377 research outputs found
ARPA Whitepaper
We propose a secure computation solution for blockchain networks. The
correctness of computation is verifiable even under malicious majority
condition using information-theoretic Message Authentication Code (MAC), and
the privacy is preserved using Secret-Sharing. With state-of-the-art multiparty
computation protocol and a layer2 solution, our privacy-preserving computation
guarantees data security on blockchain, cryptographically, while reducing the
heavy-lifting computation job to a few nodes. This breakthrough has several
implications on the future of decentralized networks. First, secure computation
can be used to support Private Smart Contracts, where consensus is reached
without exposing the information in the public contract. Second, it enables
data to be shared and used in trustless network, without disclosing the raw
data during data-at-use, where data ownership and data usage is safely
separated. Last but not least, computation and verification processes are
separated, which can be perceived as computational sharding, this effectively
makes the transaction processing speed linear to the number of participating
nodes. Our objective is to deploy our secure computation network as an layer2
solution to any blockchain system. Smart Contracts\cite{smartcontract} will be
used as bridge to link the blockchain and computation networks. Additionally,
they will be used as verifier to ensure that outsourced computation is
completed correctly. In order to achieve this, we first develop a general MPC
network with advanced features, such as: 1) Secure Computation, 2) Off-chain
Computation, 3) Verifiable Computation, and 4)Support dApps' needs like
privacy-preserving data exchange
Economics-driven approach for self-securing assets in cloud
This thesis proposes the engineering of an elastic self-adaptive security solution for the Cloud that considers assets as independent entities, with a need for customised, ad-hoc security. The solution exploits agent-based, market-inspired methodologies and learning approaches for managing the changing security requirements of assets by considering the shared and on-demand nature of services and resources while catering for monetary and computational constraints. The usage of auction procedures allows the proposed framework to deal with the scale of the problem and the trade-offs that can arise between users and Cloud service provider(s). Whereas, the usage of a learning technique enables our framework to operate in a proactive, automated fashion and to arrive on more efficient bidding plans, informed by historical data. A variant of the proposed framework, grounded on a simulated university application environment, was developed to evaluate the applicability and effectiveness of this solution. As the proposed solution is grounded on market methods, this thesis is also concerned with asserting the dependability of market mechanisms. We follow an experimentally driven approach to demonstrate the deficiency of existing market-oriented solutions in facing common market-specific security threats and provide candidate, lightweight defensive mechanisms for securing them against these attacks
Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions
In recent years, low-carbon transportation has become an indispensable part
as sustainable development strategies of various countries, and plays a very
important responsibility in promoting low-carbon cities. However, the security
of low-carbon transportation has been threatened from various ways. For
example, denial of service attacks pose a great threat to the electric vehicles
and vehicle-to-grid networks. To minimize these threats, several methods have
been proposed to defense against them. Yet, these methods are only for certain
types of scenarios or attacks. Therefore, this review addresses security aspect
from holistic view, provides the overview, challenges and future directions of
cyber security technologies in low-carbon transportation. Firstly, based on the
concept and importance of low-carbon transportation, this review positions the
low-carbon transportation services. Then, with the perspective of network
architecture and communication mode, this review classifies its typical attack
risks. The corresponding defense technologies and relevant security suggestions
are further reviewed from perspective of data security, network management
security and network application security. Finally, in view of the long term
development of low-carbon transportation, future research directions have been
concerned.Comment: 34 pages, 6 figures, accepted by journal Renewable and Sustainable
Energy Review
Recommended from our members
Novel processes for smart grid information exchange and knowledge representation using the IEC common information model
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The IEC Common Information Model (CIM) is of central importance in enabling smart grid interoperability. Its continual development aims to meet the needs of the smart grid for semantic understanding and knowledge
representation for a widening domain of resources and processes. With smart grid evolution the importance of information and data management has become an increasingly pressing issue not only because far more data is being generated using modern sensing, control and measuring devices but
also because information is now becoming recognised as the ‘integral component’ that facilitates the optimal flexibility required of the smart grid. This thesis looks at the impacts of CIM implementation upon the landscape of smart grid issues and presents research from within National Grid
contributing to three key areas in support of further CIM deployment. Taking the issue of Enterprise Information Management first, an information management framework is presented for CIM deployment at National Grid. Following this the development and demonstration of a novel secure cloud
computing platform to handle such information is described. Power system application (PSA) models of the grid are partial knowledge representations of a shared reality. To develop the completeness of our understanding of this reality it is necessary to combine these representations.
The second research contribution reports on a novel methodology for a CIM-based
model repository to align PSA representations and provide a
knowledge resource for building utility business intelligence of the grid.
