共查询到20条相似文献,搜索用时 15 毫秒
1.
Hyun Sook Rhee 《计算机、材料和连续体(英文)》2022,73(1):69-85
As the use of cloud storage for various services increases, the amount of private personal information along with data stored in the cloud storage is also increasing. To remotely use the data stored on the cloud storage, the data to be stored needs to be encrypted for this reason. Since “searchable encryption” is enable to search on the encrypted data without any decryption, it is one of convenient solutions for secure data management. A public key encryption with keyword search (for short, PEKS) is one of searchable encryptions. Abdalla et al. firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the “robust” ANO-CCA secure identity-based encryption(IBE). In this paper, we propose two generic constructions of consistent IND-CCA secure PEKS combining (1) a hierarchical identity based encryption (for short, HIBE) and a signature scheme or (2) a HIBE, an encapsulation, and a message authentication code (for short, MAC) scheme. Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker “ANO-CPA security (resp., IND-CPA security)” of HIBE than “ANO-CCA security (resp., IND-CCA security)” of IBE required in for achieving IND-CCA secure (resp., consistent) PEKS. Finally, we prove that our generic constructions satisfy IND-CCA security and consistency under the security models. 相似文献
2.
Norah M. Alshahrani M. L. Mat Kiah B. B. Zaidan A. H. Alamoodi Abdu Saif 《计算机、材料和连续体(英文)》2023,75(2):2833-2858
A smart contract is a digital program of transaction protocol (rules of contract) based on the consensus architecture of blockchain. Smart contracts with Blockchain are modern technologies that have gained enormous attention in scientific and practical applications. A smart contract is the central aspect of a blockchain that facilitates blockchain as a platform outside the cryptocurrency spectrum. The development of blockchain technology, with a focus on smart contracts, has advanced significantly in recent years. However, research on the smart contract idea has weaknesses in the implementation sectors based on a decentralized network that shares an identical state. This paper extensively reviews smart contracts based on multi-criteria analysis, challenges and motivations. Therefore, implementing blockchain in multi-criteria research is required to increase the efficiency of interaction between users via supporting information exchange with high trust. Implementing blockchain in the multi-criteria analysis is necessary to increase the efficiency of interaction between users via supporting information exchange and with high confidence, detecting malfunctioning, helping users with performance issues, reaching a consensus, deploying distributed solutions and allocating plans, tasks and joint missions. The smart contract with decision-making performance, planning and execution improves the implementation based on efficiency, sustainability and management. Furthermore, the uncertainty and supply chain performance lead to improved users’ confidence in offering new solutions in exchange for problems in smart contacts. Evaluation includes code analysis and performance, while development performance can be under development. 相似文献
3.
Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health. However, big data faces many ongoing serious challenges in the process of collection, storage, and use. Among them, data security and privacy problems have attracted extensive interest. In an effort to overcome this challenge, this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted edge computing node, design data access module, data protection module, and data integrity check module, to achieve hardware-enhanced data privacy protection. Then, we design a smart contract framework to realize distributed data access control management in a big data environment. The crucial role of the smart contract was revealed by designing multiple access control contracts, register contracts, and history contracts. Access control contracts provide access control methods for different users and enable static access verification and dynamic access verification by checking the user’s properties and history behavior. Register contract contains user property information, edge computing node information, the access control and history smart contract information, and provides functions such as registration, update, and deletion. History contract records the historical behavior information of malicious users, receives the report information of malicious requestors from the access control contract, implements a misbehavior check method to determines whether the requestor has misbehavior, and returns the corresponding result. Finally, we design decentralized system architecture, prove the security properties, and analysis to verify the feasibility of the system. Results demonstrate that our method can effectively improve the timeliness of data, reduce network latency, and ensure the security, reliability, and traceability of data. 相似文献
4.
