Article

Blockchain: a literature review

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

A blockchain consists of an ordered list with nodes and links where the nodes store information and are connected through links called chains. This technology supports the availability of a publicly maintained ledger of transactions, first gaining mainstream attraction with cryptocurrencies. A myriad of other applications have emerged ever since. There has been a steady growth in the number of research studies conducted in this field; as such, there is a need to review the research in this field. This paper conducts an extensive review on 76 journal publications in the field of blockchain from 2016 to 2018 available in Science Citation Index (SCI) and Social Science Citation Index (SSCI) database. The aim of this paper is to present scholars and practitioners with a detailed overview of the available research in the field of blockchain. The selected papers have been grouped into 14 categories. The contents of papers in each category are summarized and future research direction for each category is outlined. This overview indicates that the research in blockchain is becoming more prominent and requires more effort in developing new methodologies and framework to integrate blockchain. It is the need of today’s growing business that ventures into new technologies like cloud computing and Internet of Things (IoT).

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Digital ledgers record transactions between multiple entities, such as suppliers, manufacturers, exporters, consumers, and distributors in the product marketing field, with distributors playing a crucial role in establishing product standards. Logistics management requires tracking physical items and providing clear information, which a secure system facilitates for better optimization in company and trade transactions (Pop, Cioara, Anghel, Antal, & Salomie, 2020;Garg & Khadse, 2020). Comparing traditional transaction recording using databases (shown on the left side of FIGURE 1. 4) with decentralized transaction recording using distributed ledger technology (shown on the right side of FIGURE 1. 4), it is clear that in traditional web applications, users view data based on the access features set by the application. ...
... Blockchain technology provides a secure, shared and transparent way of recording transactions in a deployed application. The technology is based on four key features that ensure reliability and integrity for users (Gorkhali, Li, & Shrestha, 2020;Belchior, Vasconcelos, Guerreiro, & Correia, 2021): ...
... A Smart Contract (SC) is a business logic that is preserved on blockchain and automatically executes predefined actions when certain conditions are met (Gorkhali, Li, & Shrestha, 2020). These business logics are crucial in the world of blockchain technology, drawing a lot of interest for their game-changing potential in different industries like marketing. ...
... Plagiarism occurs in many areas such as in work [4], digital images [5], and the main area in the classroom for student assignments, tests, or even scientific research [6], On the other hand, improved research in the computer area brings us new technology that attracts much attention from researchers, the technology is called Blockchain [7]. Simply, Blockchain is a distributed database which means that every client or every individual in the chain network has the same data [8]. Based on this concept it is nearly impossible to make changes to the data that is stored in Blockchain, because if we want to change the data that is already stored in the Blockchain we need to also change the 50%+1 other computer and individual data that connect to Blockchain network [9], [10] As we can see the improvement of technology brings us the positive and negative sides. ...
... Here is the example for the hash value of the K-Gram word "appl" with b = 256 and q = 101 the hash was 16. The hash value for the rest of the K-Gram words will be seen below: [16,73,8,14,89,49,9,49,13,71,10,11,35,44,49,36,63,53,22,20,22,18,91,29,74,31,42,5,22,4,33,3,84,75,10,44,1,35,11,9,10,23,16,25,23,37,28] 3) Matching, this step will match the hash value from the input text with the search text that is already in the block at the Blockchain network. If the hash value is the same, it will compare with the original text from that hash value. ...
... A blockchain-based system enhances transparency by facilitating real-time tracking and addressing security issues. In the food industry, blockchain is also used to ensure the traceability and safety of agricultural products [33]. Research continues to focus on quality control and safety enhancement by integrating blockchain with Internet-of-Things (IoT) technologies. ...
... Consequently, it is applicable across a broad variety of fields [24]. The convergence of blockchain with emerging technologies, such as cloud computing and the IoT, is becoming essential in today's evolving business landscape [33]. Blockchain technology is particularly beneficial for managing safety in shared-kitchen environments involving multiple supply chains and stakeholders. ...
Article
Full-text available
With the recent growth of the sharing economy, businesses offering shared-kitchen services are expanding rapidly. Due to the communal nature of these kitchens, there is a heightened need for systematic food safety management. However, existing research on blockchain applications has largely overlooked shared kitchens, a complex setting with numerous stakeholders and sensitivity to real-time kitchen conditions. This study addresses this gap by proposing a blockchain-based food safety management system for shared kitchens. The system’s functional requirements were meticulously outlined based on guidelines from South Korea’s Ministry of Food and Drug Safety. Key participants were identified as system users, and use cases were crafted in alignment with their responsibilities and roles to ensure effective safety management. Additionally, the blockchain system’s mechanisms for enhancing safety in shared kitchens were substantiated through specific use cases and detailed data structures, addressing issues related to forgery, alteration, and management challenges. This study also offers practical insights that can facilitate more structured safety management in shared-kitchen environments.
... This technology is enabled by cryptography, consensus algorithms, validity rules, governance and smart contracts. Blockchain is the most famous form of DLT that has attracted the interest of many researchers and practitioners leading to technological advancements in the area and the development of various types of blockchains and DLT systems that serve different applications [1]. ...
... Blockchain is a distributed database system that stores validated transaction records in a linked list called chains [3], [1]. Transactions stored in blocks are known to be immutable and publicly available for participating peers to view [2]. ...
Article
Full-text available
Blockchain interoperability has become an essential requirement for the advancement of blockchain technology in numerous fields. Enterprise organizations are increasingly utilizing permissioned blockchains to manage and store their organizations’ data and transactions in a private immutable ledger. Interoperability enables permissioned blockchain platforms to communicate and exchange information which is paramount for fully exploiting permissioned blockchains as facilitators for B2B applications. Additionally, the cross-network invocation of smart contracts under agreed conditions enhances business operations. Blockchain oracles can enable permissioned blockchain interoperability and cross-network transactions in a seamless and private manner. However, they have not been studied in the literature as interoperability techniques between permission blockchains. This study proposes a blockchain oracle interoperability technique designed specifically for permissioned blockchain platforms. We presented the architecture of the blockchain oracle interoperability technique and a prototypical implementation to demonstrate the practicality of the proposed technique. In addition, we obtained cross-network transaction latency measurements and analyzed the results.
... Presently, blockchain finds extensive application, particularly in systems necessitating enhanced security. Furthermore, blockchain technology is intricately linked with various domains, including but not limited to personal asset registration, document archival, survey or election processes, the financial industry, payment transactions, fund transfers, trading platforms, exchange administration, authorization, validation, digital identity oversight, and document control [3][4][5]. In recent years, alongside established blockchains like Ethereum and Bitcoin, numerous novel blockchains and cryptocurrencies have emerged. ...
...  Once the block is mined  The blockchain's length in blocks  Minimum gas fee needed to include the transaction in the block  Effort needed to remove the block  Distinct identifier for the block  Distinct identifier of the preceding block  Transactions encompassed within the block  A password demonstrating the block's successful completion of the proof of stake [3,15,16]. Blockchain technology derives its name from its function of storing verified transaction records in blocks. A blockchain is basically composed of two key elements: validators and users. ...
Article
Full-text available
With the rise of digitalization and increased internet usage, digital certificates' security issues have gained significant importance. The utilization of counterfeit certificates can lead to deceptive identity and capability verifications, allowing untrustworthy individuals to assume misleading positions. Simultaneously, factors such as data leaks and technical glitches can jeopardize the security of certificates. These challenges can complicate talent verification processes and result in unsuitable individuals being placed in incorrect roles. The proposed work aims to thwart forged certificates and ensure their verifiability within this context. The methodology employed in the study strives to mitigate potential data loss or accessibility problems by adopting a decentralized storage structure. The primary objective is to establish certificates that are reliable, traceable, and capable of being verified. A rapid and efficient user interface was developed using React.js to achieve this aim. Smart contracts were scripted on the Ethereum blockchain using Solidity, and data, including user information and certificate details, were stored within components like MongoDB. In the phase of practical implementation, diverse scenarios have been designed to facilitate the generation, verification, and monitoring of certificates. The proposed approach is geared towards deterring forgery and enhancing the credibility of certificates. Through this system, users and organizations can authenticate certificates and prevent the proliferation of counterfeit ones. Furthermore, the enhanced security and ease of sharing certificates on digital platforms offer substantial advantages to certificate holders. In summary, this study strives to enhance the safeguarding and dependability of certificates by addressing the security concerns posed by the era of digitalization.
... As considered in [31], a participant is an actor who has above all a communication account that is full of a private/public key pair [32]. There is a relationship between these two keys, where the private key cannot be easily inferred from the knowledge of the public key alone [33]. It is also equipped with a EMS and a smart meter. ...
Article
Smart grids are developing rapidly, offering significant benefits but also major challenges. Among the main issues are trust between network players, transparency of energy transactions and data confidentiality. To address this, it is crucial to create energy transaction systems that ensure transparency, trust, and minimization of energy losses, while preserving the confidentiality of the information exchanged. An in-depth study led to the design of an innovative architecture in 7 layers, including a specific layer for energy transfer in order to accurately monitor consumption in smart grids. The division of smart grids into geographical areas aims to optimize energy transmission and reduce losses. In this article, a smart contract-based mechanism was developed, deployed on an Ethereum testnet to manage financial and energy transactions, to ensure transparency and build trust. A decentralized application (Dapp) has also been created to facilitate the management of these transactions. This architecture has been validated by comparative simulations between our market model and the one based on the double auction mechanism. The results show that our system, using energy consumption tokens on the Ethereum Virtual Machine (EVM) of the Sepolia testnet, reduces transaction losses, stabilizes prices, and maintains a high level of satisfaction through transparent and reliable transaction management and consumption tracking.
... They highlight the continued progress in creating regulations and structures to improve efficiency and productivity, and provide guidance for further studies in this area. [6,12]. Viriyasitavat et al.'s study delves into the application of Blockchain technology (BCT) to optimize Business Process Management (BPM) in the context of Industry 4.0, concentrating on digitalization and automating processes while ensuring trust and overseeing digital assets. ...
Conference Paper
Full-text available
This paper explores the integration of the Shared Research Ledger (SRL), a blockchain-based research ledger, with the small-size loan application process to enhance transparency, efficiency, and trust. By leveraging blockchain technology, this solution aims to address key challenges in the lending sector, such as loan stacking, data privacy, and inefficient loan processing. The proposed system employs advanced encryption, zero-knowledge proofs, and smart contracts to ensure secure, real-time data sharing while protecting borrower privacy. This study discusses the implementation framework, benefits , challenges, and potential impacts on the financial ecosystem. Industrial research and development follows the proper research methodologies and applies adequate business process modeling and pattern-based approaches exploiting Service Oriented Computing.
