scholarly journals Immutable autobiography of smart cars leveraging blockchain technology

Author(s):  
MD. Sadek Ferdous ◽  
Mohammad Jabed Morshed Chowdhury ◽  
Kamanashis Biswas ◽  
Niaz Chowdhury ◽  
Vallipuram Muthukkumarasamy

Abstract The popularity of smart cars is increasing around the world as they offer a wide range of services and conveniences. These smart cars are equipped with a variety of sensors generating a large amount of data, many of which are critical. Besides, there are multiple parties involved in the lifespan of a smart car, such as manufacturers, car owners, government agencies, and third-party service providers who also generate data about the vehicle. In addition to managing and sharing data among these entities in a secure and privacy-friendly way which is a great challenge itself, there exists a trust deficit about some types of data as they remain under the custody of the car owner (e.g. satellite navigation and mileage data) and can easily be manipulated. In this article, we propose a blockchain-assisted architecture enabling the owner of a smart car to create an immutable record of every data, called the autobiography of a car, generated within its lifespan. We also explain how the trust about this record is guaranteed by the immutability characteristic of the blockchain. Furthermore, the article describes how the proposed architecture enables a secure and privacy-preserving mechanism for sharing of smart car data among different parties.

2016 ◽  
Author(s):  
Mark Lemley

Internet intermediaries - service providers, Web hosting companies,Internet backbone providers, online marketplaces, and search engines -process hundreds of millions of data transfers every day, and host or linkto literally tens of billions of items of third party content.Some of this content is illegal. In the last 12 years, both Congress andthe courts have concluded that Internet intermediaries should not be liablefor a wide range of content posted or sent through their systems byanother. The reasoning behind these immunities is impeccable: if Internetintermediaries were liable every time someone posted problematic content onthe Internet, the resulting threat of liability and effort at rightsclearance would debilitate the Internet.While the logic of some sort of safe harbor for Internet intermediaries isclear, the actual content of those safe harbors is not. Rather, the safeharbors actually in place are a confusing and illogical patchwork. For someclaims, the safe harbors are absolute. For others, they preclude damagesliability but not injunctive relief. For still others they are dependent onthe implementation of a "notice and takedown" system. And for at least afew types of claims, there is no safe harbor at all. This patchwork makesno sense. In this article, I suggest that it be replaced with a uniformsafe harbor rule. A single, rationally designed safe harbor based on thetrademark model would not only permit plaintiffs the relief they need whileprotecting Internet intermediaries from unreasonable liability, but wouldalso serve as a much needed model for the rest of the world, which has yetto understand the importance of intermediaries to a vibrant Internet.


2021 ◽  
pp. 1-12
Author(s):  
Gokay Saldamli ◽  
Richard Chow ◽  
Hongxia Jin

Social networking services are increasingly accessed through mobile devices. This trend has prompted services such as Facebook and Google+to incorporate location as a de facto feature of user interaction. At the same time, services based on location such as Foursquare and Shopkick are also growing as smartphone market penetration increases. In fact, this growth is happening despite concerns (growing at a similar pace) about security and third-party use of private location information (e.g., for advertising). Nevertheless, service providers have been unwilling to build truly private systems in which they do not have access to location information. In this paper, we describe an architecture and a trial implementation of a privacy-preserving location sharing system called ILSSPP. The system protects location information from the service provider and yet enables fine grained location-sharing. One main feature of the system is to protect an individual’s social network structure. The pattern of location sharing preferences towards contacts can reveal this structure without any knowledge of the locations themselves. ILSSPP protects locations sharing preferences through protocol unification and masking. ILSSPP has been implemented as a standalone solution, but the technology can also be integrated into location-based services to enhance privacy.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


2019 ◽  
pp. 197-204
Author(s):  
Jan Zadrożny

Blockchain is a decentralized and distributed database, where participants can exchange the value of, i.e. information or financial resources without the participation of a trusted third party. Despite of a number of positive features, this technology is not free of defects. The aim of the article is to present the barriers of the discussed technology, which prevent the discussed technology from further dissemination. Therefore, in a first step, the review of basic concepts related to blockchain was conducted. It includes a discussion of key characteristics as well as dominant types of blockchain. Afterwards, the author presents barriers of the implementation of the blockchain technology: technical, socio-organizational and legal. Blockchain gained its popularity thanks to the bitcoin cryptocurrency, which was launched in 2009 as a consequence of the global financial crisis. Since then, the technology has gone a long way of evolution and development, and its use goes far beyond only the financial sector. Therefore, the article is not focused on the strengths and weaknesses of the bitcoin blockchain network, as this has already been the subject of many other publications (i.e. Yli-Huumo et al., 2016; Koteska et al., 2017), but aims to highlight barriers of its deployment. Consequently, the limitations faced by bitcoin blockchain or, more broadly, the world of cryptocurrencies, have been passed in this article advisedly.


