Chapter

NEWSTRADCOIN: A Blockchain Based Privacy Preserving Secure NEWS Trading Network

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

To stay up to date with world issues and cutting-edge technologies, the newspaper plays a crucial role. However, collecting news is not a very easy task. Currently, news publishers are collecting news from their correspondents through social networks, email, phone call, fax, etc. and sometimes they buy news from the agencies. However, the existing news sharing networks may not provide security for data integrity and any third party may obstruct the regular flow of news sharing. Moreover, the existing news schemes are very vulnerable in case of disclosing the identity. Therefore, a universal platform is needed in the era of globalization where anyone can share and trade news from anywhere in the world securely, without the interference of third-party, and without disclosing the identity of an individual. Recently, blockchain has gained popularity because of its security mechanism over data, identity, etc. Blockchain enables a distributed way of managing transactions where each participant of the network holds the same copy of the transactions. Therefore, with the help of pseudonymity, fault-tolerance, immutability, and the distributed structure of blockchain, a scheme (termed as NEWSTRADCOIN) is presented in this paper in which not only news can be shared securely but also anyone can earn money by selling news. The proposed NEWSTRADCOIN can provide a universal platform where publishers can directly collect news from news-gatherers in a secure way by maintaining data integrity, without experiencing the interference of a third-party, and without disclosing the identity of the news gatherer and publishers.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

Article
Full-text available
The online social networks facilitate to share information among the users based on their interests. The specific information being shared by a user may be legitimate or fake. Often, misinformation propagated by users and groups can create chaos and riots in the worst circumstances. Nowadays, a third party like ALT news and Cobrapost check the authenticity of the information, but it takes too much time to validate it. Therefore, there is a need to establish a new robust system to check the information authenticity within the network. In this paper, we envision a model for sharing the information securely at the peer level based on blockchain. In the proposed model, a chain is created by combining blocks of information. Each node in the network propagates the information based on its credibility against its peer nodes. The credibility of a node varies according to their respective information. Trust is calculated between sender and receiver using either of two ways, local trust and global trust. We evaluate our model using real datasets from Facebook and Live journal as well as synthetic datasets generated by using E–R network model and BA network model. The proposed model achieves high accuracy on real-world scale-free networks. The simulation results validate that the model can detect misinformation (fake news or rumor), as well as the source of information propagating nodes using network parameters by applying blockchain technology without the involvement of third parties.
Conference Paper
Internet of Things (IoT) established the foundation of the smart world via its diverse functionalities (e.g., remote data acquisition, automated task execution). This trend continues to military applications too by introducing internet of military things (IoMT). Due to being at infancy level, new technologies require to move forward and assist IoMT to gain maturity. Mixed reality (MR) can be a potential technology which fuses the virtual and actual world. MR can improve the quality of service (QoS) in terms of inventory management, remote mission handling, battlefield assistance, etc. However, data among these applications is surrounded by cyber threats (e.g., illegal data modification, unauthorised data access). Blockchain is another promising technology which brings security in the distributed world. A content sharing scheme for MR application is proposed on the top of blockchain to bring security in the multi-user environment in IoMT. A smart contract is employed to manage security in accessing data by different users. Moreover, an experimental environment is set to observe the performance of the proposed scheme. The analysis manifests that proposed scheme maintains security without affecting the regular performance.
Article
Full-text available
In this study, we present a new scheme for smart education utilizing the concept of a blockchain for question sharing. A two-phase encryption technique for encrypting question papers (QSPs) is proposed. In the first phase, QSPs are encrypted using a timestamp, and in the second phase, previously encrypted QSPs are encrypted again using a timestamp, salt hash, and hash from the previous QSPs. These encrypted QSPs are stored in a blockchain along with a smart contract that helps the user to unlock the selected QSP. An algorithm is also proposed for selecting a QSP for the exam that randomly picks a QSP. Moreover, a timestamp-based lock is imposed on the scheme so that no one can decrypt the QSP before the allowed time. Security analysis is conducted to demonstrate the feasibility of the proposed scheme against different attacks. Finally, the effectiveness of the proposed scheme is demonstrated through implementation, and the superiority of the proposed scheme over existing schemes is proven through a comparative study based on different features.