... Ayrıca, bir veri erişim sistemi ve fikir birliğinin sağlanması ile kullanıcıların ağ üzerindeki işlemlerini yönetmesine, izlemesine imkan tanımaktadır. Blok zincir birçok alanda (endüstri, finans, sağlık gibi) yenilikler sunarak, değiştirilemeyen yapısı ile popülerliğini artırmıştır [3]. ...
Article
Bu çalışmada blok zincir üzerine Türkiye’de yazılan lisansüstü tezlerinin bibliyometrik analizi yapılmıştır. Ulusal tez merkezinde bulunan lisansüstü (yüksek lisans - doktora) tezleri taranmıştır. “blokzincir”, “blok zincir” ve “blockchain” terimleri kullanılarak aramalar gerçekleştirilmiştir. Yapılan arama sonucu elde edilen 476 tezin analizi gerçekleştirilmiştir. Tezlere ait veriler danışman, üniversite, tür, yazıldığı yıl, enstitü, ana bilim dalı, yazıldığı konulara ve diline göre analiz edilmişlerdir. Özellikle Fen Bilimleri Enstitülerinde, Bilgisayar Mühendisliği ana bilim dalında yapılan tez çalışmalarının blok zincir yapısı, çalışma sistemi, güvenilirliği, akıllı sözleşmeler ile gerçekleştirilen teknik altyapıları incelediği görülmüştür. Sosyal Bilimler Enstitüsü işletme, hukuk, ekonomi, bankacılık alanlarında blok zincir alt yapısını kullanan kripto paraların da kullanıldığı, farklı alanlara uygulanan blok zincir yapılarının verimliliği, etkinliği, kullanılışlığı, hukuksal etkileri üzerine tezler yazılmıştır. Güvenilirlik, merkezi olamayan yapısı ve hızlı sonuçlar alınabilmesi nedeniyle blok zincir teknolojisi günümüzde daha da yaygınlaşmaya başlamıştır. Blok zincir teknolojisinin insan kaynağı açısından zayıf olması bu tür çalışmaların sayısını azaltmaktadır. Bu çalışmamızda Türkiye’de blok zincir alanında yapılan akademik çalışmalara kaynaklık yapabilecek analizler gerçekleştirmeye çalışıldı.
... Estos nodos se conectan por enlaces llamados cadenas [2]. Se considera un tema de gran interés para la práctica y la investigación científica [3]. ...
Article
Blockchain technology is based on a decentralized blockchain, it has features such as non-corruption, decentralized technology, enhanced security, distributed records, consensus, faster agreements, immutability, fault tolerance andtransparency. It has had different applications and appears as one of the technological trends guiding the research interest of companies and universities. This article investigated a collection of 63 documentary sources such as: research,journal and review articles, books, surveys and conference proceedings. This was done through databases such as Mendeley, Google Scholar, ACM, Scopus and Virtualpro. The search criteria were: 1) Keyword «Blockchain» and, 2)Articles published between the years 2019 and 2023. Where it is assigned as an objective to provide an overview of research and publications on the Blockchain world. It has as a result to generate an overview that allows to determine thegaps both in research and publication, as well as in technological development related to this topic, identifying the sectors with the highest and lowest production of research and publications. DOI: http://dx.doi.org/10.21017/rimci.2024.v11.n21.a154
... As part of its holistic approach, this research incorporates Proof of Work (PoW) based on the Ethereum blockchain, specifically ethash, to ensure the integrity of data blocks based on ethash's MixHash value and the corresponding nonce relative to data block difficulty. By building upon the insights gleaned from existing research, this study aspires to introduce a blockchain smart contract-driven, mobile-based ride-sharing service system characterized by its decentralized architecture, mitigating SPoF risks, and assuring user and driver privacy through blockchain technology [7,8]. To further strengthen data privacy, the blockchain methodology synergizes seamlessly with a spatial cloaking algorithm, effectively shielding user location data against potential breaches and transforming exposed data into cloaked areas, safeguarding the user's original location point. ...
... This paper discusses how emerging Web3 technologies, like distributed ledger technology (DLT) [20], blockchain [21], smart contracts, decentralized storage systems and crypto wallets can be leveraged to design and implement a decentralized digital identity system based on decentralized identifiers (DID) and self-sovereign identities (SSI). Such a system has the potential to provide a smart and innovative solution to the digital identity problem. ...
Article
Full-text available
The increased digitalization of society raises concerns regarding data protection and user privacy, and criticism on how the companies handle user data without being transparent and without providing adequate mechanisms for users to control how their own data is being processed or shared. To address this problem and open the way for a secure and efficient society, where the privacy of citizens is paramount, the identity concept and proof of identity mechanisms need to be redesigned from the ground up. In this paper we discuss how the emerging Web3 technologies like distributed ledger technology (DLT), blockchain, smart contracts, decentralized storage systems, and crypto wallets can be leveraged to design and implement a decentralized digital identity system based on decentralized identifiers (DID) and self-sovereign identities (SSI). Such a system puts the users in full control over their own data while also providing a solid backbone for building interoperable systems that are secure, scalable, and efficient. We propose different architectures for the decentralized identity infrastructure and storage layer, and also discuss the mapping of these architectures on cloud platforms. The main goal is to provide an architectural blueprint for a scalable, secure, privacy-preserving and trusted system.
... Blockchain can be described as a decentralized database containing an organized list of records interconnected using links called chains [24] . Different types of blockchain can be distinguished, such as the public or "permissionless" blockchain, which allows anyone to participate and access data, and the private or "permissioned" blockchain, which requires specific authorization to participate and access data [25] . ...
Article
Full-text available
Supply chain management is crucial to modern commerce, improving operational efficiency, cost reduction, and customer satisfaction. Electronic Data Interchange (EDI) and blockchain are key technologies in this context. While EDI streamlines communication, blockchain ensures transparency. This study aims to address the lack of comprehensive comparisons in the existing literature, focusing on EDI and blockchain. Objectives include analysis of data security, speed, cost, scalability, and efficiency. Case studies reveal nuanced differences and similarities, highlighting the potential benefits of integration. The study conducts a comprehensive analysis of articles from diverse domains, examining the comparison between Electronic Data Interchange (EDI) and blockchain technologies to identify synergies. This research guides technology selection, providing decision-makers with essential information and promoting innovation in supply chain management by understanding the comparative advantages and challenges of EDI and blockchain, as well as their synergies in hybrid applications.
... As a decentralized platform for different components of AI, the Blockchain network can be a powerful tool in this endeavor to reduce dependency on any single party. Thus, Blockchain could help in developing AI applications that are fair, transparent, and built using consensus algorithms for higher trust in the system [44]. ...
Article
Full-text available
Technologies are constantly evolving and finding applications in both business and government organizations for various purposes such as improving operational efficiency, increasing customer satisfaction, and reducing the cost of transactions. Technology adoption is a well-researched phenomenon in the academic world. Based on the current state of e-governance in Saudi cities and the potential of Artificial Intelligence (AI), Internet of Things and Blockchain in e-governance, this research study aims to study factors influencing the adoption intention of AI and Blockchain technologies in citizen services delivery within a smart city in Saudi. This article explores AI, IoT and Blockchain technologies adoption intention in the context of smart cities within a developing country like Saudi. Finally, the study provides a set of practical recommendations for smart city officials while planning to launch service applications using AI and Blockchain technologies. More specifically, the study emphasizes the importance of ethics, data privacy and security, and transparency in building trust between smart city systems.
... In this context, blockchain has three basic components: asymmetric cryptography, transactions, and a consensus mechanism. In marketing, these three components are named as program, protocol, and encryption solutions, and they are used to develop programs, independent organizations, or decentralized independent communities (Gorkhali et al., 2020). ...
Article
Full-text available
Objective: The main purpose of the current research is to designing and presenting a model for building customer trust in the marketing ecosystem based on blockchain technology and based on the identification and introduction of trust-building elements and functions arising from blockchain technology in marketing actions. Methodology: In this study, by adopting a qualitative approach, the researcher seeks to identify the antecedents and consequences of building customer trust in the marketing ecosystem based on blockchain technology. In this regard, the required data were collected based on the opinions of experts in the field of digital marketing and advanced information technology and semi-structured interview tools and were analyzed based on thematic analysis method and the use of MaxQDA software. Findings: The analysis of the collected data in the research resulted in the extraction of 64 main themes with a frequency of 264 codes which after the final categories, these themes provided seven general antecedents and two general consequences of applying blockchain technology in order to build trust among customers of a marketing ecosystem. Conclusion: Therefore, in this context, it is possible to design a mechanism to paying commissions to agents and brokers in case of implementing this technology.
... The significance of Bitcoin has increased as its value has risen (Meiryani et al. 2022). A blockchain, however, is only a network of data nodes linked through connections and operating independently (Gorkhali et al. 2020). It operates on a decentralized, open, and digital ledger with no single repository. ...
Article
Full-text available
The advent of cryptocurrencies and blockchain technology has sparked a revolutionary shift in the financial sector. This study sets out on a wide-ranging investigation to understand the nuanced dynamics, repercussions, and potential future paths of this shifting environment in the UK and USA. The primary goals of the research are to examine how cryptocurrencies affect financial markets and conventional banking systems; to examine how blockchain technology might be used in the financial sector; to assess policy and regulatory considerations; and to predict and plan for the future. This research digs into how cryptocurrencies have revolutionized the banking and finance sectors. Analysis of adoption rates, market volatility, and integration methods sheds light on the changing position of cryptocurrencies in investment portfolios, reconfiguration of asset classes, and coping mechanisms of conventional financial institutions. When looking at the financial sector as a whole, the transformational potential of blockchain technology becomes clear. The advent of DeFi, smart contracts, and asset tokenization offers new prospects to improve financial transactions, increase transparency, and broaden participation in the investment market. The research analyzes cryptocurrencies and blockchain technology from a policy and regulatory perspective. The delicate balancing act between stimulating innovation and guaranteeing consumer protection, market integrity, and financial stability is highlighted by a comparison of the regulatory methods adopted in the United Kingdom and United States, as well as proposals from international organizations. The research identifies potential future paths for these technologies and their implications. Opportunities and challenges that will influence the future of finance emerge, with a focus on central bank digital currencies (CBDCs), sustainable blockchain solutions, and interdisciplinary collaborations. As this deep dive comes to a close, the transformational power of cryptocurrencies and blockchain technology is highlighted. It sheds light on the forces that are altering the structures of the world’s financial markets, conventional banking structures, and regulatory frameworks. The findings and critical assessment stress the need for well-considered choices, ethical innovation, and interdisciplinary cooperation in order to succeed in an ever-changing environment. To further democratize access, improve transparency, and reshape the economic fabric of our planet, the future of finance resides at the confluence of tradition and innovation, where cryptocurrencies and blockchain technology exist.
