Conference PaperPDF Available

Application of Blockchain Technology to Prevent The Potential Of Plagiarism in Scientific Publication

Authors:
  • Institut Bisnis Informasi Teknologi dan Bisnis
  • Universitas Mikroskil

Abstract and Figures

Blockchain is an emerging technology that has many potential applications. The blockchain contains a certain and verifiable record of every single transaction ever made. In this paper, we introduce the application for the prevention of potential plagiarism based on decentralized architecture and a public-key cryptosystem, such that no need for a trusted third party. We use the SHA-256 hash function and Elliptic Curve Digital Signature Algorithm (ECDSA) to digital signing. The results show that any attempt to plagiarize a submitted paper will violate the rules. The transmission of a paper is also encrypted through the use of complex cryptographic principles and security algorithms such that nobody can see or alter the paper. Even the reviewer is unable to change the paper because by doing such action the blockchain will report the violation
Content may be subject to copyright.
XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE
Application of Blockchain Technology to Prevent
The Potential of Plagiarism in Scientific Publication
Andi
Magister Teknologi Informasi
Department
STMIK Mikroskil Medan
174212038@students.mikroskil.ac.id
Ronsen Purba
Magister Teknologi Informasi
Department
STMIK Mikroskil Medan
ronsen@mikroskil.ac.id
Roni Yunis
Sistem Informasi Department
STMIK Mikroskil Medan
roni-yunis@mikroskil.ac.id
AbstractBlockchain is an emerging technology that has
many potential applications. The blockchain contains a certain
and verifiable record of every single transaction ever made. In
this paper, we introduce the application for the prevention of
potential plagiarism based on decentralized architecture and a
public-key cryptosystem, such that no need for a trusted third
party. We use the SHA-256 hash function and Elliptic Curve
Digital Signature Algorithm (ECDSA) to digital signing. The
results show that any attempt to plagiarize a submitted paper
will violate the rules. The transmission of a paper is also
encrypted through the use of complex cryptographic principles
and security algorithms such that nobody can see or alter the
paper. Even the reviewer is unable to change the paper because
by doing such action the blockchain will report the violation.
Keywordsblockchain technology, plagiarism potential
prevention, proof of work,
I. INTRODUCTION
Blockchain is a decentralized and transparent
technology that does not use third parties in the process of
recording or exchanging data [1]. Each recorded data will be
inserted into a block that is secured using cryptography and
associated with the previous block to form a chain.
Nakamoto [2] introduced the concept of the first blockchain
application applied to digital currencies, namely Bitcoin.
One of the important characteristics of blockchain is that it
is immutable, which is almost impossible to change or
delete part or the whole block in the chain. If there is a
change in data on the block, then the cryptographic hash
value of the entire network will also change, which means
that one must be able to solve cryptographic hash values
from all networks on the blockchain [3]. The distributed
consensus and anonymity are two important characteristics
of blockchain technology [4].
Blockchain technology has grown from version 1.0 to
3.0. Blockchain 1.0 refers to digital currencies, Blockchain
2.0 associated with smart contracts, and Blockchain 3.0 is
used for digital society [5]. The Blockchain 3.0 refers to
new technologies that are still in the development stage,
which can be applied in various fields, such as health [6],
the food sector [7], and most recently in electronic voting
[8]. In addition to these fields, the Blockchain can also be
applied in scientific publications. In the field of scientific
publications, the problem that cannot be solved is the
process of sending texts and peer reviews because they still
have insecure mechanisms and dishonesty from the
individuals (third parties) involved. Both of these cause the
possibility of data leakage, theft of ideas, changes in
evidence of plagiarism and the taking of scientific works
belonging to others which have the potential to act
plagiarism.
Gipp [9] introduced CryptSubmit which is an
architectural system of sending scientific publications that
record scientific copyright works on the Blockchain network
before being sent to reviewers to prevent the risk of
plagiarism. Meanwhile, Pozi [10] proposes a blockchain-
based framework for calculating scientific writer's
contributions such that publication information can be
accessed transparently. However, the results of the two
studies still lack because they only focus on recording
copyright through timestamping. Information on scientific
works such as the title, content, and source of citation is not
included in the proposed model so that if the plagiarist
performs changes in scientific information, there is no
evidence that the plagiarism has been carried out. Also, the
proposed model does not yet have a secure data
transmission mechanism so that when scientific works are
sent to reviewers, the possibility of such scientific work
being stolen and plagiarized by other parties is very likely.