Author(s):  
Neenu Kuriakose & Lincy N

It is only a matter of time before technology emerges to open up a whole new world of opportunities. For example, the invention of the Internet was a development like this that changed the world in almost every theory. Blockchain technology is also one of the emerging technological advances that is expected to change the way transactions are conducted, thus affecting a wide range of potential applications. Blockchain is a distributed software network that works both as a digital logger and a method that allows secure transfer of assets without a mediator. Just as the Internet is a technology that facilitates the flow of digital information, blockchain is a technology that facilitates the digital exchange of digital value. Anything from coins to land titles to votes can be token, stored, and exchanged via a blockchain network.


Author(s):  
Anthony Akai Acheampong Otoo ◽  
Li Zhiwen ◽  
Charles Oduro Acheampong Otoo ◽  
Maxwell Opuni Antwi

In an era of globalization, economies over the world have become increasingly international and competitive. According to Alahuhta et al (2005), the last three decade has seen a massive revolution in technology use at both individual and organizations level with several organizations replacing the manual system of operation with modern technologies and computer powered machines. Acheampong, et al (2017) explain that three decades ago it was a dream to conceive that at a point in time all of the world’s knowledge could be put on a single world wide web and browsed by people from different parts of the world for free. These are the realities of the contemporary business place which Casey & Wilson-Evered (2012) explained has been facilitated by the advances in technology and globalization. According to Zaremohzzabieh, et al (2014), e-commerce platform appeared along with the development of internet and the necessities of ventures has given a web-based exchanging spot to customers and suppliers. It is a virtual system for purchasers and merchants, utilizing computer programming technology to coordinate assets on the web and accomplish the objective of community program (Ruzzier, AntonciC, Hisrich, & Konecnik, 2007). E-commerce platform gives all members equivalent and public information location of many services. Merchants can disseminate product information on e-commerce platforms, while purchasers can get a wide range of information without going outside (Strauss, 2016). As a new trend in the economic development and a new pattern of future business advancement, e-commerce platform plays a critical part with many attributes i.e. third party, service nature, neutrality and integration (Ling, et al, 2010).


2021 ◽  
Author(s):  
Arwa Alrawais ◽  
Fatemah Alharbi ◽  
Moteeb Almoteri ◽  
Sara A Aljwair ◽  
Sara SAljwair

The COVID-19 pandemic has swapped the world, causing enormous cases, which led to high mortality rates across the globe. Internet of Things (IoT) based social distancing techniques and many current and emerging technologies have contributed to the fight against the spread of pandemics and reduce the number of positive cases. These technologies generate massive data, which will pose a significant threat to data owners’ privacy by revealing their lifestyle and personal information since that data is stored and managed by a third party like a cloud. This paper provides a new privacy-preserving scheme based on anonymization using an improved slicing technique and implying distributed fog computing. Our implementation shows that the proposed approach ensures data privacy against a third party intending to violate it for any purpose. Furthermore, our results illustrate our scheme’s efficiency and effectiveness.


2010 ◽  
Vol 6 (4) ◽  
pp. 26-37
Author(s):  
Fang Zhao

Current m-commerce business models show that m-commerce depends on complex networks of business relationships, which often comprise telecommunications service providers, mobile device makers, banking industry, Internet search engine providers, and various third-party value-adding companies. Due to the nature of m-commerce, the key to success in m-commerce lies predominantly in managing a network of alliances. This paper answers research questions, such as why do companies team up for m-commerce? What are the key challenges facing the alliances? How can companies address the challenges? What does the future hold for the study of strategic alliances including m-commerce alliances? This paper extends strategic alliance theories to the study of m-commerce alliances that are formulated in various cultural and national backgrounds. The authors examine both strategic and operational strategies for m-commerce alliances and discuss a wide range of issues in the formulation and implementation of m-commerce alliance strategy.


Author(s):  
Fang Zhao

Current m-commerce business models show that m-commerce depends on complex networks of business relationships, which often comprise telecommunications service providers, mobile device makers, banking industry, Internet search engine providers, and various third-party value-adding companies. Due to the nature of m-commerce, the key to success in m-commerce lies predominantly in managing a network of alliances. This paper answers research questions, such as why do companies team up for m-commerce? What are the key challenges facing the alliances? How can companies address the challenges? What does the future hold for the study of strategic alliances including m-commerce alliances? This paper extends strategic alliance theories to the study of m-commerce alliances that are formulated in various cultural and national backgrounds. The authors examine both strategic and operational strategies for m-commerce alliances and discuss a wide range of issues in the formulation and implementation of m-commerce alliance strategy.


Author(s):  
Kibum Kim ◽  
Taewon Kang

Blockchain technology is an electronic ledger of digital records that is distributed over a network of computers rather than located on single or multiple servers. As the technology is by itself transparent and secure even without a trusted third party involvement, many applications are being developed as a means of eliminating corruption around the world. This article examines how the blockchain technology could be used to curb corruption and take integrity to higher standards at a firm level, within-country level and cross-country level. Possible risks and challenges related to the technology were identified and found that without considering the data governance and security issues, the blockchain technology may not always lead to a socio-economic benefit.


Sign in / Sign up

Export Citation Format

Share Document