... A collaborative team could benefit from some intelligence exchange via an elearning system in addition to teaching and learning, Blockchain is frequently employed as one of the newest technologies in distributed environments since it makes it easier to construct complex systems. Because the traditional education system requires both the student and the instructor to be present at the same time, at the exact location, and at the same interval of time that is challenging to manage every time, distributed secure systems in the education field make a significant change in society [1]. Additionally, it is also true that people find less time for the conventional way of studying in today's competitive world with its rising popularity and recently emerging technology. ...
Article
Full-text available
Blockchain technology can be employed in the education sector by building a decentralized system to store and share student records. The records can be encrypted to guarantee their confidentiality and security. With a blockchain-based system, student records can be saved in blocks that are linked and secured via cryptography. The records are decentralized and not controlled by any single entity, making them less susceptible to hacking or tampering. By using blockchain technology, educational institutions can create a more secure and efficient system for storing and sharing student records. This can streamline the process of transferring records between schools, and provide a secure and transparent way for students to access their own records. In this study, we provide a novel Merkle tree-based strategy for preserving the accuracy of student records and outline how to put it into practice. The software architecture resembled blockchain technology and was developed for private network deployment. The key components of our strategy are replacing conventional audit trails with their cryptographically secure equivalent and simplifying the Blockchain framework by avoiding mining. The cryptography system's framework is presented, and the new five dimensions of chaotic map academic records are proposed. Our study utilizes deoxyribonucleic acid (DNA) sequences and operations and the chaotic system to strengthen the cryptosystem in the blockchain authentication and authorization process. The significant advantage of this method is enhancing the generation of the hash function, which is the most critical challenge in the blockchain concept. The experimental outcomes and security analysis demonstrated that the proposed method works well in terms of different aspects. The suggested hash function's hash value distribution, sensitivity to tiny message modifications, confusion and diffusion qualities, resilience against birthday attacks, key-space analysis, collision resistance, efficiency, and flexibility were all considered throughout the study.
... The advantages of integration with Internet of Things (IoT) devices and monitoring systems include the prevention of design flaws [11], problem diagnostics [12], quality prediction [13], and decision-making improvement [14]. A review of smart manufacturing in relation to industrial technology was provided in [15]. This study on the importance of the circular industry covers 31 different research subjects in total. ...
Article
Smart Manufacturing Systems (SMS) have revolutionized industrial processes by incorporating automation, data analytics, and real-time monitoring to improve efficiency and quality. However, ensuring the reliability and fault tolerance of SMS remains a challenge. This paper proposes an innovative approach that combines Blockchain technology with Machine Learning (ML) models to evaluate faults in SMS. By leveraging the immutability and transparency of the blockchain and the predictive capabilities of ML, this approach enhances fault detection, facilitates traceability, and ultimately contributes to the resilience of smart manufacturing. The industrial sector's increase in data creation has made monitoring systems a crucial idea for management and decision-making. The Internet of Things (IoT), which is sensor-based and one of the most advanced and potent technologies today, can process appropriate ways to monitor the manufacturing process. The research's suggested method combines IoT, machine learning (ML), and monitoring of the industrial system. Temperature, humidity, gyroscope, and accelerometer IoT sensors are used to gather environmental data. Sensor data is produced in unstructured, enormous, and real-time data forms. Many big data approaches are used to process the data further. This system's hybrid prediction model employs the Random Forest classification approach to weed out outliers in the sensor data and aid in defect identification throughout the production process. The suggested approach was examined for South Korean vehicle production. This system uses a strategy to protect and strengthen data trust in order to prevent genuine data changes with fictitious data and system interactions. The efficacy of the suggested methodology in comparison to other methods is provided in the results section. Furthermore, compared to other inputs, the hybrid prediction model offers a respectable fault prediction. The suggested technique is anticipated to improve decision-making and decrease errors during the production process.
... Blockchain technology is a distributed ledger, allows untrustworthy nodes to provide trustworthy and irreversible services [4,13]. Since there is no central authority, distributed ledgers were employed to retain an immutable chronological record of all transactions. ...
Article
Full-text available
In recent years, face biometrics recognition systems are a wide space of a computer usage which is mostly employed for security purpose. The main purpose of the face biometrics recognition system is to authenticate a user from a given database. Due to the widespread expansion of the surveillance cameras and facial recognition technology, a robust face recognition system required. The recognition system needs to store a large number of training samples in any storage unit, that time hackers can access and control that data. So, Protecting and managing sensitive data is essential object. This requires a technique that preserve the privacy of individuals, maintain data integrity, and prevent information leakage. The storage of biometric templates on centralized servers has been associated with potential privacy risks. To address this issue, we have developed and implemented a proof-of-concept facial biometric identification system that uses a private Blockchain platform and smart contract technology. So, the proposed approach is presented a secure and tamper-proof from data breaches as well as hacks with data availability, by using the Blockchain platform to store face images. This paper aims to utilize Blockchain technology to identify individuals based on their biometric traits, specifically facial recognition system makes it tamper-proof (immutable) ensuring security. The system consists of enrolment and authentication phases. Blockchain technology uses peer-to-peer communication, cryptography, consensus processes, and smart contracts to ensure the security. The proposed approach was tested on two popular datasets: CelebFaces Attributes (CelebA) and large-scale face UTKFace datasets. The experimental results indicate that the system yields highly performance outcomes, as evidenced by the Equal Error Rate (EER) values of 0.05% and 0.07% obtained for the CelebA and UTKFace datasets, respectively. The system was compared to three baseline methods and scored the lowest Equal Error Rate.
... Due to the high security and time dimension of blockchain [20,21], the data on the chain are extremely tamper-resistant, which ensures the integrity and authenticity of the data. Therefore, blockchain technology is used for authentication of information. ...
Article
Full-text available
Existing biohashing authentication schemes usually store bioinformation in the cloud, whose storage method can face the problems of bioinformation leakage and tampering, and single point of failure. To address the above problems, a ciphertext speech biohashing authentication scheme based on chaotic system and improved public chain is proposed. First, the fusion features are extracted and generated with the inner product of 3D chaotic system to generate the biohashing sequence. Second, the original speech is encrypted and uploaded to the InterPlanetary file system and then, uploaded to the blockchain after the data are encrypted. Finally, the server matches the hash sequence queried on the chain with the to-be-authenticated hash at the user’s end using the Hamming distance. The experimental results show that the biohashing algorithm in this paper has better distinguishability, robustness, security and time efficiency. The key space of the speech encryption algorithm is 2256{2^{256}}, which can well resist the exhaustive attack and ensure the security during speech authentication. In this paper, the combination of on-chain and off-chain storage of speech information can prevent the problem of bioinformation leakage and tampering, as well as avoiding the problem of single point of failure.
... A collaborative team could benefit from some intelligence exchange via an elearning system in addition to teaching and learning, Blockchain is frequently employed as one of the newest technologies in distributed environments since it makes it easier to construct complex systems. Because the traditional education system requires both the student and the instructor to be present at the same time, at the exact location, and at the same interval of time that is challenging to manage every time, distributed secure systems in the education field make a significant change in society [1]. Additionally, it is also true that people find less time for the conventional way of studying in today's competitive world with its rising popularity and recently emerging technology. ...
Article
Full-text available
Blockchain technology can be employed in the education sector by building a decentralized system to store and share student records. The records can be encrypted to guarantee their confidentiality and security. With a blockchain-based system, student records can be saved in blocks that are linked and secured via cryptography. The records are decentralized and not controlled by any single entity, making them less susceptible to hacking or tampering. By using blockchain technology, educational institutions can create a more secure and efficient system for storing and sharing student records. This can streamline the process of transferring records between schools, and provide a secure and transparent way for students to access their own records. In this study, we provide a novel Merkle tree-based strategy for preserving the accuracy of student records and outline how to put it into practice. The software architecture resembled blockchain technology and was developed for private network deployment. The key components of our strategy are replacing conventional audit trails with their cryptographically secure equivalent and simplifying the Blockchain framework by avoiding mining. The cryptography system's framework is presented, and the new five dimensions of chaotic map academic records are proposed. Our study utilizes deoxyribonucleic acid (DNA) sequences and operations and the chaotic system to strengthen the cryptosystem in the blockchain authentication and authorization process. The significant advantage of this method is enhancing the generation of the hash function, which is the most critical challenge in the blockchain concept. The experimental outcomes and security analysis demonstrated that the proposed method works well in terms of different aspects. The suggested hash function's hash value distribution, sensitivity to tiny message modifications, confusion and diffusion qualities, resilience against birthday attacks, key-space analysis, collision resistance, efficiency, and flexibility were all considered throughout the study.
Thesis
Full-text available
In the cryptocurrency market prices are highly volatile due to ongoing market issues such as economic crises, technological changes, and high inflation. This study deep dives into the fascinating world of cryptocurrencies by exploring the behaviour and forecasting future trends of top ten cryptocurrencies including Bitcoin, Ethereum, Tether, BNB, Solana, USDC, XRP, Dogecoin, Ton coin, and Cardano. The descriptive analysis provides the past behaviours analysis of the selected cryptocurrencies, which sheds light on the factors that drive often price volatile such as technological break-throughs, regulatory shifts, and macroeconomic fluctuations. For the predic-tive analysis using time series employs ARIMA and ARMAX models to fore-cast future prices, which provides valuable insights into the behaviour of the cryptocurrency price. Our results suggest that the simpler ARIMA model performed better which focuses purely on historical data and often provides more accurate predictions compared to ARMAX model which incorporates external factors like trading volume and market capitalization. This finding emphasizes the cryptocurrency market's complexity and suggests that both historical behaviour and influencing factors must be considered in order to make better predictions. The study lays the groundwork for such efforts, providing valuable insights and pointing the way forward in the quest to comprehend the ever-changing world of cryptocurrencies. Finally, the analysis contributes to various stakeholders, including investors and policymakers, to offer a detailed analysis of the cryptocurrency market, underlying the factors influencing its dynamics.
