52 research outputs found

    Novel Frame Work for Blockchain Based Votingapplication Using Ethereum Virtual Machine

    Get PDF
    Blockchain fills in as a scattered record development which licenses propelled assets for be executed in decentralized framework which works in a common manner. In bound together systems everything depends upon the central structure and the outcomes of throwing a voting form system were not exact considering the way that anyone can change. These kinds of results are wrong and not trustworthy by the people who are voting. The Voting machines that are accessible as of now rely upon the servers which are centralized. Here the people who are voting have to keep belief on the concentrated individuals for the accurate results. So, the contemplating decentralized law-based systems that can settle on the political choice procedure very snappy and easy. These scattered systems are the most praised advancement improvement in this present genuine world. Here Blockchain advancement has various wide extent of usages starting and beginning from distributing statistics, economics etc. Here the blockchain advancement is used as a help of achieve this just assembled application that depends concerning a decentralized appropriated application. Here, the structure works in the way as follows, the transactions or understandings whichever executed are changed over into machine reasonable method of reasoning that engages and ensures understanding among various people who are in the organization, and in like manner who has the solidarity to support their individual money exchanges, different activities and opposite party challenges that are associated with their checking and observing. Smart understandings will be enabled and they are to be passed on into a blockchain space or stage, the amount of possible use cases for this development will be checked and improves amazingly. The most critical use of this blockchain is that to empty the prerequisite for pariahs in the two individuals when all is said in done and the private parts, to end up being progressively capable and effective

    Addressing the IoT Schemes for Securing the Modern Healthcare Systems with Block chain Neural Networks

    Get PDF
    This paper provides a wide-range of literature review of various IOT with AI based enabling wearable technologies and protocols used for medical (IoT) with a taught of examining the present and future smart health care technologies. Despite recent advances in medical systems, biomedical hardware, the growth of IoT in medicine continues to advance in terms of biomedical hardware, monitoring figures like cancer patient data disease indicators, temperature levels, oxygen levels, and glucose levels. In the near future, medical IoT is expected to replace the old traditional healthcare systems to smart Ai-IoT based healthcare systems. In our paper we provided a theoretical approach of the most relevant protocols and wearable technologies used for the IoT health care medical systems. We also provided a proposed smart AI based intelligent IoT frameworks for hospital systems settings

    Implementation of Smart Contracts Ethereum Blockchain in Web-Based Electronic Voting (e-voting)

    Get PDF
    The increasing of digital technology today has helped many people to fulfill their needs. But the election system, still conventionally using paper in its implementation. Elections in general still use a centralized system, where there is an organization that manages it. Some of the problems that may occur in traditional electoral systems are that there are organizations that have full control over the database and system, so the possibility of hacking the database is quite a big opportunity.Blockchain innovation is one arrangement that can be utilized in light of the fact that it has a decentralized framework and the whole database is duplicated by all clients. Blockchain itself has been used by Bitcoin and Ethereum cryptocurrency which is known as a decentralized system. By using the blockchain in database recording on an e-voting system can reduce one source of fraud that is database manipulation. This study discusses the recording of voting data using blockchain technology. The implementation of Smart Contracts contained in the Ethereum Blockchain will be implemented to create this voting syste

    Blockchain-based roaming and offload service platform for local 5G operators

    Get PDF
    Abstract. 5G is the latest generation of mobile networks which will be deployed based on network softwarization concept. It will enable Local 5G Operator (L5GO) concept which is one of the most prominent versatile applications of the 5G in the near future. The unique locality features of L5GOs will be useful in many use cases such as smart cities, industrial internet and healthcare. The popularity of L5GOs will trigger more and more number of roaming and offloading opportunities between mobile users. However, existing static and the operator-assisted roaming and offloading procedures are inefficient for L5GO ecosystem. To address these challenges, we propose a blockchain / Distributed Ledger Technology (DLT) based service platform for the L5GOs to facilitate efficient roaming and offload services. We introduce several novel features, namely, universal wallet for subscribers, service quality based L5GO rating system, user-initiated roaming process and the roaming fraud prevention system. Blockchain-based smart contract scheme is proposed to establish dynamic and automated agreements between operators. A prototype of the proposed platform is emulated with the Ethereum blockchain platform and Rinkeby Testnet to evaluate the performance and justify the feasibility of the proposal

