12 research outputs found
Cloud Storage Security Using Blockchain Technology
Data is increasing with increasing Internet technology. To handle the large data, more applications choose to enlarge storage capacity via Cloud plate form. It will not a surprise if we say most organizations have moved towards the cloud. While using the cloud, we have to keep our trust for our sensitive and private data in third parties and the data is usually not encrypted. But we need to implement nearly procedures for the assurance of our reserved data. This will be occupied by blockchains. Blockchain has been a center of attention as a next-generation goal because of its security. A comprehensive approach is used in this paper by signifying diverse blockchain methods to protect cloud computing
A Blueprint for a Blockchain-Based Architecture to Power a Distributed Network of Tamper-Evident Learning Trace Repositories
The need to ensure privacy and data protection in educational contexts is driving a shift towards new ways of securing and managing learning records. Although there are platforms available to store educational activity traces outside of a central repository, no solution currently guarantees that these traces are authentic when they are retrieved for review. This paper presents a blueprint for an architecture that employs blockchain technology to sign and validate learning traces, allowing them to be stored in a distributed network of repositories without diminishing their authenticity. Our proposal puts participants in online learning activities at the center of the design process, granting them the option to store learning traces in a location of their choice. Using smart contracts, stakeholders can retrieve the data, securely share it with third parties and ensure it has not been tampered with, providing a more transparent and reliable source for learning analytics. Nonetheless, a preliminary evaluation found that only 56% of teachers surveyed considered tamper-evident storage a useful feature of a learning trace repository. These results motivate further examination with other end users, such as learning analytics researchers, who may have stricter expectations of authenticity for data used in their practice
Cloud/fog computing resource management and pricing for blockchain networks
The mining process in blockchain requires solving a proof-of-work puzzle,
which is resource expensive to implement in mobile devices due to the high
computing power and energy needed. In this paper, we, for the first time,
consider edge computing as an enabler for mobile blockchain. In particular, we
study edge computing resource management and pricing to support mobile
blockchain applications in which the mining process of miners can be offloaded
to an edge computing service provider. We formulate a two-stage Stackelberg
game to jointly maximize the profit of the edge computing service provider and
the individual utilities of the miners. In the first stage, the service
provider sets the price of edge computing nodes. In the second stage, the
miners decide on the service demand to purchase based on the observed prices.
We apply the backward induction to analyze the sub-game perfect equilibrium in
each stage for both uniform and discriminatory pricing schemes. For the uniform
pricing where the same price is applied to all miners, the existence and
uniqueness of Stackelberg equilibrium are validated by identifying the best
response strategies of the miners. For the discriminatory pricing where the
different prices are applied to different miners, the Stackelberg equilibrium
is proved to exist and be unique by capitalizing on the Variational Inequality
theory. Further, the real experimental results are employed to justify our
proposed model.Comment: 16 pages, double-column version, accepted by IEEE Internet of Things
Journa
The impact of blockchain technology on the trustworthiness of online voting systems - an exploration of blockchain-enabled online voting
Online Voting evidently increases election turnouts. However, recent state-owned initiatives have failed due to security concerns and a lack of trust in the systems. Block chain seems to be a very suitable technical solution to establish transparency in online voting and thus, create trust. We have built our own, block chain-enabled voting platform and utilized it to run an A/B-testing experiment at an university election to investigate its effect. Our results which show that students trusted the block chain-based voting version less than the control version can be found in Vysna (2020). The following discussion can be found in Konzok (2020
Sdhcare: Secured Distributed Healthcare System
In the healthcare sector, the move towards Electronic Health Records (EHR) systems has been accelerating in parallel with the increased adoption of IoT and smart devices. This is driven by the anticipated advantages for patients and healthcare providers. The integration of EHR and IoT makes it highly heterogeneous in terms of devices, network standards, platforms, types of data, connectivity, etc. Additionally, it introduces security, patient and data privacy, and trust challenges. To address such challenges, this thesis proposes an architecture that combines biometric-based blockchain technology with the EHR system. More specifically, this thesis describes a mechanism that uses a patient’s fingerprint for recovery of patient’s access control on their EHRs securely without compromising their privacy and identity. A secure distributed healthcare system (SDHCARE) is proposed to uniquely identify patients, enable them to control access to, and ensure recoverable access to their EHRs that are exchanged and synchronized between distributed healthcare providers. The system takes into account the security and privacy requirements of Health Insurance Portability and Accountability Act (HIPAA) compliance, and it overcomes the challenges of using secret keys as a patient’s identity to control access to EHRs. The system used distributed architecture with two layers being local to each healthcare provider that is a member of SDHCARE, and two layers shared across all members of SDCHARE system. SDHCARE system was prototyped and implemented in order to validate its functional requirements, security requirements, and to evaluate its performance. The results indicated successful fulfillment of design requirements without significant overhead on the performance as required by healthcare environment
BlockNet Report: Exploring the Blockchain Skills Concept and Best Practice Use Cases
In order to explore the practical potential and needs of interdisciplinary
knowledge and competence requirements of Blockchain technology, the project
activity "Development of Interdisciplinary Blockchain Skills Concept" starts
with the literature review identifying the state of the art of Blockchain in
Supply Chain Management and Logistics, Business and Finance, as well as
Computer Science and IT-Security. The project activity further explores the
academic and industry landscape of existing initiatives in education which
offer Blockchain courses. Moreover, job descriptions and adverts are analyzed
in order to specify today's competence requirements from enterprises. To
discuss and define the future required competence, expert workshops are
organized to validate the findings by academic experts. Based on the research
outcome and validation, an interdisciplinary approach for Blockchain competence
is developed.
A second part focuses on the development of the Blockchain Best Practices
activity while conducting qualitative empirical research based on case studies
with industry representatives. Therefore, company interviews, based on the
theoretical basis of Output 1, explore existing Blockchain use cases in
different sectors. Due to the interdisciplinary importance of Blockchain
technology, these skills will be defined by different perspectives of
Blockchain from across multiple mentioned disciplines. The use cases and
companies for the interviews will be selected based on various sampling
criteria to gain results valid for a broad scale. The analysis of the various
use cases will be conducted and defined in a standardized format to identify
the key drivers and competence requirements for Blockchain technology
applications and their adoption. On the one hand, this approach ensures
comparability, on the other hand, it facilitates the development of a
structured and systematic framework.Comment: arXiv admin note: text overlap with arXiv:2102.0322