Counterfeits In Supply Chains Utilizing A Multi-Quorum Blockchain, Vika Crossland, Connor Dellwo, Golam Bashar, Gaby G. Dagher Dec 2023

Janus: Toward Preventing Counterfeits In Supply Chains Utilizing A Multi-Quorum Blockchain, Vika Crossland, Connor Dellwo, Golam Bashar, Gaby G. Dagher

Computer Science Faculty Publications and Presentations

The modern pharmaceutical supply chain lacks transparency and traceability, resulting in alarming rates of counterfeit products entering the market. These illegitimate products cause harm to end users and wreak havoc on the supply chain itself, costing billions of dollars in profit loss. In this paper, in response to the Drug Supply Chain Security Act (DSCSA), we introduce Janus, a novel pharmaceutical track-and-trace system that utilizes blockchain and cloning-resistant hologram tags to prevent counterfeits from entering the pharmaceutical supply chain. We design a multi-quorum consensus protocol that achieves load balancing across the network. We perform a security analysis to show robustness …


Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G Nov 2023

Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G

Faculty Scholarship

Blockchain as a digital ledger for keeping records of digital transactions and other information, it is secure and decentralized technology. The globally growing number of digital population every day possesses a significant threat to online data including the medical and patients’ data. After bitcoin, blockchain technology has emerged into a general-purpose technology with applications in medical industries and healthcare. Blockchain can promote highly configurable openness while retaining the highest security standards for critical data of medical patients. Referred to as distributed record keeping for healthcare systems which makes digital assets unalterable and transparent via a cryptographic hash and decentralized network. …


Metaverse Key Requirements And Platforms Survey, Akbobek Abilkaiyrkyzy, Ahmed Elhagry, Fedwa Laamarti, Abdulmotaleb El Saddik Oct 2023

Metaverse Key Requirements And Platforms Survey, Akbobek Abilkaiyrkyzy, Ahmed Elhagry, Fedwa Laamarti, Abdulmotaleb El Saddik

Computer Vision Faculty Publications

The growing interest in the metaverse has led to an abundance of platforms, each with its own unique features and limitations. This paper's objective is two-fold. First, we aim at providing an objective analysis of requirements that need to be fulfilled by metaverse platforms. We survey a broad set of criteria including interoperability, immersiveness, persistence, multimodal and social interaction, scalability, level of openness, configurability, market access, security, and blockchain integration, among others. Second, we review a wide range of existing metaverse platforms, and we critically evaluate their ability to meet the requirements listed. We identify their limitations, which must be …


Threshold Attribute-Based Credentials With Redactable Signature, Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng Sep 2023

Threshold Attribute-Based Credentials With Redactable Signature, Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Threshold attribute-based credentials are suitable for decentralized systems such as blockchains as such systems generally assume that authenticity, confidentiality, and availability can still be guaranteed in the presence of a threshold number of dishonest or faulty nodes. Coconut (NDSS'19) was the first selective disclosure attribute-based credentials scheme supporting threshold issuance. However, it does not support threshold tracing of user identities and threshold revocation of user credentials, which is desired for internal governance such as identity management, data auditing, and accountability. The communication and computation complexities of Coconut for verifying credentials are linear in the number of each user's attributes and …


The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel Aug 2023

The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel

Research Collection School Of Computing and Information Systems

Cryptocurrencies have been all the rage in recent years, with many being drawn to their appeal as speculative investment assets. Its proponents also champion the secure and decentralised nature of the technology it is based on, called the blockchain. Given the secure nature of blockchain technology, the idea of adopting cryptocurrencies as legal tender currency has also been mooted and experimented with – with the most famous example being the Central American nation of El Salvador’s bold move to adopting the cryptocurrency Bitcoin as legal tender in September 2021. In theory, this would provide a solution to the high transaction …


Towards Crisp‐Bc: 3tic Specification Framework For Blockchain Use‐Cases, Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim‐Kwang Raymond Choo Jul 2023

Towards Crisp‐Bc: 3tic Specification Framework For Blockchain Use‐Cases, Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim‐Kwang Raymond Choo

All Works

The application of Blockchain and augmented technologies such as IoT, AI, and Big Data platforms present a feasible approach for resolving the implementation challenges of trusted, decentralized platforms. This article proposes a DevOps framework for the specification of Blockchain use‐cases that enables evaluation, replication, and benchmarking. Specifically, it could be applied to specify the requirements and design characteristics of Blockchain applications in terms of key attributes such as: (i) transparency; (ii) traceability; (iii) tamper‐resistance; (iv) immutability; and (v) compliance. The article first introduces the design characteristics of Blockchain as a Platform and then examines successful use‐cases for its implementation using …


