Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (6)
- University of Nevada, Las Vegas (3)
- Air Force Institute of Technology (2)
- Edith Cowan University (2)
- Florida International University (2)
-
- University of Texas Rio Grande Valley (2)
- Boise State University (1)
- Bridgewater State University (1)
- City University of New York (CUNY) (1)
- Columbus State University (1)
- Embry-Riddle Aeronautical University (1)
- San Jose State University (1)
- Selected Works (1)
- Technological University Dublin (1)
- University at Albany, State University of New York (1)
- University for Business and Technology in Kosovo (1)
- University of Massachusetts Amherst (1)
- Wilfrid Laurier University (1)
- Wright State University (1)
- Zayed University (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (5)
- Theses and Dissertations (4)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- Computer Science Faculty Publications and Presentations (2)
- FIU Electronic Theses and Dissertations (2)
-
- Research outputs 2014 to 2021 (2)
- All Works (1)
- Boise State University Theses and Dissertations (1)
- Browse all Theses and Dissertations (1)
- Conference Papers (1)
- Doctoral Dissertations (1)
- Houbing Song (1)
- International Journal of Cybersecurity Intelligence & Cybercrime (1)
- Legacy Theses & Dissertations (2009 - 2024) (1)
- MITB Thought Leadership Series (1)
- Master's Projects (1)
- Open Educational Resources (1)
- Publications (1)
- Theses and Dissertations (Comprehensive) (1)
- Publication Type
Articles 1 - 30 of 31
Full-Text Articles in Physical Sciences and Mathematics
Blockchain Based Access Control For Enterprise Blockchain Applications, Lei Xu, Isaac Markus, Subhod I, Nikhil Nayab
Blockchain Based Access Control For Enterprise Blockchain Applications, Lei Xu, Isaac Markus, Subhod I, Nikhil Nayab
Computer Science Faculty Publications and Presentations
Access control is one of the fundamental security mechanisms of IT systems. Most existing access control schemes rely on a centralized party to manage and enforce access control policies. As blockchain technologies, especially permissioned networks, find more applicability beyond cryptocurrencies in enterprise solutions, it is expected that the security requirements will increase. Therefore, it is necessary to develop an access control system that works in a decentralized environment without compromising the unique features of a blockchain. A straightforward method to support access control is to deploy a firewall in front of the enterprise blockchain application. However, this approach does not …
Quantum Consensus, Jorden Seet, Paul Griffin
Quantum Consensus, Jorden Seet, Paul Griffin
Research Collection School Of Computing and Information Systems
In this paper, we propose a novel consensus mechanism utilizing the quantum properties of qubits. This move from classical computing to quantum computing is shown to theoretically enhance the scalability and speed of distributed consensus as well as improve security and be a potential solution for the problem of blockchain interoperability. Using this method may circumvent the common problem known as the Blockchain Trilemma, enhancing scalability and speed without sacrificing de-centralization or byzantine fault tolerance. Consensus speed and scalability is shown by removing the need for multicast responses and exploiting quantum properties to ensure that only a single multicast is …
Kcrs: A Blockchain-Based Key Compromise Resilient Signature System, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu, Weidong Shi
Kcrs: A Blockchain-Based Key Compromise Resilient Signature System, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu, Weidong Shi
Computer Science Faculty Publications and Presentations
Digital signatures are widely used to assure authenticity and integrity of messages (including blockchain transactions). This assurance is based on assumption that the private signing key is kept secret, which may be exposed or compromised without being detected in the real world. Many schemes have been proposed to mitigate this problem, but most schemes are not compatible with widely used digital signature standards and do not help detect private key exposures. In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of …
The Information Disclosure Trilemma: Privacy, Attribution And Dependency, Ping Fan Ke
The Information Disclosure Trilemma: Privacy, Attribution And Dependency, Ping Fan Ke
Research Collection School Of Computing and Information Systems
