Fig 5 - uploaded by Bhabendu Kumar Mohanta
Content may be subject to copyright.
passing truffle tests

passing truffle tests

Source publication
Conference Paper
Full-text available
Over the past decade, a lot of evolution has happened in the field of security specifically authentication system. The most commonly used authentication service we use now is OAuth 2.0 based authentication. In this method, we are dependent on a 3rd party authentication service provider to which we need to trust. Though this model is used extensivel...

Similar publications

Preprint
Full-text available
We present the Differentially Private Blockchain-Based Vertical Federal Learning (DP-BBVFL) algorithm that provides verifiability and privacy guarantees for decentralized applications. DP-BBVFL uses a smart contract to aggregate the feature representations, i.e., the embeddings, from clients transparently. We apply local differential privacy to pro...

Citations

... Blockchain's relevance in this domain is also noted in [32]. In [39], the authors present DAuth, a decentralized web authentication system that leverages the Ethereum blockchain as a secure alternative to OAuth 2.0. The model employs smart contract functionality and user signatures to achieve the authentication process. ...
... The architecture of the model proposed in the article[39]. ...
Article
Full-text available
With its decentralized, immutable, and consensus-based validation features, blockchain technology has grown from early financial applications to a variety of different sectors. This paper aims to outline various applications of the blockchain, and systematically identify general challenges and key threats regarding its adoption. The challenges are organized into even broader groups, to allow a clear overview and identification of interconnected issues. Potential solutions are introduced into the discussion, addressing their possible ways of mitigating these challenges and their forward-looking effects in fostering the adoption of blockchain technology. The paper also highlights some potential directions for future research that may overcome these challenges to unlock further applications. More generally, the article attempts to describe the potential transformational implications of blockchain technology, through the manner in which it may contribute to the advancement of a diversity of industries.
... In this work, as in the work of Xiong et al. [31], network users were required to enter their key data and encrypted hash values on the login screen. Patel et al. [37] also developed a decentralized web authentication system using a prototype of an Ethereum-based blockchain system called DAuth. This study employed users' private keys and smart contracts to improve security and privacy. ...
Article
Full-text available
In the age of information and technology, web applications have become an important part of daily life. The communication of these web applications, where important personal and corporate information is managed, with the outside world is provided by authentication methods. Today, most applications use the traditional username-password method for authentication. This method, which is vulnerable to brute force attacks, causes serious security vulnerabilities. In this method, since most users use the same login credentials in different applications, an attack can affect many applications. Some applications also prefer to rely on third-party systems such as Google and Facebook for authentication. Due to their nature, these systems have risks such as data security and single point failure. For more security in the authentication area, studies have been carried out on the Two-Factor Authentication (2FA) method This method has serious disadvantages such as GSM network problems, SMS cost or centralization. To overcome these problems, blockchain is a suitable solution thanks to its distributed, transparent, secure and immutable structure. In an important and sensitive issue such as identity control, it is thought that it may be risky to present blockchain technology, which is still under development, as the only method. Considering the current situation, in this study, a proposal has been made to offer a secure blockchain-based solution as an alternative to the authentication methods that currently work for web applications. The new technologies and tools used in the proposed solution are explained with visuals.
... The following related work studies decentralized authentication and Zero Knowledge Proofs (ZNP). A new authentication scheme is discussed in [30], where the core focus is the improvement of Oauth 2.0 functionality through an Ethereum-based block chain. Improving the security landscape of cloud-based data is tackled in [31]. ...
Article
Full-text available
IoT edge computing is a network design model that captures and processes data at the network edge. The results are forwarded to a cloud service or, if additional processing is needed, a middle tier. By processing data at the edge and middle tier, edge networks achieve better load-balancing and improve performance; however, traditional edge network deployments represent a rigid participation model. Edge networks require physical access to an IoT device and often lock the device to a single edge network. These constraints make it difficult to construct the ideal network, as they reject IoT devices deployed at the network edge but not owned by the network administrator. Our goal is to remove these limitations by creating a network protocol that supports broader participation of IoT devices, cryptographically secures network data, and improves network performance by increasing captured data at the network edge. The protocol is named Snap to symbolize the ease of self assembly. Our experimental research focuses on temperature stability and the cycle efficiency of an HVAC system by utilizing a Snap network to combine two existing edge networks and increase the number of temperature measurement points. The additional measurement points improved the efficiency of the HVAC cycle strategy by increasing the square footage of measured building space. The additional temperature capture points supported an adjustment to the HVAC cycle strategy which resulted in reducing the disparity between the requested temperature and the resulting temperatures. Snap networks support a broader range of IoT sensors leading to increased measurement density, sample rate frequency, and coverage of the network edge.