The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh Jul 2023

The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh

Research outputs 2022 to 2026

Recent improvements in the Internet of Things (IoT) have allowed healthcare to evolve rapidly. This article summarizes previous studies on IoT applications in healthcare. A comprehensive review and a bibliometric analysis were performed to objectively summarize the growth of IoT research in healthcare. To begin, 2,990 journal articles were carefully selected for further investigation. These publications were analyzed based on various bibliometric metrics, including publication year, journals, authors, institutions, and countries. Keyword co-occurrence and co-citation networks were generated to unravel significant research hotspots. The findings show that IoT research has received considerable interest from the healthcare community. Based on the …


Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu Apr 2023

Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu

Research Collection School Of Computing and Information Systems

Ethereum has become a popular blockchain with smart contracts for investors nowadays. Due to the decentralization and anonymity of Ethereum, Ponzi schemes have been easily deployed and caused significant losses to investors. However, there are still no explainable and effective methods to help investors easily identify Ponzi schemes and validate whether a smart contract is actually a Ponzi scheme. To fill the research gap, we propose PonziLens, a novel visualization approach to help investors achieve early identification of Ponzi schemes by investigating the operation codes of smart contracts. Specifically, we conduct symbolic execution of opcode and extract the control flow …


Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty Jan 2023

Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty

VMASC Publications

Background: Developing effective and generalizable predictive models is critical for disease prediction and clinical decision-making, often requiring diverse samples to mitigate population bias and address algorithmic fairness. However, a major challenge is to retrieve learning models across multiple institutions without bringing in local biases and inequity, while preserving individual patients' privacy at each site.

Objective: This study aims to understand the issues of bias and fairness in the machine learning process used in the predictive health care domain. We proposed a software architecture that integrates federated learning and blockchain to improve fairness, while maintaining acceptable prediction accuracy and minimizing overhead …


Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty Jan 2023

Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty

VMASC Publications

The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …


A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat Jan 2023

A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat

Electrical & Computer Engineering Faculty Publications

IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different …


Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil Jan 2023

Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil

All Works

Ranking systems have proven to improve the quality of education and help build the reputation of academic institutions. Each of the current academic ranking systems is based on different methodologies, criteria, and standards of measurement. Academic and employer reputations are subjective indicators of some rankings determined through surveying that is neither transparent nor traceable. The current academic ranking systems fall short of providing transparency and traceability features for both subjective and objective indicators that are used to calculate the ranking. Also, the ranking systems are managed and controlled in a centralized manner by specific entities. This raises concerns about fairness …


Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu Jan 2023

Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …


A Secure Emr Sharing System With Tamper Resistance And Expressive Access Control, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng Jan 2023

A Secure Emr Sharing System With Tamper Resistance And Expressive Access Control, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng

Research Collection School Of Computing and Information Systems

To reduce the cost of human and material resources and improve the collaborations among medical systems, research laboratories and insurance companies for healthcare researches and commercial activities, electronic medical records (EMRs) have been proposed to shift from paperwork to friendly shareable electronic records. To take advantage of EMRs efficiently and reduce the cost of local storage, EMRs are usually outsourced to the remote cloud for sharing medical data with authorized users. However, cloud service providers are untrustworthy. In this paper, we propose an efficient, secure, and flexible EMR sharing system by introducing a novel cryptosystem called dual-policy revocable attribute-based encryption …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Differentiated Security Architecture For Secure And Efficient Infotainment Data Communication In Iov Networks, Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam Dec 2022

Differentiated Security Architecture For Secure And Efficient Infotainment Data Communication In Iov Networks, Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam

Research Collection School Of Computing and Information Systems

This paper aims to provide differentiated security protection for infotainment data commu- nication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, built-in hardware, and communication technologies to enable information exchange between pedestrians, cars, and urban infrastructure. Negligence on the security of infotainment data commu- nication in IoV networks can unintentionally open an easy access point for social engineering attacks. The attacker can spread false information about traffic conditions, mislead drivers in their directions, and interfere with traffic management. Such attacks can also cause distractions to the driver, which has a potential implication …


Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon Nov 2022

Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon

Information Technology & Decision Sciences Faculty Publications

Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …


Toward Intention Discovery For Early Malice Detection In Bitcoin, Ling Cheng, Feida Zhu, Yong Wang, Huiwen Liu Sep 2022

Toward Intention Discovery For Early Malice Detection In Bitcoin, Ling Cheng, Feida Zhu, Yong Wang, Huiwen Liu

Research Collection School Of Computing and Information Systems

Bitcoin has been subject to illicit activities more often than probably any other financial assets, due to the pseudo-anonymous nature of its transacting entities. An ideal detection model is expected to achieve all the three properties of (I) early detection, (II) good interpretability, and (III) versatility for various illicit activities. However, existing solutions cannot meet all these requirements, as most of them heavily rely on deep learning without satisfying interpretability and are only available for retrospective analysis of a specific illicit type.First, we present asset transfer paths, which aim to describe addresses' early characteristics. Next, with a decision tree based …


Secure Hierarchical Deterministic Wallet Supporting Stealth Address, Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu Sep 2022

Secure Hierarchical Deterministic Wallet Supporting Stealth Address, Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu

Research Collection School Of Computing and Information Systems

Over the past decade, cryptocurrency has been undergoing a rapid development. Digital wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for the public to access cryptocurrency assets. Hierarchical Deterministic Wallet (HDW), proposed in Bitcoin Improvement Proposal 32 (BIP32), has attracted much attention and been widely used in the community, due to its virtues such as easy backup/recovery, convenient cold-address management, and supporting trust-less audits and applications in hierarchical organizations. While HDW allows the wallet owner to generate and manage his keys conveniently, Stealth Address (SA) allows a payer to generate fresh address (i.e., …


An Overview Of Technologies Deployed In Gcc Countries To Combat Covid-19, Samia Loucif, Murad Al-Rajab, Reem Salem, Nadine Akkila Jun 2022

An Overview Of Technologies Deployed In Gcc Countries To Combat Covid-19, Samia Loucif, Murad Al-Rajab, Reem Salem, Nadine Akkila

All Works

Since December 2019, COVID-19 and all of its variants continue to ravage the planet with consequent negative impact that has completely changed our lives within a short period of time after the outbreak of the Virus. On March 11, 2020, COVID-19 was declared a global pandemic by the World Health Organization. Since then, a group of new COVID-19 variants has emerged posing a greater danger to humanity. By the start of August 2021, the reported COVID-19 related death toll across the globe has rocketed to 4,233,139. To deal with the COVID-19 pandemic, countries across the world have rushed to develop …


Blockchain For Governments: The Case Of The Dubai Government, Shafaq Khan, Mohammed Shael, Munir Majdalawieh, Nishara Nizamuddin, Mathew Nicho May 2022

Blockchain For Governments: The Case Of The Dubai Government, Shafaq Khan, Mohammed Shael, Munir Majdalawieh, Nishara Nizamuddin, Mathew Nicho

All Works

Blockchain technology is an innovative technology with the potential of transforming cities by augmenting the building of resilient societies and enabling the emergence of more transparent and accountable governments. To understand the capabilities of blockchain, as well as its impact on the public sector, this study conducted a review of blockchain technology and its implementations by various governments around the globe. E-government evolution is analyzed, based on empirical evidence from a Dubai government entity in the United Arab Emirates (UAE), which has utilized blockchain technology for developing end-user services, relevant to the public sector. Benefits achieved and challenges to overcome …


Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones May 2022

Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones

Other Student Works

This project will analyze the results of trials implementing various storage methods on Geth nodes to synchronize and maintain a full-archive state of the Ethereum blockchain. The purpose of these trials is to gain deeper insight to the process of lowering cost and increasing efficiency of blockchain storage using available technologies, analyzing results of various storage drives under similar conditions. It provides performance analysis and describes performance of each trial in relation to the others.