Article
The European Union has for several years been a critical export market and a significant source of imports for us, and the US has, in general, kept closed domestic players vis-à-vis the EU. However, given the variety of alternative market conditions and EU forms, the attractiveness of cross-border electronic commerce (CBEC) between China and the EU has fallen far short, and there is an urgency to create a harmonious and uniform environmental environment for the exchange of information to facilitate the convenience of cross border electronic commerce. This study examines the CBEC of agricultural goods and its cooperative management technique inside the logistical supply chain. It details the complete transaction model and fundamental components and presents a theoretical framework for the CBEC distribution network. The Block Chain can effectively bridge the obstacles to CBEC in Chinese and European countries by providing a valuable source of benefits from decentralization, trust, anti-counterfeiting, consensus, innovative procurement, and extraordinary techniques, which will provide the basis for building an Embedded Provider Platform for Electronic Commerce, Risk Management System for Deposit Risk Management, Supply Chain (SC) Management System, Cross Border Logistic System, Customs Supervisory Computer, etc. The paper examines how blockchain science can assemble CBEC SC computing devices for agricultural goods between global places in Central Europe. Firstly, it expounds on the theory and characteristics of the blockchain. Then, the paper introduces the troubles that arise in the CBEC supply chain. Then, the thesis proposes a blockchain-based CBEC SC structure, analyzes the aspects and relations among each other, and provides a framework for developing a China-European blockchain cross-border electronic Commerce. The test findings indicate that the system satisfies the criteria for tracking agricultural items and enhances fresh farm commodities' quality and security.
Conference Paper
The inception of this study was driven by the imperative need for enhanced security mechanisms within the Internet of Things (IoT) framework, particularly in the sensitive domain of healthcare. As the IoT paradigm continues to entrench itself in healthcare, patient data confidentiality and integrity command heightened priority, given the vulnerability of this data to unauthorized access and cyber threats. In response to these challenges, this paper elucidates the design and implementation of an innovative blockchain-based security model that harmonizes a dynamic Bee Swarm Key Generator with the lightweight Speck cipher to fortify the encryption capabilities of IoT devices. Delving into the background, the escalating deployment of IoT in healthcare has exposed critical gaps in data security, thus catalyzing the exploration of blockchain technology as a bulwark against these deficiencies. The interest in the adoption of blockchain in this field is derived from the fact that its decentralization approach is resistant to fail the way the centralized system does. After integrating the robust encryption from the Bee Swarm Key Generator and the efficiency present in the Speck Cipher, the model is designed to guarantee the confidentiality and integrity of healthcare data against other outrageous cyber-attacks. The methodological frame comprises an extensive security analysis, an operating analysis, and on-field plotting. A thorough security analysis consisting of NIST randomness tests and cyber-attack attempts is used to verify the reliability of the author’s encryption framework. The author further supports the use of the model through its integration with the Firebase platform for the immediate transactional activity of data concerning healthcare. The outcome of this empirical analysis demonstrates the strength of the described blockchain network, mainly when resistance to cyber-attacks is enhanced with the length of the network. The NIST randomness tests prove the workability of the character security framework and use one financed cyber-attack to support the concept of blockchain attack and counterattack. The conclusion adequately quantifies the immense improvement in healthcare’s security components and is exemplary of an applicable secure real-time patient data warehousing system. Therefore, this kind of research is quite beneficial for future studies. The comprehensive nature of the research contributes a substantial foundation upon which scalable and secure IoT systems can be developed, steering the healthcare industry toward a more resilient digital future.
Article
Blockchain technology has been growing at a substantial growth rate over the last decade. Blockchain, originally developed to support the cryptocurrency ecosystem, has recently been used in various other fields to achieve extraordinary levels of security. Blockchain technology has applications beyond cryptocurrencies, including risk management, healthcare facilities, financial and social services, and more. Blockchain has been used in the healthcare industry for several purposes including secure data logging, transactions, and maintenance using smartcontracts. The healthcare sector integrating blockchain into various aspects of this digital age. Its features such as micro-transactions, decentralized exchanges, consensus mechanisms, and smart contracts allow for securing the privacy of the health data of patients who are key stakeholders in the healthcare domain. The User Interface (UI) of the HealthChain system highlights the development of blockchain peers with background data on blockchain network construction. By digitally linking patients, payers, and providers over an open network, Health Chain is building a data- driven healthcare community. The modular Hyperledger fabric architecture, which promotes secrecy, scalability and security in health informatics, is a major asset of HealthChain which is powered by Blockchain. The smartcontracts guarantees that the right people are authorised and given the rights on its network of permissions. This review's primary goal is to offer an extensive look and assessment of blockchain technology. The intention is to provide readers with a comprehensive understanding of blockchain technology, its present status, and its possible effects on a range of industries, including supply chain management, healthcare, banking, and more.
Chapter
Blockchain technology, on the other hand, provides a secure and transparent way to record and verify transactions, making it an ideal solution for the tourism and hospitality industry. By using blockchain technology, businesses can streamline their payment processes, reduce fraud and identity theft, and improve data security. Additionally, this chapter will be focusing upon how blockchain technology can enable businesses to create decentralized and secure marketplaces for booking accommodations, flights, and other travel services, eliminating the need for intermediaries and reducing costs for both businesses and customers.
Chapter
This study aims to get an insight into the intellectual structure, current research themes, and future research directions on digital currency, cryptocurrency, and blockchain. Bibliometric analysis coupled with performance analysis and cluster analysis has been conducted on the digital currency articles, published between the years 2011 and 2023, filtered using PRISMA protocol, and extracted from the Web of Science and Scopus databases. Network analysis was carried out in the Biblioshiny package of R software and VOSviewer. The study highlights that the research of digital currency is classified into four broad categories: ‘emerging technology', ‘cryptocurrencies portfolios', ‘cryptocurrencies as a medium of exchange and an asset class', and ‘cryptocurrencies and financial risk'. The chapter presents an innovative model focusing on productive avenues for future research by synthesizing the latest research articles extracted from the databases, related to digital currency through bibliometric analysis.
Article
To date, minimal literature is based on a systems perspective to examine the ecosystems of the industrial chain and supply chain. To fill the gap, this study has employed a systems perspective in analysing issues related to the industrial chain–supply chain ecology. The term ‘industrial chain–supply chain’ emerged recently to reflect the current global manufacturing industry structure and a prevalent global supply chain. This study clarifies the concepts of industrial chain ecosystem and supply chain ecosystem, highlighting their similarities and distinctions. Additionally, the study outlines the process of value creation within the industrial chain–supply chain ecosystem, involving innovation in research, technology, products, systems and management, leading to technological breakthroughs and enhancements. A three‐stage model for the industrial chain–supply chain ecosystem is proposed, comprising the blueprint creation stage, the core technology breakthrough stage and the iterative ecosystem upgrade stage.
Article
Full-text available
The growing realm of blockchain technology has captivated researchers and practitioners alike with its promise of decentralized, secure, and transparent transactions. This paper presents a comprehensive survey and analysis of various blockchain technologies, focusing on their fundamental properties, architectural designs, operational models, evolutionary trends, and overarching frameworks. Through an extensive review of existing literature and empirical studies, this research synthesizes the multifaceted landscape of blockchain, elucidating key concepts such as consensus mechanisms, smart contracts, scalability, interoperability, and privacy protocols. By examining the evolution of blockchain from its inception to its current state and beyond, this paper delineates the trajectory of technological advancements and identifies emerging paradigms. Furthermore, it critically evaluates the strengths and limitations of diverse blockchain architectures and models, offering insights into their applicability across different domains and use cases. Finally, this study culminates in the proposal of a comprehensive framework that encapsulates the essential elements necessary for understanding, implementing, and harnessing the transformative potential of blockchain technologies. Through this holistic analysis, this research contributes to a deeper understanding of blockchain ecosystems and provides valuable guidance for future research directions and practical implementations.
Chapter
The purpose of this chapter is to demystify blockchain technology and present potential use cases to ignite the potential blockchain brings. This chapter brings together thought leaders from both academia and industry to ensure a more holistic perspective on blockchain, both pros and cons. Primarily riding on the potential of the smart contract, this chapter expounds on the potential innovation that can be derived from blockchain. Simultaneously, this chapter expands on potential ideas that would bring value to mankind. It discusses how blockchain can be used to do social good and to rebuild trust between citizens, government, and more importantly, politicians. This could be achieved by rebuilding thrust through transparency and efficiency. While it is not without any drawback, suggested areas of future research were also proposed at the end of this chapter. This chapter also proposed a possible digital framework to be considered.
Article
Full-text available
Addressing the scalability issues, excessive communication overhead, and challenges in adapting to large‐scale network node environments faced by the Practical Byzantine Fault Tolerance (PBFT) consensus algorithm currently employed in consortium blockchains, this paper proposes a Double Layer Consensus Algorithm Based on RAFT and PBFT Consensus Algorithms (DLCA_R_P). The nodes in the blockchain are initially divided into several groups to form the lower‐layer consensus network. Subsequently, the leaders of these groups constitute the upper‐layer consensus network, creating a dual‐layer consensus network structure. Within the lower‐layer consensus network, the PBFT consensus algorithm is employed for consensus among the groups, while the primary accountants form the upper‐layer RAFT consensus network. The algorithm incorporates a supervision mechanism and a reputation mechanism to enhance the security of the consensus network. Additionally, a grouping mechanism is introduced to transform the consensus network into a dynamic structure. Experimental results analysis demonstrates that compared to traditional PBFT consensus algorithms, DLCA_R_P reduces consensus latency by two orders of magnitude and improves throughput by one order of magnitude in a scenario with 100 nodes. Furthermore, it exhibits significant advantages over other improved algorithms. Thus, the DLCA_R_P consensus algorithm exhibits excellent scalability and can be widely applied in various scenarios within consortium blockchains.
Article
Full-text available
In recent years, blockchain technology has drawn a lot of attention, especially in the field of decentralised finance (De-Fi). However, scalability problems have come to light as a significant obstacle to the broad use of blockchain-based applications. To solve the issue of scalability, this paper has created a decentralised finance application with three main components: the addition of more liquidity to the swapping application, the implementation of a Polygon Proof of Stake bridge to enable efficient asset transfers, and the ability to transfer tokens between accounts seamlessly regardless of network agnosticism. The first feature, network agnostic capabilities for interoperability, facilitates token transfers between blockchain networks, allowing users to access and transact across them with ease The second component, the Polygon Proof-of-Stake bridge, makes asset transfers more efficient by taking advantage of the Polygon network's scalability advantages, which drastically lower transaction costs and processing times. Finally, adding more liquidity to the swapping programme makes it more scalable by guaranteeing that there is enough money for transactions, which prevents delays and bottlenecks. The scalability issue with blockchain technology is efficiently resolved by adding these three characteristics to the decentralised finance application, creating new opportunities for the mass acceptance and utilisation of blockchain-based financial services.