Information disclosure has been an important mechanism to increase transparency and welfare in various contexts, from rating a restaurant to whistleblowing the wrongdoing of government agencies. Yet, the author often needs to be sacrificed during information disclosure process – an anonymous disclosure will forgo the reputation and compensation whereas an identifiable disclosure will face the threat of retaliation. On the other hand, the adoption of privacy-enhancing technologies (PETs) lessens the tradeoff between privacy and attribution while introducing dependency and potential threats. This study will develop the desirable design principles and possible threats of an information disclosure system, and discuss how …
Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid
Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid
FIU Electronic Theses and Dissertations
Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity …
Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee
Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee
Doctoral Dissertations
Internet of Things (IoT) devices are becoming an essential part of our everyday lives. These physical devices are connected to the internet and can measure or control the environment around us. Further, IoT devices are increasingly being used to monitor buildings, farms, health, and transportation. As these connected devices become more pervasive, these devices will generate vast amounts of data that can be used to gain insights and build intelligence into the system. At the same time, large-scale deployment of these devices will raise new challenges in efficiently managing and controlling them. In this thesis, I argue that the IoT …
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
FIU Electronic Theses and Dissertations
With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …
Csci49379: Intro To Blockchain (Syllabus), Wendy Mock, Nyc Tech-In-Residence Corps
Csci49379: Intro To Blockchain (Syllabus), Wendy Mock, Nyc Tech-In-Residence Corps
Open Educational Resources
Syllabus for the course: CSCI 49397 - Blockchain. Delivered at Hunter College in Fall 2019 by Wendy Mock as part of the Tech-in-Residence Corps program.
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Houbing Song
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …
Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett
Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett
International Journal of Cybersecurity Intelligence & Cybercrime
The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack …
Managing Iot Data On Hyperledger Blockchain, Akhil David
Managing Iot Data On Hyperledger Blockchain, Akhil David
UNLV Theses, Dissertations, Professional Papers, and Capstones
Blockchain is a rapidly evolving technology known for its security, immutability and decentralized nature. At its heart, it’s used for storing various kinds of data like transactions. But it is not limited to just the transactions or the cryptocurrency. It can also be used to store many other things like assets, IoT data or even multimedia data like songs, pictures, and videos.
The number of IoT devices being connected to the internet is increasing day by day. In fact, Garter (Analyst Firm) predicts there will be 20.4 Billion IoT devices by the end of 2020 [IOTb]. With the increase in …
Deviant: A Mutation Testing Tool For Solidity Smart Contracts, Patrick Chapman
Deviant: A Mutation Testing Tool For Solidity Smart Contracts, Patrick Chapman
Boise State University Theses and Dissertations
Blockchain in recent years has exploded in popularity with Ethereum being one of the leading blockchain platforms. Solidity is a widely used scripting language for creating smart contracts in Ethereum applications. Quality assurance in Solidity contracts is of critical importance because bugs or vulnerabilities can lead to a considerable loss of financial assets. However, it is unclear what level of quality assurance is provided in many of these applications.
Mutation testing is the process of intentionally injecting faults into a target program and then running the provided test suite against the various injected faults. Mutation testing is used to evaluate …
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Publications
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …
Decentralise Me, Paul Robert Griffin
Decentralise Me, Paul Robert Griffin
MITB Thought Leadership Series
If you are in need of a reminder of the levels of hype surrounding blockchain, then look no further than Japan’s J-Pop sensation Kasotsuka Shojo, otherwise known as the Virtual Currency Girls who, with their debut track “The Moon and Cryptocurrencies and Me”, aim to educate fans about cryptocurrencies in an entertaining way.
