1,649 Hits in 4.4 sec


Hoang-Long Nguyen, Claudia-Lavinia Ignat, Olivier Perrin
2018 Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18  
To ensure the trustworthiness of a public key server, transparent log systems such as CONIKS employ a tamper-evident data structure on the server and a gossiping protocol among clients in order to detect  ...  This paper presents Trusternity, an auditing scheme relying on Ethereum blockchain that is easy to implement, scalable and inexpensive to operate.  ...  In this paper we present Trusternity, a practical transparent log auditing scheme using blockchain that addresses shortcomings of state-of-the-art approaches.  ... 
doi:10.1145/3184558.3186938 dblp:conf/www/NguyenIP18 fatcat:istdaimlyfaxflyejmwkpbiylm

Applying Blockchain Technology to Security-Related Aspects of Electronic Healthcare Record Infrastructure

Ryno Adlam, Bertram Haskins
2021 The African journal of information and communication  
Features of blockchain platforms, such as decentralisation, immutability, auditability, and transparency, may provide a viable means of augmenting or improving services related to the security of EHRs.  ...  The insights gained from these experiments are founded on a theoretical base to provide recommendations for applying blockchain technology to services related to the security of EHR infrastructure.  ...  Motivation Blockchain-based audit logs are permanent and tamper-evident.  ... 
doi:10.23962/10539/32211 fatcat:sjxvz74iqrdbxa5glpq2ktvrle

Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains [article]

Kai Li, Yuzhe Tang, Beom Heyn Kim, Jianliang Xu
2019 arXiv   pre-print
By experiments on private and public Ethereum testnets, we extensively evaluate the cost of the ContractChecker in comparison with that of existing client-based log auditing works.  ...  The ContractChecker collects the logs from both clients and the cloud server, and verifies the consistency by cross-checking the logs.  ...  New attacks: This work presents new security attacks against Blockchain-based log-auditing protocols.  ... 
arXiv:1904.06626v3 fatcat:gtwta6iemfg65jrw6iep35juta

Towards Blockchain-Driven, Secure and Transparent Audit Logs [article]

Ashar Ahmad, Muhammad Saad, Mostafa Bassiouni, Aziz Mohaisen
2018 arXiv   pre-print
In this paper, we present BlockAudit: a scalable and tamper-proof system that leverages the design properties of audit logs and security guarantees of blockchains to enable secure and trustworthy audit  ...  However, audit logs are vulnerable to a series of attacks, which enable adversaries to tamper data and corresponding audit logs.  ...  This work is supported by Air Force Material Command award FA8750-16-0301 and Global Research Lab program of the National Research Foundation NRF-2016K1A1A2912757.  ... 
arXiv:1811.09944v1 fatcat:am5775uazzgebpjlsss7hxmez4

Catena: Efficient Non-equivocation via Bitcoin

Alin Tomescu, Srinivas Devadas
2017 2017 IEEE Symposium on Security and Privacy (SP)  
However, different from previous Bitcoin-based work, Catena decreases the bandwidth requirements of log auditors from 90 GB to only tens of megabytes.  ...  Catena enables any number of thin clients, such as mobile phones, to efficiently agree on a log of applicationspecific statements managed by an adversarial server.  ...  Also, because most transparency schemes publish digests of the directory periodically, we believe they are amenable to being secured by Catena. 2) Blockchain-based Transparency: Blockchain-based transparency  ... 
doi:10.1109/sp.2017.19 dblp:conf/sp/TomescuD17 fatcat:j3k4eww7gbcnlhh32ryc7vywci

Secure and Transparent Audit Logs with BlockAudit [article]

Ashar Ahmad and Muhammad Saad and Aziz Mohaisen
2019 arXiv   pre-print
In this paper, we present BlockAudit: a scalable and tamper-proof system that leverages the design properties of audit logs and security guarantees of blockchain to enable secure and trustworthy audit  ...  However, audit logs are vulnerable to a series of attacks enabling adversaries to tamper data and corresponding audit logs without getting detected.  ...  While 10 calls can be handled by ORM-based audit logs, they are not optimal for blockchain-based audit logs. Log for transaction.  ... 
arXiv:1907.10484v1 fatcat:wmqpjt3gtnac5hdqlp42nbtpdi

