Revolutionary Applications of Blockchain-Enabled Privacy and Access Control - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 11)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799875895, 9781799875901

Author(s):  
Sivasankari Narasimhan

In the blockchain, the transaction hashes are implemented through public-key cryptography and hash functions. Hence, there is a possibility for the two users to choose the same private key knowingly or unknowingly. Even the intruders can follow the particular user's bitcoin transaction, and they can masquerade as that user by generating the private and public key pairs of him. If it happens, the user may lose his transaction. Generally, bitcoin technology uses random numbers from 1 to 2256. It is a wide range, but for a greater number of users, there should be one another solution. There is a possibility of digital prototyping which leads to the loss of more accounts. This chapter provides the device-specific fingerprint technology known as physical unclonable function (PUF) to be employed for authentication in a blockchain-based bitcoin environment. The random unique response from PUF ensures correct transaction. In this chapter, a new tetrahedral oscillator PUF has been introduced intrinsically. All the blockchain operations are carried out and verified with PUF response.


Author(s):  
Dhana Srinithi Srinivasan ◽  
Karpagam Manavalan ◽  
Soundarya R. ◽  
Thamizhi S. I.

Blockchain is an emerging technology that is based on the concept of distributed ledgers. It allows for pervasive transactions among different parties and eliminates the need for third-party intermediaries. Several of blockchain's characteristics make it suitable for use in the agriculture sector. Some of the potential applications of blockchain include efficient management of the food supply chain and value-based payment mechanisms. The products of agriculture are usually the inputs for a multi-actor distributed supply chain, in which case the consumer is usually the final client. The food chain involves several actors including farmers, shipping companies, distributors, and groceries. This makes the entire system to be distributed with multiple actors playing different roles throughout the chain. This currently used system is inefficient and unreliable in various aspects. This project aims to leverage blockchain technology to solve and address discrepancies involved in food supply chains.


Author(s):  
Namrata Dhanda ◽  
Anushka Garg

This chapter explores the drawbacks of conventional centralized share exchange frameworks, like those of higher transaction costs, central and vulnerable regulation to exploitation, and lack of revelation to business behavior and practices by introducing a revolutionary model that utilizes blockchain to establish a decentralized stock exchange and a transparent persistent economy. The suggested model utilizes exclusive contracts to implement the validity of the privileges of the owner and the proper accomplishment and settlement of the transactions, thereby mitigating the need for a centralized authority to ensure the accuracy of the stock exchange mechanism. The experimental findings convincingly demonstrate that the decentralized solution can provide lower transaction costs by progressively replacing brokerage costs and centralized officials' commissions with mining charges, which reward the miners for their backbreaking work in maintaining the system and enforcing the laws.


Author(s):  
Promise Agbedanu ◽  
Anca Delia Jurcut

In this era of explosive growth in technology, the internet of things (IoT) has become the game changer when we consider technologies like smart homes and cities, smart energy, security and surveillance, and healthcare. The numerous benefits provided by IoT have become attractive technologies for users and cybercriminals. Cybercriminals of today have the tools and the technology to deploy millions of sophisticated attacks. These attacks need to be investigated; this is where digital forensics comes into play. However, it is not easy to conduct a forensic investigation in IoT systems because of the heterogeneous nature of the IoT environment. Additionally, forensic investigators mostly rely on evidence from service providers, a situation that can lead to evidence contamination. To solve this problem, the authors proposed a blockchain-based IoT forensic model that prevents the admissibility of tampered logs into evidence.


Author(s):  
Loreen M. Powell ◽  
Jessica Schwartz ◽  
Michalina Hendon

Technological advancements in the transportation/automotive industry are continually increasing due to competition and consumer demands. The mobile open blockchain initiative (MOBI) is one way organizations are coming together to share innovating ways to revolutionize the transportation/automotive industry. This chapter explains the events that lead to the innovation of an open consortium, MOBI, and its members and highlights some of the cutting-edge technologies and innovative methods where blockchain is being adopted by the transportation/automotive industry.


