scholarly journals Temporal Index Scheme of Hyperledger Fabric System in IoT

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Yongqiang Lu ◽  
Zhaobin Liu ◽  
Shaoqi Wang ◽  
Zhiyang Li ◽  
Weijiang Liu ◽  
...  

As a large number of mobile terminals are connected to the IoT, the security problem of IoT is a challenge to the IoT technology. Blockchain technology has the characteristics of decentralization, data encryption, smart contract, and so on, especially suitable in the complex heterogeneous network. However, sequential access based on block files in the blockchain hinders efficient query processing. The problem is due to current blockchain solutions do not support temporal data processing. In this paper, we propose two index building methods (TISD and TIF) to address this issue in Hyperledger Fabric System. TISD (temporal index based on state databases) segments the historical data by time interval in the time dimension and indexes events at the same time interval. TIF (temporal index based on files) builds the index of files by the block transaction data, which is arranged in chronological order and is stored at a certain time interval. In the experimental part, we compare the query time on two datasets and analyse the query performance. Experiments demonstrated that our two methods are relatively stable in overall time performance on different datasets in the Hyperledger Fabric System.

Author(s):  
Fatma Ghorbel ◽  
Fayçal Hamdi ◽  
Elisabeth Métais

This article proposes a crisp-based approach for representing and reasoning about concepts evolving in time and of their properties in terms of qualitative relations (e.g., “before”) in addition to quantitative ones, time intervals and points. It is not only suitable to handle precise time intervals and points, but also imprecise ones. It extends the 4D-fluents approach with crisp components to represent handed data. It also extends the Allen's interval algebra. This extension allows reasoning about imprecise time intervals. Compared to related work, it is based on crisp set theory. These relations preserve many properties of the original algebra. Their definitions are adapted to allow relating a time interval and a time point, and two time points. All relations can be used for temporal reasoning by means of transitivity tables. Finally, it proposes a crisp ontology that based on the extended Allen's algebra instantiates the 4D-fluents-based representation.


2019 ◽  
Vol 13 (01) ◽  
pp. 111-133
Author(s):  
Romita Banerjee ◽  
Karima Elgarroussi ◽  
Sujing Wang ◽  
Akhil Talari ◽  
Yongli Zhang ◽  
...  

Twitter is one of the most popular social media platforms used by millions of users daily to post their opinions and emotions. Consequently, Twitter tweets have become a valuable knowledge source for emotion analysis. In this paper, we present a new framework, K2, for tweet emotion mapping and emotion change analysis. It introduces a novel, generic spatio-temporal data analysis and storytelling framework that can be used to understand the emotional evolution of a specific section of population. The input for our framework is the location and time of where and when the tweets were posted and an emotion assessment score in the range [Formula: see text], with [Formula: see text] representing a very high positive emotion and [Formula: see text] representing a very high negative emotion. Our framework first segments the input dataset into a number of batches with each batch representing a specific time interval. This time interval can be a week, a month or a day. By generalizing existing kernel density estimation techniques in the next step, we transform each batch into a continuous function that takes positive and negative values. We have used contouring algorithms to find the contiguous regions with highly positive and highly negative emotions belonging to each member of the batch. Finally, we apply a generic, change analysis framework that monitors how positive and negative emotion regions evolve over time. In particular, using this framework, unary and binary change predicate are defined and matched against the identified spatial clusters, and change relationships will then be recorded, for those spatial clusters for which a match occurs. We also propose animation techniques to facilitate spatio-temporal data storytelling based on the obtained spatio-temporal data analysis results. We demo our approach using tweets collected in the state of New York in the month of June 2014.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lurdes D. Patrício ◽  
João J. Ferreira

PurposeThe continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the major cause of personal and organizational data losses. Blockchain emerges as a promised technology to ensure higher levels of data encryption and security. Thus, this study aims to develop a systematic literature review analyzing the previous literature and to purpose of a framework to better understand the process of blockchain security.Design/methodology/approachThe 75 articles reviewed were obtained through the Scopus database and a bibliographic-coupling analysis was developed to identify the main themes of this research area, via VOSviewer software.FindingsThe results enable the categorization of the existing literature revealing four clusters: 1) feasibility, 2) fintech and cryptocurrency, 3) data trust and share and 4) applicability. Blockchain technology is still in its early stage of development and counting on researchers in security and cryptography to take it further to new highs, to allow its applicability to different areas and in long-term scenarios.Originality/valueThis systematic literature creates a base to reduce the blockchain security literature gap. In addition, it provides a framework that enables the scientific community to access the main subjects discussed and the articulation between concepts. Furthermore, it enhances the state-of-the-art literature on blockchain security and proposes a future research agenda.