    Storing IOT Data Securely in a Private Ethereum Blockchain

    Full text link
    Internet of Things (IoT) is a set of technologies that enable network-connected devices to perform an action or share data among several connected devices or to a shared database. The actions can be anything from switching on an Air Conditioning device remotely to turning on the ignition of a car through a command issued from a remote location or asking Alexa or Google Assistant to search for weather conditions in an area. IoT has proved to be game-changing for many industries such as Supply Chain, Shipping and Transportation providing updates on the status of shipments in real time. This has resulted in a huge amount of data created by a lot of these devices all of which need to be processed in real time. In this thesis, we propose a method to collect sensor data from IoT devices and use blockchain to store and retrieve the collected data in a secure and decentralized fashion within a closed system, suitable for a single enterprise or a group of companies in industries like shipping where sharing data with each other is required. Much like blockchain, we envision a future where IoT devices can connect and disconnect to distributed systems without causing downtime for the data collection or storage or relying on a cloud-based storage system for synchronizing data between devices. We also look at how the performance of some of these distributed systems like Inter Planetary File System (IPFS) and Ethereum Swarm compare on low-powered devices like the raspberry pi

    Achieving cybersecurity in blockchain-based systems: a survey

    Get PDF
    With The Increase In Connectivity, The Popularization Of Cloud Services, And The Rise Of The Internet Of Things (Iot), Decentralized Approaches For Trust Management Are Gaining Momentum. Since Blockchain Technologies Provide A Distributed Ledger, They Are Receiving Massive Attention From The Research Community In Different Application Fields. However, This Technology Does Not Provide With Cybersecurity By Itself. Thus, This Survey Aims To Provide With A Comprehensive Review Of Techniques And Elements That Have Been Proposed To Achieve Cybersecurity In Blockchain-Based Systems. The Analysis Is Intended To Target Area Researchers, Cybersecurity Specialists And Blockchain Developers. For This Purpose, We Analyze 272 Papers From 2013 To 2020 And 128 Industrial Applications. We Summarize The Lessons Learned And Identify Several Matters To Foster Further Research In This AreaThis work has been partially funded by MINECO, Spain grantsTIN2016-79095-C2-2-R (SMOG-DEV) and PID2019-111429RB-C21 (ODIO-COW); by CAM, Spain grants S2013/ICE-3095 (CIBERDINE),P2018/TCS-4566 (CYNAMON), co-funded by European Structural Funds (ESF and FEDER); by UC3M-CAM grant CAVTIONS-CM-UC3M; by the Excellence Program for University Researchers, Spain; and by Consejo Superior de Investigaciones Científicas (CSIC), Spain under the project LINKA20216 (“Advancing in cybersecurity technologies”, i-LINK+ program)

    Utilizzo della tecnologia blockchain applicata alle licenze software

    Get PDF
    Negli ultimi anni la blockchain ha attratto molto interesse da varie aziende e ricercatori, studiando i miglioramenti che una tecnologia come questa potrebbe avere in vari settori, da quello finanziario a quello medico o immobiliare. Abbiamo scelto una delle possibili aree di applicazione, la gestione delle licenze software, e ne abbiamo sviluppato un sistema basato sulla blockchain di Ethereum. La tesi inizierà con un’introduzione al concetto di blockchain, fornendo le conoscenze necessarie per comprendere questa tecnologia; in seguito, illustrerà il processo che ha portato alla costruzione di questo sistema e infine analizzerà i possibili vantaggi e svantaggi che la blockchain può offrire in un ambito come le licenze software

