Internet-based management and consumption of digital assets

Author(s):  
Yulin Wang ◽  
Yixin Chen ◽  
Jing Feng ◽  
Hong Ding ◽  
Wenjia Ding
Keyword(s):  
Author(s):  
D. V. Gribanov

Introduction. This article is devoted to legal regulation of digital assets turnover, utilization possibilities of distributed computing and distributed data storage systems in activities of public authorities and entities of public control. The author notes that some national and foreign scientists who study a “blockchain” technology (distributed computing and distributed data storage systems) emphasize its usefulness in different activities. Data validation procedure of digital transactions, legal regulation of creation, issuance and turnover of digital assets need further attention.Materials and methods. The research is based on common scientific (analysis, analogy, comparing) and particular methods of cognition of legal phenomena and processes (a method of interpretation of legal rules, a technical legal method, a formal legal method and a formal logical one).Results of the study. The author conducted an analysis which resulted in finding some advantages of the use of the “blockchain” technology in the sphere of public control which are as follows: a particular validation system; data that once were entered in the system of distributed data storage cannot be erased or forged; absolute transparency of succession of actions while exercising governing powers; automatic repeat of recurring actions. The need of fivefold validation of exercising governing powers is substantiated. The author stresses that the fivefold validation shall ensure complex control over exercising of powers by the civil society, the entities of public control and the Russian Federation as a federal state holding sovereignty over its territory. The author has also conducted a brief analysis of judicial decisions concerning digital transactions.Discussion and conclusion. The use of the distributed data storage system makes it easier to exercise control due to the decrease of risks of forge, replacement or termination of data. The author suggests defining digital transaction not only as some actions with digital assets, but also as actions toward modification and addition of information about legal facts with a purpose of its establishment in the systems of distributed data storage. The author suggests using the systems of distributed data storage for independent validation of information about activities of the bodies of state authority. In the author’s opinion, application of the “blockchain” technology may result not only in the increase of efficiency of public control, but also in the creation of a new form of public control – automatic control. It is concluded there is no legislation basis for regulation of legal relations concerning distributed data storage today.


Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


Symmetry ◽  
2021 ◽  
Vol 13 (8) ◽  
pp. 1444
Author(s):  
Guojia Li ◽  
Lin You

In recent years, blockchain has triggered an upsurge in the application of decentralized models and has received more and more attention. For convenience and security considerations, in blockchain applications, users usually use wallets to manage digital assets. The most important data stored in the wallet is the user’s private key, which is also the only identification of the ownership of the encrypted digital assets. Once the private key is lost or stolen, it will bring irreparable losses. We proposed a consortium blockchain wallet scheme based on dual-threshold key protection secret-sharing. By splitting and storing the user’s wallet private key using a secret-sharing method, we can protect our private keys safely and effectively. Our scheme is based on the application scenario of the consortium blockchain. The peers preset by the consortium blockchain store the user’s wallet private key shadow shares, reasonably integrate storage resources, and enhance the solution’s anti-attack ability by setting double thresholds.


2021 ◽  
Vol 2 (1) ◽  
pp. 1-23
Author(s):  
Ziya Alper Genç ◽  
Gabriele Lenzini ◽  
Daniele Sgandurra

To protect their digital assets from malware attacks, most users and companies rely on antivirus (AV) software. AVs’ protection is a full-time task against malware: This is similar to a game where malware, e.g., through obfuscation and polymorphism, denial of service attacks, and malformed packets and parameters, tries to circumvent AV defences or make them crash. However, AVs react by complementing signature-based detection with anomaly or behavioral analysis, and by using OS protection, standard code, and binary protection techniques. Further, malware counter-acts, for instance, by using adversarial inputs to avoid detection, and so on. In this cat-and-mouse game, a winning strategy is trying to anticipate the move of the adversary by looking into one’s own weaknesses, seeing how the adversary can penetrate them, and building up appropriate defences or attacks. In this article, we play the role of malware developers and anticipate two novel moves for the malware side to demonstrate the weakness in the AVs and to improve the defences in AVs’ side. The first one consists in simulating mouse events to control AVs, namely, to send them mouse “clicks” to deactivate their protection. We prove that many AVs can be disabled in this way, and we call this class of attacks Ghost Control . The second one consists in controlling whitelisted applications, such as Notepad, by sending them keyboard events (such as “copy-and-paste”) to perform malicious operations on behalf of the malware. We prove that the anti-ransomware protection feature of AVs can be bypassed if we use Notepad as a “puppet” to rewrite the content of protected files as a ransomware would do. Playing with the words, and recalling the cat-and-mouse game, we call this class of attacks Cut-and-Mouse . We tested these two attacks on 29 AVs, and the results show that 14 AVs are vulnerable to Ghost Control attack while all 29 AV programs tested are found vulnerable to Cut-and-Mouse . Furthermore, we also show some weaknesses in additional protection mechanisms of AVs, such as sandboxing and CAPTCHA verification. We have engaged with the affected AV companies, and we reported the disclosure communication with them and their responses.