Author(s):  
Yin Shiyong ◽  
Jin song Bao ◽  
Zhang Yiming ◽  
Huang Xiaodi

As the core of intelligent manufacturing, CPS has serious security issues, especially for the communication security of its terminal M2M. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in CPS. According to the principles of blockchain technology, we design a blockchain for secure M2M communications. As a communication system of M2M consists of public network areas, equipment areas and private areas, we design a sophisticated blockchain structure between the public area and private area. For validating our design, we take cotton spinning production as a case study to demonstrate our solution to M2M communication problems under the CPS framework.


Author(s):  
Alla Havrylova ◽  
Olha Korol ◽  
Stanyslav Milevskyi

The subject of the research is a mathematical model of authentication of the transmitted message based on the McEliese scheme on shortened and elongated modified elliptic codes using the modified UMAC algorithm. The aim of this work is to develop such a scheme for the information exchange over Internet commverification and integrity of the transmitted information, taking into account the prevention of an increase in the costs of the actions taken. Tasks: analysis of existing ways to increase the resistance to hacking of transmitted messages over telecommunication networks; analysis of a message transfer scheme using blockchain technology; formalized description of a mathematical model for providing clear text authentication using a modified UMAC algorithm, as the formation of key data, a crypto-code construction (CCC) is used on the McEliese scheme on modified elliptic codes (MEС); development of data encryption and decryption algorithms using CCC based on McEliese on the MEC and UMAC algorithm. Аn approach was proposed to verify the authentication and verification of the information packet during transmission and reception via telecommunication channels, which allows using already known hashing methods to compare generated codegrams and transmitted messages for their correspondence, which increases the level of cryptographic stability of the transmitted data and the reliability of the received data. The developed schemes of algorithms for generating codеgrams and their decryption using the proposed approach make it possible to gradually demonstrate the implementation of procedures for generating codegrams and their hash codes using both shortening and lengthening the code. Further research should prove from a practical point of view the effectiveness of using this approach when transmitting a message regarding the preservation of its integrity and authenticity. Therefore, it is necessary to develop a test system that should implement the proposed approach, as well as evaluate the results obtained.unication channels, which would ensure the proper level of


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Riadh Ayachi ◽  
Ayoub Mhaouch ◽  
Abdessalem Ben Abdelali

System-on-chip (SoC) is the main processor for most recent applications such as the Internet of things (IoT). SoCs are composed of multiple blocks that communicate with each other through an integrated router. Data routing from a block to another poses many challenges. The network-on-chip (NoC) was used for the transmission of data from a source to a destination with high reliability, high speed, low power consumption, and low hardware occupation. An NoC is composed of a router, network links (NL), and network interface (NI). The main component of the NoC, the NI, is composed of an input/output FIFO, a finite state machine (FSM), pack, and depack modules. Data transmission from a block to another poses a security problem such as secret information extraction. In this paper, we proposed a data encryption framework for NoC based on a light encryption device (LED) algorithm. The main advantages of the proposed algorithm are to reduce the implementation area and to achieve high speed while reducing the power consumption. The proposed encryption framework was simulated Verilog/VHDL on the Xilinx ISE and implemented on the Xilinx Virtex 5 XC5VFX200T. The obtained results have shown that the proposed framework has a smaller area and higher speed compared to existing works. The proposed algorithm has reduced the NI implementation area and enhanced the network performance in terms of speed and security.


Author(s):  
W. Song ◽  
F. Zhang

There are complex spatio-temporal relationships among cadastral entities. Cadastral spatio-temporal data model should not only describe the data structure of cadastral objects, but also express cadastral spatio-temporal relationships between cadastral objects. In the past, many experts and scholars have proposed a variety of cadastral spatio-temporal data models, but few of them concentrated on the representation of spatiotemporal relationships and few of them make systematic studies on spatiotemporal relationships between cadastral objects. The studies on spatio-temporal topological relationships are not abundant. In the paper, we initially review current approaches to the studies of spatio-temporal topological relationships, and argue that spatio-temporal topological relation is the combination of temporal topology on the time dimension and spatial topology on the spatial dimension. Subsequently, we discuss and develop an integrated representation of spatio-temporal topological relationships within a 3-dimensional temporal space. In the end, based on the semantics of spatiotemporal changes between land parcels, we conclude the possible spatio-temporal topological relations between land parcels, which provide the theoretical basis for creating, updating and maintaining of land parcels in the cadastral database.


2011 ◽  
Vol 403-408 ◽  
pp. 1332-1336 ◽  
Author(s):  
Jing Sheng Zhao ◽  
Wei Zhang ◽  
Chao Yuan

This paper analyzes the security problem and the popular security technology of Mobile Agent system. A new mechanism of Mobile Agent security system in open platform, a three tier protection model, that is code mess up, limited life time of code and data, encryption, associated with CA, used for protecting Mobile Agent from the attacks of malicious hosts is discussed. A method to deal with Mobile Agent in different level management and certification services, used for constructing hosts’ secure environment is also proposed. The security mechanism has been conducted, which shows the mode has taken into effect.


Sign in / Sign up

Export Citation Format

Share Document