scholarly journals BlendSPS: A BLockchain-ENabled Decentralized Smart Public Safety System

Smart Cities ◽  
2020 ◽  
Vol 3 (3) ◽  
pp. 928-951
Author(s):  
Ronghua Xu ◽  
Seyed Yahya Nikouei ◽  
Deeraj Nagothu ◽  
Alem Fitwi ◽  
Yu Chen

Due to the recent advancements in the Internet of Things (IoT) and Edge-Fog-Cloud Computing technologies, the Smart Public Safety (SPS) system has become a more realistic solution for seamless public safety services that are enabled by integrating machine learning (ML) into heterogeneous edge computing networks. While SPS facilitates convenient exchanges of surveillance data streams among device owners and third-party applications, the existing monolithic service-oriented architecture (SOA) is unable to provide scalable and extensible services in a large-scale heterogeneous network environment. Moreover, traditional security solutions rely on a centralized trusted third-party authority, which not only can be a performance bottleneck or the single point of failure, but it also incurs privacy concerns on improperly use of private information. Inspired by blockchain and microservices technologies, this paper proposed a BLockchain-ENabled Decentralized Smart Public Safety (BlendSPS) system. Leveraging the hybrid blockchain fabric, a microservices based security mechanism is implemented to enable decentralized security architecture, and it supports immutability, auditability, and traceability for secure data sharing and operations among participants of the SPS system. An extensive experimental study verified the feasibility of the proposed BlendSPS that possesses security and privacy proprieties with limited overhead on IoT based edge networks.

2021 ◽  
Vol 1 (3) ◽  
pp. 70-88
Author(s):  
Muhammad Waseem ◽  
Khawaja Arslan Ahmed ◽  
Muhammad Talha Azeem

Blockchain technology is widely studied in these days and has vital role in the ITS and Vehicular network. Intelligent Transport System (ITS) have resolved several issues of transportation like congestion, electronic toll collection, traffic light cameras, traffic updates, and environment forecasting. The vehicular network is the ever-increasing network it is not only facilitates us but also brings new challenges with it. The mobile nature of vehicular networks it is very important to collect and broadcast information of traffic events in real-time. A little delay to broadcast important information or deciding on this information can cause a serious situation in the mobile vehicular network. Moreover, malicious vehicles in the network broadcasting false information about these traffic events cause a disturbance in the network. In large-scale scenarios, the transmission of malicious messages offers a lot of danger to the system. They can wrongly claim the roads and provide false information about the incident. These traffic events can be life-threatening and cause unwanted situations like accidents, wastage of time and other resources. Therefore, it is very much important to provide real-time information on recent traffic events and real-time authentication of vehicles that broadcast information in the network. Traditional studies are unable to solve these security issues and contain a single point of failure issue. These studies are centralized and dependent on a single higher authority. Moreover, they have serious security concerns that are harmful for vehicular network. Moreover, any vehicles are unwilling to share their private information while broadcasting information about traffic events because they are strangers to each other. And if a vehicle does not want to share its private information like name, id, etc. It is not possible to authenticate this vehicle and manage trust in the network. It means that it is very crucial to prevent vehicles to broadcast wrong information in the network while preserving their privacy at the same time. Therefore, there is a need to authenticate vehicles and manage trust in the network while preserving their privacy simultaneously. Blockchain can offer better solution to solve these issues due to its secure distributed environment and features that ensure immutability about actions. The purpose of this report is to provide real-time security and privacy in the network. It is also ensured that vehicles get real-time authenticated information about traffic incidents from legitimate vehicles while simultaneously preserving their privacy. It means that only authenticated and legitimate entities (vehicles) can participate in vehicular network and privacy of both sender and receiver is secured in the network. Details of conducted experiments are given, and shreds of evidence are provided to evaluate the performance of architectures for authentication and trust management. The shreds of evidence show that these blockchain-based systems can solve security and trust issues more effectively.


