105 research outputs found

    Blockchain for Online Video Game Integrity

    Get PDF
    With the growing level competition in video games, especially with regards to competitively played video games known as ”e-sports,” many players are searching for methods of gaining competitive advantages. As such, there is growing demand in software exploits of video games that aim to provide players unfair competitive advantages. Colloquially, these software exlpoits are referred to as “cheats” or “hacks.” Video game developers counteract these exploits by implementing “anti-cheat” technologies. Anti-cheats employ a myriad of complex methods across software, network, and hardware to detect and prevent cheats. They can be implemented both client-side and server-side with current research and implementations relying heavily client-side. This is an issue, however, as client-side implementations are open to inspection and alteration by malicious users looking to bypass the anti-cheat, who often succeed. Integrity of players’ actions in online video games cannot be fully maintained with current client-side anti-cheat technologies. Blockchain, however, by design can ensure that integrity is maintained across an entire network. This project explores using blockchain as the core of a server-side anti cheat implementation. With this method, each player is a member of the anti-cheat blockchain, ensuring integrity of player actions by validating player actions upon consensus

    Crowdsourcing atop blockchains

    Get PDF
    Traditional crowdsourcing systems, such as Amazon\u27s Mechanical Turk (MTurk), though once acquiring great economic successes, have to fully rely on third-party platforms to serve between the requesters and the workers for basic utilities. These third-parties have to be fully trusted to assist payments, resolve disputes, protect data privacy, manage user authentications, maintain service online, etc. Nevertheless, tremendous real-world incidents indicate how elusive it is to completely trust these platforms in reality, and the reduction of such over-reliance becomes desirable. In contrast to the arguably vulnerable centralized approaches, a public blockchain is a distributed and transparent global consensus computer that is highly robust. The blockchain is usually managed and replicated by a large-scale peer-to-peer network collectively, thus being much more robust to be fully trusted for correctness and availability. It, therefore, becomes enticing to build novel crowdsourcing applications atop blockchains to reduce the over-trust on third-party platforms. However, this new fascinating technology also brings about new challenges, which were never that severe in the conventional centralized setting. The most serious issue is that the blockchain is usually maintained in the public Internet environment with a broader attack surface open to anyone. This not only causes serious privacy and security issues, but also allows the adversaries to exploit the attack surface to hamper more basic utilities. Worse still, most existing blockchains support only light on-chain computations, and the smart contract executed atop the decentralized consensus computer must be simple, which incurs serious feasibility problems. In reality, the privacy/security issue and the feasibility problem even restrain each other and create serious tensions to hinder the broader adoption of blockchain. The dissertation goes through the non-trivial challenges to realize secure yet still practical decentralization (for urgent crowdsourcing use-cases), and lay down the foundation for this line of research. In sum, it makes the next major contributions. First, it identifies the needed security requirements in decentralized knowledge crowdsourcing (e.g., data privacy), and initiates the research of private decentralized crowdsourcing. In particular, the confidentiality of solicited data is indispensable to prevent free-riders from pirating the others\u27 submissions, thus ensuring the quality of solicited knowledge. To this end, a generic private decentralized crowdsourcing framework is dedicatedly designed, analyzed, and implemented. Furthermore, this dissertation leverages concretely efficient cryptographic design to reduce the cost of the above generic framework. It focuses on decentralizing the special use-case of Amazon MTurk, and conducts multiple specific-purpose optimizations to remove needless generality to squeeze performance. The implementation atop Ethereum demonstrates a handling cost even lower than MTurk. In addition, it focuses on decentralized crowdsourcing of computing power for specific machine learning tasks. It lets a requester place deposits in the blockchain to recruit some workers for a designated (randomized) programs. If and only if these workers contribute their resources to compute correctly, they would earn well-deserved payments. For these goals, a simple yet still useful incentive mechanism is developed atop the blockchain to deter rational workers from cheating. Finally, the research initiates the first systematic study on crowdsourcing blockchains\u27 full nodes to assist superlight clients (e.g., mobile phones and IoT devices) to read the blockchain\u27s records. This dissertation presents a novel generic solution through the powerful lens of game-theoretic treatments, which solves the long-standing open problem of designing generic superlight clients for all blockchains

    Increasing users response of tourism game

    Get PDF
    Not all information about tourist attractions is described and displayed properly, especially those related to transactions between parties at tourist sites, such as with tour guides, ticket providers and other parties at tourist sites. The appearance is very important because tourists need knowledge of the activities that will be carried out at tourist sites as a consideration to determine the choice of tourist destinations. To solve this problem, it takes the development of alternative media with an attractive look so that tourists can be interested and better know the information displayed, especially coupled with blockchain transactions. Ethereum is one of the blockchain transactions. In this study conducted a test of Ethereum transactions and had a faster transaction speed than Bitcoin. Ethereum has an average speed of 3.8 seconds per transaction with gas price 30 Gwei, while bitcoin has an average speed of 7 minutes per transaction with the same Gas Price. Test the effectiveness of the blockChain-based transaction system in the stone city tourism simulation game is effective with an effectiveness rate of 100%

    Opportunities and Barriers to the Adoption of Blockchain-Based Games in an Online Gaming Company in Thailand