Crowdbc: A Blockchain-Based Decentralized Framework For Crowdsourcing, Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jiannan Liu, Yang Xiang, Robert H. Deng
Crowdbc: A Blockchain-Based Decentralized Framework For Crowdsourcing, Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jiannan Liu, Yang Xiang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Crowdsourcing systems which utilize the human intelligence to solve complex tasks have gained considerable interest and adoption in recent years. However, the majority of existing crowdsourcing systems rely on central servers, which are subject to the weaknesses of traditional trust-based model, such as single point of failure. They are also vulnerable to distributed denial of service (DDoS) and Sybil attacks due to malicious users involvement. In addition, high service fees from the crowdsourcing platform may hinder the development of crowdsourcing. How to address these potential issues has both research and substantial value. In this paper, we conceptualize a blockchain-based decentralized …
Contract Builder Ethereum Application, Colin M. Fowler
Contract Builder Ethereum Application, Colin M. Fowler
Master's Projects
Developments in Blockchain, smart contract, and decentralized application (“dApps”) technology have enabled new types of software that can improve efficiency within law firms by increasing speed at which attorneys may draft and execute contracts. Smart contracts and dApps are self-executing software that reside on a blockchain. Custom smart contracts can be built in a modular manner in order to emulate contracts that are commonly generated and executed in law firms. Such contracts include those for the transfer of services, goods, and title. This article explores exactly how implementations of smart contracts for law firms may look.
Storing Iot Data Securely In A Private Ethereum Blockchain, Vinay Kumar Calastry Ramesh
Storing Iot Data Securely In A Private Ethereum Blockchain, Vinay Kumar Calastry Ramesh
UNLV Theses, Dissertations, Professional Papers, and Capstones
Internet of Things (IoT) is a set of technologies that enable network-connected devices to perform an action or share data among several connected devices or to a shared database. The actions can be anything from switching on an Air Conditioning device remotely to turning on the ignition of a car through a command issued from a remote location or asking Alexa or Google Assistant to search for weather conditions in an area. IoT has proved to be game-changing for many industries such as Supply Chain, Shipping and Transportation providing updates on the status of shipments in real time. This has …
Analysis Of Bitcoin Cryptocurrency And Its Mining Techniques, Suman Ghimire
Analysis Of Bitcoin Cryptocurrency And Its Mining Techniques, Suman Ghimire
UNLV Theses, Dissertations, Professional Papers, and Capstones
Bitcoin is a peer-to-peer digital, decentralized cryptocurrency created by an individual under pseudonym Satoshi Nakamoto. In fact, it is the first digital, decentralized currency. Several developers and organizations have explored the importance of digital cryptocurrency and the concept of the blockchain. Bitcoin is assumed to be one of the secure and comfortable payment methods that can be used in the upcoming days. The backbone of Bitcoin mining is the concept of the blockchain, which is assumed to beone of the ingenious invention of this century. The blockchain is the collection of blocks that are linked together in such a way …
A Blockchain-Based Location Privacy-Preserving Crowdsensing System, Mengmeng Yang, Tianqing Zhu, Kaitai Liang, Wanlei Zhou, Robert H. Deng
A Blockchain-Based Location Privacy-Preserving Crowdsensing System, Mengmeng Yang, Tianqing Zhu, Kaitai Liang, Wanlei Zhou, Robert H. Deng
Research Collection School Of Computing and Information Systems
With the support of portable electronic devices and crowdsensing, a new class of mobile applications based on the Internet of Things (IoT) application is emerging. Crowdsensing enables workers with mobile devices to travel to specified locations and collect data, then send it back to the requester for rewards. However, the majority of the existing crowdsensing systems are based on centralized servers, which are prone to a high chance of attack, intrusion, and manipulation. Further, during the process of transmitting information to and from the service server, the worker's location is usually exposed. This raises the potential risk of a privacy …
The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir
The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir
All Works
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the …
E Ardhmja E Teknologjisë “Blockchain”, Leart Retkoceri
E Ardhmja E Teknologjisë “Blockchain”, Leart Retkoceri
Theses and Dissertations
Teknologjia blockchain është zbatuar për herë të parë në vitin 2009 dhe që nga atëherë interesi për këtë teknologji vetëm po rritet, arsyet për interesin e vazhdueshëm janë atributet e saj që ofrojnë siguri, anonimitet dhe integritet të të dhënave, pa përfshirjen e ndonjë pale të tretë që kontrollon transaksionet dhe prandaj po tërheq vëmendjen e të gjithëve e ardhmja e kësaj teknologjie. Institucionet financiare ishin të parat që i kushtuan vëmendje pasi me fjalë të thjeshta është një sistem i ri i pagesave. Përveç transaksioneve financiare, ka potencial për shumë fusha të ndryshme dhe po nxit interes edhe për …
Near Real-Time Rf-Dna Fingerprinting For Zigbee Devices Using Software Defined Radios, Frankie A. Cruz
Near Real-Time Rf-Dna Fingerprinting For Zigbee Devices Using Software Defined Radios, Frankie A. Cruz
Theses and Dissertations
Low-Rate Wireless Personal Area Network(s) (LR-WPAN) usage has increased as more consumers embrace Internet of Things (IoT) devices. ZigBee Physical Layer (PHY) is based on the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 specification designed to provide a low-cost, low-power, and low-complexity solution for Wireless Sensor Network(s) (WSN). The standard’s extended battery life and reliability makes ZigBee WSN a popular choice for home automation, transportation, traffic management, Industrial Control Systems (ICS), and cyber-physical systems. As robust and versatile as the standard is, ZigBee remains vulnerable to a myriad of common network attacks. Previous research involving Radio Frequency-Distinct Native Attribute …
A Blockchain-Based Anomalous Detection System For Internet Of Things Devices, Joshua K. Mosby
A Blockchain-Based Anomalous Detection System For Internet Of Things Devices, Joshua K. Mosby
Theses and Dissertations
Internet of Things devices are highly susceptible to attack, and owners often fail to realize they have been compromised. This thesis describes an anomalous-based intrusion detection system that operates directly on Internet of Things devices utilizing a custom-built Blockchain. In this approach, an agent on each node compares the node's behavior to that of its peers, generating an alert if they are behaving differently. An experiment is conducted to determine the effectiveness at detecting malware. Three different code samples simulating common malware are deployed against a testbed of 12 Raspberry Pi devices. Increasing numbers are infected until two-thirds of the …
Picking Flowers In An Ico Garden, Fam Guo Teng, Paul R. Griffin, Andrew Koh
Picking Flowers In An Ico Garden, Fam Guo Teng, Paul R. Griffin, Andrew Koh
Research Collection School Of Computing and Information Systems
The rise of Initial Coin Offerings (ICO) in recent times and their potential for investment opportunities have investors spending a lot of time researching ICOs or having to follow the crowd. This paper aims to explore four broad factors of ICOs: identity, credibility, investor sentiment, and price movement to develop a framework that is useful in determining ICO quality. Research is shown using data sources including public forums, chat groups, web sites, white papers as well as smart contract details. Finally, a system, based on the framework, is proposed that can be used to detect and regulate ICO activities and …
A New Network Model For Cyber Threat Intelligence Sharing Using Blockchain Technology, Daire Homan, Ian Shiel, Christina Thorpe
A New Network Model For Cyber Threat Intelligence Sharing Using Blockchain Technology, Daire Homan, Ian Shiel, Christina Thorpe
Conference Papers
The aim of this research is to propose a new blockchain network model that facilitates the secure dissemination of Cyber Threat Intelligence (CTI) data. The primary motivations for this study are based around the recent changes to information security legislation in the European Union and the challenges that Computer Security and Incident Response Teams (CSIRT) face when trying to share actionable and highly sensitive data within systems where participants do not always share the same interests or motivations. We discuss the common problems within the domain of CTI sharing and we propose a new model, that leverages the security properties …
Proof-Of-Familiarity: A Privacy-Preserved Blockchain Scheme For Collaborative Medical Decision-Making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, Chul-Soo Kim