Author(s):  
Raghav Goel and Dr. Bhoomi Gupta

Are you a software engineer/developer/coder or maybe even a tech enthusiast who is thinking of agility, parallel development and reducing cost. In the early twentieth century, we witnessed the rise of Service Oriented Architecture (SOA), which is a software architecture pattern that allows us to construct large-scale enterprise applications that require us to integrate multiple services, each of which is made over different platforms and languages through a common communication mechanism, where we write code and multiple services talk to each other’s for a business use case, but sometimes we end up with one big monolithic code base whose maintenance becomes difficult. Nowadays clients are using cloud and paying for on-demand services without effectively utilizing resources. These problems invite micro-services. In this paper, I am going to discuss how one should use scale application in a production environment and local machine


Author(s):  
Surya Nepal ◽  
John Zic

In the Service Oriented Architecture (SOA) model, a service is characterized by its exchange of asynchronous messages, and a service contract is a desirable composition of a variety of messages. Though this model is simple, implementing large-scale, cross-organizational distributed applications may be difficult to achieve in general, as there is no guarantee that service composition will be possible because of incompatibilities of Web service contracts. We categorize compatibility issues in Web service contracts into two broad categories: (a) between contracts of different services (which we define as a composability problem), and (b) a service contract and its implementation (which we define as a conformance problem). This chapter examines and addresses these problems, first by identifying and specifying contract compatibility conditions, and second, through the use of compatibility checking tools that enable application developers to perform checks at design time.


Author(s):  
Elarbi Badidi ◽  
Mohamed El Koutbi

The services landscape is changing with the growing adoption by businesses of the Service Oriented Architecture (SOA), the migration of business solutions to the cloud, and the proliferation of smartphones and Internet-enabled handheld devices to consume services. To meet their business goals, organizations increasingly demand services, which can satisfy their functional and non-functional requirements. Service Level Agreements (SLAs) are seen as the means to guarantee the continuity in service provisioning and required levels of service. In this paper, we propose a framework for service provisioning, which aims at providing support for automated SLA negotiation and management. The Service Broker component carries out SLA negotiation with selected service-providers on behalf of service-consumers. Multi-rounds of negotiations are very often required to reach an agreement. In each round, the negotiating parties bargain on multiple SLA parameters by trying to maximize their global utility functions. The monitoring infrastructure is in charge of observing SLA compliance monitoring using measurements obtained from independent third party monitoring services.


Author(s):  
Laurent Cicurel ◽  
José Luis Bas Uribe ◽  
Sergio Bellido Gonzalez ◽  
Jesús Contreras ◽  
José-Manuel López-Cobo ◽  
...  

Offering public access to efficient transactional stock market functionalities is of interest to all banks and bank users. Traditional service oriented architecture (SOA) technology succeeds at providing reasonable, good Web-based brokerage solutions, but may lack extensibility possibilities. By introducing Semantic Web Services (SWS) as a way to integrate third party services from distributed service providers, we propose in this chapter an innovative way to offer online real-time solutions that are easy-to-use for customers. The combined use of ontologies and SWS allows different users to define their own portfolio management strategies regardless of the information provider. In deed the semantic layer is a powerful way to integrate the information of many providers in an easy way. With due regard for more development of security technological issues, research on SWS has shown that the deployment of the technology in commercial solutions is within sight.


Author(s):  
Andrew Targowski

The enterprise system approach is defined by its evolution and major milestones of architectural planning. The ES architectures are multi-faceted solutions, hence it is defined in the scope of the enterprise organization architecture (EOA), enterprise functional architecture (EFA), enterprise processive architecture (EPA), enterprise information architecture (EIA), enterprise software architecture (ESA), enterprise network architecture (ENA), enterprise service architecture (ESA), business component architecture (BCA), enterprise information infrastructure (EII), and enterprise configurations. A composite ES architecture is presented as a transitional architecture, which is currently practiced by most enterprises. The near future of the ES approach will be rather limited to the ways of delivering ES’ applications within a framework of service-oriented architecture (SOA) and the cloud computing, which satisfies effective large-scale operations. The progressive process of organization/business virtualization and the urgent need for more sustainable enterprise development should lead to new development of enterprise systems.


