Tassos Dimitriou’s research while affiliated with Kuwait University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (113)


Visor: Privacy-Preserving Reputation for Decentralized Marketplaces
  • Chapter

July 2024

·

1 Read

Tassos Dimitriou




FIGURE 1. Generic system architecture.
FIGURE 2. Overview of BPF.
FIGURE 4. Injection of (a) BPF, (b) eBPF.
FIGURE 5. (a) BPF Architecture, (b) eBPF Architecture.
FIGURE 6. Overview of eBPF components and functionality.

+13

Extended Berkeley Packet Filter: An Application Perspective
  • Article
  • Full-text available

January 2022

·

874 Reads

·

16 Citations

IEEE Access

The extended Berkeley Packet Filter (eBPF) is a lightweight and fast 64-bit RISC-like virtual machine (VM) inside the Linux kernel. eBPF has emerged as the most promising and de facto standard of executing untrusted, user-defined specialized code at run-time inside the kernel with strong performance, portability, flexibility, and safety guarantees. Due to these key benefits and availability of a rich ecosystem of compilers and tools within the Linux kernel, eBPF has received widespread adoption by both industry and academia for a wide range of application domains which include enhancing performance of monitoring tools, providing a variety of new security mechanisms, data collection tools and data screening applications. In this review, we investigate the landscape of existing eBPF use-cases and trends with aim to provide a clear roadmap for researchers and developers. We first introduce the necessary background knowledge for eBPF before delving into its applications. Although, the potential use-cases of eBPF are vast, we restrict our focus on four key application domains related to networking, security, storage, and sandboxing. Then for each application domain, we analyze and summarize solution techniques along with their working principles in an effort to provide an insightful discussion that will enable researchers and practitioners to easily adopt eBPF into their designs. Finally, we delineate several exciting research avenues to fully exploit the revolutionary eBPF technology.

Download

Key notation
Cost of Bitcoin transactions based for a delay of d blocks
Incentivizing Participation in Crowd-Sensing Applications Through Fair and Private Bitcoin Rewards

January 2022

·

20 Reads

·

4 Citations

IEEE Access

In this work we develop a rewarding framework that can be used to enhance existing crowd-sensing applications. Although a core requirement of such systems is user engagement, people may be reluctant to participate as sensitive information about them may be leaked or inferred from submitted data. The use of monetary rewards can help incentivize participation, thereby increasing not only the amount but also the quality of sensed data. Our framework allows users to submit data and obtain Bitcoin payments in a privacy-preserving manner, preventing curious providers from linking the data or the payments back to the user. At the same time, it prevents malicious user behavior such as double-redeeming attempts, where a user tries to obtain rewards for multiple submissions of the same data. More importantly, it ensures the fairness of the exchange in a completely trustless manner; by relying on the Blockchain, the trust placed on third parties in traditional fair exchange protocols is eliminated. Finally, our system is highly efficient as most of the protocol steps do not utilize the Blockchain network. When they do, only the simplest of Blockchain transactions are used as opposed to prior works that are based on the use of more complex smart contracts.


Blockchain-Based Fair and Secure Certified Electronic Mail Without a TTP

July 2021

·

181 Reads

·

2 Citations

IEEE Access

Certified mail is a special postal service that provides the sender with a proof that the mail was successfully received by the other party. However, when it comes to certified electronic mail (CEM), there has not been a widely accepted protocol yet. Most of the existing solutions rely on a Trusted Third Party (TTP) in order to achieve fairness, which can become a bottleneck and lead to more charges and computations. Other solutions that do not rely on a TTP require a high computational and communication cost. Blockchains have allowed the creation of TTP-free protocols for fair exchange; however, the existing Blockchain-based protocols are either too expensive or do not meet the necessary fairness and confidentiality guarantees. In this work, we developed two TTP-free Blockchain-based protocols for certified electronic mail that achieve the required security properties of strong fairness, non-repudiation, timeliness, and confidentiality. The first protocol uses simple bitcoin transactions for a single receiver, whereas the second one implements smart contracts for one or multiple receivers. We have analyzed and compared both protocols to existing TTP-free Blockchain solutions and have demonstrated their superior properties and cost. Furthermore, we have implemented the two protocols in a realistic testbed, demonstrating the viability of our approach.




Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data

April 2020

·

31 Reads

·

16 Citations

IEEE Internet of Things Journal

In this work we present DPTS, a data payment and transfer scheme that uses bitcoin payments to reward users for detailed electricity measurements they submit to a utility provider. DPTS emphasizes both privacy and fairness of transactions; not only it allows participants to earn bitcoins in a way that cannot be linked to their actions or identities but also ensures that data is delivered if and only if an appropriate payment is received. While DPTS is described in the smart grid setting, the protocol can also be applied in other areas where incentives are used to increase user participation. One such important area is participatory or crowd-sensing, where individuals use their smartphones to report sensed data back to a campaign administrator and obtain a reward for it. DPTS allows users to enjoy the benefits of participation without compromising anonymity. The proposal is coupled with a security analysis showing the privacy-preserving character of the system along with an efficiency analysis demonstrating the feasibility of our approach.


