386 research outputs found

    On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach

    Full text link
    Open-access blockchains based on proof-of-work protocols have gained tremendous popularity for their capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous organization. Nevertheless, the proof-of-work based consensus protocols are vulnerable to cyber-attacks such as double-spending. In this paper, we propose a novel approach of cyber risk management for blockchain-based service. In particular, we adopt the cyber-insurance as an economic tool for neutralizing cyber risks due to attacks in blockchain networks. We consider a blockchain service market, which is composed of the infrastructure provider, the blockchain provider, the cyber-insurer, and the users. The blockchain provider purchases from the infrastructure provider, e.g., a cloud, the computing resources to maintain the blockchain consensus, and then offers blockchain services to the users. The blockchain provider strategizes its investment in the infrastructure and the service price charged to the users, in order to improve the security of the blockchain and thus optimize its profit. Meanwhile, the blockchain provider also purchases a cyber-insurance from the cyber-insurer to protect itself from the potential damage due to the attacks. In return, the cyber-insurer adjusts the insurance premium according to the perceived risk level of the blockchain service. Based on the assumption of rationality for the market entities, we model the interaction among the blockchain provider, the users, and the cyber-insurer as a two-level Stackelberg game. Namely, the blockchain provider and the cyber-insurer lead to set their pricing/investment strategies, and then the users follow to determine their demand of the blockchain service. Specifically, we consider the scenario of double-spending attacks and provide a series of analytical results about the Stackelberg equilibrium in the market game

    Prototype of running clinical trials in an untrustworthy environment using blockchain.

    Get PDF
    Monitoring and ensuring the integrity of data within the clinical trial process is currently not always feasible with the current research system. We propose a blockchain-based system to make data collected in the clinical trial process immutable, traceable, and potentially more trustworthy. We use raw data from a real completed clinical trial, simulate the trial onto a proof of concept web portal service, and test its resilience to data tampering. We also assess its prospects to provide a traceable and useful audit trail of trial data for regulators, and a flexible service for all members within the clinical trials network. We also improve the way adverse events are currently reported. In conclusion, we advocate that this service could offer an improvement in clinical trial data management, and could bolster trust in the clinical research process and the ease at which regulators can oversee trials

    The Role of Collaborative Governance in Blockchain-Enabled Supply Chains: A Proposed Framework

    Get PDF
    The blockchain age is dawning. Firms large and small are teaming up with partners and solution providers to deploy blockchain, especially in supply chains, often called the “sleeping giant” use case. But blockchain is still new, and despite early successes in simulated environments, how companies need to collaborate in a blockchain world is unclear. To help close the blockchain collaboration research gap, this design science study explores the technological and ecosystem business decisions required to deploy an interoperable blockchain solution. The research partially builds a supply chain artifact, and the challenges experienced by the design team prompts further investigation with twenty blockchain experts. With the discovery that effective and collaborative governance is a key mechanism to remove obstacles in blockchain deployment, the study concludes with a collaborative governance model. Inspired by public policy makers, the framework includes technological rules to assist practitioners as they collaborate in a blockchain world

    Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications

    Get PDF
    Internet-of-Things (IoT) utilising sensors is effective in performing continuous monitoring, while Blockchain is ideal in guaranteeing integrity and immutability of these IoT data. There are many challenges in integrating IoT and Blockchain together mainly because IoT devices have limited computational resources, and storage capacity while Blockchain processing incurs high CPU cost and high latency in data transfer. We propose a fully distributed edge computing architecture coupled with an efficient storage system that is based on Non-Volatile Memory express Over Fabrics (NVMeOF) to provide efficient IoT data processing for supply chain management. The data is secured using Blockchain at the edge to ensure traceability, security and non-repudiation in the data. An evaluation of our implementation and performance comparison between NVMeOF and SATA storage interfaces for our IoT-Blockchain architecture is presented