Jin Wang Wei Ou Wenhai Wang R. Simon Sherratt Yongjun Ren Xiaofeng Yu 《计算机、材料和连续体(英文)》2023,74(3):4933-4950
With the rapid development of information technology, the development of blockchain technology has also been deeply impacted. When performing block verification in the blockchain network, if all transactions are verified on the chain, this will cause the accumulation of data on the chain, resulting in data storage problems. At the same time, the security of data is also challenged, which will put enormous pressure on the block, resulting in extremely low communication efficiency of the block. The traditional blockchain system uses the Merkle Tree method to store data. While verifying the integrity and correctness of the data, the amount of proof is large, and it is impossible to verify the data in batches. A large amount of data proof will greatly impact the verification efficiency, which will cause end-to-end communication delays and seriously affect the blockchain system’s stability, efficiency, and security. In order to solve this problem, this paper proposes to replace the Merkle tree with polynomial commitments, which take advantage of the properties of polynomials to reduce the proof size and communication consumption. By realizing the ingenious use of aggregated proof and smart contracts, the verification efficiency of blocks is improved, and the pressure of node communication is reduced. 相似文献
5.
Distributed power market trading has the characteristics of large number of participants, scattered locations, small single trading scale, and point-to-point trading. The traditional centralized power trading model has the problems of large load, low efficiency, high cost, reliance on third parties and unreliable data. With the characteristics of decentralization and non-tampering, blockchain can establish a point-to-point trusted trading environment and provide effective solutions to the above problems. Therefore, this paper proposed a distributed power market trading framework based on blockchain. In this framework, the distributed power supply characteristics and trading needs of each participant are analyzed, a complete distributed trading process based on blockchain is designed. In addition, we have studied the key technologies of distributed power market trading. With the goal of power service reputation and maximum revenue of distributed power providers, we have established a matching degree model, a distributed power market trading optimization model, and designed a smart contract-based power market trading optimization strategy and power trading settlement strategy. Finally, we designed experiments to verify the performance of the proposed framework. 相似文献
6.
Jieren Cheng Jun Li Naixue Xiong Meizhu Chen Hao Guo Xinzhi Yao 《计算机、材料和连续体(英文)》2020,65(3):2247-2262
Nowadays, as lightweight mobile clients become more powerful and widely used, more and more information is stored on lightweight mobile clients, user sensitive data privacy protection has become an urgent concern and problem to be solved. There has been a corresponding rise of security solutions proposed by researchers, however, the current security mechanisms on lightweight mobile clients are proven to be fragile. Due to the fact that this research field is immature and still unexplored in-depth, with this paper, we aim to provide a structured and comprehensive study on privacy protection using trusted execution environment (TEE) for lightweight mobile clients. This paper presents a highly effective and secure lightweight mobile client privacy protection system that utilizes TEE to provide a new method for privacy protection. In particular, the prototype of Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments (LMCPTEE) is built using Intel software guard extensions (SGX) because SGX can guarantee the integrity, confidentiality, and authenticity of private data. By putting lightweight mobile client critical data on SGX, the security and privacy of client data can be greatly improved. We design the authentication mechanism and privacy protection strategy based on SGX to achieve hardware-enhanced data protection and make a trusted connection with the lightweight mobile clients, thus build the distributed trusted system architecture. The experiment demonstrates that without relying on the performance of the blockchain, the LMCPTEE is practical, feasible, low-performance overhead. It can guarantee the privacy and security of lightweight mobile client private data. 相似文献
7.
Iftikhar Ahmad Mohammed A. Alqarni Abdulwahab Ali Almazroi Laiba Alam 《计算机、材料和连续体(英文)》2021,66(2):1813-1822
Blockchain technology is one of the key technological breakthroughs of the last decade. It has the ability to revolutionize numerous aspects of society, including financial systems, healthcare, e-government and many others. One such area that is able to reap the benefits of blockchain technology is the real estate industry. Like many other industries, real estate faces major administrative problems such as high transaction fees, a lack of transparency, fraud and the effects of a middleman including undue influence and commissions. Blockchain enables supporting technologies to overcome the obstacles inherent within the real estate investment market. These technologies include smart contracts, immutable record management and time-stamped storage. We utilize these key properties of blockchain technology in our work by proposing a system that has the ability to record real estate transactions in a private blockchain, using smart contracts. The immutability of the blockchain ledger and transactions can provide a safe space for the real estate business. Blockchain technology can also assist the authentication process by hastening background checks. Personal digital keys are provided to parties that are involved in a contract, thus minimizing the risk of fraud. We also discuss the rationale behind the advantages of using a blockchain in this manner, and how we selected the consensus mechanism for our proposed system. 相似文献
8.