In this paper, we introduce the application of
blockchain technology to model the prevention of
plagiarism potential in scientific publications. The proposed
model handles the problems related to (1) the main process
in scientific publications, namely submission of scripts and
peer reviews, still has insecure mechanisms and dishonesty
from the individuals (third parties) involved, causing the
possibility of data leakage, theft of ideas, alteration of
plagiarism evidence and retrieval of scientific works
belonging to others which become gaps which has the
potential to carry out plagiarism, (2) the prevention of
potential plagiarism by implementing blockchain is only
based on recording copyright through timestamping only
and does not yet have a secure data security mechanism
such that the possibility of such scientific work being stolen
and plagiarized by other parties is very likely. We use
decentralized architecture by applying SHA-256 hash
function as a message finger print and Elliptic Curve Digital
Signature Algorithm (ECDSA) as the digital signature
scheme. We ran some simulation to proof that plagiarism
prevention by using the dataset from
https://aminer.org/citation. We did tests for three cases i.e.
(a) normal paper addition to show that everything is normal
if the paper addition does not violate the rule of plagiarism
prevention; (b) someone intentionally changes the paper
information to eliminate the evidence of plagiarism and (c)
preventing other parties from plagiarizing and reading
scientific works sent to the relevant reviewer.
The remaining paper is structured as follows: Section 2
provides background research related to blockchain
application. Section 3 presents the research methodology or
our approach to prevent the potential of plagiarism. Section
4 provides the result and discussion and Section 5 provides
the conclusion of the paper.
II. RELATED WORKS
In 2008, an individual (or group) writing under the
name of Satoshi Nakamoto published a paper entitled
“Bitcoin: A Peer-To-Peer Electronic Cash System”. This
paper described a peer-to-peer version of the electronic cash
that would allow online payments to be sent directly from
one party to another without going through a financial
institution. Bitcoin uses cryptographic proof instead of the
trust-in-the-third-party mechanism for two willing parties to
execute an online transaction over the Internet. Each
transaction is protected through a digital signature is sent to
the “public key” of the receiver, and is digitally signed using
the “private key” of the sender. To spend money, the owner
of the cryptocurrency needs to prove his ownership of the
“private key”. Bitcoin uses a consensus protocol called PoW
(Proof of Work) based on Cryptocurrency to ensure that
only legitimate transactions are allowed in the system.
Every time a new transaction is made, the hash value of the
transaction is calculated and entered into a database called
the blockchain. This block is connected to other blocks that
already in the chain. To connect one block to another, the
hash value of the previous block is entered into the next
block to calculate the hash value of the new one. The hash
value must meet certain requirements called difficulty so
that it can be considered a legitimate block as described in
Fig. 1.
Fig. 1. Blockchain Illustration
After bitcoin, blockchain technology has been successfully
used in several industries, such as finance, energy, health
sector, and supply chain. Mettler [11] conducted research
related to the potential application of blockchain in the
health sector to prevent counterfeiting of health data such as
drug and medical records. This study only explains that
blockchain has enormous potential if applied in the health
sector. After the study, the idea began to emerge to apply
blockchain in other fields such as that done by O’Dair [12]
to analyze the application of Blockchain in the music
industry, especially in the protection of music copyright and
recording the payment of loyalty benefits from the music
created. Furthermore, some researchers began to analyze the
blockchain in recording copyright in other fields, such as
conducted by Xu [13] which proposed a method of
safeguarding and protecting copyright by using rights
management schemes based on blockchain technology. The
results of the study are in the form of an architectural model
that explains the procedures for copyright protection by
implementing the blockchain. Based on some of these
studies, it is proven that blockchain has a high level of
security such that Hanifatunnisa [14] conducted a research
to implement the blockchain in e-voting to maintain data
security such that it cannot be changed by third parties.
Through the implementation of the blockchain, the e-voting
database cannot be changed, because even a slight data
change will change the hash value of the entire network.
Gipp [9] introduced CryptSubmit, an architecture of the
delivery system of scientific publications that record
scientific copyright in blockchain network before being sent
to reviewers to prevent plagiarism. Hepp [15] continued to
study the idea and overcome the weaknesses of
timestamping which are still centralized by proposing
Decentralized Trusted Timestamping (DTT). The results of
the study presented a new approach to timestamping and
archiving digital content using blockchain technology.
Furthermore, Pozi [10] continuing the implementation of
blockchain in scientific publications, namely by proposing a
blockchain-based framework to calculate the contribution of
scientific writers so that publication information can be
accessed transparently. Research on the implementation of
blockchain to prevent plagiarism was then carried out by
Holland [16], but in a different perspective by explaining
how the blockchain application in preventing counterfeiting
and plagiarism towards brands comes from 3D printing
printers. The results of this study illustrate the model and
proof of how the blockchain is carrying out brand
registrations to prevent counterfeiting and acts of
plagiarism.
III. RESEARCH METHODOLOGY
In this paper we solved two problems related to
preventing the potential of plagiarism: (1) the main process
in scientific publications, namely submission of scripts and
peer reviews, still has insecure mechanisms and dishonesty
from the individuals (third parties) involved, causing the
possibility of data leakage, theft of ideas, alteration of
plagiarism evidence and retrieval of scientific works
belonging to others which become gaps which has the
potential to carry out plagiarism, (2) plagiarism prevention
by implementing blockchain is only based on recording
copyright through timestamping only and does not yet have
a secure data security mechanism such that the possibility of
such scientific work being stolen and plagiarized by other
parties is very likely. This paper is an improvement to
research by Gipp [9] called CryptSubmit as shown in Fig. 2.