    Cybersecurity applications of Blockchain technologies

    Get PDF
    With the increase in connectivity, the popularization of cloud services, and the rise of the Internet of Things (IoT), decentralized approaches for trust management are gaining momentum. Since blockchain technologies provide a distributed ledger, they are receiving massive attention from the research community in different application fields. However, this technology does not provide cybersecurity by itself. Thus, this thesis first aims to provide a comprehensive review of techniques and elements that have been proposed to achieve cybersecurity in blockchain-based systems. The analysis is intended to target area researchers, cybersecurity specialists and blockchain developers. We present a series of lessons learned as well. One of them is the rise of Ethereum as one of the most used technologies. Furthermore, some intrinsic characteristics of the blockchain, like permanent availability and immutability made it interesting for other ends, namely as covert channels and malicious purposes. On the one hand, the use of blockchains by malwares has not been characterized yet. Therefore, this thesis also analyzes the current state of the art in this area. One of the lessons learned is that covert communications have received little attention. On the other hand, although previous works have analyzed the feasibility of covert channels in a particular blockchain technology called Bitcoin, no previous work has explored the use of Ethereum to establish a covert channel considering all transaction fields and smart contracts. To foster further defence-oriented research, two novel mechanisms are presented on this thesis. First, Zephyrus takes advantage of all Ethereum fields and smartcontract bytecode. Second, Smart-Zephyrus is built to complement Zephyrus by leveraging smart contracts written in Solidity. We also assess the mechanisms feasibility and cost. Our experiments show that Zephyrus, in the best case, can embed 40 Kbits in 0.57 s. for US1.64,andretrievethemin2.8s.SmartZephyrus,however,isabletohidea4Kbsecretin41s.Whilebeingexpensive(aroundUS 1.64, and retrieve them in 2.8 s. Smart-Zephyrus, however, is able to hide a 4 Kb secret in 41 s. While being expensive (around US 1.82 per bit), the provided stealthiness might be worth the price for attackers. Furthermore, these two mechanisms can be combined to increase capacity and reduce costs.Debido al aumento de la conectividad, la popularización de los servicios en la nube y el auge del Internet de las cosas (IoT), los enfoques descentralizados para la gestión de la confianza están cobrando impulso. Dado que las tecnologías de cadena de bloques (blockchain) proporcionan un archivo distribuido, están recibiendo una atención masiva por parte de la comunidad investigadora en diferentes campos de aplicación. Sin embargo, esta tecnología no proporciona ciberseguridad por sí misma. Por lo tanto, esta tesis tiene como primer objetivo proporcionar una revisión exhaustiva de las técnicas y elementos que se han propuesto para lograr la ciberseguridad en los sistemas basados en blockchain. Este análisis está dirigido a investigadores del área, especialistas en ciberseguridad y desarrolladores de blockchain. A su vez, se presentan una serie de lecciones aprendidas, siendo una de ellas el auge de Ethereum como una de las tecnologías más utilizadas. Asimismo, algunas características intrínsecas de la blockchain, como la disponibilidad permanente y la inmutabilidad, la hacen interesante para otros fines, concretamente como canal encubierto y con fines maliciosos. Por una parte, aún no se ha caracterizado el uso de la blockchain por parte de malwares. Por ello, esta tesis también analiza el actual estado del arte en este ámbito. Una de las lecciones aprendidas al analizar los datos es que las comunicaciones encubiertas han recibido poca atención. Por otro lado, aunque trabajos anteriores han analizado la viabilidad de los canales encubiertos en una tecnología blockchain concreta llamada Bitcoin, ningún trabajo anterior ha explorado el uso de Ethereum para establecer un canal encubierto considerando todos los campos de transacción y contratos inteligentes. Con el objetivo de fomentar una mayor investigación orientada a la defensa, en esta tesis se presentan dos mecanismos novedosos. En primer lugar, Zephyrus aprovecha todos los campos de Ethereum y el bytecode de los contratos inteligentes. En segundo lugar, Smart-Zephyrus complementa Zephyrus aprovechando los contratos inteligentes escritos en Solidity. Se evalúa, también, la viabilidad y el coste de ambos mecanismos. Los resultados muestran que Zephyrus, en el mejor de los casos, puede ocultar 40 Kbits en 0,57 s. por 1,64 US$, y recuperarlos en 2,8 s. Smart-Zephyrus, por su parte, es capaz de ocultar un secreto de 4 Kb en 41 s. Si bien es cierto que es caro (alrededor de 1,82 dólares por bit), el sigilo proporcionado podría valer la pena para los atacantes. Además, estos dos mecanismos pueden combinarse para aumentar la capacidad y reducir los costesPrograma de Doctorado en Ciencia y Tecnología Informática por la Universidad Carlos III de MadridPresidente: José Manuel Estévez Tapiador.- Secretario: Jorge Blasco Alís.- Vocal: Luis Hernández Encina
    corecore