Author(s):  
Eranda Harshanath Jayatunga ◽  
Pasika Sashmal Ranaweera ◽  
Indika Anuradha Mendis Balapuwaduge

The internet of things (IoT) is paving a path for connecting a plethora of smart devices together that emerges from the novel 5G-based applications. This evident heterogeneity invites the integration of diverse technologies such as wireless sensor networks (WSNs), software-defined networks (SDNs), cognitive radio networks (CRNs), delay tolerant networks (DTNs), and opportunistic networks (oppnets). However, the security and privacy are prominent conundrums due to featured compatibility and interoperability aspects of evolving directives. Blockchain is the most nascent paradigm instituted to resolve the issues of security and privacy while retaining performance standards. In this chapter, advances of blockchain technology in aforesaid networks are investigated and presented as means to be followed as security practices for pragmatically realizing the concepts.


Author(s):  
Ambika N.

IoT is an assembly of equipment of different calibers and functionality working towards a single goal. A blockchain is a computerized record that contains the whole history of exchanges made on the system. A multi-WSN arrangement model is structured. The hubs of the IoT are isolated into base stations, group heads, and conventional hubs as per their capacities, which encourage the administration and participation of the hubs. A hybrid blockchain model is proposed. To fit the multi-WSN arrange model better, as indicated by the various capacities and energies of various hubs, neighborhood blockchain and open blockchain are sent between group head hubs and base stations individually, and a crossbreed blockchain model is framed. A shared validation plot for IoT hubs is proposed. For group head hubs, the creators utilize the worldwide blockchain for validation, and for customary hubs, they utilize the nearby blockchain for confirmation. The proposal aims in increasing reliability by 1.17% and minimizes sinkhole attack by 2.42% compared to previous contribution.


Author(s):  
Rochak Swami ◽  
Mayank Dave ◽  
Virender Ranga ◽  
Nikhil Tripathi ◽  
Abhijith Kalayil Shaji ◽  
...  

Distributed denial of service (DDoS) attacks have been a matter of serious concern for network administrators in the last two decades. These attacks target the resources such as memory, CPU cycles, and network bandwidth in order to make them unavailable for the benign users, thereby violating availability, one of the components of cyber security. With the existence of DDoS-as-a-service on internet, DDoS attacks have now become more lucrative for the adversaries to target a potential victim. In this work, the authors focus on countering DDoS attacks using one of the latest technologies called blockchain. In inception phase, utilizing blockchain for countering DDoS attacks has proved to be quite promising. The authors also compare existing blockchain-based defense mechanisms to counter DDoS attacks and analyze them. Towards the end of the work, they also discuss possible future research directions in this domain.


Author(s):  
Archana Sharma ◽  
Purnima Gupta

As the base of bitcoin, the blockchain has received widespread consideration recently. Blockchain stands for an immutable ledger which permits transactions to occur in a decentralized ways. Applications based on blockchain are numerous for instance financial services, industrial and supply chain services, legal and healthcare services, IoT and blockchain integration, bigdata analytics, and so on. Nevertheless, there are still numerous confronts of blockchain technology like security and fork problems that have to be resolved. This research highlights an inclusive indication on blockchain technology with blockchain architecture in the first phase. And in the second phase, the security challenges and problems associated with blockchain are highlighted. It further proposes and measures up to various typical consensus algorithms used in different blockchains. Research has been concluded with the potential prospects of blockchain as future trends.


Author(s):  
Sonam Bhardwaj ◽  
Rochak Swami ◽  
Mayank Dave

Software-defined networking (SDN) is a promising networking technology that provides a new way of network management to the customers. SDN provides more programmable and flexible network services. SDN breaks the vertical integration of control and data planes and promotes centralized network management. This unique characteristic of SDN offers security features to deal with the malicious activities. However, architectural design of SDN makes it vulnerable to several attacks. Therefore, it is important to investigate the crime through various forensic techniques. This work discusses a literature study of some possible forensic techniques. A framework is also presented for forensic investigation of SDN environment in attack scenario. The proposed framework includes the collection of evidence and preserves them against any damage. During investigation, protection of evidence and chain of custody are of utmost importance to avoid misleading of the investigators. The safe storage strategy as well as maintaining the custody link can be achieved through blockchain technology.


Sign in / Sign up

Export Citation Format

Share Document