Article
Full-text available
This paper presents a blockchain enabled secure data acquisition scheme utilizing an Unmanned Aerial Vehicle (UAV) swarm where data are collected from internet of things (IoT) devices and subsequently, forwarded to the nearest server through the UAV swarm. Before initiating data acquisition, the UAV swarm shares a shared key with IoT devices in order to maintain communications. However, prior to transmitting data, IoT devices encrypt the data and forward it to the UAV swarm. Upon receiving the data, the UAV swarm implements a two-phase validation utilizing the π-hash bloom filter and the digital signature algorithm to validate the sender; in addition, prior to forwarding data to the nearest server, it performs encryption. However, before adding data in blockchain, consent from all validators is required. Finally, the data are stored in blockchain with the approval of validators. A security analysis is performed to demonstrate the feasibility of the proposed scheme. Finally, the effectiveness of the proposed scheme is manifested through implementation and simulation. The security analysis and the performance results show that UAV assist IoT devices both in terms of connectivity and energy consumption, and provides security against the threats mentioned in the paper.
Article
Full-text available
Since its inception, the blockchain technology has shown promising application prospects. From the initial cryptocurrency to the current smart contract, blockchain has been applied to many fields. Although there are some studies on the security and privacy issues of blockchain, there lacks a systematic examination on the security of blockchain systems. In this paper, we conduct a systematic study on the security threats to blockchain and survey the corresponding real attacks by examining popular blockchain systems. We also review the security enhancement solutions for blockchain, which could be used in the development of various blockchain systems, and suggest some future directions to stir research efforts into this area.
Article
Internet of things (IoT), mobile edge computing (MEC), and unmanned aerial vehicle (UAV) have attracted significant attention in both industry and academic research. By consolidating these technologies, IoT can be facilitated with improved connectivity, better data transmission, energy saving, and other advantages. However, the communication between these entities is subject to potential cyber threats. In addition, the integrity of the data must be maintained after storing into local storage. Blockchain is a data structure that supports features like pseudonymity, data integrity etc. This paper represents a blockchain based data acquisition process in which information is gathered from IoTs using UAV as a relay and is securely kept in blockchain at MEC server. In the proposed scheme, data are encrypted prior to transfer to MEC server with the assistance of a UAV. Upon receiving the data, MEC server validates the data and the identity of the sender. Successful validation is followed by stocking of the data into blockchain, subsequent to obtaining consent from the validators. Security analysis is conducted in order to show the feasibility of the proposed secure scheme. Finally, the performance of the proposed scheme is analyzed via simulation and implementation.
Conference Paper
Unmanned aerial vehicle (UAV) is an emerging technology that becomes popular not only in military operation but also in civil applications. Internet of things (IoT) is another popular technology which brings automation in our daily life. Like other areas, IoT also exposes its potential in healthcare. Using IoT sensors, it becomes easy to monitor the health of a user remotely. UAV consolidated with mobile edge computing (MEC) can provide real-time services in outdoor health monitoring. However, communication among them surrounds with cyber threats and data integrity issue. Blockchain is a data structure in which data are shared among peers. In this paper, a blockchain based secure outdoor health monitoring scheme using UAV is proposed for a smart city. In the proposed scheme, health data (HD) are accumulated from users wearable sensors and these HD are transmitted to the nearest MEC server via UAV. Prior to transmitting to MEC, HD experience encryption in order to provide protection against cyber threats. Moreover, after arriving at MEC, HD are diagnosed and if any abnormalities are found in the user’s health, MEC server notifies the user and the nearest hospitals. When the processing is completed, HD are stored in blockchain with the consent of validators. Finally, simulation results and experimental set up are discussed in order to manifest the feasibility of the proposed scheme.