2021 ◽  
Vol 13 (10) ◽  
pp. 5383
Author(s):  
Nikolaos A. Kyriazis

This paper sets out to explore the nexus between economic policy uncertainty (EPU) and digital currencies. An integrated survey takes place based on eleven primary studies. Furthermore, an econometric analysis is conducted by the threshold ARCH, simple asymmetric ARCH and non-linear ARCH specifications covering the bull and the bear markets as well as the highly volatile period up to the present. Threshold ARCH is found to provide the best fit for estimations. Outcomes reveal that Bitcoin is strongly connected with EPU while Ethereum and Litecoin are not but are strongly linked with Bitcoin performance. Moreover, weak negative effects of the VIX on both cryptocurrencies are detected while oil exerts weak positive impacts on Ethereum. Overall, Ethereum and Litecoin could serve for diversifiers against Bitcoin or hedgers against traditional assets during highly stressed periods with the advantage of not being affected by economic policy uncertainty news.


2021 ◽  
pp. 089443932110039
Author(s):  
Viktor Shestak ◽  
Alla Kiseleva ◽  
Yuriy Kolesnikov

The objective of the study is to determine the status of a digital financial asset and the features of its taxation in the Russian Federation and progressive countries. Currently, there are three main taxation models that are used in this area: income tax, corporate income tax, and capital gains tax. The article explores the prospects for introducing the experience of foreign countries in the Russian Federation. The possible changes that may occur in tax regulation are analyzed. The experience of leading countries in the field of legal regulation of the use of digital financial assets and the taxation of cryptocurrency transactions is analyzed. Such an analysis will allow Russia to keep pace with countries with a leading economy and at the same time increase state budget revenue through taxation of cryptocurrency transactions. The study provides an analysis of the conceptual scenarios of digital income taxation and objects of taxation in the process of cryptocurrency creation. The study critically assesses possible options for applying international standards for tax accounting of digital assets. Groups of problematic issues that arise in the tax accounting of digital assets are developed. The prospect of further research is the development of tax accounting methods for each of the established entities for the creation and circulation of digital financial assets in accordance with accounting objects.


SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402110025
Author(s):  
Chika Anastesia Anisiuba ◽  
Obiamaka P. Egbo ◽  
Felix C. Alio ◽  
Chuka Ifediora ◽  
Ebele C. Igwemeka ◽  
...  

We analyzed cryptocurrency dynamics in the global U.S. dollar–denominated market and the emerging market economies (EMEs) with a view to ascertaining whether activities in these markets are predominantly shaped by reinforcement or substitution effect. Cryptocurrencies analyzed include the Bitcoins, Ethereum, Litecoin, Steller, Bitcoin Cash, and USD Tether. The results suggest that, on average, correlation between digital assets in the cryptocurrencies’ ecosystem is positive. However, there is evidence of an outlier with respect to the USD Tether (USDT) in the global market, revealing that the USDT is negatively associated with all other cryptocurrencies. This is supported by the dynamic regression results that provided evidence of reinforcement effect in favor of the USDT in the global crypto market, thus confirming the status of the USDT as “Stablecoin” as it is pegged 1:1 to USD. In the global market context, the results also revealed that USDT/USD returns had identical outliers that could portend lesser chances of extreme gains or losses compared with suggestions of extreme gains or losses in the EMEs. Furthermore, USDT did not seem to have similar evolution in the EMEs where it had relatively marginal influence in the markets. The vector error correction (VEC) estimate showed mixed results between Altcoins in all the markets; moreover, our finding showed that reinforcement effects hold in favor of Steller (XLM) both in the Russian ruble and Indian rupee crypto markets, whereas the Chinese yuan crypto market was predominantly characterized by substitution effect in favor of Bitcoin.


Sign in / Sign up

Export Citation Format

Share Document