Article
Full-text available
In recent years, blockchain technology has drawn a lot of attention, especially in the field of decentralised finance (De-Fi). However, scalability problems have come to light as a significant obstacle to the broad use of blockchain-based applications. To solve the issue of scalability, this paper has created a decentralised finance application with three main components: the addition of more liquidity to the swapping application, the implementation of a Polygon Proof of Stake bridge to enable efficient asset transfers, and the ability to transfer tokens between accounts seamlessly regardless of network agnosticism. The first feature, network agnostic capabilities for interoperability, facilitates token transfers between blockchain networks, allowing users to access and transact across them with ease The second component, the Polygon Proof-of-Stake bridge, makes asset transfers more efficient by taking advantage of the Polygon network's scalability advantages, which drastically lower transaction costs and processing times. Finally, adding more liquidity to the swapping programme makes it more scalable by guaranteeing that there is enough money for transactions, which prevents delays and bottlenecks. The scalability issue with blockchain technology is efficiently resolved by adding these three characteristics to the decentralised finance application, creating new opportunities for the mass acceptance and utilisation of blockchain-based financial services.
Chapter
This volume reviews cutting-edge innovations in blockchain technology that are propelling the healthcare industry into a new era of efficiency and security. It brings 14 reviews contributed by experts in blockchain and Web3 technologies into a single volume. Each contribution includes a summary for easy understanding and scientific references for advanced readers. Key Themes: Empowering Decentralized Healthcare: Learn about the future of decentralized healthcare, powered by blockchain, ensuring a seamless and patient-centric experience. Clinical Trials: Discover how blockchain is reshaping clinical trials, offering a glimpse into a future of optimized medical research. Data Security: Uncover the strategic use of blockchain in securing vital clinical trials data, ensuring confidentiality and integrity at every step. Blockchain-based Healthcare delivery: Delve into a comprehensive review of blockchain technology in the health sector, revealing its potential to transform healthcare systems with efficient and precise solutions. Predict, Prevent, and Protect: Understand how blockchain technology serves as a predictive tool, aiding in the prevention and control of the spread of COVID-19. This volume is a must-read for healthcare practitioners and administrators seeking to harness the power of blockchain in medicine and healthcare. It also provides information for researchers and business professionals who want to understand the innovative role of blockchain technology in the healthcare sector.
Article
Entering a new era of green investing powered by advanced automation not only offers higher transparency but also paves the way for an innovative financial product for retail investors. Green bonds are a type of bonds that are used to finance environmentally sustainable projects. Accordingly, the entities issuing a green bond commit themselves to utilizing the raised funds for financing projects that bring about positive environmental outcomes, such as initiatives in renewable energy or sustainable infrastructure. Blockchain technologies have the potential to sustain green bonds by increasing transparency and accountability in the issuance and use of the funds raised from green bonds. In this paper, we investigate the effects of blockchain technologies in sustaining green bonds exchange on investors' behaviors. By leveraging on a sample of 551 international participants, results revealed the mediator role of investors' environmental concern, and the moderator role of their innovativeness. Specifically, statistical analysis revealed that their attitude toward green bonds proposed on the basis of blockchain technologies increase positively investors' willingness to buy through the effects of their environmental concern. Moreover, this effect is stronger among those investors characterized by higher level of innovativeness tendency.
Conference Paper
Full-text available
The development of smart manufacturing systems is being driven by a variety of diverse needs for the dependability of equipment and the prediction of quality. In order to accomplish this objective through the use of machine learning, a wide range of approaches are being investigated. The management and protection of one’s company’s data presents yet another challenging aspect of doing business. In order to cope with fraudulent datasets, machine learning and internet of things technologies were utilised. These technologies were used to protect system transactions and manage a dataset. Because of this, we were able to find solutions to the problems that we had previously discussed. The gathered information was organised and examined with the help of big data techniques. The Internet of Things system was constructed using the Hyperledger Fabric platform, which is a private computer network. In addition, a hybrid prediction strategy was utilised for the defect diagnostic as well as the defect forecasting. The latest machine learning techniques were utilised in order to model the complexity of the environment and estimate the genuine positive ratio of the quality control system. The quality control of the system was evaluated using these pieces of data.
Chapter
Cloud computing revolutionized business data management yet introduced security risks. This chapter assesses blockchain's impact on cloud security, highlighting the pros and cons. It introduces blockchain's role in addressing cloud security concerns via decentralization and transparency. The chapter examines how blockchain bolsters cloud security, enhancing data integrity, privacy, and encryption. Despite benefits, deployment challenges are recognized. The chapter explores blockchain's integration with AI/ML and real-world cases, equipping readers to navigate complexities. This empowers secure and resilient cloud computing. Thus, the chapter equips readers with the necessary information to navigate the complexities of deploying blockchain-based cloud security solutions, leading to a future of secure and resilient cloud computing.
Article
Full-text available
Blockchain technology is a prominent technological innovation and firms increasingly engage in the initiatives. But blockchain technology is still in its early stage and a thorough understanding of its financial values remains elusive. By employing a large sample of public firms listed in China market, this study aims to estimate the impact of blockchain initiatives on firm default risk. Using an instrumental variable and Heckman two-stage, these results reveal a strong and negative association between blockchain initiatives and firm default risk by model. The authors further empirically demonstrate three underlying economic mechanisms. Specifically, they find that blockchain technology has the potential to enhance trust between firms and stakeholders in the supply chain, optimize business processes, and improve the information disclosure quality, which are beneficial to lower corporate financing cost or improve operation performance.
Article
Full-text available
This study looks into the current, and potential uses of Blockchain technology in business, specifically in Accounting and in cybersecurity. We relate Blockchain uses to current concerns within cybersecurity and accounting. We review the literature that includes topics such as Big Data in Accounting, blockchain’s use in financial security and cybersecurity, and its use in financial accounting though the use of ledger technology and also as a system of tracking financial misconduct. We also review the Department of Homeland Security plan for cybersecurity over the next few years to understand what the US Government plans because of the importance of cybersecurity development. We show that Blockchain impacts auditing in different ways that will change the profession drastically. We also find that blockchain should be effectively implemented into different aspects of cybersecurity, and accounting, such as Auditing and general accounting procedures. Keywords: blockchain, business, cybersecurity, accounting, big data, Department of Homeland Security
Article
Full-text available
The dawn of the 21st century has seen the advent of many technologies targeting commercial and financial sectors. These include Big Data, Internet of Things and FinTechs such as blockchain. Blockchain is a type of a distributed database that is used to replicate, share, and synchronise data spread across different geographical locations such as multiple sites, countries, or organisations. The main property of blockchain is that there is no central administrator or centralised data storage mechanism. Consensus algorithms govern the peer-to-peer decentralised network. Numerous benefits and applications of blockchains have resulted in it becoming popular among a broad spectrum of businesses, but is it the case in the construction industry? Given, the backward nature of the construction industry in digitalisation and its reticence to change, it becomes important to analyse the potential impact of Blockchains as a potential disruptive technology. Although there exists a significant research gap and the potential possibility to test blockchain in the construction sector, the construction industry is historically reported as the second lowest sector to have adopted information technology. This leads to a conundrum whether blockchain is a pure technological hype or whether there is a real potential application in construction. The paper is aimed at critically analysing the application potential of blockchains in construction through a use case analysis and comprehensive literature review to resolve whether it is pure hype or real. The exploration revealed that due to the exponential uses of blockchain, investments involved, and a number of start-up businesses contributing to Industry 4.0, blockchain indeed has a credible potential in the construction industry.
Article
Full-text available
Internet of Things (IoT) is able to integrate the computation and physical processes as services in the social world. The number of services at the edge of IoT is rising rapidly due to the prevalent uses of smart devices and cyber-physical systems (CPSs). To explore the promising applications of IoT services, one of the challenges is to enable the interoperability of the services in a decentralized environment. The blockchain technology (BCT) has been proven as a promising solution to establish the trust of data and call for executions; theoretically, it can be used to support the interoperability of services. BCT verifies data or a process and stores it as a transaction in a distributed ledger. Similar to the topology to IoT, applying BCT at the edges of the network exhibits the distributed characteristic. However, currently, BCT is still facing the challenges for interoperability due to a number of factors such as consensus protocols, block sizes, and interval of blocks. Prominent protocols such as proof-of-work (PoW) may cause excessive delays in finality settlement. One promising protocol Practical Byzantine Fault Tolerant offers a fast finality settlement and uses hyperledger to support the scalability; however, the trust might also be a concern if the validators are chosen improperly. This paper discusses the interoperability of IoT services and the challenges and proposes an architecture solution by integrating BCT, service-oriented architecture (SoA), and enablers of key performance indicators (KPIs) and service selections. The proposed architecture aims to solve both interoperability and trust issues for IoT services. The feasibility of the proposed method is validated by the examples of smart contract implementations.
Article
Full-text available
In this paper, we propose a novel blockchain-based contractual routing (BCR) protocol for a network of untrusted IoT devices. In contrast to conventional secure routing protocols in which a central authority (CA) is required to facilitate the identification and authentication of each device, the BCR protocol operates in a distributed manner with no CA. The BCR protocol utilizes smart contracts to discover a route to a destination or data gateway within heterogeneous IoT networks. Any intermediary device can guarantee a route from a source IoT device to a destination device or gateway. We compare the performance of BCR with that of the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in a network of 14 devices. The results show that the routing overhead of the BCR protocol is 5 times lower compared to AODV at the cost of a slightly lower packet delivery ratio. BCR is fairly resistant to both Blackhole and Greyhole attacks. The results show that the BCR protocol enables distributed routing in heterogeneous IoT networks.
Article
Full-text available
The state parameters of electrical equipment and power system control parameters are the key data to realize the precise control and cooperative autonomy of a cyber physical power system. The trustworthiness of the data is the primary condition to guarantee the electric power system’s safe and reliable operation. In the traditional centralized data acquisition and management architecture, the security and trustworthiness completely depend on the central main server. A small mistake in the main server will result in data loss, which is irreversible and fatal. Blockchain technique combines the dispersed data with mutual backup and retrieval mechanism, which guarantees that the data cannot be tampered with and forged privately. Based on the blockchain technology, this article proposes a novel data trustworthy acquisition model with high credibility, applied to a self-organized cyber physical power system. In order to overcome the long time-consuming process of building traditional blockchains, a new on-demand data transmission routing algorithm with M/M/1/k queuing model is proposed in this article. Different scales of IEEE standard bus systems are employed as experimental examples to evaluate the algorithm’s performance. The results show that the proposed algorithm can effectively shorten the time consumption of blockchain construction and realize the data trustworthiness of cyber physical power system.
Article
Full-text available
AI and blockchain are among the most disruptive technologies and will fundamentally reshape how we live, work, and interact. The authors summarize existing efforts and discuss the promising future of their integration, seeking to answer the question: What can smart, decentralized, and secure systems do for our society?