Citations (85)


... [12] proposes an incentive mechanism aided by a threestage Stackelberg game for blockchain-based MCS. [31] incentivizes participation through Bitcoin rewards for crowdsensing data collection, whose payment is in a privacypreserving manner. All these studies utilize blockchain to improve the security of crowdsensing system, but they neglect many possible privacy issues. ...

Reference:

A Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing Based on Blockchain
Incentivizing Participation in Crowd-Sensing Applications Through Fair and Private Bitcoin Rewards

IEEE Access

... The Linux kernel is undergoing a transformation brought on by eBPF, similar to how JavaScript altered the web. Users can execute programs in a secure setting by using eBPF, which permits the execution of sandboxed programs inside the context of privileged operations within the operating system [5]. Since the programs are run in the kernel, this results in a much-reduced amount of overhead compared to using native kernel modules. ...

Extended Berkeley Packet Filter: An Application Perspective

IEEE Access

... We will see two definitions that we consider to only differ in such details (i.e. in details that are perhaps technically crucial but do not change the intuitive appeal or raison d'être of the definition) as being two instantiations of the same definition, even if they were not originally proposed as such. 3 Since there are essentially infinitely many possible and a very large number of potentially relevant choices of distribution model and computational perspective, we need also restrict our discussion 2 Technically, the notion of output closeness is typically a divergence, i.e. some nonnegative function of two probability distributions which is 0 if and only if the distributions are identical. 3 The choice of when to consider two definitions to be the same in this sense is a quite informal one. ...

Private Lives Matter: A Differential Private Functional Encryption Scheme
  • Citing Conference Paper
  • April 2022

... The authors of [22] present a solution based on the bitcoin blockchain, which makes it difficult to extend this solution to more advanced services (multirecipient services, combinations with other services, etc.) since it is not possible to program complex tasks on the bitcoin blockchain. One of the solutions presented in [23] is also based on the bitcoin blockchain; additionally, the explanation is incomplete, and the protocol is incorrectly specified. The description of the protocol indicates that the recipient must publish the decryption key and his signature on the blockchain so that the sender has evidence of receipt of the message, whereas the security analysis states that it is sufficient for the sender to publish the key and her signature so that they have evidence of receipt. ...

Blockchain-Based Fair and Secure Certified Electronic Mail Without a TTP

IEEE Access

... This includes proofs where a mathematical description was an important part of the proof, or where the authors provided a formal mathematical proof. This included References 18,34,36,45,48,69,72,73, and 79. The final subgroup proved the theorems or lemmas not just through mathematical proofs, but specifically through what are called security games. ...

Decentralized Reputation
  • Citing Conference Paper
  • April 2021

... Dimitriou, in [13], presents a rewarding framework for crowd-sensing applications, which enables users to submit data and receive Bitcoin payments in a privacy-preserving manner. The protocol ensures the fairness of the exchange and prevents malicious user behavior, such as double-redeeming attempts. ...

Fair and Private Bitcoin Rewards: Incentivizing Participation in Crowd-Sensing Applications
  • Citing Conference Paper
  • August 2020

... This approach separates statistical calculations from filtering entities, addressing scenarios where filtering entities, such as university ranking authorities, should not access statistical outcomes. Blockchain technology has been explored in recent studies for data exchange, as seen in Dimitriou and Mohammed's use of Bitcoin for smart-grid data, though privacy risks persist post-payment [7]. Duan et al.'s use of encrypted data in smart contracts is another example, yet our system circumvents the need for blockchain data storage, favoring scalability for large user scenarios [8]. ...

Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data
  • Citing Article
  • April 2020

IEEE Internet of Things Journal

... It demonstrates how leveraging advanced technologies and data analytics can improve both sustainability and operational efficiency in offshore energy operations. However, limitations such as data integration challenges, validation constraints, and adoption barriers underscore the need for further development and testing (Sultan et al., 2019) [47] . Future research directions propose incorporating AI-driven analytics, expanding the model to renewable energy systems, and investigating cross-sector applications. ...

Containers’ Security: Issues, Challenges, and Road Ahead

IEEE Access

... Users and reviewers can remain anonymous throughout the review process. In [5], Dimitriou et al. proposed an incentive scheme that can be used in smart grids. In this scheme, customers are rewarded with tokens when they anonymously provide their electricity usage data to a utility provider, which can be redeemed as needed. ...

REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems
  • Citing Article
  • February 2019

Computer Communications