Fig. 2. CryptSubmit Architecture [9]
There are two main differences between our model to
the model by Gipp [9]: (1) we record the whole information
of scientific work rather than just the timestamping; (2)
scientific work submission from the writer to the reviewer is
not protected by digital signature. Based on the above
architecture, we introduce a new model and we use Citation
Network Dataset [17], as shown in Fig. 3.
Fig. 3. Proposed Model for the Prevention Of Potential
Plagiarism
The publication processes are conducted as follows:
A. Publication Registration
Researchers who have scientific works carry out the
publication process by filling in the online forms that are
separate on the front end which is usually a website. After
the online form is filled in, the next step is to sign
information on scientific papers using ECDSA to produce a
public key, private key and message digest. The final
process is to process or send the scientific work to
reviewers, so you must press the submit button.
B. Backend Process
The system implements the blockchain using SHA-256
every time a new publication is submitted. Information
about scientific work will be protected with a digital
signature using public key and private key, where the
private key will be stored (kept) by the researcher and the
public key will be given to the reviewer concerned so that
scientific information can only be opened by the reviewer.
All information that is processed will be stored in the
database and read through the blockchain network. The
blockchain network contains information on all scientific
works that have been sent by previous researchers. Each
scientific work is stored in a block that will be connected to
previous blocks such that if there is a change in scientific
work information by someone, it will be related to other
blocks, so that evidence of plagiarism is impossible to
eliminate.
C. Paper Review
The reviewer who wants to review a paper must have a
public key such that he (she) can open the whole
information about that scientific publication.
In our model, we simulate three different scenarios to
show that the blockchain technology we implement can
prevent participants (researcher and reviewer) from
misconduct action. First, we change the information about
plagiarism intending to eliminate evidence of plagiarism.
Secondly, we will show how the blockchain eliminates the
existence of third-party intermediaries who have the
potential to commit plagiarism. Finally, we show how to
prevent other parties from doing potential plagiarism and
read the scientific work sent to the reviewer.
IV. RESULT AND DISCUSSION
In this paper, we build an application to model the
prevention of potential plagiarism using node.js and we run
the test on Processor Intel ® Core™ i5 @ 2.3 GHz. We
provide the model with some features such as paper
submission or add publication by legitimate writer, list all
added blocks to see all legitimate blocks, and do some
changes to the information on a certain block in the chain
(network). We separate the experiments into 2 parts i.e.: (1)
quantitative test to find the relationship between number of
blocks and difficulty targets to security level which is
indicated by mining time if there is change in the block; (2)
qualitative test to show that 1. any attempt to plagiarize
somebody’s work will be detected, 2. peer reviewers who are
also third parties will be eliminated so that the potential for
plagiarism can be prevented, 3. paper submission from a
writer to the system will be encrypted and signed such that
nobody can see or alter the paper to prevent potential of
plagiarism.
For the quantitative test, we use the number of blocks NB
= 1, 10, 50, 100, 250 and 500. Meanwhile, for difficulty
targets we use DT= 1 until DT = 5. For different NB and DT,
we find the mining time as shown in Table I.
Table I. Experiment Mining Time
Number
of Blocks
Mining Time (Seconds)
DT=1
DT=2
DT=3
DT=4
DT=5
1
0.006
0.104
0.156
9.937
92.197
10
0.057
0.546
3.39
88.539
1,754.79
50
0.353
2.054
26.027
426.595
8,350.6
100
1.141
4.393
57.791
977.731
17,539
250
5.777
13.991
142.74
2,325.54
42,847.5
500
22.298
40.645
326.921
4,484.16
90,695.7
From Table I, we can see that the more block and the
more difficulty target, we find that mining time very
significantly increases. This time increasing indicates that it
is difficult to make any slight change to the block that
already in the blockchain. Furthermore, the mining time
needed to fulfill the difficulty target shows that it is
impossible to plagiarize the paper that its hash value already
in the blockchain. The test shows that for block number =
500 with difficulty target = 5, it takes up to 90,695.7 seconds
to complete the mining process. If it is assumed that
scientific publication information on a blockchain network is
around 500,000, then if the mining process is carried out on
the entire block it will take 90,695,700 seconds (around
25,193 days). This test result shows that the model could
prevent the potential of plagiarism since the computation
time needed does not make sense to mine the entire block to
become valid.
