62 research outputs found
Cryptocurrency Constellations across the Three-Dimensional Space: Governance Decentralization, Security, and Scalability
In the post-Bitcoin era, many cryptocurrencies with a variety of goals and purposes have emerged in the digital arena. This article aims to map cryptocurrency protocols across three main defining dimensions, which are governance decentralization, security, and scalability. We theorize about the organizational and technological features that impact these three dimensions. Such features encompass roles permissiveness, validation network size, resource expenditure, and number of transactions per second. We map the different cryptocurrency constellations based on their consensus mechanisms, discussing the organizational and technological features of the various protocols applications and how they experience and play with the tradeoffs among governance decentralization, security, and scalability
A Review of Consensus Protocols in Permissioned Blockchains
Consensus protocols are used for the distributed management of large databases in an environment without trust among participants. The choice of a specific protocol depends on the purpose and characteristics of the system itself. The subjects of the paper are consensus protocols in permissioned blockchains. The objective of this paper is to identify functional advantages and disadvantages of observed protocol. The analysis covers a total of six consensus protocols for permissioned blockchains. The following characteristics were compared: security, trust among participants, throughput and scalability. The results show that no protocol shows absolute dominance in all aspects of the comparison. Paxos and Raft are intended for systems in which there is no suspicion of unreliable users, but only the problem of a temporary shutdown. Practical Byzantine Fault Tolerance is intended for systems with a small number of nodes. Federated Byzantine Fault Tolerance shows better scalability and is more suitable for large systems, but can withstand a smaller number of malicious nodes. Proof-of-authority can withstand the largest number of malicious nodes without interfering with the functioning of the system. When choosing a consensus protocol for a blockchain application, one should take into account priority characteristics
Blockchain-based secure authentication with improved performance for fog computing
Advancement in the Internet of Things (IoT) and cloud computing has escalated the number of connected edge devices in a smart city environment. Having billions more devices has contributed to security concerns, and an attack-proof authentication mechanism is the need of the hour to sustain the IoT environment. Securing all devices could be a huge task and require lots of computational power, and can be a bottleneck for devices with fewer computational resources. To improve the authentication mechanism, many researchers have proposed decentralized applications such as blockchain technology for securing fog and IoT environments. Ethereum is considered a popular blockchain platform and is used by researchers to implement the authentication mechanism due to its programable smart contract. In this research, we proposed a secure authentication mechanism with improved performance. Neo blockchain is a platform that has properties that can provide improved security and faster execution. The research utilizes the intrinsic properties of Neo blockchain to develop a secure authentication mechanism. The proposed authentication mechanism is compared with the existing algorithms and shows that the proposed mechanism is 20 to 90 per cent faster in execution time and has over 30 to 70 per cent decrease in registration and authentication when compared to existing methods
STUDY OF CONSENSUS PROTOCOLS AND IMPROVEMENT OF THE DELEGATED BYZANTINE FAULT TOLERANCE (DBFT) ALGORITHM
Nowadays, blockchain is one of the most popular and innovate technologies over the world. Although this technology appears for first time in the Bitcoin cryptocurrency, in recent years, a lot of researchers and industries from different fields such as banking, financial, supply chain management, etc. have given more involved than ever before. The blockchain is implemented in decentralized and distributed ledgers in peer-to-peer (p2p) networks where non-trusting peers can implement digital asset transactions without the need of central authority. Then, other peers in the network, according specific rules determined by the network, validate these transactions, insert them in the block and append the block in the chain (ledger). The key contribution for the proper operation of the blockchain is the consensus protocols. Through these protocols, all the peers in the network or the majority of them, they have to reach an agreement for a specific block in order to insert it in the chain based on different blockchains rules. In this master thesis, we will analyze in depth the general architecture of the blockchain and various consensus protocols that implemented in different blockchains in order to be able to improve the Delegated Byzantine Fault Tolerance (DBFT) consensus algorithm, which is used in the NEO blockchain technology. Finally, a development of a reputation mechanism is needed based on the improvement of the DBFT algorithm in order to measure the reputation of the peers for a specific day
LightChain: A DHT-based Blockchain for Resource Constrained Environments
As an append-only distributed database, blockchain is utilized in a vast
variety of applications including the cryptocurrency and Internet-of-Things
(IoT). The existing blockchain solutions have downsides in communication and
storage efficiency, convergence to centralization, and consistency problems. In
this paper, we propose LightChain, which is the first blockchain architecture
that operates over a Distributed Hash Table (DHT) of participating peers.