    Virtual Resources & Internet of Things

    Get PDF
    Internet of Things (IoT) systems mostly follow a Cloud-centric approach. These systems get the benefits of the extensive computational capabilities and flexibility of the Cloud. Although Cloud-centric systems support virtualization of components to interact with IoT networks, many of these systems introduce high latency and restrict direct access to IoT devices. Fog computing has been presented as an alternative to reduce latency when engaging IoT networks, however, new forms of virtualization are required to access physical devices in a direct manner. This research introduces a definition of Virtual Resources to enable direct access to IoT networks and to allow richer interactions between applications and IoT components. Additionally, this work proposes Virtual Resources as a mechanism to handle the multi-tenancy challenge that emerges when more than one tenant tries to access and manipulate an IoT component simultaneously. Virtual Resources are developed using Go language and CoAP protocol. This work proposes permission-based blockchain to provision Virtual Resources directly on IoT devices. Seven experiments have been done using Raspberry Pi computers and Edison Arduino boards to test the definition of Virtual Resources presented by this work. The results of the experiments demonstrate that Virtual Resources can be deployed across different IoT platforms. Also, the results show that Virtual Resources and blockchain can support multi-tenancy in the IoT space. IBM Bluemix Blockchain as a Service and Multichain blockchain have been evaluated handling the provisioning of Virtual Resources in the IoT network. The results of these experiments show that permission-based blockchain can store the configurations of Virtual Resources and provision these configurations in the IoT network

    Digital Management of Competencies in Web 3.0: The C-Box® Approach

    Get PDF
    Management of competencies is a crucial concern for both learners and workers as well as for training institutions and companies. For the former, it allows users to track and certify the acquired skills to apply for positions; for the latter, it enables better organisation of business processes. However, currently, most software systems for competency management adopted by the industry are either organisation-centric or centralised: that is, they either lock-in students and employees wishing to export their competencies elsewhere, or they require users’ trust and for users to give up privacy (to store their personal data) while being prone to faults. In this paper, we propose a user-centric, fully decentralised competency management system enabling verifiable, secure, and robust management of competencies digitalised as Open Badges via notarization on a public blockchain. This way, whoever acquires the competence or achievement retains full control over it and can disclose his/her own digital certifications only when needed and to the extent required, migrate them across storage platforms, and let anyone verify the integrity and validity of such certifications independently of any centralised organisation. The proposed solution is based on C-Box®, an existing application for the management of digital competencies that has been improved to fully support models, standards, and technologies of the so-called Web 3.0 vision—a global effort by major web organisations to “give the web back to the people”, pushing for maximum decentralisation of control and user-centric data ownership

    EMAIL VERIFICATION SERVICE USING BLOCKCHAIN

    Get PDF
    Current email security solutions depend on various attributes to reduce the chances that a given email (mail) is likely to be a threat. However, current solutions make it relatively easy to target corporate organizations with a Business Email Compromise (BEC) attack. A BEC attack is a non-malicious mail which defrauds key people in organizations into performing, for example, wire transfers meant for the suppliers or partners abroad. The U.S. Federal Bureau of Investigation (FBI) has been tracking BEC, also known as email fraud and email account compromise (EAC), domestically and globally since October 2013. The recent trends related to fraudulent wire transfers and unauthorized disclosures of employee data are alarming: Total identified global exposed losses now exceed 12.5billion(upfrom12.5 billion (up from 5.3 billion in December 2016). More than 30,000 victim complaints were submitted between June 2016 and May 2018 via the recently launched Internet Crime Complaint Center (IC3) compliant form. BEC scams targeting the real estate sector rose more than 1,100% between 2015 and 2017. Wage and tax documentation BEC scams extend the threat beyond wire transfers and continue to grow. The US Internal Revenue Service (IRS) indicated it received approximately 900 reports of Form W-2 scams in 2017 (compared to just over 100 reports in 2016). The problem is that there is no absolute way to understand if a mail was sent from a particular sender to a group of recipients
    • …
    corecore