Article
Full-text available
Blockchain technology has attracted tremendous attention in both academia and capital market. However, overwhelming speculations on thousands of available cryptocurrencies and numerous initial coin offering (ICO) scams have also brought notorious debates on this emerging technology. This paper traces the development of blockchain systems to reveal the importance of decentralized applications (dApps) and the future value of blockchain.We survey the state-of-the-art dApps and discuss the direction of blockchain development to fulfill the desirable characteristics of dApps. The readers will gain an overview of dApp research and get familiar with recent developments in the blockchain.
Article
Full-text available
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users’ storage and computation overhead, but also preserve the image privacy. However, the existing schemes still suffer from deficiencies induced by security, applications, efficiency and storage. To solve the problems, we implement a consortium chain-based outsourcing feature extraction scheme over encrypted images by using the smart contract, DAC (Distributed Autonomous Corporation), sharding technique and D2D (Device to Device) communication, which is secure, widely applied, highly efficient and has less storage overhead. First, the effectiveness, security and performance of our scheme are analyzed. Then, the efficiency and storage overhead of our scheme are presented by conducting experimental results. OAPA
Article
Full-text available
In this paper, the blockchain technology is utilized to build the first incentive mechanism of nodes as per data storage for wireless sensor networks (WSNs). In our system, the nodes storing the data are rewarded with digital money. The more the data stored by the node, the more the reward it achieves. Moreover, two blockchains are constructed. One is utilized to store data of each node and another is to control the access of data. In addition, our proposal adopts the provable data possession to replace the proof of work (PoW) in original bitcoins to carry out the mining and storage of new data blocks, which greatly reduces the computing power comparing to the PoW mechanism. Furthermore, the preserving hash functions are used to compare the stored data and the new data block. The new data can be stored in the node which is closest to the existing data, and only the different subblocks are stored. Thus, it can greatly save the storage space of network nodes.
Article
Full-text available
With the widespread of E-commerce, the need of a trusted system to ensure the delivery of traded items is crucial. Current Proof of Delivery (PoD) systems lack transparency, traceability and credibility. These systems are mostly centralized and rely on trusted third parties (TTPs) to complete the delivery between sellers and buyers. TTPs can be costly, a single point of failure, and subject to hacking, privacy evasion and compromise. Blockchain is an immutable, trusted, decentralized ledger with logs and events that can be used for transparency, traceability, and tracking. In this paper, we present a solution and a general framework using the popular permissionless Ethereum blockchain to create a trusted, decentralized PoD system that ensures accountability, auditability, and integrity. The solution uses Ethereum smart contracts to prove the delivery of a shipped item between a seller and a buyer irrespective of the number of intermediate transporters needed. In our proposed solution, all participating entities are incentivized to act honestly by using a double deposit collateral. Automated payment in Ether is an integral part of solution to ensure that every entity gets its intended share of Ether upon successful delivery. An arbitration mechanism is also incorporated if dispute arises during the shipping process. In the paper, we show how we implemented, verified and tested the proper functionality of our PoD solution. We also provide security analysis and give estimates of the cost consumption in Ether gas.We made the full code of the Ethereum smart contracts publicly available at Github.
Article
Full-text available
The public key infrastructure (PKI) based authentication protocol provides basic security services for the vehicular ad-hoc networks (VANETs). However, trust and privacy are still open issues due to the unique characteristics of VANETs. It is crucial to prevent internal vehicles from broadcasting forged messages while simultaneously preserving the privacy of vehicles against the tracking attacks. In this paper, we propose a blockchain-based anonymous reputation system (BARS) to establish a privacy-preserving trust model for VANETs. The certificate and revocation transparency is implemented efficiently with the proofs of presence and absence based on the extended blockchain technology. Public keys are used as pseudonyms in communications without any information about real identities for conditional anonymity. In order to prevent the distribution of forged messages, a reputation evaluation algorithm is presented relying on both direct historical interactions and indirect opinions about vehicles. A set of experiments is conducted to evaluate BARS in terms of security, validity, and performance and the results show that BARS is able to establish a trust model with transparency, conditional anonymity, efficiency, and robustness for VANETs.
Article
Full-text available
Privacy, facilitated by a confluence of cryptography and decentralization, is one of the primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy promise has proven illusory, and despite growing interest in privacy-centric blockchains, most blockchain users remain susceptible to privacy attacks that exploit network-layer information and access patterns that leak as users interact with blockchains. Understanding if and how blockchain-based applications can provide strong privacy guarantees is a matter of increasing urgency. Many researchers advocate using anonymous communications networks, such as Tor, to ensure access privacy. We challenge this approach, showing the need for mechanisms through which non-anonymous users can (i) publish transactions that cannot be linked to their network addresses or to their other transactions, and (ii) fetch details of specific transactions without revealing which transactions they seek. We hope this article inspires blockchain researchers to think beyond Tor and tackle these important access privacy problems head-on.
Article
Full-text available
VM measurements data in IaaS cloud play a crucial role in integrity evaluation and decision making. Hence the secure storage for these data has attracted more attentions recently. This work proposes a novel approach, named Mchain, to enhance the integrity and controllability of the secure storage. Specially, to enhance the integrity, a two-layer blockchain network is introduced. In the first layer, after the production, the data packages are firstly verified by leveraging a correspondence between a package and a policy, and a one-to-one relation among a VM, a user and a node. After that, we propose a consensus achievement algorithm to construct a semi-finished block on a candidate block arranged by data packages. Meanwhile the semi-finished block is distributed to all nodes, which can provide a certain integrity. In the second-layer, tamper-resistant metadata are generated by performing PoW tasks on the semi-finished block, resulting in strong integrity. Further, to enhance the controllability, a revisable user-defined policy based encryption method with KP-ABE is proposed. It helps to flexibly control the scope of authorized verifiers. The experimental results on six scenarios with simulated dataset show that the proposed approach is appealing in integrity and controllability, as well as the time overhead of data storage. OAPA
Article
Full-text available
Blockchain technology has attracted a great deal of attentions as an effective way to innovate business processes. It has to be integrated with other Business Process Management system (BPM) components to implement specified functionalities related to the applications. The current efforts in integrating this technology into BPM are at a very early stage. To apply Blockchain into business processes efficiently, Blockchain and business process characteristics must be identified. Inconsistency of confirmation settlement that heavily relies on the implementation of consensus protocol poses a major challenge in business process operations, especially ones that are time-critical. In addition, validators, nodes responsible for performing consensus operations in a Blockchain system, can introduce bias and as a result are not trustable. This paper first defines Blockchain and also investigates the characteristics of Blockchain and business processes. Then, we suggest an architecture of business processes in Blockchain era to overcome the problems of time inconsistency and consensus bias. The architecture provides persistency, validity, auditability, and disintermediary that Blockchain offers. The architecture also provides flexibility by allowing business partner to select nodes in performing consensus; thus bias is mitigated.
Article
Full-text available
Due to the increasing total value of the digital currency, the security of encryption wallet is becoming more and more important. The hardware-based wallet is safe, but it is inconvenient because users need to carry an additional physical device; the software-based wallet is convenient, but the safety cannot be guaranteed. All these wallets need to synchronize the blockchain, while most current mobile devices do not have the capability to store all blocks. To solve these problems, mobile devices can use Simplified Payment Verification (SPV). Nevertheless, in existing methods, there is no good way to protect the verification process of the transaction. In this paper, we design a Secure Blockchain Lightweight Wallet based on Trustzone (SBLWT) to protect SPV. It is more portable compared with the hardware wallet, and safer than the software wallet. Through the isolation, it can also protect the private key and the wallet’s address from being stolen by the attackers no matter whether the Rich OS is malicious or not. Meanwhile, it can protect the verification process by verifying transactions in the Secure Execution Environment (SEE), and keep the local block headers unreadable directly from the Rich OS through encryption. We deploy it on the RASPBERRY PI 3 MODEL B development board. The result of the experiment shows that it has little impact on the system.
Article
Full-text available
Blockchain-enabled e-voting (BEV) could reduce voter fraud and increase voter access. Eligible voters cast a ballot anonymously using a computer or smartphone. BEV uses an encrypted key and tamper-proof personal IDs. This article highlights some BEV implementations and the approach’s potential benefits and challenges.
Article
Full-text available
Legal Services industries are entering a period of major disruption caused by new legal technologies (LawTech), such as artificial intelligence (AI), Internet of Things (IoT) and Blockchain. An area already undergoing major innovation is alternative dispute resolution (Alternative Dispute Resolution (2017) Wikipedia, https://en.wikipedia.org/wiki/Alternative_dispute_resolution), especially automated online dispute resolution (Online Dispute Resolution (2017) Wikipedia, https://en.wikipedia.org/wiki/Online_dispute_resolution; Katsh, E. and Rifkin, J. (2001) Online Dispute Resolution: Resolving Conflicts in Cyberspace. Jossey-Bass Wiley, New Jersey). In terms of LawTech, we broadly divide online dispute resolution into (a) Consumer ODR—uses technology to facilitate the resolution of disputes between ecommerce parties, typically online suppliers and consumers; (b) Judicial ODR—covers any means of settling ‘ordinary’ disputes where there is a hearing (using technology) but outside of the courtroom, such as divorce or personal injury cases; and what we refer to as (c) Corporate ODR—the use of technology to manage the resolution of any contractual disputes that may emerge from major multi-partner projects or financial transactions. This paper focuses on ODR and specifically the future use of automating anticipatory Corporate dispute resolution using AI and blockchain technologies. The paper describes the legal sector, and how it is being radically transformed by computer science.
Article
Full-text available
In 2008, the emergence of the blockchain as the foundation of the first-ever decentralized cryptocurrency not only revolutionized the financial industry but proved a boon for peer-to-peer (P2P) information exchange in the most secure, efficient, and transparent manner. The blockchain is a public ledger that works like a log by keeping a record of all transactions in chronological order, secured by an appropriate consensus mechanism and providing an immutable record. Its exceptional characteristics include immutability, irreversibility, decentralization, persistence, and anonymity.