Conference Paper
Non-orthogonal multiple access (NOMA) with successive interference cancellation receiver is considered as one of the most potent multiple access techniques to be adopted in future wireless communication networks. Data security in the NOMA transmission scheme is on much attention drawing issue. Blockchain is a distributed peer-to-peer network enables a way of protecting information from unauthorized access, tempering etc. By utilizing encryption techniques of blockchain, a secured data communication scheme using blockchain in NOMA is proposed in this paper. A two-phase encryption technique with key generation using different parameter is proposed. In the first-phase data is encrypted by imposing users’ public key and in the second phase, a private key of the base station (BS) is engaged for encryption. Finally, the superiority of the proposed scheme over existing scheme is proven through a comparative study based on the different features.
Article
The paper focuses on various legal-related aspects of the application of blockchain technologies in the copyright sphere. Specifically, it outlines the existing challenges for distribution of copyrighted works in the digital environment, how they can be solved with blockchain, and what associated issues need to be addressed in this regard. It is argued that blockchain can introduce long-awaited transparency in matters of copyright ownership chain; substantially mitigate risks of online piracy by enabling control over digital copy and creating a civilized market for “used” digital content. It also allows to combine the simplicity of application of creative commons/open source type of licenses with revenue streams, and thus facilitate fair compensation of authors by means of cryptocurrency payments and Smart contracts. However, these benefits do not come without a price: many new issues will need to be resolved to enable the potential of blockchain technologies. Among them are: where to store copyrighted content (on blockchain or “off-chain”) and the associated need to adjust the legal status of online intermediaries; how to find a right balance between immutable nature of blockchain records and the necessity to adjust them due to the very nature of copyright law, which assigns ownership based on a set of informal facts, not visible to the public. Blockchain as a kind of time stamping service cannot itself ensure the trustworthiness of facts, which originate “off-chain”. More work needs to be done on the legal side: special provisions aimed at facilitating user's trust in blockchain records and their good faith usage of copyrighted works based on them need to be introduced and transactions with cryptocurrencies have to be legalized as well as the status of Smart contracts and their legal consequences. Finally, the economics of blockchain copyright management systems need to be carefully considered in order to ensure that they will have necessary network effects. If those issues are resolved in a satisfactory way, blockchain has the potential to rewrite how the copyright industry functions and digital content is distributed.
Conference Paper
With the rapid development of mobile Internet technology, mobile phones and other mobile terminal products have been widely popular. General public who are not the professional journalist produce more and more pictures, video and other media content anywhere and anytime so that the user-generated content plays an more important role in the news reporting, especially in emergencies. As not having a collection channel of user-generated content, the traditional news gathering system has been proved that when it comes to emergencies it faces two challenging: bad timeliness and lack of first hand materials. In order to improve the timeliness and make full use of the user-generated content for emergencies, this paper presents an efficient and flexible news gathering system which is UGC-oriented. The new system includes two major parts — the client application in mobile devices and the management system in the server. Our work is focused on the server side to increase the gathering efficiency of UGC content. The results indicate it works well.
Newspaper production process
  • Wikipedia
Wikipedia, "Newspaper production process," Jan 2018, https://en.wikipedia.org/wiki/News-paper_production_process.
Newspapers| how they are published and edited| contents of a newspaper|
  • E Online
E. Online, "Newspapers | how they are published and edited | contents of a newspaper|," http://www.englishonline.at/media/newspapers/newspapers.htm.
White house correspondent april ryan says reporters are getting death threats
  • S J Montgomery
S. J. Montgomery, "White house correspondent april ryan says reporters are getting death threats," Jan 2018.
Times reporter still getting death threats
  • Sausa Trs
T. R. S. SAUSA, "Times reporter still getting death threats," Jan 2018.
Where reporters face beatings, threats and death
  • M I Khan
M. I. Khan, "Where reporters face beatings, threats and death," Dec 2017.
Mfwa condemns threats on life of journalist
  • A Ibrahim
A. Ibrahim, "Mfwa condemns threats on life of journalist," Feb 2018.