For the past few decades, the Internet of Things (IoT) has been one of the main pillars wielding significant impact on various advanced industrial applications, including smart energy, smart manufacturing, and others. These applications are related to industrial plants, automation, and e-healthcare fields. IoT applications have several issues related to developing, planning, and managing the system. Therefore, IoT is transforming into G-IoT (Green Internet of Things), which realizes energy efficiency. It provides high power efficiency, enhances communication and networking. Nonetheless, this paradigm did not resolve all smart applications’ challenges in edge infrastructure, such as communication bandwidth, centralization, security, and privacy. In this paper, we propose the OTS Scheme based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure to resolve these challenges. An OTS-based Blockchain-enabled distributed network is used at the fog layer for security and privacy. We evaluated our proposed architecture’s performance quantitatively as well as security and privacy. We conducted a comparative analysis with existing studies with different measures, including computing cost time and communication cost. As a result of the evaluation, our proposed architecture showed better performance. 相似文献
9.
Abdallah Abdallah Ayman A. Aly Bassem F. Felemban Imran Khan Ki-Il Kim 《计算机、材料和连续体(英文)》2022,72(1):157-179
The Internet of Things (IoT) has allowed for significant advancements in applications not only in the home, business, and environment, but also in factory automation. Industrial Internet of Things (IIoT) brings all of the benefits of the IoT to industrial contexts, allowing for a wide range of applications ranging from remote sensing and actuation to decentralization and autonomy. The expansion of the IoT has been set by serious security threats and obstacles, and one of the most pressing security concerns is the secure exchange of IoT data and fine-grained access control. A privacy-preserving multi-dimensional secure query technique for fog-enhanced IIoT was proposed in light of the fact that most existing range query schemes for fog-enhanced IoT cannot provide both multi-dimensional query and privacy protection. The query matrix was then decomposed using auxiliary vectors, and the auxiliary vector was then processed using BGN homomorphic encryption to create a query trapdoor. Finally, the query trapdoor may be matched to its sensor data using the homomorphic computation used by an IoT device terminal. With the application of particular auxiliary vectors, the spatial complexity might be efficiently decreased. The homomorphic encryption property might ensure the security of sensor data and safeguard the privacy of the user's inquiry mode. The results of the experiments reveal that the computing and communication expenses are modest. 相似文献
10.
Cristian Valencia-Payan José Fernando Grass-Ramírez Gustavo Ramirez-Gonzalez Juan Carlos Corrales 《计算机、材料和连续体(英文)》2023,74(3):4703-4728
Traditionally, food sustainability has been considered solely in the stage of agricultural production. However, globalization, the expansion of the food production industry, and the emergence of supermarket chains that control the retail food market require specific significant changes in supply chains in the food sector and, therefore, we need to address the economic, social, and environmental impacts of these events. On the other hand, social selling has increased rapidly in recent years, with a further boom, following current events related to the coronavirus disease (COVID-19). This explosion of social sales, where there are usually no control and regulation entities, can bring problems associated with mishandling items. In this paper, we expose how Blockchain technology supports the traceability of social sales by validating the data provided by the chain participants such as digital health passports, production and transport data in the sale process; the proposed solution generates recommendations on product management considering the agreements previously made by the network actors. To evaluate the proposed smart contracts, we use Hyperledger Caliper, obtaining an average throughput of 12.6 transactions per second and an average latency of 0.3 s for the asset update process. We also use a study case to evaluate the proposed project platform’s selling-transport stage using Internet of Things (IoT) sensors. 相似文献
11.
Abdul Jabbar 《国际生产研究杂志》2020,58(11):3423-3436
The research and thinking pertaining to blockchain have thus far focused on cryptocurrency and Bitcoin. However, there is increased interest in using the technology to solve operational challenges in manufacturing and service supply chains. In this study, we introduce a new implication of using blockchain technology and propose two unique contributions. First, we introduce the notion of computational costs (measured in units of gas) as an essential mechanism for completing operational transactions in the blockchain environment. Second, we discuss the use of smart contracts and their influence on operational transactions. To investigate the link between blockchain transaction and computational costs, this study uses an experimental methodology. We develop and implement a fully functional virtual public blockchain to store, validate, and maintain transactions. The methodology provides a process to measure the computational costs, frequency, and intensity of transactions. This research contributes to conceptual research on the blockchain implementation paradigm. Its novelty stems from the identification of computational costs for operational transactions and use of an experimental methodology. This research provides managers an insight into the design of smart contract transactions in a supply chain from a cost perspective. 相似文献
12.
