scholarly journals Privacy preserving divisible double auction with a hybridized TEE-blockchain system

Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Bingyu Liu ◽  
Shangyu Xie ◽  
Yuanzhou Yang ◽  
Rujia Wang ◽  
Yuan Hong

AbstractDouble auction mechanisms have been designed to trade a variety of divisible resources (e.g., electricity, mobile data, and cloud resources) among distributed agents. In such divisible double auction, all the agents (both buyers and sellers) are expected to submit their bid profiles, and dynamically achieve the best responses. In practice, these agents may not trust each other without a market mediator. Fortunately, smart contract is extensively used to ensure digital agreement among mutually distrustful agents. The consensus protocol helps the smart contract execution on the blockchain to ensure strong integrity and availability. However, severe privacy risks would emerge in the divisible double auction since all the agents should disclose their sensitive data such as the bid profiles (i.e., bid amount and prices in different iterations) to other agents for resource allocation and such data are replicated on all the nodes in the network. Furthermore, the consensus requirements will bring a huge burden for the blockchain, which impacts the overall performance. To address these concerns, we propose a hybridized TEE-Blockchain system (system and auction mechanism co-design) to privately execute the divisible double auction. The designed hybridized system ensures privacy, honesty and high efficiency among distributed agents. The bid profiles are sealed for optimally allocating divisible resources while ensuring truthfulness with a Nash Equilibrium. Finally, we conduct experiments and empirical studies to validate the system and auction performance using two real-world applications.

2012 ◽  
pp. 900-910
Author(s):  
Hichang Cho

The increasing use of the Internet and the development of more sophisticated data-mining and surveillance techniques have led to growing levels of public concern about online privacy. This chapter reviews the intellectual history and current knowledge of online privacy risks. It discusses some foundational studies of privacy research. This is followed by literature reviews of empirical studies of online privacy risks. Specifically, this chapter focuses on perceptual and behavioral responses to online privacy risks, such as online privacy concerns, risk perception and optimistic bias, and self-protection behavior. It concludes with implications and directions for future research.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Mingwu Zhang ◽  
Bingruolan Zhou

Combinatorial auctions can be employed in the fields such as spectrum auction, network routing, railroad segment, and energy auction, which allow multiple goods to be sold simultaneously and any combination of goods to be bid and the maximum sum of combinations of bidding prices to be calculated. However, in traditional combinatorial auction mechanisms, data concerning bidders’ price and bundle might reveal sensitive information, such as personal preference and competitive relation since the winner determination problem needs to be resolved in terms of sensitive data as above. In order to solve this issue, this paper exploits a privacy-preserving and verifiable combinatorial auction protocol (PP-VCA) to protect bidders’ privacy and ensure the correct auction price in a secure manner, in which we design a one-way and monotonically increasing function to protect a bidder’s bid to enable the auctioneer to pick out the largest bid without revealing any information about bids. Moreover, we design and employ three subprotocols, namely, privacy-preserving winner determination protocol, privacy-preserving scalar protocol, and privacy-preserving verifiable payment determination protocol, to implement the combinatorial auction with bidder privacy and payment verifiability. The results of comprehensive experimental evaluations indicate that our proposed scheme provides a better efficiency and flexibility to meet different types of data volume in terms of the number of goods and bidders.


The article is devoted to the analysis of the peculiarities of the early manifestations of attention deficit with hyperactivity disorder (ADHD) in preschool children. The topic of ADHD requires a detailed psychological analysis. Such work will allow the formation of methodological and theoretical tools, the need for which is now felt by the practical psychologists. The following research methods have been used: theoretical analysis, generalization of scientific approaches, theoretical modeling, symptomatic analysis. Based on the data obtained, a unified theoretical and methodological model has been developed that allows to carry out the comprehensive analysis of the developmental features of preschool children. The analysis of the developmental features of the child in the early stages of ontogenesis can be carried out along several axes, which go through several stages of their formation, which are accompanied by dynamic changes such as interfunctional relationships and the child’s worldview is shown. A comparison of the results of studies of the features of the early stages of children development with ADHD has allowed to expose a deficit axis of development, changes in the formation of which lead to the appearance of children’s behavioral disorders of such a group. The peculiarities of the passage of the axes development in the process of ontogenesis also makes it possible to identify the mechanisms of their correction and habilitation, which has undoubted practical value. At the moment, this integrative model has already shown its practical value. A number of correctional development programs, as well as support programs, have been worked out. The results of empirical studies show their high efficiency. In addition, the model demonstrates its high efficiency in advising family members and child support groups, in particular, when conducting psycho-educational work.


The Winners ◽  
2010 ◽  
Vol 11 (1) ◽  
pp. 43
Author(s):  
Edy Supriyadi

Perfect competition (PPS) is the most ideal market structure because this market system is considered will ensure the realization of activities producing goods and services with very high efficiency compared to other market structures such as monopoly. Due to its benefits for sellers and buyers, economists often wish for the creation of perfect competition. In the pattern of transactions in everyday life, there are many market transactions commonly encountered, such as decentralized systems (DT), and Double Auction (DA). This paper presents the use of experimental methods to study the characteristics of both systems the transaction is in a "perfect competition” (5 sellers and 5 buyers' and market monopoly (with 1 seller and 5 buyers). Responses observed are Contract Price (CP), market efficiency, CP diversity coefficient on the price balance, buyer surplus and seller surplus. From the experimental results can be seen that the average Contract Price (CP) during 5 experimental periods that the value of CP at Perfect Competition Market is smaller than the monopoly market. From efficiency levels between transactions type it can be seen that the Double Auction type of transaction is more efficient than with the Decentralization type of transaction.