The third contribution addresses the need for greater integration of information relating to energy storage, an essential aspect of smart energy management. It presents the strategic rationale for integrated energy modeling and a novel extension to the existing CIM standards for modeling grid-scale energy storage. Significantly, this work has already contributed to a larger body of work on modeling Distributed Energy Resources currently under development at the Electric Power Research Institute (EPRI) in the
USA.Dr. Martin Bradley on behalf of National Grid Plc. and the Engineering and Physical
Sciences Research Council (EPSRC
Delivering the recommendations of the Fraud Review 2006 and the paradox of police leadership
The purpose of this context statement is to investigate those factors which either contributed towards or impeded delivery of key recommendations from the Fraud Review, Attorney General (2006). These public works comprise three independent but intrinsically linked projects; the National Fraud Reporting Centre (NFRC), National Fraud Intelligence Bureau (NFIB) and the Economic Crime Academy (ECA). Critical analysis shows how the success of each project influenced and contributed directly to the next project. Examination is made of how, without vision and the continuity of leadership, these public works would either not exist today or would have failed to be as successful as they are. Reflection upon this, together with analyses of individual and organisational leadership styles, stimulated two unavoidable and fundamental questions to be raised: What does the Police Service now stand for? Is the current model of police leadership fit for purpose? Critical analysis of the role of police leadership in the delivery of these public works led to a further, specific question: Is the police response to fraud appropriate? This is because police responses to fraud often appear to be in conflict with Peelian Principles, ACPO (2012) and are more biased towards serving the criminal justice system rather than delivering social justice through interventions that are morally and ethically grounded. On commencement of this context statement the intention was for it to be read by like-minded leaders and visionaries, those who do not fit the norm or stereotype of a typical police manager; as the context statement evolved so too has the intended readership. Throughout reflective assessment and consideration of police leadership and today’s performance culture, it became increasingly apparent that this subject should be core reading for police leaders of the future. However, on completion of the context statement, it is apparent that readership audience should extend beyond the Police Service and the policy makers within government and the Ministry of Justice. The real audience should be the public we serve, those with whose consent we police. Therefore, it seems logical that public should be the ultimate critical assessors of this contribution, together with the effectiveness and appropriateness of the current and ongoing culture of police leadership and the response to fraud
Auditing Symposium VIII: Proceedings of the 1986 Touche Ross/University of Kansas Symposium on Auditing Problems
Discussant\u27s response to On the economics of product differentiation in auditing / Howard R. Osharow; Unresolved issues in classical audit sample evaluations / Donald R. Nichols, Rajendra P. Srivastava, Bart H. Ward; Discussant\u27s response to Unresolved issues in classical audit sample evaluations / Abraham D. Akresh; Under the spreading chestnut tree, accountants\u27 legal liability -- A historical perspective / Paul J. Ostling; Impact of technological events and trends on audit evidence in the year 2000: Phase I / Gary L. Holstrum, Theodore J. Mock, Robert N. West; Discussant\u27s Response to Impact of technological events and trends on audit evidence in the year 2000: Phase I; Is the second standard of fieldwork necessary / Thomas P. Bintinger; Discussant\u27s response to Is the second standard of fieldwork necessary / Andrew D. Bailey; Interim report on the development of an expert system for the auditor\u27s loan loss evaluation / Kirk P. Kelly, Gary S. Ribar, John J. Willingham; Discussant\u27s response to Interim report on the development of an expert system for the auditor\u27s loan loss evaluation / William F. Messier; Work of the Special Investigations Committee / R. K. (Robert Kuhn) Mautz (1915-2002); Discussant\u27s response to Under the spreading chestnut tree, accountants\u27 legal liability -- A historical perspective / Thomas A. Gavin; Assertion based approach to auditing / Donald A. Leslie; Discussant\u27s response to An assertion-based approach to auditing / William L. Felixhttps://egrove.olemiss.edu/dl_proceedings/1007/thumbnail.jp
A Guide to Emissions Trading under the Western Climate Initiative
This Guide presents an overview of the cap-and-trade system of carbon emissions trading created and adhered to under the Western Climate Initiative (WCI). This Guide is divided into five chapters. Chapter 1 provides an overview of a cap-and-trade system of emissions permits. Chapter 2 explains the constitutional background to cap-and-trade schemes in the United States and Canada. Chapter 3 provides an overview of the linked system and a summary of its principal features in each WCI cap-and-trade partner jurisdiction (California, Quebec, Ontario). Chapter 4 explains how emission allowances are traded under the WCI and includes the results of a survey undertaken of emissions trading market participants. Chapter 5 provides some concluding observations with respect to WCI cap-and-trade
Money & Trust in Digital Society, Bitcoin and Stablecoins in ML enabled Metaverse Telecollaboration
We present a state of the art and positioning book, about Digital society
tools, namely; Web3, Bitcoin, Metaverse, AI/ML, accessibility, safeguarding and
telecollaboration. A high level overview of Web3 technologies leads to a
description of blockchain, and the Bitcoin network is specifically selected for
detailed examination. Suitable components of the extended Bitcoin ecosystem are
described in more depth. Other mechanisms for native digital value transfer are
described, with a focus on `money'. Metaverse technology is over-viewed,
primarily from the perspective of Bitcoin and extended reality. Bitcoin is
selected as the best contender for value transfer in metaverses because of it's
free and open source nature, and network effect. Challenges and risks of this
approach are identified. A cloud deployable virtual machine based technology
stack deployment guide with a focus on cybersecurity best practice can be
downloaded from GitHub to experiment with the technologies. This deployable lab
is designed to inform development of secure value transaction, for small and
medium sized companies
- …