13 research outputs found

    TrustNShare Partizipativ entwickeltes, Smart-contract basiertes Datentreuhandmodell mit skalierbarem Vertrauen und Inzentivierung

    Get PDF
    Überblick über die Ziele, Projektpartner (DLR, UKB, UKJ) und Aufgabenbereiche des Projekts "TrusNShare". Fokus liegt auf der Erläuterung des geplanten Treuhandmodells, der Partizipativen Entwicklung möglicher Anreize und der "Healthy Navigation App"

    Improved Rsa Algorithm for Data Security against DDoS Attack in a Cloud-based Intrusion Detection System

    Get PDF
    Today, more and more industries are using cloud computing for some integration operations, but ensuring the security of user data and system resources remains a challenge. This article proposes a method to identify and mitigate unwanted packets and traffic, especially duplicate packets, in cloud computing environments. The method includes creating an Intrusion Search and Detection (IF-AD) system to securely maintain user information and allocate secondary memory. To detect unwanted traffic, this method compares the size of the downloaded file  with the original file, identifying any differences as potential DDoS.  RSA encryption mechanism is used for subsequent file transfers for added security. The proposed approach aims to enhance the security posture of cloud-based systems by detecting and preventing unauthorized access and file modification

    Requirements For Incentive Mechanisms In Industrial Data Ecosystems

    Get PDF
    In the increasingly interconnected business world, economic value is less and less created by one company alone but rather through the combination and enrichment of data by various actors in so-called data ecosystems. The research field around data ecosystems is, however, still in its infancy. In particular, the lack of knowledge about the actual benefits of inter-organisational data sharing is seen as one of the main obstacles why companies are currently not motivated to engage in data ecosystems. This is especially evident in traditional sectors, such as production or logistics, where data is still shared comparatively rarely. However, there is also consensus in these sectors that cross-company data-driven services, such as collaborative condition monitoring, can generate major value for all actors involved. One reason for this discrepancy is that it is often not clear which incentives exist for data providers and how they can generate added value from offering their data to other actors in an ecosystem. Fair and appropriate incentive and revenue sharing mechanisms are needed to ensure reliable cooperation and sustainable ecosystem development. To address this research gap and contribute to a deeper understanding, we conduct a literature review and identify requirements for incentive mechanisms in industrial data ecosystems. The results show, among other things, that technical requirements, such as enabling data usage control, as well as economic aspects, for instance, the fair monetary valuation of data, play an important role in incentive mechanisms in industrial data ecosystems. Understanding these requirements can help practitioners to better comprehend the incentive mechanisms of the ecosystems in which their organisations participate and can ultimately help to create new data-driven products and services

    A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions

    Get PDF
    Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive survey of the most recent and promising blockchain state-of-the-art methods, the P2P network for data dissemination, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. Furthermore, we have discussed a detailed comparison of consensus algorithms of Blockchain concerning security. Also, we have discussed the future of blockchain and cloud computing. The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work

    DESIGN OPTIONS FOR DATA SPACES

    Get PDF
    Data spaces receive considerable attention nowadays since they are at the heart of numerous large-scale European research initiatives shaping the data economy. Their goal is to establish secure environments that enable cross-organizational data management and thereby collect, integrate and make available heterogeneous data from various sources. Although we can observe a great interest in establishing new data spaces, questions of what exactly makes a data space and what it takes to design one remain open. To clarify that, we extracted and organized data space characteristics based on the analysis of 53 papers, as well as an empirical analysis of 47 real-world data spaces. We formalize the findings in a taxonomy to provide an intuitive tool that captures important data space design options. Our paper contributes to the understanding of an emerging artifact with significant implications for business, namely data spaces

    Blockchain-based incentives for secure and collaborative data sharing in multiple clouds

    No full text
    The prosperity of cloud computing has driven an increasing number of enterprises and organizations to store their data on private or public cloud platforms. Due to the limitation of individual data owners in terms of data volume and diversity, data sharing over different cloud platforms would enable third parties to take advantage of big data analysis techniques to provide value-added services, such as providing healthcare services for customers by gathering medical data from multiple hospitals. However, it remains a challenging task to design effective incentives that encourage secure and collaborative data sharing in multiple clouds. In this paper, we propose a reliable collaboration model consisting of three types of participants, which include data owners, miners, and third parties, where the data is shared via blockchain and recorded by a smart contract. In general, these participants may acquire and store the sharing of data using their private or public clouds. We analyze the topological relationships between the participants and develop some Shapley value models from simple to complicate in the process of revenue distribution. We also discuss the incentive effect of sharing security data and rationality of the designed solution through analysis towards distribution rules.This work is partially supported by the Beijing Natural Science Foundation under Grant 4192050, and in part by the National Natural Science Foundation of China under Grants 61972039 and 61872041

    Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

    Get PDF
    Supply chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and restrictive data flows. These bottlenecks can force manufacturers to source more raw materials and increase production significantly. Also, restrictive data flow in a complex global SC network generally slows down the movement of goods and services. The use of distributed ledger technologies (DLT) in SC management (SCM) demonstrates the potentials to reduce these bottlenecks through transparency, decentralization, and optimizations in data management. These technologies promise to enhance the trustworthiness of entities within the SC, ensure the accuracy of data-driven operations, and enable existing SCM processes to migrate from a linear to a fully circular economy. This article presents a comprehensive review of 111 articles published in the public domain in the use and efficacy of DLT in SC. It acts as a roadmap for current and future researchers who focus on SC security management to better understand the integration of digital technologies such as DLT. We clustered these articles using standard descriptors linked to trustworthiness, namely, immutability, transparency, traceability, and integrity

    Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

    Get PDF
    This is an accepted manuscript of an article published by IEEE in IEEE Transactions on Engineering Management, available online at: https://ieeexplore.ieee.org/document/9366288 The accepted version of the publication may differ from the final published versionSupply-chains (SC) present performance bottlenecks that contribute to a high level of costs, infltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and restrictive data fows. These bottlenecks can force manufacturers to source more raw materials and increase production signifcantly. Also, restrictive data fow in a complex global SC network generally slows down the movement of goods and services. The use of Distributed LedgerTechnologies (DLT) in supply chain management (SCM) demonstrates the potentials to to reduce these bottlenecks through transparency, decentralization, and optimizations in data management. These technologies promise to enhance the trustworthiness of entities within the supply chain, ensure the accuracy of data-driven operations, and enable existing SCM processes to migrate from a linear to a fully circular economy. This paper presents a comprehensive review of 111 articles published in the public domain in the use and effcacyofDLTin SC.It acts asaroadmapfor current and futureresearchers whofocus onSC Security Management to better understand the integration of digital technologies such as DLT. We clustered these articles using standard descriptors linked to trustworthiness, namely, immutability, transparency, traceability, and integrity
    corecore