scholarly journals Blockchain Technology for Information Security of the Energy Internet: Fundamentals, Features, Strategy and Application

Energies ◽  
2020 ◽  
Vol 13 (4) ◽  
pp. 881 ◽  
Author(s):  
Zilong Zeng ◽  
Yong Li ◽  
Yijia Cao ◽  
Yirui Zhao ◽  
Junjie Zhong ◽  
...  

In order to ensure the information security, most of the important information including the data of advanced metering infrastructure (AMI) in the energy internet is currently transmitted and exchanged through the intranet or the carrier communication. The former increases the cost of network construction, and the latter is susceptible to interference and attacks in the process of information dissemination. The blockchain is an emerging decentralized architecture and distributed computing paradigm. Under the premise that these nodes do not need mutual trust, the blockchain can implement trusted peer-to-peer communication for protecting the important information by adopting distributed consensus mechanisms, encryption algorithms, point-to-point transmission and smart contracts. In response to the above issues, this paper firstly analyzes the information security problems existing in the energy internet from the four perspectives of system control layer, device access, market transaction and user privacy. Then blockchain technology is introduced, and its working principles and technical characteristics are analyzed. Based on the technical characteristics, we propose the multilevel and multichain information transmission model for the weak centralization of scheduling and the decentralization of transaction. Furthermore, we discuss that the information transmission model helps solve some of the information security issues from the four perspectives of system control, device access, market transaction and user privacy. Application examples are used to illustrate the technical features that benefited from the blockchain for the information security of the energy internet.

2012 ◽  
Vol 532-533 ◽  
pp. 1230-1234 ◽  
Author(s):  
Xiao Le Li ◽  
Yong Jun Luo ◽  
Yu Liang ◽  
Ying Wen

This paper mainly studies application of formal design for security protocols in digital campus. With a comprehensive analysis on security requirements of information transmission in digital campus, an information transmission model is built from the viewpoint of information security. Based on this model, a new security protocol, called DCIT for short, is designed. The formal analysis shows that secrecy, integrity, availability, controllability, non-repudiation and identifiability of information during transmission could be insured by DCIT, which could be used as a direction for development of various application systems in digital campus, from the viewpoint of information security.


1998 ◽  
Vol 4 (5-6) ◽  
pp. 62-66
Author(s):  
I.D. Gorbenko ◽  
◽  
Yu.V. Stasev ◽  
A.V. Pot ◽  
A.M. Tkachev ◽  
...  

Author(s):  
Naresh Sammeta ◽  
Latha Parthiban

Recent healthcare systems are defined as highly complex and expensive. But it can be decreased with enhanced electronic health records (EHR) management, using blockchain technology. The healthcare sector in today’s world needs to address two major issues, namely data ownership and data security. Therefore, blockchain technology is employed to access and distribute the EHRs. With this motivation, this paper presents novel data ownership and secure medical data transmission model using optimal multiple key-based homomorphic encryption (MHE) with Hyperledger blockchain (OMHE-HBC). The presented OMHE-HBC model enables the patients to access their own data, provide permission to hospital authorities, revoke permission from hospital authorities, and permit emergency contacts. The proposed model involves the MHE technique to securely transmit the data to the cloud and prevent unauthorized access to it. Besides, the optimal key generation process in the MHE technique takes place using a hosted cuckoo optimization (HCO) algorithm. In addition, the proposed model enables sharing of EHRs by the use of multi-channel HBC, which makes use of one blockchain to save patient visits and another one for the medical institutions in recoding links that point to EHRs stored in external systems. A complete set of experiments were carried out in order to validate the performance of the suggested model, and the results were analyzed under many aspects. A comprehensive comparison of results analysis reveals that the suggested model outperforms the other techniques.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Pei Xu ◽  
Joonghee Lee ◽  
James R. Barth ◽  
Robert Glenn Richey

PurposeThis paper discusses how the features of blockchain technology impact supply chain transparency through the lens of the information security triad (confidentiality, integrity and availability). Ultimately, propositions are developed to encourage future research in supply chain applications of blockchain technology.Design/methodology/approachPropositions are developed based on a synthesis of the information security and supply chain transparency literature. Findings from text mining of Twitter data and a discussion of three major blockchain use cases support the development of the propositions.FindingsThe authors note that confidentiality limits supply chain transparency, which causes tension between transparency and security. Integrity and availability promote supply chain transparency. Blockchain features can preserve security and increase transparency at the same time, despite the tension between confidentiality and transparency.Research limitations/implicationsThe research was conducted at a time when most blockchain applications were still in pilot stages. The propositions developed should therefore be revisited as blockchain applications become more widely adopted and mature.Originality/valueThis study is among the first to examine the way blockchain technology eases the tension between supply chain transparency and security. Unlike other studies that have suggested only positive impacts of blockchain technology on transparency, this study demonstrates that blockchain features can influence transparency both positively and negatively.