... As a result, no IoT device should add its certificate to each message, as the blockchain network will validate its entry. Shibasis Patel 31 proposed an authentication service based on the Ethereum blockchain called DAuth, in which the user's session will be activated by validating the signatures. Initially, the backend requests the signature www.nature.com/scientificreports/ ...
Article
Full-text available
OAuth2.0 is a Single Sign-On approach that helps to authorize users to log into multiple applications without re-entering the credentials. Here, the OAuth service provider controls the central repository where data is stored, which may lead to third-party fraud and identity theft. To circumvent this problem, we need a distributed framework to authenticate and authorize the user without third-party involvement. This paper proposes a distributed authentication and authorization framework using a secret-sharing mechanism that comprises a blockchain-based decentralized identifier and a private distributed storage via an interplanetary file system. We implemented our proposed framework in Hyperledger Fabric (permissioned blockchain) and Ethereum TestNet (permissionless blockchain). Our performance analysis indicates that secret sharing-based authentication takes negligible time for generation and a combination of shares for verification. Moreover, security analysis shows that our model is robust, end-to-end secure, and compliant with the Universal Composability Framework.
... With security assumptions being predicated on the presence of trusted authorities, the provided security and authentication are outside the scope of blockchain transactions. Even though blockchain-based authentication has been suggested before, including applications such as IoT [18], Voting [19], Single Sign On [20], as well as PKI supported by blockchains [21], [22], authentication is not provided for execution aspects on blockchains and web architectures. For this purpose, blockchains could be involved in key generation and signatures combined with X.509 certificates for web-based authentication as suggested by the proposed architecture. ...
... Thus, Dapps are inherently inferior from a computational perspective as witnessed by many papers in the field of distributed computing analyzing the costs of decentralized algorithms, e.g., (Harris, Schneider and Su, 2018), especially, consensus algorithms (Chaudhry and Yousaf, 2018). As future work to improve the current solution one can include chains with lower costs and fraud detection, e.g., by authentication via a blockchain (Patel et al., 2019). ...
Preprint
Full-text available
Non-fungible tokens(NFTs) are on the rise. They can represent artworks exhibited for marketing purposes on webpages of companies or online stores -- analogously to physical artworks. Lending of NFTs is an attractive form of passive income for owners but comes with risks (e.g., items are not returned) and costs for escrow agents. Similarly, renters have difficulties in anticipating the impact of artworks, e.g., how spectators of NFTs perceive them. To address these challenges, we introduce an NFT rental solution based on a pay-per-like pricing model using blockchain technology, i.e., smart contracts based on the Ethereum chain. We find that blockchain solutions enjoy many advantages also reported for other applications, but interestingly, we also observe dark sides of (large) blockchain fees. Blockchain solutions appear unfair to niche artists and potentially hamper cultural diversity. Furthermore, a trust-cost tradeoff arises to handle fraud caused by manipulation from parties outside the blockchain. All code for the solution is publicly available at: https://github.com/asopi/rental-project
... As a result, several industry applications are currently exploring the integration of blockchain technology and cloud architectures to ensure trust and decentralization [8]. Moreover, the use of virtualization to distribute resources is becoming increasingly common in organizations as a means of increasing availability, maximizing efficiency, and reducing costs [9]. Recently, Blockchain-as-a-Service (BaaS) has been proposed as an end-to-end solution that provides blockchain security services and the capability to build highly available blockchain networks. ...
Article
Blockchain-based multi-factor authentication (BMFA) combines multi-factor authentication with blockchain technology to provide a reliable and secure authentication mechanism. In other words, it adds a layer of protection and creates a comprehensive system that protects sensitive credentials in a decentralized ledger. This makes it challenging for unauthorized users to access or modify authentication credentials. However, BMFA is still in its infancy, and its effectiveness in preventing potential security breaches and unauthorized access has yet to be explored sufficiently. Thus, its development can be further advanced by reducing complexity, improving flexibility, decreasing costs, and enhancing authenticity. Furthermore, it is becoming increasingly important to ensure robust security measures and authentication mechanisms are in place as distributed systems, such as IoT, Fog, and WSN, become more sophisticated and integrated into our daily lives. Thus, such systems must have effective authentication mechanisms to function efficiently and effectively. This paper presents a comprehensive analysis of using blockchain technology with multi-factor authentication techniques in different subject areas. Also, the paper proposes a blockchain-based multi-factor authentication-as-a- service (BMFAaaS) approach and identifies the key requirements for its effective implementation. A systematic literature review was conducted between 2019–2023 to review existing studies and analyze the results against those key requirements. The review was concluded by discussing research challenges and future works in BMFAaaS for distributed systems.
... A blockchain-based decentralized authentication modeling scheme is proposed in the edge and IoT environment to realize a highly secure, highly reliable, and strong fault-tolerant authentication scheme [13]. An alternative authentication service method, DAuth, based on the Ethereum blockchain [14] is designed to achieve decentralized identity verification and lower the risk of user data being leaked or modified at will. ...
