13 research outputs found
TrustNShare Partizipativ entwickeltes, Smart-contract basiertes Datentreuhandmodell mit skalierbarem Vertrauen und Inzentivierung
Überblick über die Ziele, Projektpartner (DLR, UKB, UKJ) und Aufgabenbereiche des Projekts "TrusNShare". Fokus liegt auf der Erläuterung des geplanten Treuhandmodells, der Partizipativen Entwicklung möglicher Anreize und der "Healthy Navigation App"
Improved Rsa Algorithm for Data Security against DDoS Attack in a Cloud-based Intrusion Detection System
Today, more and more industries are using cloud computing for some integration operations, but ensuring the security of user data and system resources remains a challenge. This article proposes a method to identify and mitigate unwanted packets and traffic, especially duplicate packets, in cloud computing environments. The method includes creating an Intrusion Search and Detection (IF-AD) system to securely maintain user information and allocate secondary memory. To detect unwanted traffic, this method compares the size of the downloaded file with the original file, identifying any differences as potential DDoS. RSA encryption mechanism is used for subsequent file transfers for added security. The proposed approach aims to enhance the security posture of cloud-based systems by detecting and preventing unauthorized access and file modification
Requirements For Incentive Mechanisms In Industrial Data Ecosystems
In the increasingly interconnected business world, economic value is less and less created by one company
alone but rather through the combination and enrichment of data by various actors in so-called data
ecosystems. The research field around data ecosystems is, however, still in its infancy. In particular, the lack
of knowledge about the actual benefits of inter-organisational data sharing is seen as one of the main
obstacles why companies are currently not motivated to engage in data ecosystems. This is especially evident
in traditional sectors, such as production or logistics, where data is still shared comparatively rarely.
However, there is also consensus in these sectors that cross-company data-driven services, such as
collaborative condition monitoring, can generate major value for all actors involved. One reason for this
discrepancy is that it is often not clear which incentives exist for data providers and how they can generate
added value from offering their data to other actors in an ecosystem. Fair and appropriate incentive and
revenue sharing mechanisms are needed to ensure reliable cooperation and sustainable ecosystem
development. To address this research gap and contribute to a deeper understanding, we conduct a literature
review and identify requirements for incentive mechanisms in industrial data ecosystems. The results show,
among other things, that technical requirements, such as enabling data usage control, as well as economic
aspects, for instance, the fair monetary valuation of data, play an important role in incentive mechanisms in
industrial data ecosystems. Understanding these requirements can help practitioners to better comprehend
the incentive mechanisms of the ecosystems in which their organisations participate and can ultimately help
to create new data-driven products and services
A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions
Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive survey of the most recent and promising blockchain state-of-the-art methods, the P2P network for data dissemination, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. Furthermore, we have discussed a detailed comparison of consensus algorithms of Blockchain concerning security. Also, we have discussed the future of blockchain and cloud computing. The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work
DESIGN OPTIONS FOR DATA SPACES
Data spaces receive considerable attention nowadays since they are at the heart of numerous large-scale European research initiatives shaping the data economy. Their goal is to establish secure environments that enable cross-organizational data management and thereby collect, integrate and make available heterogeneous data from various sources. Although we can observe a great interest in establishing new data spaces, questions of what exactly makes a data space and what it takes to design one remain open. To clarify that, we extracted and organized data space characteristics based on the analysis of 53 papers, as well as an empirical analysis of 47 real-world data spaces. We formalize the findings in a taxonomy to provide an intuitive tool that captures important data space design options. Our paper contributes to the understanding of an emerging artifact with significant implications for business, namely data spaces
Blockchain-based incentives for secure and collaborative data sharing in multiple clouds
The prosperity of cloud computing has driven an increasing number of enterprises and organizations to store their data on private or public cloud platforms. Due to the limitation of individual data owners in terms of data volume and diversity, data sharing over different cloud platforms would enable third parties to take advantage of big data analysis techniques to provide value-added services, such as providing healthcare services for customers by gathering medical data from multiple hospitals. However, it remains a challenging task to design effective incentives that encourage secure and collaborative data sharing in multiple clouds. In this paper, we propose a reliable collaboration model consisting of three types of participants, which include data owners, miners, and third parties, where the data is shared via blockchain and recorded by a smart contract. In general, these participants may acquire and store the sharing of data using their private or public clouds. We analyze the topological relationships between the participants and develop some Shapley value models from simple to complicate in the process of revenue distribution. We also discuss the incentive effect of sharing security data and rationality of the designed solution through analysis towards distribution rules.This work is partially supported by the Beijing Natural Science Foundation under Grant 4192050, and in part by the National Natural Science Foundation of China under Grants 61972039 and 61872041
Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey
Supply chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and restrictive data flows. These bottlenecks can force manufacturers to source more raw materials and increase production significantly. Also, restrictive data flow in a complex global SC network generally slows down the movement of goods and services. The use of distributed ledger technologies (DLT) in SC management (SCM) demonstrates the potentials to reduce these bottlenecks through transparency, decentralization, and optimizations in data management. These technologies promise to enhance the trustworthiness of entities within the SC, ensure the accuracy of data-driven operations, and enable existing SCM processes to migrate from a linear to a fully circular economy. This article presents a comprehensive review of 111 articles published in the public domain in the use and efficacy of DLT in SC. It acts as a roadmap for current and future researchers who focus on SC security management to better understand the integration of digital technologies such as DLT. We clustered these articles using standard descriptors linked to trustworthiness, namely, immutability, transparency, traceability, and integrity
Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey
This is an accepted manuscript of an article published by IEEE in IEEE Transactions on Engineering Management, available online at: https://ieeexplore.ieee.org/document/9366288
The accepted version of the publication may differ from the final published versionSupply-chains (SC) present performance bottlenecks that contribute to a high level of costs, infltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and restrictive data fows. These bottlenecks can force manufacturers to source more raw materials and increase production signifcantly. Also, restrictive data fow in a complex global SC network generally slows down the movement of goods and services. The use of Distributed LedgerTechnologies (DLT) in supply chain management (SCM) demonstrates the potentials to to reduce these bottlenecks through transparency, decentralization, and optimizations in data management. These technologies promise to enhance the trustworthiness of entities within the supply chain, ensure the accuracy of data-driven operations, and enable existing SCM processes to migrate from a linear to a fully circular economy. This paper presents a comprehensive review of 111 articles published in the public domain in the use and effcacyofDLTin SC.It acts asaroadmapfor current and futureresearchers whofocus onSC Security Management to better understand the integration of digital technologies such as DLT. We clustered these articles using standard descriptors linked to trustworthiness, namely, immutability, transparency, traceability, and integrity