For the qualitative test, we experiment with three
different tests to see that blockchain’s application can detect
any action related to plagiarism conduct:
First, a writer conducts plagiarism by publishing
scientific works belonging to others by making a few
changes. The author assumes that with the presence of a third
party within the publishing organization, the evidence of
plagiarism can be changed and deleted if at any time a
dispute arises over the scientific work resulting from the
plagiarism. For this test, it is assumed that the block number
of the scientific work produced by plagiarism is in block
number 22 and original scientific works are in block number
20. With the timestamping, it can be seen who the owner of
the scientific work first published the scientific work, so that
it can be proved that the number block 22 is plagiarizing the
scientific work contained in block number 20. Suppose that a
writer or a third party, attempts to change the information of
the author's name from Eun-Kyeong Kwon to Sutanto and
timestamping information from 2019-07-07 03:38:44 to be
2019-07-07 02:38:44 such as block 22 was first published
before block 20. However, when a change occurs, the hash
value of block 22 and the next blocks will change. In this
case, we show that block 22 and block 23 becomes red which
means that the block is invalid as a result of the information
change. has been changed. as shown in Fig. 4.
Fig. 4. Information Change in Block 22 Causes Block 23
Invalid
To validate the remaining blocks, the mining process must
be carried out against these blocks. The mining process is
certainly not easy to do, because it requires very expensive
computing equipment and takes a very long time to mine.
The more blocks found on the blockchain network, the
longer time will take to do the mining process for the entire
block. This result is in line with the previous quantitative
test.
Second, a writer who is also a reviewer from an
educational institution uses his/her authority to carry out
acts of plagiarism. Every piece of scientific work
information sent to him/her is taken and quoted to be
published in his/her name. This happens because the
scientific publication process still utilizes third parties as
publications that do not have security guarantees for the
submitted scientific work. Because of these problems, it is
necessary to apply the permissionless blockchain in a
network of scientific publications. Suppose that there are 3
peers namely A, B, and C, each peer represents the sender
(writer) of scientific publications. When there is a new
scientific publication sender who wants to join the network,
all block data will be duplicated and stored into a new peer,
namely, peer D. This mechanism eliminates the existence
of third-party intermediaries that store a database of
scientific publication information. A decentralized network
will be created where each sender has a copy of his/her
own record which is able to eliminate third parties
interfering in it. Each peer is protected by a consensus such
that if there is data in different peer, it will be rejected in the
blockchain network. The test shows if there is an
information change by one peer will automatically change
the hash value of the last block and will be different from
the other peer. Through the permissionless blockchain
mechanism, it can create a decentralized and trusted
publicity network such that we can add the application of
text mining that provides more accurate results of plagiarism
comparison. Fig. 5 shows how the blockchain can detect any
change made and eliminate the existence of the third party.
Fig. 5. The Application of Blockchain that Eliminates
Third-Parties Existence
Third, a writer who sends a paper for the publication of
scientific work to reviewers wants to secure his/her
scientific work information such that nobody can read
his/her paper. It is assumed that a researcher who sends
his/her work will sign the paper using ECDSA with his/her
private key and only legitimate reviewer who owns (knows)
the valid public key can verify the signature of the paper
owner. This is done to prevent other people to carry out
plagiarism and nobody can open the submitted paper. If
there is a change for the paper during the submission
process, blockchain will detect that change and reject the
paper for review. Simulation of opening scientific
publication information with a public key can be seen in
Fig. 6.
Fig. 6. Simulation of Opening Scientific Publication
Information by Entering a Valid Public Key
After the scientific publication information is open, then
the authenticity of the information must be verified, whether
it has been changed or not by pressing the verify button. If
the information is not changed, the block will be green and
if the information has been changed, the block will be red.
The simulation of digital signature verification can be seen
in Fig. 7 and 8.
Fig. 7. Valid Message Digest Verification Simulation
Fig. 8. Invalid Message Digest Verification Simulation
Through the application of digital signatures in the
proposed model, it is, of course, able to safeguard the
information of the owner of the scientific work so that the
scientific work is not easy to be stolen or plagiarized by
unauthorized parties.
V. CONCLUSION AND FUTURE RESEARCH
Based on the results of research conducted, it can be
concluded that blockchain can be used as a solution in
preventing the potential of plagiarism namely (a) through the
application of the technology it is shown that it is impossible
to change plagiarism evidence or claim the scientific work of
others because a slight change will have an impact on the
entire network , (b) blockchain has the potential to eliminate
third parties who often become a loophole to carry out
potential plagiarism, (c) through the application of digital
signatures can provide guarantees for the protection of
scientific works that only legitimate reviewers can read the
scientific work, making it impossible to do so information
theft or potential plagiarism. At the end of the study, a
combination of the number of blocks with difficulty targets
was tested to prove the safety of the blockchain. The
experimental results imply that using blockchain is very safe
because no one can make changes to the data on the block
and validate all blocks on the network. Future research can
be done by using blockchain 4.0 as a new technology for
industry 4.0 and implementing deep learning to make any
plagiarism misconduct can be broadcasted to the entire
scientific publication network. The use of blockchain 4.0 can
increase trade per second (TPS) significantly.