SIMULATION ◽  
2018 ◽  
Vol 95 (4) ◽  
pp. 363-381
Author(s):  
Fuyu Sun ◽  
Jianping Zhou ◽  
Shuai Guo ◽  
Yi Li

Service-Oriented Architecture (SOA) has gained considerable popularity for the development of large-scale distributed software systems. The SOA paradigm promotes the reusability and integrability of software in heterogeneous environments by means of open standards. The existing problem is that every service-oriented software development project often requires a customized development process that provides specific service-oriented software in support of requirements unique to that project. To resolve this problem, this study proposes universal service-oriented software (USOS). USOS focuses on the general simulation technology and integrates many features, which are necessary to build a correct and efficient simulation system. It is aimed at providing a professional environment to reduce the cost of modeling as well as the execution time of the simulation for multi-type models. USOS supports many advanced features such as dynamic model template generation, multi-formalism model debugging, flexible model-driven application, etc. Developers may use USOS as an open framework to build, store, and verify models very efficiently. Based on USOS, we have developed a large-scale parallel simulation platform called SIM, which is oriented to test parallel and distributed architectures, and applications in the aerospace domain. This study introduces the distinctive features of USOS for practical implementation of SIM and validates the performance by a prototype system simulation.


Blockchain refers to a distributed ledger technology that represents an innovation in recording and sharing information without the need for a trusted third party. Blockchain technology offers new tools for security and privacy concerns. Marching towards digitization and analytics, this technology emerges as a promising solution for authentication and authorization issues. It sounds so amazing that this technology that originated with cryptocurrencies could not only be applied in digital contracts, financial and public records, and property ownership but also in medicine, education, science and so on. The use case of this technology springs up in every possible direction. This article first analyses the need for this breakthrough technology and explains how this technology works. This work presents a review on various types of blockchain, the consensus mechanisms used, their advantages and limitations. It provides an overview on the various use cases of this technology. This work mainly focuses on its application in Healthcare. The goal of this article is to analyze the usage of Blockchain technology in various fields of Healthcare such as Electronic Health Record, Health Insurance, Biomedical Research, Drug Supply, Medical Education, Remote Patient Monitoring, Interoperability, Location Sharing etc., It investigates the current research trends and finds the gaps and limitations of these approaches. Moreover, it proposes some enhancements to fill in the gaps in the present approach. This work also analyses the importance of Wearable Internet of Things (IoT) devices in HealthCare and the integration of these devices with Blockchain. Finally, this work concludes by comparing Blockchain 3.0 with previous versions.


2013 ◽  
Vol 21 (2) ◽  
pp. 72-95 ◽  
Author(s):  
Aries Susanto ◽  
Hwansoo Lee ◽  
Hangjung Zo ◽  
Andrew P. Ciganek

Internet banking is a prominent example of Internet-based applications. Previous research has found that satisfaction, trust, commitment, and loyalty are important factors for Internet banking success. Resistance to adopt Internet banking is often attributed to the role of trust, security, and privacy in e-commerce systems. This study proposes a framework to examine behaviors toward Internet banking services in Indonesia and South Korea. A research model was empirically tested with data captured in a large-scale study. The results show that Indonesians’ use of Internet banking is strongly influenced by perceived security, while Koreans use of Internet banking is strongly influenced by privacy concerns. Trust and user satisfaction have a greater influence on loyalty for Indonesians while commitment has a greater influence on loyalty for Koreans. The study develops related conclusions including a discussion of the research implications.


Author(s):  
Muthu Ramachandran ◽  
Pethuru Raj Chelliah ◽  
P. Beaulah Soundarabai

Cloud computing technologies are being used highly successfully in large-scale businesses. Therefore, it is useful for governments to adopt cloud-driven multi-channel, and multiple devices to offer their services such as e-tax, e-vote, e-health, etc. Since these applications require open, flexible, interoperable, collaborative, and integrated architecture, service-oriented architecture approach can be usefully adopted to achieve flexibility and multi-platform and multi-channel integration. However, its adoption needs to be systematic, secure, and privacy-driven. In this context, micro services architecture (MSA), a direct offshoot of SOA, is also a highly attractive mechanism for building and deploying enterprise-scale applications. This chapter proposes a systematic framework for cloud e-government services based on the cloud software engineering approach and suggests a cloud adoption model for e-government, leveraging the benefits of MSA patterns. The proposed model is based on a set of evaluated application characteristics that, in turn, support emerging IT-based technologies.


Sign in / Sign up

Export Citation Format

Share Document