LightChain is a permissionless blockchain that provides addressable blocks and
transactions within the network, which makes them efficiently accessible by all
the peers. Each block and transaction is replicated within the DHT of peers and
is retrieved in an on-demand manner. Hence, peers in LightChain are not
required to retrieve or keep the entire blockchain. LightChain is fair as all
of the participating peers have a uniform chance of being involved in the
consensus regardless of their influence such as hashing power or stake.
LightChain provides a deterministic fork-resolving strategy as well as a
blacklisting mechanism, and it is secure against colluding adversarial peers
attacking the availability and integrity of the system. We provide mathematical
analysis and experimental results on scenarios involving 10K nodes to
demonstrate the security and fairness of LightChain. As we experimentally show
in this paper, compared to the mainstream blockchains like Bitcoin and
Ethereum, LightChain requires around 66 times less per node storage, and is
around 380 times faster on bootstrapping a new node to the system, while each
LightChain node is rewarded equally likely for participating in the protocol
Design and implementation of a credible blockchain-based e-health records platform
>Magister Scientiae - MScWith the development of information and network technologies, Electronic Health
Records (EHRs) management system has gained wide spread application in
managing medical records. One of the major challenges of EHRs is the independent
nature of medical institutions. This non-collaborative nature puts a significant
barrier between patients, doctors, medical researchers and medical data. Moreover,
unlike the unique and strong anti-tampering nature of traditional paper-based
records, electronic health records stored in centralization database are vulnerable to
risks from network attacks, forgery and tampering. In view of the data sharing
difficulties and information security problems commonly found in existing EHRs,
this dissertation designs and develops a credible Blockchain-based electronic
health records (CB-EHRs) management system
Design and Implementation of a Credible Blockchain-based E-health Records Platform
Masters of ScienceWith the development of information and network technologies, Electronic Health Records (EHRs) management system has gained wide spread application in managing medical records. One of the major challenges of EHRs is the independent nature of medical institutions. This non-collaborative nature puts a significant barrier between patients, doctors, medical researchers and medical data. Moreover, unlike the unique and strong anti-tampering nature of traditional paper-based records, electronic health records stored in centralization database are vulnerable to risks from network attacks, forgery and tampering. In view of the data sharing difficulties and information security problems commonly found in existing EHRs, this dissertation designs and develops a credible Blockchain-based electronic health records (CB-EHRs) management system. To improve security, the proposed system combines digital signature (using MD5 and RSA) with Role-Based Access
Control (RBAC). The advantages of these are strong anti-tampering, high stability, high security, low cost, and easy implementation. To test the efficacy of the system, implementation was done using Java web programming technology. Tests were carried out to determine the efficiency of the Delegated Byzantine Fault Tolerance (dBFT) consensus algorithm, functionality of the RBAC mechanism and the various system modules. Results obtained show that the system can manage and share EHRs safely and effectively. The expectation of the author is that the output of this research would foster the development and adaptation of EHRs management system
Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that deal with smart agriculture. Then, we provide a classification of threat models against green IoT-based agriculture into five categories, including, attacks against privacy, authentication, confidentiality, availability, and integrity properties. Moreover, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods toward secure and privacy-preserving technologies for IoT applications and how they will be adapted for green IoT-based agriculture. In addition, we analyze the privacy-oriented blockchain-based solutions as well as consensus algorithms for IoT applications and how they will be adapted for green IoT-based agriculture. Based on the current survey, we highlight open research challenges and discuss possible future research directions in the security and privacy of green IoT-based agriculture
Blockchain's adoption in IoT: The challenges, and a way forward
© 2018 Elsevier Ltd The underlying technology of Bitcoin is blockchain, which was initially designed for financial value transfer only. Nonetheless, due to its decentralized architecture, fault tolerance and cryptographic security benefits such as pseudonymous identities, data integrity and authentication, researchers and security analysts around the world are focusing on the blockchain to resolve security and privacy issues of IoT. However, presently, not much work has been done to assess blockchain's viability for IoT and the associated challenges. Hence, to arrive at intelligible conclusions, this paper carries out a systematic study of the peculiarities of the IoT environment including its security and performance requirements and progression in blockchain technologies. We have identified the gaps by mapping the security and performance benefits inferred by the blockchain technologies and some of the blockchain-based IoT applications against the IoT requirements. We also discovered some practical issues involved in the integration of IoT devices with the blockchain. In the end, we propose a way forward to resolve some of the significant challenges to the blockchain's adoption in IoT
- …