REFERENCES
[1]
C. Cachin and M. Vukolić, "Blockchain Consensus Protocols in the
Wild," in International Symposium on Distributed Computing,
Germany, 2017.
[2]
S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System,"
2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf. [Accessed
20 April 2019].
[3]
A. Kibet and S. M. Karume, "A Synopsis of Blockchain Technology,"
International Journal of Advanced Research in Computer Engineering
& Technology (IJARCET), vol. VII, no. 11, 2018.
[4]
M. Crosby, N. P. Pattanayak, S. Verma and V. Kalyanaraman,
"BlockChain Technology: Beyond Bitcoin," Applied Innovation
Review (AIR), no. 2, 2016.
[5]
J. L. Zhao, S. Fan and J. Yan, "Overview of business innovations and
research opportunities in blockchain and introduction to the special
issue," Financial Innovation, pp. 2-7, 2016.
[6]
M. Hölbl, M. Kompara, A. Kamišali´c and L. N. Zlatolas, "A
Systematic Review of the Use of Blockchain," Symmetry, 2018.
[7]
Q. Lin, H. Wang, X. Pei and J. Wang, "Food Safety Traceability
System Based," Special Section on Smart Caching, Communications,
Computing and Cybersecurity For Information-Centric Internet Of
Things, vol. VII, 2019.
[8]
B. Shahzad and J. Crowcroft, "Trustworthy Electronic Voting Using
Adjusted Blockchain Technology," IEEE Access, vol. VII, 2019.
[9]
B. Gipp, C. Breitinger, N. Meuschke and J. Beel, "CryptSubmit:
Introducing Securely Timestamped Manuscript Submission and Peer
Review Feedback Using the Blockchain," in IEEE Joint Conference
on Digital Libraries (JCDL), Toronto, Canada, 2017.
[10]
M. S. M. Pozi, G. Muruti and A. A. Bakar, "Preserving Author Editing
History Using Blockchain Technology," in Proceedings of the 18th
ACM/IEEE on Joint Conference on Digital Libraries, Fort Worth,
Texas, 2018.
[11]
M. Mettler, "Blockchain Technology in Healthcare The Revolution
Starts Here," Munich, 2016.
[12]
M. O’Dair, Z. Beaven, D. Neilson, R. Osborne and P. Pacifico,
"Music On The Blockchain," Middlesex University, London, 2016.
[13]
R. Xu, L. Zhang, H. Zhao and Y. Peng, "Design of Network Media’s
Digital Rights Management Scheme Based on Blockchain
Technology," in IEEE 13th International Symposium on Autonomous
Decentralized System, Bangkok, Thailand, 2017.
[14]
R. Hanifatunnisa and B. Rahardjo, "Blockchain Based E-Voting
Recording System," in IEEE, Lombok, Indonesia, 2017.
[15]
T. Hepp, C. Gondek, A. Schoenhals and B. Gipp, "OriginStamp: A
blockchain-backed system for decentralized trusted timestamping,"
Research Gate, 2018.
[16]
M. Holland, J. Stjepandiü and C. Nigischer, "Intellectual Property
Protection of 3D Print Supply Chain with Blockchain Technology," in
IEEE International Conference on Engineering, Stuttgart, Germany,
2018.
[17]
J. Tang, J. Zhang, L. Yao, J. Li, L. Zhang and Z. Su, "ArnetMiner:
Extraction and Mining of Academic Social Networks," in Proceedings
of the Fourteenth ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, Las Vegas, Nevada, 2008.
... The innovation of a blockchain is that it creates assurance without the requirement for a reliable third party by ensuring the accuracy and security of a record of data. [20,21,22]. The transparency offered by blockchain is one of the most significant benefits for buyers [2,11]. ...
... • A new block is created as each new data item arrives. The data are chained together in chronological sequence once the block has been filled with data by chaining it onto the previous block [7,22]. ...
... This condition is Cite this article as: Andi, C. Juliandy, Robet, and O. Pribadi, "Securing Medical Records of COVID-19 Patients Using Elliptic Curve Digital Signature Algorithm (ECDSA) in Blockchain", CommIT Journal 16(1), 87-96, 2022. undoubtedly impossible to do because it takes a very long time [9][10][11]. Blockchains can be classified into three categories: permissionless blockchain, public permissioned blockchain, and permissioned blockchain. ...
... Blockchain 2.0 is associated with smart contracts. Blockchain 3.0 is used for digital society, such as new technologies that are still under development, which can be applied in various fields, such as health [10], the food sector [26], electronic voting [27], and education [9]. The latest version is Blockchain 4.0, which is a real implementation of blockchain in business to fulfil the daily useable requirements [28]. ...