... Compared with the single authentication or group authentication used in the literature [14,[27][28][29][30], this scheme uses mixed authentication, which combines single authentication with group authentication, uses group authentication to improve authentication efficiency, and adopts single authentication to find illegal nodes in the group ( The Init function acts as the initialization function at the initialization layer. Each org (group) corresponds to a roothash (rth). ...
... Compared with the single authentication or group authentication used in the literature [14,[27][28][29][30], this scheme uses mixed authentication, which combines single authentication with group authentication, uses group authentication to improve authentication efficiency, and adopts single authentication to find illegal nodes in the group (Table 6). At the same time, blockchain is introduced into the scheme to realize the decentralization of the authentication scheme and effectively solve the problem of a single point of failure. ...
Article
Full-text available
Spatiotemporal big data are a kind of data that marks time information and geographic location and has been widely applied in various fields. However, there are always security issues with spatiotemporal big data, especially in data collection and authentication. Traditional authentication protocols are less efficient in the face of ultra-large-scale IoT (Internet of Things, IoT) device verification, and the threat of single-point failure is relatively large. Given these complications, a group authentication scheme is proposed in this paper with blockchain spatiotemporal big data. The decentralization of the blockchain is utilized to solve the single point of failure, and the single-point authentication is combined with the group authentication, the authentication efficiency is improved through the group authentication, and the illegal nodes are accurately identified using the single-point authentication. The simulation results demonstrate that using the MHT (Merkel Hash Tree, MHT) algorithm for group authentication can effectively improve the authentication efficiency of the entire system when the number of users exceeds 200. The time overhead is only 4 ms when the number of users is 16,000. It can have a large throughput (400–500 tps) and a low latency (1–2 s) at the same time when the block size is 1500 KB. This study not only verifies the legitimacy of each device and protects the security of spatiotemporal big data, but also significantly reinforces the authentication efficiency compared with similar schemes.
... Ramachandran et al. (2020) demonstrate how together Solid data stores (namely, pods) and blockchains can be used for trustless verification with confidentiality. Patel et al. (2019) propose a fully decentralized protocol named DAuth that leverages asymmetric encryption in order to implement authentication; Cai et al. (2020) introduce a secure Solid authentication mechanism, integrating Rivest-Shamir-Adleman (RSA) signatures into permissioned blockchain systems. In turn, Becker et al. (2021) demonstrate how data stored in Solid pods can be monetized by leveraging a blockchain based payment system. ...
Article
Full-text available
Decentralization initiatives such as Solid, Digi.me, and ActivityPub aim to give data owners more control over their data and to level the playing field by enabling small companies and individuals to gain access to data, thus stimulating innovation. However, these initiatives typically use access control mechanisms that cannot verify compliance with usage conditions after access has been granted to others. In this paper, we extend the state of the art by proposing a resource governance conceptual framework, entitled ReGov, that facilitates usage control in decentralized web environments. We subsequently demonstrate how our framework can be instantiated by combining blockchain and trusted execution environments. Through blockchain technologies, we record policies expressing the usage conditions associated with resources and monitor their compliance. Our instantiation employs trusted execution environments to enforce said policies, inside data consumers’ devices. We evaluate the framework instantiation through a detailed analysis of requirments derived from a data market motivating scenario, as well as an assessment of the security, privacy, and affordability aspects of our proposal.
... If all the previous steps occur and the RS authorizes the client's request, it fulfills the request and returns an appropriate response in step (6) [35]. Although ACE-OAuth appears to perform identification operations in restricted environments and has become widely popular, it still faces security and privacy concerns [38]. According to the implementation, ACE-OAuth is dependent on central or federal service providers for identity management, access permissions, and data storage, which means that some third parties have control over all user data that can leak or change at will, being vulnerable to hacks. ...
Article
Full-text available
The popularity of the Internet of Things (IoT) and Industrial IoT (IIoT) has caused a rapid increase in connected entities and exposed its lack of adequate Identity Management (IdM). Traditional IdM systems are highly dependent on central authorities; any failure can potentially compromise the entire system. To eliminate the drawback of central authorities and evolve IdM systems to meet increasingly stringent security requirements, theDecentralized Identification approach has been proposed. This approach often relies on blockchain technology to provide a secure and tamper-proof method of managing and verifying identities. Therefore, this article investigates the capabilities of blockchain-based decentralized identification for the IoT domain, with an emphasis on the het-erogeneity of online devices. It describes a number of features and specifications of decentralized identification with a specific focus on Self-Sovereign Identity (SSI), a model in which entities own their identities. The article concludes with a discussion of technical aspects as well as potential obstacles and constraints to the implementation of decentralized identification in the context of the Internet of Things.