Proof-Of-Familiarity: A Privacy-Preserved Blockchain Scheme For Collaborative Medical Decision-Making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, Chul-Soo Kim
Research outputs 2014 to 2021
The current healthcare sector is facing difficulty in satisfying the growing issues, expenses, and heavy regulation of quality treatment. Surely, electronic medical records (EMRs) and protected health information (PHI) are highly sensitive, personally identifiable information (PII). However, the sharing of EMRs, enhances overall treatment quality. A distributed ledger (blockchain) technology, embedded with privacy and security by architecture, provides a transparent application developing platform. Privacy, security, and lack of confidence among stakeholders are the main downsides of extensive medical collaboration. This study, therefore, utilizes the transparency, security, and efficiency of blockchain technology to establish a collaborative medical decision-making scheme. This study …
Adapting Financial Technology Standards To Blockchain Platforms, Gabriel Bello
Adapting Financial Technology Standards To Blockchain Platforms, Gabriel Bello
Theses and Dissertations
Traditional payment systems have standards designed to keep transaction data secure, but blockchain systems are not in scope for such security standards. We compare the Payment Application Data Security Standard’s (PA-DSS) applicability towards transaction-supported blockchain platforms to test the standard’s applicability. By highlighting the differences in implementation on traditional and decentralized transaction platforms, we critique and adapt the standards to fit the decentralized model. In two case studies, we analyze the QTUM and Ethereum blockchain platforms’ industry compliance, as their payment platforms support transactions equivalent to that of applications governed by the PA-DSS. We determine QTUM’s and Ethereum’s capabilities to …
Towards Secure And Fair Iiot-Enabled Supply Chain Management Via Blockchain-Based Smart Contracts, Amal Eid Alahmadi
Towards Secure And Fair Iiot-Enabled Supply Chain Management Via Blockchain-Based Smart Contracts, Amal Eid Alahmadi
Theses and Dissertations (Comprehensive)
Integrating the Industrial Internet of Things (IIoT) into supply chain management enables flexible and efficient on-demand exchange of goods between merchants and suppliers. However, realizing a fair and transparent supply chain system remains a very challenging issue due to the lack of mutual trust among the suppliers and merchants. Furthermore, the current system often lacks the ability to transmit trade information to all participants in a timely manner, which is the most important element in supply chain management for the effective supply of goods between suppliers and the merchants. This thesis presents a blockchain-based supply chain management system in the …
False Image Injection Prevention Using Ichain, Mohiuddin Ahmed
False Image Injection Prevention Using Ichain, Mohiuddin Ahmed
Research outputs 2014 to 2021
The advances in information and communication technology are consistently beneficial for the healthcare sector. A trend in the healthcare sector is the progressive shift in how data are acquired and the storage of such data in different facilities, such as in the cloud, due to the efficiency and effectiveness offered. Digital images related to healthcare are sensitive in nature and require maximum security and privacy. A malicious entity can tamper with such stored digital images to mislead healthcare personnel and the consequences of wrong diagnosis are harmful for both parties. A new type of cyber attack, a false image injection …
Autonomous Spectrum Enforcement : A Blockchain Approach, Maqsood Ahamed Abdul Careem
Autonomous Spectrum Enforcement : A Blockchain Approach, Maqsood Ahamed Abdul Careem
Legacy Theses & Dissertations (2009 - 2024)
A core limitation in existing wireless technologies is the scarcity of spectrum, to support the exponential increase in Internet-connected and multimedia-capable mobile devices and the increasing demand for bandwidth-intensive services. As a solution, Dynamic Spectrum Access policies are being ratified to promote spectrum sharing for various spectrum bands and to improve the spectrum utilization. This poses an equally challenging problem of enforcing these spectrum policies. The distributed and dynamic nature of policy violations necessitates the use of autonomous agents to implement efficient and agile enforcement systems. The design of such a fully autonomous enforcement system is complicated due to the …