Article
Full-text available
There is no doubt that Internet of Things (IoT) occupy a very important role in our daily lives. Indeed, numerous objects that we use every time, are being equipped with electronic devices and protocol suites in order to make them interconnected and connected to the Internet. In IoT, things process and exchange data without human intervention. Therefore, because of this full autonomy, these entities need to recognize and authenticate each other as well as to ensure the integrity of their exchanged data. Otherwise, they will be the target of malicious users and malicious use. Due to the size and other features of IoT, it is almost impossible to create an efficient centralized authentication system. To remedy this limit, in this paper, we propose an original decentralized system called bubbles of trust, which ensures a robust identification and authentication of devices. Furthermore, it protects the data integrity and availability. To achieve such a goal, our approach relies on the security advantages provided by blockchains, and serves to create secure virtual zones (bubbles) where things can identify and trust each other. We also provided a real implementation1 of our mechanism using the C++ language and Ethereum blockchain. The obtained results prove its ability to satisfy IoT security requirements, its efficiency, and its low cost
Article
Full-text available
In traditional cloud storage systems, attribute-based encryption (ABE) is regarded as an important technology for solving the problem of data privacy and fine-grained access control. However, in all ABE schemes, the private key generator (PKG) has the ability to decrypt all data stored in the cloud server, which may bring serious problems such as key abuse and privacy data leakage. Meanwhile, the traditional cloud storage model runs in a centralized storage manner, so single point of failure may lead to the collapse of system. With the development of blockchain technology, decentralized storage mode have entered the public view. The decentralized storage approach can solve the problem of single point of failure in traditional cloud storage systems and enjoy a number of advantages over centralized storage, such as low price and high throughput. In this paper, we study the data storage and sharing scheme for decentralized storage systems, and propose a framework that combines the decentralized storage system IPFS, the Ethereum blockchain and attribute-based encryption (ABE) technology. In this framework, the data owner has the ability to distribute secret key for data users, and encrypt shared data by specifying access policy, and the scheme achieves fine-grained access control over data. At the same time, based on smart contract on the Ethereum blockchain, the keyword search function on the ciphertext of the decentralized storage systems is implemented, which solves the problem that the cloud server may not return all of the results searched or return wrong results in the traditional cloud storage systems. Finally, we simulated the scheme in the linux system and the Ethereum official test network Rinkeby, and the experimental results show that our scheme is feasible. OAPA
Article
Full-text available
With the fast development of mobile Internet, Internet of Things (IoT) has been found in many important applications recently. However, it still faces many challenges in security and privacy. Blockchain (BC) technology, which underpins the cryptocurrency Bitcoin, has played an important role in the development of decentralized and data intensive applications running on millions of devices. In this paper, to establish the relationship between IoT and BC for device credibility verification, we propose a framework with layers, intersect, and self-organization Blockchain Structures (BCS). In this new framework, each BCS is organized by Blockchain technology. We describe the credibility verification method and show how it provide the verification. The efficiency and security analysis are also given in this paper, including its response time, storage efficiency, and verification. The conducted experiments have been shown to demonstrate the validity of the proposed method in satisfying the credible requirement achieved by Blockchain technology and certain advantages in storage space and response time.
Article
Full-text available
Currently, Internet of Things (IoT) and blockchain technologies are experiencing exponential growth in academia and industry. Generally, IoT is a centralized system whose security and performance mainly rely on centralized servers. Therefore, users have to trust the centralized servers; in addition, it is difficult to coordinate external computing resources to improve the performance of IoT. Fortunately, the blockchain may provide this decentralization, high credibility and high security. Consequently, blockchain-based IoT may become a reasonable choice for the design of a decentralized IoT system. In this paper, we propose a novel blockchain-based threshold IoT service system: BeeKeeper. In the BeeKeeper system, servers can process a user’s data by performing homomorphic computations on the data without learning anything from them. Furthermore, any node can become a leader’s server if the node and the leader desire so. In this way, BeeKeeper’s performance can continually increase by attracting external computing resources to join in it. Moreover, malicious nodes can be scrutinized. In addition, BeeKeeper is fault tolerant since a user’s BeeKeeper protocol may work smoothly as long as a threshold number of its servers are active and honest. Finally, we deploy BeeKeeper on the Ethereum blockchain and give the corresponding performance evaluation. In our experiments, servers can generate their response with about 107 ms. Moreover, the performance of BeeKeeper mainly depends on the blockchain platform. For instance, the response time is about 22.5 s since the block interval of Ethereum blockchain is about 15 s. In fact, if we use some other blockchain with short block interval, the response time may be obviously short.
Article
Full-text available
As an attractive business model of cloud computing, outsourcing services usually involve online payment and security issues. The mutual distrust between users and outsourcing service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing payment solutions only consider a specific type of outsourcing service and rely on a trusted third-party to realize fairness. In this paper, in order to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing. We first present the system architecture, specifications and adversary model of BCPay, then describe in detail its design. Our security analysis indicates that BCPay achieves Soundness and what we call Robust Fairness, where the fairness is resilient to eavesdropping and malleability attacks. Furthermore, our performance evaluation shows that BCPay is very efficient in terms of the number of transactions and computation cost. As illustrative applications of BCPay, we further construct a blockchain-based provable data possession scheme in cloud computing and a blockchain-based outsourcing computation protocol in fog computing.
Article
Full-text available
As a very attractive computing paradigm, cloud computing makes it possible for resourceconstrained users to enjoy cost-effective and flexible resources of diversity. Considering the untrustworthiness of cloud servers and the data privacy of users, it is necessary to encrypt the data before outsourcing it to the cloud. However, the form of encrypted storage also poses a series of problems, such as: How can users search over the outsourced data? How to realize user-side verifiability of search results to resist malicious cloud servers? How to enable server-side verifiability of outsourced data to check malicious data owners? How to achieve payment fairness between the user and the cloud without introducing any third party? Towards addressing these challenging issues, in this paper, we introduce TKSE, a Trustworthy Keyword Search scheme over Encrypted data without any third party, trusted or not. In TKSE, the encrypted data index based on digital signature allows a user to search over the outsourced encrypted data and check whether the search result returned by the cloud fulfills the pre-specified search requirements. In particular, for the first time, TKSE realizes server-side verifiability which protects honest cloud servers from being framed by malicious data owners in the data storage phase. Furthermore, blockchain technologies and hash functions are used to enable payment fairness of search fees without introducing any third party even if the user or the cloud is malicious. Our security analysis and performance evaluation indicate that TKSE is secure and efficient and it is suitable for cloud computing.
Article
Full-text available
Blockchain can potentially be deployed in a wide range of applications due to its capability to ensure decentralisation, transparency and immutability. In this paper, we design a cryptographic membership authentication scheme (i.e. authenticating graph data) to support blockchain-based identity management systems (BIMS). Such a system is designed to bind a digital identity object to its real-world entity. Specifically, we introduce a new Transitively Closed Undirected Graph Authentication (TCUGA) scheme, which only needs to use node signatures (e.g. certificates for identifying nodes). The trapdoor hash function used in our scheme allows the signer to efficiently update the certificates without the need to re-sign the nodes. In other words, our scheme is efficient even though the graph dynamically adds or deletes vertices and edges. Moreover, our proposal can efficiently provide a proof when the edge between two vertices does not exist; thus, solving the existing intractability issue in transitive signature (the main tool for authenticating graph data). Finally, we prove the security of our proposed TCUGA in the standard model and evaluate its performance to show its feasibility for BIMS.
Article
Full-text available
LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.
Article
Full-text available
The recent advances in information technology for mobile devices have increased the work efficiency of users, the mobility of compact mobile devices, and the convenience of location independence. However, mobile devices have limited computing power and storage capacity, so mobile cloud computing is being researched to overcome these limitations in mobile devices. Mobile cloud computing is divided into two methods: the use of external cloud services and the use of mobile resource management without a cloud server (MRM), which integrates the computing and storage resources of nearby mobile devices. Because mobile devices can freely participate in MRM, it is critical to have authentication technology to determine the correctness of information regarding resources. Conventional technologies require strong authentication techniques because they have vulnerabilities that can easily be tampered with via man-in-the-middle (MITM) attacks. This paper proposes the Secure Authentication Management human-centric Scheme (SAMS) to authenticate mobile devices using blockchain for trusting resource information in the mobile devices that are participating in the MRM resource pool. The SAMS forms a blockchain based on the resource information of the subordinate client nodes around the master node in the MRM. Devices in the MRM that have not been authorized through the SAMS cannot access or falsify data. To verify the SAMS for application with MRM, it was tested for data falsification by a malicious user accessing the SAMS, and the results show that data falsification is impossible.
Article
Full-text available
The electric vehicle (EV) charging scheme can reduce the power generation costs and improve the smart grid resilience. However, huge penetrations of EVs can impact the voltage stability and operating costs. In this paper, a novel EV participation charging scheme is proposed for a decentralized blockchain enabled smart grid system. Our objectives are to minimize the power fluctuation level in the grid network and the overall charging cost for EV users. We first formulate the power fluctuation level problem of the smart grid system that take into accounts of EV battery capacities, charging rates and EV users charging behavior. And then we propose a novel adaptive blockchain-based electric vehicle participation (AdBEV) scheme that uses Iceberg order execution algorithm to obtain an improved EV charging and discharging schedule. The simulation results show the proposed scheme outperforms the scheme that applying Genetic Algorithm (GA) approach in term of lowering the power fluctuation level and overall charging costs.
Article
Full-text available
Minimizing the breach detection gap (BDG) for cyber-attacks is a big concern for all organizations and governments. Cyber-attacks are discovered daily, many of which have gone undetected for days to years before the victim organizations detect and deploy the cyber defense. Cyber defense solutions are advancing to combat risks and attacks from traditional to next-generation advanced defense protection solutions. However, many individuals, organizations and businesses continue to be hit by new waves of global cyber-attacks. In this paper, we present a blockchain-enabled federated cloud computing framework that uses the Dempster–Shafer theory to reduce BDG by continuously monitoring and analyzing the network traffics against cyber-attacks. We evaluate the proposed approach using numerical results, and the proposed approach outperforms the traditional approaches.
Article
Full-text available
Nowadays, blockchain has become one of the most cutting-edge technologies, which has been widely concerned and researched. However, the quantum computer attack seriously threatens the security of blockchain, and related research is still less. Targeting at this issue, in this paper, we present the definition of post-quantum blockchain (PQB) and propose a secure cryp-tocurrency scheme based on PQB, which can resist quantum computer attacks. Firstly, we propose a signature scheme based on lattice problem. We use lattice basis delegation algorithm to generate secret keys with selecting a random value, and sign message by preimage sampling algorithm. In addition, we design the first-signature and last-signature in our scheme which are defined as double-signature. It is used to reduce the correlation between the message and signature. Secondly, by combining the proposed signature scheme with blockchain, we construct the PQB and propose this cryptocurrency scheme. Its security can be reduced to the lattice short integer solution (SIS) problem. At last, through our analysis, the proposed cryptocurrency scheme is able to resist the quantum computer attack and its signature satisfies correctness and one-more unforgeability under the lattice SIS assumption. Furthermore, compared with previous signature schemes, the sizes of signature and secret keys are relatively shorter than that of others, which can decrease the computational complexity. These make our cryptocurrency scheme more secure and efficient.
Article
Full-text available
The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.