Sensors ◽  
2021 ◽  
Vol 21 (19) ◽  
pp. 6399
Author(s):  
Joseph Bugeja ◽  
Andreas Jacobsson ◽  
Paul Davidsson

Smart homes promise to improve the quality of life of residents. However, they collect vasts amounts of personal and sensitive data, making privacy protection critically important. We propose a framework, called PRASH, for modeling and analyzing the privacy risks of smart homes. It is composed of three modules: a system model, a threat model, and a set of privacy metrics, which together are used for calculating the privacy risk exposure of a smart home system. By representing a smart home through a formal specification, PRASH allows for early identification of threats, better planning for risk management scenarios, and mitigation of potential impacts caused by attacks before they compromise the lives of residents. To demonstrate the capabilities of PRASH, an executable version of the smart home system configuration was generated using the proposed formal specification, which was then analyzed to find potential attack paths while also mitigating the impacts of those attacks. Thereby, we add important contributions to the body of knowledge on the mitigations of threat agents violating the privacy of users in their homes. Overall, the use of PRASH will help residents to preserve their right to privacy in the face of the emerging challenges affecting smart homes.


2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Ming Di ◽  
Shah Nazir ◽  
Fucheng Deng

The wide-ranging implementation of Android applications used in various devices, from smartphones to intelligent television, has made it thought-provoking for developers. The permission granting mechanism is one of the defects imposed by the developers. Such assessing of defects does not allow the user to comprehend the implication of privacy for granting permission. Mobile applications are speedily easily reachable to typical users of mobile. Despite possible applications for improving the affordability, availability, and effectiveness of delivering various services, it handles sensitive data and information. Such data and information carry considerable security and privacy risks. Users are usually unaware of how the data can be managed and used. Reusable resources are available in the form of third-party libraries, which are broadly active in android apps. It provides a diversity of functions that deliver privacy and security concerns. Host applications and third-party libraries are run in the same process and share similar permissions. The current study has presented an overview of the existing approaches, methods, and tools used for influencing user behavior concerning android privacy policy. Various prominent libraries were searched, and their search results were analyzed briefly. The search results were presented in diverse perspectives for showing the details of the work done in the area. This will help researchers to offer new solutions in the area of the research.


Computers ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 69
Author(s):  
Yu-Jen Chen ◽  
Ja-Ling Wu ◽  
Yung-Chen Hsieh ◽  
Chih-Wen Hsueh

In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-based mechanisms, which build an effective connection between a distributed database and real assets. For demonstration purposes, smart contracts were drawn up to deal with two different applications. Due to the characteristics of the blockchain, we may still encounter severe privacy issues, since the data stored on the blockchain are exposed to the public. The proposed scheme provides a general solution for resolving the above-mentioned privacy issue; that is, we try to protect the on-chain privacy of the sensitive data by using homomorphic encryption techniques. Specifically, we constructed a secure comparison protocol that can check the correctness of a logic function directly in the encrypted domain. By using the proposed access control contract and the secure comparison protocol, one can carry out sensitive data-dependent smart contract operations without revealing the data themselves.


Author(s):  
Nihar Ranjan Pradhan ◽  
Akhilendra Pratap Singh ◽  
Kaibalya Prasad Panda ◽  
Diptendu Sinha Roy

Abstract The vital dependence of peer to peer (P2P) energy trading frameworks on creative Internet of Things (IoT) has been making it more vulnerable against a wide scope of attacks and performance bottlenecks like low throughput, high latency, high CPU, memory use, etc. This hence compromises the energy exchanging information to store, share, oversee, and access. Blockchain innovation as a feasible solution, works with the rule of untrusted members. To alleviate this threat and performance issues, this paper presents a Blockchain based Confidential Consortium (CoCo) P2P energy trading system that works on the trust issues among the energy exchanging networks and limits performance parameters. It reduces the duplicate validation by creating a trusted network on nodes, where participants identities are known and controlled. A Java-script-based smart contract is sent over the Microsoft CoCo system with Proof of Elapsed Time (PoET) consensus protocol. Also, a functional model is designed for the proposed framework and the performance bench-marking has been done considering about latency, throughput, transaction rate control, success and fail transaction, CPU and memory usage, network traffic. Additionally, it is shown that PoET’s performance is superior to proof of work (PoW) for multi-hosting conditions. The measured throughput and latency moving toward database speeds with more flexible, business-specific confidentiality models, network policy management through distributed governance, support for non-deterministic transactions, and reduced energy consumption.


2008 ◽  
Vol 56 (1) ◽  
pp. 102-120 ◽  
Author(s):  
Leon Yang Chu ◽  
Zuo-Jun Max Shen

Sign in / Sign up

Export Citation Format

Share Document