An Evaluation Of Security In Blockchain-Based Sharing Of Student Records In Higher Education, Timothy Arndt, Angela Guercio, Yonghun Chae May 2022

An Evaluation Of Security In Blockchain-Based Sharing Of Student Records In Higher Education, Timothy Arndt, Angela Guercio, Yonghun Chae

Information Systems

Blockchain has recently taken off as a disruptive technology, from its initial use in cryptocurrencies to wider applications in areas such as property registration and insurance due to its characteristic as a distributed ledger which can remove the need for a trusted third party to facilitate transactions. This spread of the technology to new application areas has been driven by the development of smart contracts – blockchain-based protocols which can automatically enforce a contract by executing code based on the logic expressed in the contract. One exciting area for blockchain is higher education. Students in higher education are ever more …


Vigilrx: A Scalable And Interoperable Prescription Management System Using Blockchain, Alixandra Taylor, Austin Kugler, Praneeth Babu Marella, Gaby G. Dagher Mar 2022

Vigilrx: A Scalable And Interoperable Prescription Management System Using Blockchain, Alixandra Taylor, Austin Kugler, Praneeth Babu Marella, Gaby G. Dagher

Computer Science Faculty Publications and Presentations

Achieving interoperability between healthcare providers is a major challenge. Current systems for managing prescription records suffer from data siloing, unnecessary record duplication, and slow record transfers. In many systems, patients do not retain control over their prescription data. Instead, they must use an intermediary to access or transfer their records. Furthermore, record transfers suffer from differing standards between providers, outdated communication methods, and information blocking. Solving these problems necessitates the creation of an interoperable prescription management system. Realizing such a system requires considering security, efficiency, scalability, and other challenges. Recent regulatory actions attempt to address these challenges, but fundamental issues …


Netchain: A Blockchain-Enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture, Guobiao He, Wei Su, Shuai Gao, Ningchun Liu, Sajal K. Das Mar 2022

Netchain: A Blockchain-Enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture, Guobiao He, Wei Su, Shuai Gao, Ningchun Liu, Sajal K. Das

Computer Science Faculty Research & Creative Works

Multi-domain networking slice orchestration is an essential technology for the programmable and cloud-native 5G network. However, existing research solutions are either based on the impractical assumption that operators will reveal all the private network information or time-consuming secure multi-party computation which is only applicable to limited computation scenarios. To provide agile and privacy-preserving end-to-end network slice orchestration services, this paper proposes NetChain, a multi-domain network slice orchestration architecture based on blockchain and trusted execution environment. Correspondingly, we design a novel consensus algorithm CoNet to ensure the strong security, scalability, and information consistency of NetChain. In addition, a bilateral evaluation mechanism …


Building Smart Contracts For Covid19 Pandemic Over The Blockchain Emerging Technologies, Ala’ Abu Hilal, Mohamad Badra, Abdallah Tubaishat Jan 2022

Building Smart Contracts For Covid19 Pandemic Over The Blockchain Emerging Technologies, Ala’ Abu Hilal, Mohamad Badra, Abdallah Tubaishat

All Works

This research aims to improve and integrate hospital’s healthcare applications with Blockchain and smart contracts technologies to provide huge and secure storage that is immutable. This application will be able to record the patients’ medical history like appointments, medical tests, etc.; As a matter of fact, these resources should be recorded to be securely retrieved, modified, and stored by an authorized party only. The utilization of these critical resources will increase the validity for participants with a high level of liability, where building a scheduling appointment system using the blockchain-based on a smart contract will enhance patients’ privacy and provides …


Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro Jan 2022

Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro

Graduate School of Business Publications

The use of electronic medical records (EMRs) plays a crucial role in the successful implementation of the Universal Healthcare Law which promises quality and affordable healthcare to all Filipinos. Consequently, the current adoption of EMRs should be studied from the perspective of the healthcare provider. As most studies look into use of EMRs by doctors or patients, there are very few that extend studies to look at possible interaction of doctor and patient in the same EMR environment. Understanding this interaction paves the way for possible incentives that will increase the use and adoption of the EMR. This study uses …


Formal Modeling And Verification Of A Blockchain-Based Crowdsourcing Consensus Protocol, Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua, Sarada Prasad Gochhayat Jan 2022

Formal Modeling And Verification Of A Blockchain-Based Crowdsourcing Consensus Protocol, Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua, Sarada Prasad Gochhayat

VMASC Publications

Crowdsourcing is an effective technique that allows humans to solve complex problems that are hard to accomplish by automated tools. Some significant challenges in crowdsourcing systems include avoiding security attacks, effective trust management, and ensuring the system’s correctness. Blockchain is a promising technology that can be efficiently exploited to address security and trust issues. The consensus protocol is a core component of a blockchain network through which all the blockchain peers achieve an agreement about the state of the distributed ledger. Therefore, its security, trustworthiness, and correctness have vital importance. This work proposes a Secure and Trustworthy Blockchain-based Crowdsourcing (STBC) …