Article
Full-text available
In distributed peer-to-peer (P2P) applications, peers self-organize and cooperate to effectively complete certain tasks such as forwarding files, delivering messages, or uploading data. Nevertheless, users are selfish in nature and they may refuse to cooperate due to their concerns on energy and bandwidth consumption. Thus each user should receive a satisfying reward to compensate its resource consumption for cooperation. However, suitable incentive mechanisms that can meet the diverse requirements of users in dynamic and distributed P2P environments are still missing. On the other hand, we observe that Blcokchain is a decentralized secure digital ledger of economic transactions that can be programmed to record not just financial transactions and Blockchain-based cryptocurrencies get more and more market capitalization. Therefore in this paper, we propose a Blockchain based truthful incentive mechanism for distributed P2P applications that applies a cryptocurrency such as Bitcoin to incentivize users for cooperation. In this mechanism, users who help with a successful delivery get rewarded. As users and miners in the Blockchain P2P system may exhibit selfish actions or collude with each other, we propose a secure validation method and a pricing strategy, and integrate them into our incentive mechanism. Through a game theoretical analysis and evaluation study, we demonstrate the effectiveness and security strength of our proposed incentive mechanism.
Article
To date, there is a very limited literature on the use of systems ideas and methodologies as a basis for developing curriculum or courses. To fill the gap, this study has made several contributions by employing systems theory and thinking in analysing issues related to higher education. Industry 4.0 is reshaping the future of education, which opens up our vision and makes us to consider what knowledge and skills students should possess after they have graduated from college, when to accelerate workforce reskilling and what is the building blocks and connections of education supply chain. In this study, it is the first time the concept of ‘education supply chain’ is proposed and coined. Furthermore, our research has led us to view educational systems and configurations, such as international mobility and transnationalization, as outcomes of enduring power related to industrial revolutions. Finally, a curriculum structure based on system thinking is proposed. We engage our inquiry with transformations that are happening around higher education and position our research on the benefits of sharing of global intellectual resource and top talents through transnational mobility and education joint ventures in the context of Industry 4.0.
Article
Industry 4.0, Internet of Things, Blockchain, and Business Analytics are the hot research topics and have attracted much attention from scholars and practitioners in recent years. In order to identify the forces driving their development and to promote their development, this paper reviews the extant studies on these topics. The review provides a comprehensive overview of state-of-the-art researches on Industry 4.0, Internet of Things, Blockchain, and Business Analytics. The results assist scholars to figure out the directions of future studies on these topics.
Article
Innovating business processes involves cutting-edge technologies where the Internet of Things (IoT) and Blockchain are technological breakthroughs. IoT is envisioned as a global network infrastructure consisting of numerous connected devices over the Internet. Many attempts have been made to improve and adapt business workflows for best utilizing IoT services. One possible solution is to digitize and automate internal processes using IoT services, in which Blockchain smart contract is a viable solution to establish the trust of process executions without intermediaries. Modern business processes are composed of disparate services; many of them tend to be delivered based on IoT. Interoperating with such services poses major challenges: 1) time for finality settlement of transactions is unpredictable and usually experiencing delay; 2) several implementations of permissioned Blockchain pose a major concern of trust regarding nodes that perform consensus; and 3) trust of process executions and IoT information is the major factor to the success of modern business processes, which require the composition of distributed IoT services. Traditional business processes are mostly managed by a single entity, which induces the problem of trust of process executions. In this paper, a smart contract for establishing the trust of process executions that fits into the IoT environment is presented. A consensus approach with selected validators extended from Practical Byzantine Fault Tolerance (PBFT) is introduced to address time and prejudice challenges.
Article
The blockchain revolutionizes the creation of both scalable information technology systems and diversified applications by integrating the increasingly popular artificial intelligence, cloud computing, and big data. Various industries have recently begun to implement the exploration of blockchain. It will not take long for the blockchain to spread all over the world. In order to identify and further the development of the blockchain technology, this paper reviews the extant studies on the blockchain and its key components, blockchain-based IoT, blockchain-based security, blockchain-based data management, and the main applications based on the blockchain, and it delineates potential trends and challenges. This study provides a comprehensive overview of state-of-the-art blockchain and describes a forward-looking direction.
Article
Nowadays, more and more companies migrate business from their own servers to the cloud. With the influx of computational requests, datacenters consume tremendous energy every day, attracting great attention in the energy efficiency dilemma. In this paper, we investigate the energy-aware resource management problem in cloud datacenters, where green energy with unpredictable capacity is connected. Via proposing a robust blockchain-based decentralized resource management framework, we save the energy consumed by the request scheduler. Moreover, we propose a reinforcement learning method embedded in a smart contract to further minimize the energy cost. Because the reinforcement learning method is informed from the historical knowledge, it relies on no request arrival and energy supply. Experimental results on Google cluster traces and real-world electricity price show that our approach is able to reduce the datacenters cost significantly compared with other benchmark algorithms.
Article
Blockchain is disrupting the banking industry and contributing to the increased big data in banking. However, there exists a gap in research and development into blockchain-ed big data in banking from an academic perspective, and this gap is expected to have a significant negative impact on the adoption and development of blockchain technology for banking. In hope of motivating more active engagement by academics, researchers and bankers alike, we present the most comprehensive review of the impact of blockchain in banking to date by summarizing the opportunities and challenges from a bankers perspective. In addition, we also discuss the impact that big data from blockchain will have on banking data analytics in future and show the increasing importance of filtering and signal extraction for the banking industry. Whilst there is evidence of selected banks adopting blockchain technology in isolation or small groups, we find the need for extensive research and development into several aspects of banking with blockchain to overcome the challenges which are currently hindering its adoption in banking across the globe.
Article
Intelligent vehicle (IV) is an internet-enabled vehicle, commonly referred to as a self-driving car, which enables vehicles-to-everything communications. This communication environment is not secure and has several vulnerabilities. The major issues in IV communication are trustworthiness, accuracy, and security of received and broadcasted data in the communication channel. In this article, we introduce blockchain technology to build trust and reliability in peer-to-peer networks with topologies similar to IV communication. Further, we propose a blockchain-technology-enabled IV communication use case. Blockchain technology is used to build a secure, trusted environment for IV communication. This trusted environment provides a secure, distributed, and decentralized mechanism for communication between IVs, without sharing their personal information in the intelligent transportation system. Our proposed method comprises of a local dynamic blockchain (LDB) and main blockchain, enabled with a secure and unique crypto ID called intelligent vehicle trust point (IVTP). The IVTP ensures trustworthiness among vehicles. Vehicles use and verify the IVTP with the LDB to communicate with other vehicles. For evaluation, we simulated our proposed blockchain technology-based IV communication in a common intersection deadlock use case. The performance of the traditional blockchain is evaluated with emphasis on real-time traffic scenarios. We also introduce LDB branching, along with a branching and un-branching algorithm for automating the branching process for IV communication.
Article
The blockchain represents emerging technologies and future trends. For the traditional social organization and mode of operation, the development of the blockchain is a revolution. As a decentralized infrastructure and distributed general ledger agreement, the blockchain presents us with a great opportunity to establish data security and trust for automation and intelligence development in the Internet of Things (IoT) and it creates a new un-centralized programmable smart ecosystem. Our research synthesizes and analyses extant articles that focus on blockchain-related perspectives which will potentially play an important role in sustainable development in the world. Blockchain applications and future directions always attract more attention. Blockchain technology provides strong scalability and interoperability between the intelligent and the physical worlds.
Article
The Internet of Things (IoT) has already reshaped and transformed our lives in many ways, ranging from how we communicate with people or manage our health to how we drive our cars and manage our homes. With the rapid development of the IoT ecosystem in a wide range of applications, IoT devices and data are going to be traded as commodities in the marketplace in the near future, similar to cloud services or physical objects. Developing such a trading platform has previously been identified as one of the key grand challenges in the integration of IoT and data science. Deployment of such a platform raises concerns about the security and privacy of data and devices since their ownership is hard to trace and manage without a central trusted authority. A central trusted authority is not a viable solution for a fully decentralized and distributed IoT ecosystem with a large number of distributed device vendors and consumers. Blockchain, as a decentralized system, removes the requirement for a trusted thirdparty by allowing participants to verify data correctness and ensure its immutability. IoT devices can use blockchain to register themselves and organize, store, and share streams of data effectively and reliably. We demonstrate the applicability of blockchain to IoT devices and data management with an aim of providing end-to-end trust for trading. We also give a brief introduction to the topics and challenges for future research toward developing a trustworthy trading platform for IoT ecosystems.
Article
Blockchain has enormous potential to advance modern services, but it is important to remember that no new technology succeeds with the rip-and-replace method. Organizations using this technology will have a greater impact if they augment existing, well-established technologies such as electronic data interchange (EDI) systems.
Article
EVCE computing is an attractive network paradigm involving seamless connections among heterogeneous vehicular contexts. It will be a trend along with EVs becoming popular in V2X. The EVs act as potential resource infrastructures referring to both information and energy interactions, and there are serious security challenges for such hybrid cloud and edge computing. Context-aware vehicular applications are identified according to the perspectives of information and energy interactions. Blockchain-inspired data coins and energy coins are proposed based on distributed consensus, in which data contribution frequency and energy contribution amount are applied to achieve the proof of work. Security solutions are presented for securing vehicular interactions in EVCE computing.
Article
With the development of network technology and cloud computing, data sharing is becoming increasingly popular, and many scholars have conducted in-depth research to promote its flourish. As the scale of data sharing expands, its privacy protection has become a hot issue in research. Moreover, in data sharing, the data is usually maintained in multiple parties, which brings new challenges to protect the privacy of these multi-party data. In this paper, we propose a trusted data sharing scheme using blockchain. We use blockchain to prevent the shared data from being tampered, and use the Paillier cryptosystem to realize the confidentiality of the shared data. In the proposed scheme, the shared data can be traded, and the transaction information is protected by using the (p, t)-threshold Paillier cryptosystem. We conduct experiments in cloud storage scenarios and the experimental results demonstrate the efficiency and effectiveness of the proposed scheme.
Article
Blockchain is becoming popular as a distributed and reliable ledger which allows distrustful parties to transact safely without trusting third parties. Emerging blockchain systems like Ethereum support smart contracts where miners can run arbitrary user-defined programs. However, one of the biggest concerns about the blockchain and the smart contract is privacy, since all the transactions on the chain are exposed to the public. In this paper, we present ShadowEth, a system that leverages hardware enclave to ensure the confidentiality of smart contracts while keeping the integrity and availability based on existing public blockchains like Ethereum. ShadowEth establishes a confidential and secure platform protected by trusted execution environment (TEE) off the public blockchain for the execution and storage of private contracts. It only puts the process of verification on the blockchain. We provide a design of our system including a protocol of the cryptographic communication and verification and show the applicability and feasibility of ShadowEth by various case studies. We implement a prototype using the Intel SGX on the Ethereum network and analyze the security and availability of the system.