Article
Full-text available
The rapid and dangerous spread of COVID-19 has forced governments in various countries to provide information on patients' medical records to the public in the context of prevention. Meanwhile, patients' medical records are vital and confidential because they contain patients' privacy. Changing and falsifying a patient's medical record leads to various dangerous consequences, such as mishandling which results in the patient's death. From these problems, the research introduces a new model with a combination of blockchain technology and the Elliptic Curve Digital Signature Algorithm (ECDSA) to secure the medical records of COVID-19 patients. This model is an improvement from the model and framework proposed by previous researchers. The proposed model consists of two big parts (front and back end). Then, the simulations are carried out to measure and prove the level of security of blockchain technology in securing patient medical records. The research results show that the ECDSA algorithm can protect patients' medical records from being opened by unauthorized parties. Then, blockchain technology can prevent changes or manipulation of patient medical records because the information recorded on the blockchain network is impossible to change and will be immutable. The research has successfully introduced a new model in securing patient medical records.
... For instance, blockchain reduces the high cost of transactions by preventing wilful fraud or theft in real-time monitoring [8,11]. Moreover, it protects digital copyright from plagiarism by offering decentralised validation authority and a piracy tracing system [12]. However, there are many other applications of blockchain, as summarised in Table 1 based on the literature review by Sunny et al. [13]. ...
Article
Full-text available
With the widespread use of electronic seals (e-seals), their traceability and security have attracted more and more attention. Moreover, the complexity of shipping operations and container handling justifies the use of technologies to ensure information security in the face of attacks. This work contributes a blockchain-based solution with a simulated prototype for improving electronic seals for containers on terminals in ports. An electronic seal was designed, and a blockchain prototype was constructed for a container data flow. The obtained results from the prototype were evaluated using performance tests. The security issues in the blockchain were also discussed from a strategic perspective based on game theory. Finally, the simulation concluded that the blockchain improves transaction efficiency. No studies were found that integrated blockchain technology with electronic seals. Therefore, this work intends to combine blockchain technology with e-seal to improve the security of transferred data due to its immutable nature.
... Table 4 also shows the permission needed by each categories. According to the permission-based privacy analysis model in [30], all tested applications need the access permission to the Internet, which is reasonable because all cryptocurrencies need to make online transactions. Most of programs need to accsess camera and external storage because they might need to do QR code scan, take photo of band card information and record transactions. ...
Article
Full-text available
Cryptocurrency represented by Bitcoin is a very popular topic in recent years. However, the prosperity of cryptocurrency drives an increasing number of applications published. Some malicious or vulnerable programs are also detected and reported these years. To do a deeper study into security of cryptocurrency application, this paper learns common vulnerabilities, threat models inside normal applications, and taint analysis, a useful vulnerability-detecting tool, concludes a common and useful methodology for threat detection in application programs, especially Android apps. This approach uses static taint analysis to detect vulnerabilities inside a given Android application, classify them into common vulnerability categories and then make conclusions. This paper does research in analyzing statistics of threats in common cryptocurrency apps in Google play store and draw conclusions on the status of cryptocurrency software as well. Finally, some suggestions are provided at the end of this paper. These recommendations apply to application programmers, app store administrators, scholars and experts in related area, government officer and users. This set of analysis process can be applied to analyze any type of application programs.
... Some copyright protection schemes [3] [4] use cryptographic hash functions such as SHA-1, SHA-256 and MD5 to generate image hash codes. However, the cryptographic hash functions are extremely sensitive to the modification of files [5]. ...
Article
Full-text available
At present, most of the perceptual hash methods for image copyright protection rely on manually designed feature extraction and mapping, whose detection accuracy is insufficient. Some schemes based on deep learning are designed to consider a limited variety of content retention operations, which are not enough to deal with the increasingly severe situation of image copyright protection. In response to this situation, a novel Convolutional Neural Network (CNN)-based perceptual image hashing scheme is introduced in this paper. In this scheme, the training images are classified according to their original images and a Hadamard matrix is used to generate a hash center for each class in Hamming space. Then the Convolution Neural Network learns the feature extraction process of the image automatically, constrained by central quantization and distinct quantization, so that the hash code of each image converges to the hash center of their class, and generates the final hash sequence. The proposed scheme can successfully strike a balance between perceived robustness and discrimination capacity. Based on the test results on large-scale test sets, F <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sub> scores, equal error rate (EER) and receiver operating characteristic (ROC) curves demonstrate the superiority of our scheme compared with some state-of-the-art schemes.
... They have achieved better security level than other systems. Purba et al. [8] developed a new application for preventing the plagiarism in research papers using blockchain technology. ...
