scholarly journals autoCoin: Secure Content Sharing Based on Blockchain for Vehicular Cloud

Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1477
Author(s):  
Wooseong Kim ◽  
Kyungho Ryu

A future smart car will be more than a means of transportation, as it will not only move people to a destination without requiring them to drive but will enable people to work or enjoy a trip with entertainment. For this, smart vehicles need to deal with various types of data for safety and infotainment, such as real-time traffic, multi-media contents, documents and weather information. Recently, a fleet of vehicles connected to other vehicles and infrastructure (i.e., road side units) using a legacy or 5G mmWave spectrum has been considered as a platform to cooperate for those new tasks, known as the vehicular cloud or fog. Within the vehicular cloud, data management should consider security, high availability and interoperability between vehicles. However, these are not easily achievable without a centralized service provider; it is difficult for an autonomous P2P system to guarantee data integrity, and it cannot compensate drivers that actively participate in the vehicular cloud. Fortunately, the many successes achieved in the field of crypto-currency raise the possibility of defining incentives that are necessary for a sustainable digital economy. In this paper, we propose autoCoin—an approach that aims to encourage smart vehicles to cooperate to create and exchange infotainment data securely under the assumption of rationality. We introduce a scalable blockchain architecture for autoCoin and a smart contract to exchange contents without third-parties using an off-chain technique.

2014 ◽  
Vol 36 (7) ◽  
pp. 1485-1499 ◽  
Author(s):  
Jie SONG ◽  
Tian-Tian LI ◽  
Zhi-Liang ZHU ◽  
Yu-Bin BAO ◽  
Ge YU

2021 ◽  
Vol 14 (7) ◽  
pp. 1166-1166
Author(s):  
Sujaya Maiyya ◽  
Faisal Nawab ◽  
Divyakant Agrawal ◽  
Amr El Abbadi

This errata article discusses and corrects a minor error in our work published in VLDB 2019. The discrepancy specifically pertains to Algorithms 3 and 4. The algorithms presented in the paper are biased towards a commit decision in a specific failure scenario. We explain the error using an example before correcting the algorithm.


2019 ◽  
pp. 889-902
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

One of the main challenges in cloud computing is to build a healthy and efficient storage for securely managing and preserving data. This means a cloud service provider needs to make sure that its clients' outsourced data are stored securely and, data queries and retrievals are executed correctly and privately. On the other hand, it may also mean businesses are willing to outsource their data to a third party only if they trust their data are not accessible and visible to the service provider and other non-authorized parties. However, one of the major obstacles faced here for ensuring data reliability and security is Byzantine faults. While Byzantine fault tolerance (BFT) has received growing attention from the academic research community, the research done is generally from the distributed computing point of view, and hence finds little practical use in cloud computing. To that end, the focus of this paper is to discuss how these faults can be tolerated with the authors' proposed conceptualization of Byzantine data faults and fault-tolerant architecture in cloud data management.


2016 ◽  
pp. 1205-1222
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Eric Pardede

Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.


2016 ◽  
Vol 7 (3) ◽  
pp. 86-98 ◽  
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

One of the main challenges in cloud computing is to build a healthy and efficient storage for securely managing and preserving data. This means a cloud service provider needs to make sure that its clients' outsourced data are stored securely and, data queries and retrievals are executed correctly and privately. On the other hand, it may also mean businesses are willing to outsource their data to a third party only if they trust their data are not accessible and visible to the service provider and other non-authorized parties. However, one of the major obstacles faced here for ensuring data reliability and security is Byzantine faults. While Byzantine fault tolerance (BFT) has received growing attention from the academic research community, the research done is generally from the distributed computing point of view, and hence finds little practical use in cloud computing. To that end, the focus of this paper is to discuss how these faults can be tolerated with the authors' proposed conceptualization of Byzantine data faults and fault-tolerant architecture in cloud data management.


Sign in / Sign up

Export Citation Format

Share Document