    Get PDF
    This research aims to explore potential opportunities and barriers related to the adoption of blockchain-based games in an online gaming company in Thailand. The identified opportunities are classified under the benefits framework proposed by Shang and Seddon [1], and the identified barriers are classified under the Technology-Organisation-Environment (TOE) framework. Based on the knowledge and experience of experts in the case company, all the opportunities and barriers are then assessed using the concept of Failure Mode and Effect Analysis (FMEA), which is further improved using the Analytic Hierarchy Process (AHP) by assigning a relative weight to each element of the FMEA before being used to find the priority number (PN). Next, the Pareto principle is applied to reveal the critical opportunities and barriers. As a result, a total of 21 critical opportunities are revealed and categorised into 5 dimensions: 4 operational opportunities; 3 managerial opportunities; 7 strategic opportunities; 4 infrastructure opportunities; and 3 organisational opportunities, and a total of 19 critical barriers are revealed and categorised into 3 dimensions: 7 technological barriers; 6 organisational barriers; and 6 environmental barriers. The TOWS matrix is then used to formulate possible strategies for the case company to exploit the opportunities and address the barriers to the adoption of blockchain-based games. As a result, a total of 7 SO, 12 ST, 5 WO, and 1 WT strategies are proposed. Based on the PNs and the interview with experts, a roadmap including short-, medium-, and long-term action plans is also developed to facilitate the adoption of blockchain-based games

    A Critical Investigation into Identifying Key Focus Areas for the Implementation of Blockchain Technology in the Mining Industry

    Get PDF
    Thesis (PhD)--University of Pretoria, 2023.The value of digital information is ever-increasing as more companies utilize digital technologies such as Artificial Intelligence (AI) and the Internet of Things (IoT) to gain deeper insight into their business operations and drive productivity gains. It is therefore important to safeguard and ensure the integrity of digital information exchange. Blockchain technology (BCT) was identified as potentially providing the mining industry with a trusted system for securely exchanging digital value. However, there is little evidence or understanding of how/where BCT can be implemented and what benefits the industry could obtain. This research study provides a fundamental understanding of what the technology is in order to identify the associated capabilities and potential application benefits for the mining industry. From a technology push perspective, blockchain capabilities are used to evaluate how the technology’s value drivers map to the mining industries core value chain processes. This was done to identify potential focus areas within the mining enterprise for further research and development of blockchain applications.ARMMining EngineeringMEngUnrestricte

    Cyber security threats and challenges in collaborative mixed-reality

    Get PDF
    Collaborative Mixed-Reality (CMR) applications are gaining interest in a wide range of areas including games, social interaction, design and health-care. To date, the vast majority of published work has focused on display technology advancements, software, collaboration architectures and applications. However, the potential security concerns that affect collaborative platforms have received limited research attention. In this position paper, we investigate the challenges posed by cyber-security threats to CMR systems. We focus on how typical network architectures facilitating CMR and how their vulnerabilities can be exploited by attackers, and discuss the degree of potential social, monetary impacts, psychological and other harms that may result from such exploits. The main purpose of this paper is to provoke a discussion on CMR security concerns. We highlight insights from a cyber-security threat modelling perspective and also propose potential directions for research and development toward better mitigation strategies. We present a simple, systematic approach to understanding a CMR attack surface through an abstraction-based reasoning framework to identify potential attack vectors. Using this framework, security analysts, engineers, designers and users alike (stakeholders) can identify potential Indicators of Exposures (IoE) and Indicators of Compromise (IoC). Our framework allows stakeholders to reduce their CMR attack surface as well understand how Intrusion Detection System (IDS) approaches can be adopted for CMR systems. To demonstrate the validity to our framework, we illustrate several CMR attack surfaces through a set of use-cases. Finally, we also present a discussion on future directions this line of research should take

    Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity

    Get PDF
    Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI\u27s potential in improving cybersecurity solutions, by identifying both its strengths and weaknesses. We also discuss future research opportunities associated with the development of AI techniques in the cybersecurity field across a range of application domains

    Foundations, Properties, and Security Applications of Puzzles: A Survey

    Full text link
    Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken. These cryptograms, generally called puzzles, require the use of a certain amount of resources to be solved, hence introducing a cost that is often regarded as a time delay---though it could involve other metrics as well, such as bandwidth. These powerful features have made puzzles the core of many security protocols, acquiring increasing importance in the IT security landscape. The concept of a puzzle has subsequently been extended to other types of schemes that do not use cryptographic functions, such as CAPTCHAs, which are used to discriminate humans from machines. Overall, puzzles have experienced a renewed interest with the advent of Bitcoin, which uses a CPU-intensive puzzle as proof of work. In this paper, we provide a comprehensive study of the most important puzzle construction schemes available in the literature, categorizing them according to several attributes, such as resource type, verification type, and applications. We have redefined the term puzzle by collecting and integrating the scattered notions used in different works, to cover all the existing applications. Moreover, we provide an overview of the possible applications, identifying key requirements and different design approaches. Finally, we highlight the features and limitations of each approach, providing a useful guide for the future development of new puzzle schemes.Comment: This article has been accepted for publication in ACM Computing Survey
    • …
    corecore