Article
Full-text available
Blockchain technology is playing a major role in the process of providing security to the data of different kinds of applications. This technology is considered the verified document of every transaction. Proof of Low Infringement and Plagiarism is a consensus mechanism designed to revolutionize heavy identity, asset tracking, and academic participation. Research articles and innovations are not encouraged across the globe due to a lack of funding, overpriced publication rates (it costs an average of $1000 to publish an academic journal in the USA), no transparency in infringement data, and an overwhelming number of middlemen taking part in citation costs. To that end, we propose a new cryptosystem that incorporates a newly proposed cryptographic system to provide security for research articles while online plagiarism checking. The proposed system uses the SHA-256 hash function and AES for securing the data. In addition, an existing cryptographic algorithm called Elliptic Curve Cryptography with Diffie-Hellman (EC(DH)2) is also applied to enhance the data security level. The experimental results suggest that any attempt to plagiarize the research article that is submitted is an interruption of the instructions. The transmission of a research article is also encrypted by applying cryptographic rules and security mechanisms such that no one can access or modify the submitted research article. Even the reviewer of the research article is not able to make any changes to the article because by doing such activity, the system gives an alarm message about the violation to the administrator. The experiments are conducted to prove the efficiency and effectiveness of the cryptosystem.
... Analytically, one of the most promising technologies regarding eliminating biases, promoting objectivity, and anonymisation in peer-review is blockchain technology [27], [28]. This technology is used for various reasons such as detecting plagiarism [29], shared governance in publishing [30], fairness evaluation via permission checks [31], and web-based file-sharing systems [32]. ...
Preprint
Full-text available
One of the most important tasks in scientific publishing is the articles' evaluation via the editorial board and the reviewers' community. Additionally, in scientific publishing great concern exists regarding the peer-review process and how it can be further optimised to decrease the time from submission to the first decision, as well as increase the objectivity of the reviewers' remarks ensuring that no bias or human error exists in the reviewing process. In order to address this issue, our article suggests a novice cloud framework for manuscript submission based on blockchain technology that further enhances the anonymity between authors and reviewers alike. Our method covers the whole spectrum of current submission systems capabilities, but it also provides a decentralised solution using open-source tools such as Java Spring that enhance the anonymity of the reviewing process.
... Analytically, one of the most promising technologies regarding eliminating biases, promoting objectivity, and anonymisation in peer-review is blockchain technology [27], [28]. This technology is used for various reasons such as detecting plagiarism [29], shared governance in publishing [30], fairness evaluation via permission checks [31], and webbased file-sharing systems [32]. ...
Article
Full-text available
One of the most important tasks in scientific publishing is the articles' evaluation via the editorial board and the reviewers' community. Additionally, in scientific publishing great concern exists regarding the peer-review process and how it can be further optimised to decrease the time from submission to the first decision, as well as increase the objectivity of the reviewers' remarks ensuring that no bias or human error exists in the reviewing process. In order to address this issue, our article suggests a novice cloud framework for manuscript submission based on blockchain technology that further enhances the anonymity between authors and reviewers alike. Our method covers the whole spectrum of current submission systems capabilities, but it also provides a decentralised solution using open-source tools such as Java Spring that enhance the anonymity of the reviewing process.
Book
Full-text available
- Offers comprehensive knowledge about the transformations through Blockchain technology in all major sections of society. - Serves as a knowledge-sharing platform of ideas focusing on future directions of models, architectures, frameworks, policies related to Blockchain. - Focuses on how Blockchain technology can work in an integrated manner with other existing technologies.
Chapter
Full-text available
Rapid development in advanced technologies such as the Internet of Things (IoT) and Blockchain has led to a growth of interest in a number of application areas, including smart environments such as a smart campus, which can be considered as an example of a smart city. Despite such growth, no comprehensive guiding framework has been developed for emerging IoT and Blockchain technologies deployment in the smart campus environment, particularly in relation to security and privacy aspects, as well as to the mitigation of known problems with IoT and Blockchain in existing applications. This chapter proposes a novel architecture framework for the IoT and Blockchain applications deployed within a smart campus environment, comparing the main technologies involved. As a specific example, this framework is tested for integration of Blockchain and other relevant technologies into the higher education certificating system for issuing authentic, verifiable and sharable student credentials. The existing certificating systems are marked by their lack of speed and low reliability and, in certain educational systems, they produce social and cultural conflicts. The proposed Blockchain-based student certification system is aimed to address these existing problems. Specific higher education institutes in Saudi Arabia were used as a case study to present a certificate validation and sharing framework that guarantees authenticity through leveraging the privacy and security features of a Blockchain network. The proposed solution was validated with the user acceptance study. Two groups of participants, employers and academic users, with a majority of female respondents, were included in this empirical study focusing on the evaluation of the proposed framework, assessing the potential for Blockchain adoption in higher education. The validity and reliability of the framework was tested using a sequential mixed methods design involving the collection of qualitative interview data and quantitative survey data. The results of this study are particularly useful in the context of developing countries. It is expected that the proposed framework will have useful applications in a variety of fields, where it is necessary to determine whether a satisfactory level of IoT and Blockchain technologies has been achieved and maintained in accordance with the relevant safety and security standards.KeywordsSmart campusInternet of ThingsBlockchainSecurityPrivacyTrustSmart HE certificate
Article
Full-text available
The electronic voting has emerged over time as a replacement to the paper-based voting to reduce the redundancies and inconsistencies. The historical perspective presented in the last two decades suggests that it has not been so successful due to the security and privacy flaws observed over time. This paper suggests a framework by using effective hashing techniques to ensure the security of the data. The concept of block creation and block sealing is introduced in this paper. The introduction of a block sealing concept helps in making the blockchain adjustable to meet the need of the polling process. The use of consortium blockchain is suggested, which ensures that the blockchain is owned by a governing body (e.g., election commission), and no unauthorized access can be made from outside. The framework proposed in this paper discusses the effectiveness of the polling process, hashing algorithms' utility, block creation and sealing, data accumulation, and result declaration by using the adjustable blockchain method. This paper claims to apprehend the security and data management challenges in blockchain and provides an improved manifestation of the electronic voting process.