Late payment, and indeed no payment, is a rampant and chronic problem that has plagued the global construction industry for too long. Recent development in blockchain technology, particularly its smart contract, seems to provide a new opportunity to improve this old problem. However, this opportunity is largely unexploited. This study aims to develop a blockchain-based smart contract (BBSC) system for smart payment in the construction industry by focusing on the fundamental cycle of payment freezing (sometimes also synonymously called payment guarantees) and disbursement application. Firstly, a BBSC framework, containing three processes of (a) initiation and configuration, (b) payment freezing, and (c) disbursement application, is developed. Next, based on the framework, the system architecture of the BBSC system, containing three layers of (1) Infrastructure as a Service (IaaS), (2) Blockchain as a Service (BaaS), and (3) Software as a Service (SaaS) is proposed and elabora-ted. Finally, based on the system architecture, a BBSC prototype system is developed using a real-life modular construction project as a case study. It was found that the prototype system can improve the certainty and efficiency of the progress payment, thereby enabling smart payment in construction transactions. Without advocating radical changes (e.g., the contractual relationships or the intermediate role of banks in modern construction projects), the prototype can be developed into a real-life BBSC system that can work compatibly with current advancements in the field. Future works are recommended to fine-tune the findings and translate and implement them in real-life applications. 相似文献
13.
Alexandre Dolgui Semyon Potryasaev Boris Sokolov Marina Ivanova Frank Werner 《国际生产研究杂志》2020,58(7):2184-2199
Recently, the applications of Blockchain technology have begun to revolutionise different aspects of supply chain (SC) management. Among others, Blockchain is a platform to execute the smart contracts in the SC as transactions. We develop and test a new model for smart contract design in the SC with multiple logistics service providers and show that this problem can be presented as a multi-processor flexible flow shop scheduling. A distinctive feature of our approach is that the execution of physical operations is modelled inside the start and completion of cyber information services. We name this modelling concept ‘virtual operation’. The constructed model and the developed experimental environment constitute an event-driven dynamic approach to task and service composition when designing the smart contract. Our approach is also of value when considering the contract execution stage. The use of state control variables in our model allows for operations status updates in the Blockchain that in turn, feeds automated information feedbacks, disruption detection and control of contract execution. The latter launches the re-scheduling procedure, comprehensively combining planning and adaptation decisions within a unified methodological framework of dynamic control theory. The modelling complex developed can be used to design and control smart contracts in the SC. 相似文献
14.
数字经济的高质量发展,需要充分发挥个人数据的潜在价值。但与此同时,数据泄露是困扰消费者、立法者、执法者和学者等社会各界的世界性的挑战。尽管各个国家为了保护数据主体的隐私权,出台了许多法律法规,都没有取得预期的效果。这种结症的根本原因在于,数据主体没有真正地控制个人数据。突破旧的思维模式和原有法律的局限,区块链的独特属性和加密技术的应用为直接的数据隐私权的保护提供事前预防机制,克服了反垄断法等法律的理论和制度缺陷,与大数据收集行为密切相关的反垄断法为间接地保护数据隐私权则提供事后救济措施。不断完善的区块链技术和反垄断法等法律的组合,是实现目标的最佳途径。在这些条件前提之下,注重有效地保护数据隐私权、提高经济效率、促进竞争和创新的平衡,最终实现防止数据主体的隐私权免受伤害和维持公平、自由的竞争秩序的宏伟理想。 相似文献
15.
城市开放空间公共座椅隐私性设计构想 总被引:2,自引:1,他引:1
由于设计中对隐私性的需求考虑不足,城市开放空间公共座椅在使用过程中存在诸多弊端.为解决由此所产生的问题,从人机工程学和环境心理学角度进行了分析,进而提出设计构想. 相似文献
16.