Author(s):  
O.V. Nepomnyashchiy ◽  
A.V. Tarasov ◽  
Yu.V. Krasnobaev ◽  
V.N. Khaidukova ◽  
D.O. Nepomnyashchiy

The problem of increasing the efficiency of power units of autonomous electric transport vehicles is considered. The task of creating a promising power system control device has been singled out. It is determined that in creating such devices, significant results can be obtained by using an intelligent module in the control loop of the electric drive. Goal. It is necessary to develop a power plant model with intelligent control, allowing to obtain data sets about currents, voltages and engine speeds in different modes of operation. The architecture of an intelligent control device, a PID controller based on a neural network, has been proposed; it has been proposed to exclude rotor angular velocity sensors from the classical feedback loop. The type and architecture of the neural network is defined. In the software environment MatLab the model of neuroemulator of the engine for formation of a training sample of a neural network by a method of Levenberg – Marquardt is developed. The trained neural network is implemented in the developed model of the electric motor control loop. The results of simulation of the intelligent control device showed a good convergence of the output influences generated by the neuroemulator with the actual parameters of the electric motor.


2018 ◽  
Vol 10 (11) ◽  
pp. 4201 ◽  
Author(s):  
Xiao Dai ◽  
Jian Wu ◽  
Liang Yan

In China, with the deepening of the reform of industrial structures, the improvement of technological innovation has become a key issue. This is not only related to whether the strategic development of Chinese science and technology can be achieved, but also whether the Chinese economy and high-quality human capital can develop sustainably. Based on the theoretical boundary of sustainable development—free transfer of information—we see that sticky wages are the embodiment of information dissemination. Under the dual effects of profit-seeking behavior and information barriers, the relationship between the sticky wages of technological innovation talents (TIT), as the most profitable labor force, and technological innovation efficiency (TIE) has become more complex, and so far we still have a limited understanding of it. We explore this issue in an empirical study by using a two-stage chain Data Envelopment Analysis (DEA) of TIE followed by modifying the wages of TIT; finally, we build a collaborative evolution model with spatial effects on a large dataset (from 2007 to 2016). The results show that the overall Chinese TIE is relatively low, and in the central and western regions the TIE has been seriously reversed; there are also divergences in the TIE at different stages in the regions we focus on. As the output of technological innovation, except for initial results (such as patents), the more important value is whether it has an ability to transform the initial results into production, and the core of it is whether it can match the market environment and technology transfer system (for example, market mechanism, transformation incentive mechanism, and institutional mechanism). So, considering these aspects, the central and west of China are obviously insufficient, while the east has obvious advantages; this can also explain the results of spatial diffusion, namely, in the eastern region it is higher than in other areas, but the gap between them is gradually narrowing; lastly, from the perspective of synergy, the wage stickiness of TIT in the central region is larger than that of the eastern and western regions, and the evolutionary relationship in the former is “extruding” while in the latter it is “cooperative.” Mainly due to the popularity of the eastern innovation network and the initial state of the west, the barriers of information transmission are relatively low, while the central part is undergoing economic transformation, so its extreme demand for TIT has pushed up the cost of information transmission.


Author(s):  
Петр Юрьевич Филяк ◽  
Максим Константинович Постников ◽  
Семен Евгеньевич Федоров ◽  
Александр Григорьевич Остапенко ◽  
Андрей Петрович Преображенский

В условиях развития информационного общества (Knowledgeable society - KS) информационные системы стали неотъемлемой частью любой организации, даже самой малой, независимо от реализуемых ими бизнес-процессов. Такие информационные системы принято называть корпоративными информационными системами (КИС), или Corporate Information System (CIS). Особые требования при разработке КИС предъявляются к обеспечению их информационной безопасности, что может быть реализовано путем разработки КИС в защищенном исполнении. Технологии blockchain являются очень перспективными не только при применении их в традиционных сферах - производстве, сервисе, на транспорте, но и для решения проблем безопасности и информационной, в частности. Анализу данной проблемы и подходам к ее решению и посвящена данная статья. At present, in the context of the development of Knowledgeable society, information systems are at now an integral part of any organization, even the smallest, regardless of the business processes they implement. Such information systems are commonly referred to as Corporate Information Systems (CIS). Special requirements for the development of CIS are made to ensure their information security, which can be achieved by developing a protected version of the CIS. In this article is considered the analysis of this problem and approaches to its solution. Block Chain technologies are very promising not only when applying them in traditional spheres - manufacturing, service, transport, but also to solve security and information problems, in particular.


Sign in / Sign up

Export Citation Format

Share Document