Article
Full-text available
The electronic voting has emerged over time as a replacement to the paper based voting to reduce the redundancies and inconsistencies. The historical perspective presented in last two decades suggests that it has not been so successful due to the security and privacy flaws observed over time. This paper suggests a framework by using the effective hashing techniques to ensure the security of the data. The concept of block creation and block sealing are introduced in this paper. The introduction of block sealing concept helps in making the blockchain adjustable to meet the need of the polling process. The use of consortium blockchain is suggested that ensures that the blockchain is owned by a governing body (e.g. election commission) and no unauthorized access can be made from outside. The framework proposed in this paper discusses the effectiveness of the polling process, hashing algorithms utility, block creation and sealing, data accumulation, and result declaration by using the adjustable blockchain method. This research claims to apprehend the security and data management challenges in blockchain and provides an improved manifestation of the electronic voting process.
Article
Full-text available
In recent years, food safety issues have drawn growing concerns from society. In order to efficiently detect and prevent food safety problems and trace the accountability, building a reliable traceability system is indispensable. It is especially essential to accurately record, share and trace the specific data within the whole food supply chain including the process of production, processing, warehousing, transportation and retail. Traditional traceability systems have issues such as data invisibility, tampering and sensitive information disclosure. Blockchain is a promising technology for food safety traceability system because of the characteristics such as irreversible time vector, smart contract, consensus algorithm, etc. This paper proposes a food safety traceability system based on blockchain and EPC Information Services (EPCIS), and develops a prototype system. A management architecture of on-chain & off-chain data is proposed as well, through which the traceability system can alleviate the data explosion issue of the blockchain for Internet of Things (IoT). Furthermore, the enterprise-level smart contract is designed to prevent data tampering and sensitive information disclosure during information interaction among participants. The prototype system was implemented based on the Ethereum. According to test results, the average time of information query response is around 2ms while the amount of on-chain data and query count are 1GB and 1,000 times per second respectively.
Research
Full-text available
Article
Full-text available
Currently, timestamps are certified by central timestamping authorities, which have disadvantages of centralization. The concept of the decentralized trusted timestamping (DTT) was developed by Gipp et al. to address these drawbacks. The paper provides insights into the architecture and implementation of a decentralized timestamp service taking the integration of multiple blockchain types into account. Furthermore, the components are introduced and the versatile application scenarios are presented. A future direction of research is the evaluation of blockchain technology and their suitability for timestamping.
Article
Full-text available
Blockchain technology enables a decentralized and distributed environment with no need for a central authority. Transactions are simultaneously secure and trustworthy due to the use of cryptographic principles. In recent years, blockchain technology has become very trendy and penetrated different domains, mostly due to the popularity of cryptocurrencies. One field where blockchain technology has tremendous potential is healthcare, due to the need for a more patient-centric approach to healthcare systems and to connect disparate systems and increase the accuracy of electronic healthcare records (EHRs). In this systematic review, an analysis of state-of-the-art blockchain research in the field of healthcare is conducted. The aim is to reveal the potential applications of the technology and to highlight the challenges and possible directions of blockchain research in healthcare. First, background information is discussed, followed by a description of the exact methodology used in this paper. Next, an analysis of the results is given, which includes a bibliometric overview, an analysis of gathered data and its properties, and the results of a literature quality assessment. Lastly, there is a discussion of the results from the analysis. The findings indicate that blockchain technology research in healthcare is increasing and it is mostly used for data sharing, managing health records and access control. Other scenarios are very rare. Most research is aimed at presenting novel structural designs in the form of frameworks, architectures or models. Findings also show that technical details about the used blockchain elements are not given in most of the analyzed publications and that most research does not present any prototype implementation or implementation details. Often even with a prototype implementation, no details about blockchain elements are given.
Conference Paper
Authorship contribution is often taken for granted. Internally, the contribution rate is usually known among all the authors of a given paper. However, this rate is hard to be verified by external parties, as the measurement of the authors' contribution is still not common and the way to measure it is unclear. In this paper, we propose a new blockchain based framework to assess the contribution of all authors of any scientific paper. Our framework can be implemented by anyone who is directly or indirectly involved in the publication of the paper, such as a principal researcher, grant funder, research assistant or anyone from relevant external bodies.