With the continuous development of cloud computing and big data technology, the use of cloud storage is more and more extensive, and a large amount of data is outsourced for public cloud servers, and the security problems that follow are gradually emerging. It can not only protect the data privacy of users, but also realize efficient retrieval and use of data, which is an urgent problem for cloud storage. Based on the existing fuzzy search and encrypted data fuzzy search schemes, this paper uses the characteristics of fuzzy sounds and polysemy that are unique to Chinese, and realizes the synonym construction of keywords through Chinese Pinyin and Chinese-English translation, and establishes the fuzzy word and synonym set of keywords. This paper proposes a Chinese multi-keyword fuzzy search scheme in a cloud environment, which realizes the fuzzy search of multiple Chinese keywords and protects the private key by using a pseudo-random function. Finally, the safety analysis and system experiments verify that the scheme has high security, good practicability, and high search success rate. 相似文献
17.
Unlike previous reviews, most of which focus on a field and use qualitative methods to analyze blockchain technology, herein main path analysis was used to determine the key route of citations and identify the developmental trajectories of blockchain technology and its major themes. A total of 3159 blockchain-related articles published through August 5, 2019, were gathered from the Web of Science. In all, 2478 articles formed the citation network, 27 of which were on the key route. These 27 key papers on blockchain represented the four developmental stages. Stage 1 focused on challenges to bitcoin. Stage 2 focused on smart contract issues. Stage 3 focused on opportunities, challenges, and development in blockchain. Finally, Stage 4 focused on smart contract applications, especially in e-healthcare, where blockchain technology is paving the way to a quicker, more secure, and more efficient means of storing and accessing medical data. The Girvan-Newman clustering technique was used to classify articles, and keyword analysis was used to analyze the top six major themes. These were bitcoin security, bitcoin financial applications, e-healthcare, Ethereum smart contracts, security and privacy in IoT, and energy. Main path analysis was also used to analyze their developmental trends. The results have significant value for both academics and practitioners. 相似文献
18.
Muhammad Usman Tariq Muhammad Babar Mian Ahmad Jan Akmal Saeed Khattak Mohammad Dahman Alshehri Abid Yahya 《计算机、材料和连续体(英文)》2021,67(1):625-639
The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer information. The IoT architecture permits on-demand services to a public pool of resources. Cloud computing plays a vital role in developing IoT-enabled smart applications. The integration of cloud computing enhances the offering of distributed resources in the smart city. Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability, security, performance, confidentiality, and privacy. The key reason for cloud- and IoT-enabled smart city application failure is improper security practices at the early stages of development. This article proposes a framework to collect security requirements during the initial development phase of cloud-assisted IoT-enabled smart city applications. Its three-layered architecture includes privacy preserved stakeholder analysis (PPSA), security requirement modeling and validation (SRMV), and secure cloud-assistance (SCA). A case study highlights the applicability and effectiveness of the proposed framework. A hybrid survey enables the identification and evaluation of significant challenges. 相似文献
19.
为了确保数据发布应用环节中个人敏感隐私数据信息的安全,深入研究了k-匿名技术的机制及性能,针对其不能完全有效地防止敏感属性数据信息泄漏的问题,通过引入真子树的概念和全新的敏感属性值选择手段,在实验探索的基础上,提出了一种基于k-匿名隐私保护模型的新的数据发布隐私保护方法——FVS k-匿名隐私保护方法。这种隐私保护方法继承了k-匿名技术实现简单、处理数据便捷的优点,而且弥补了其保护个人敏感隐私数据信息不完全、不充分的缺点。优化后的FVS k-匿名方法能有效地防止个人敏感隐私数据信息的泄漏,确保个人敏感隐私数据信息的安全。 相似文献
20.
目的在新媒体发展的视角下,对智慧城市建设中公共设施的设计构建进行理念上的分析与研究,深入探讨和总结其设计特征。方法以加入了新媒体元素的智慧城市公共设施设计的案例为具体研究载体,从案例设计的用户体验、视觉表现、文化输出以及可持续发展等方面分析其设计内涵的转变。结论对公共设施设计的内涵和特征进行了归纳总结,从交互性、智能性、通识性和文化审美性4个方面,提出了智慧城市公共设施设计的基本原则,以期为智慧城市中公共设施设计的升级提出建议。 相似文献