Efficient logging and querying for blockchain-based cross-site genomic dataset access audit

Shuaicheng Ma, Yang Cao, Li Xiong
2020 BMC Medical Genomics  
Several studies have proposed blockchain-based access audit to solve this problem but without considering the efficiency of the audit queries.  ...  A centralized access log audit system is vulnerable to the single point of attack and also lack transparency since the log could be tampered by a malicious system administrator or internal adversaries.  ...  Tsung-Ting Kuo, the organizer of iDASH competition 2018 first track, for providing informative Q&A and helpful advice!  ... 
doi:10.1186/s12920-020-0725-y pmid:32693835 fatcat:uia7f3ja4zdabjubxezmmhaofq

Transparency of SIM profiles for the consumer remote SIM provisioning protocol

Abu Shohel Ahmed, Mukesh Thakur, Santeri Paavolainen, Tuomas Aura
2020 Annales des télécommunications  
To address this security problem, we present SIM Profile Transparency Protocol (SPTP) to detect malicious provisioning of SIM profiles.  ...  The protocol enables remote provisioning of SIM profiles from a server to SIM cards, also known as the embedded Universal Integrated Circuit Card (eUICC).  ...  The transparency log appends all changes submitted to it in a cryptographically assured and an auditable manner.  ... 
doi:10.1007/s12243-020-00791-2 fatcat:2it6bspg7jbszfvz7ljqo4ukba

CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain [article]

Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2018 arXiv   pre-print
In this paper, we propose a new PKI architecture with certificate transparency based on blockchain, what we called CertLedger, to eliminate the split-world attacks and to provide an ideal certificate/revocation  ...  However, all of these proposals are still vulnerable to split-world attacks if the adversary is capable of showing different views of the log to the targeted victims.  ...  transparency based on consistency proof from the log.  ... 
arXiv:1806.03914v2 fatcat:jcsbujoy5nbbze5ae7uhp45n7m

BlockPGP: A Blockchain-based Framework for PGP Key Servers

Alexander Yakubov, Wazen Shbair, Nida Khan, Radu State, Christophe Medinger, Jean Hilger
2020 International Journal of Networking and Computing  
However, following the implementation of PKI log-based infrastructure solutions like Google's Certificate Transparency, the security challenges of PGP key servers became apparent, including MITM risks  ...  BlockPGP: A Blockchain-based Framework for PGP Key Servers certificate identity confirmation known as "Web of Trust".  ...  In Google's Certificate Transparency [18] , the most popular log-based PKI, certificates are added to append-only Merkel hash trees of the log servers.  ... 
doi:10.15803/ijnc.10.1_1 fatcat:mfk4zeb5wzcfjeptquxevzrvnu

T3AB: Transparent and Trustworthy Third-party Authority using Blockchain [article]

Runhua Xu, Chao Li, James Joshi
2021 arXiv   pre-print
In this paper, we propose a Transparent and Trustworthy TPA using Blockchain (T3AB) to provide transparency and accountability to the trusted third-party entities, such as honest-but-curious third-party  ...  in auditing, and punishes unintentional or malicious behaviors.  ...  Besides, the cost of inspection for key service and public parameter audit obligations is 2.4 × 10 5 gas and 3.7 × 10 5 gas, respectively.  ... 
arXiv:2102.01249v2 fatcat:7rqodjdo7bbahhy6aal2csvsei

Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System

Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello
2020 Proceedings of the 17th International Joint Conference on e-Business and Telecommunications  
Finally, Prov-Trust ensures an accurate privacy-preserving auditing process based on blockchain traces and achieved thanks to events' logs that are signed by SGX enclaves, transactions being registered  ...  In this paper, we propose Prov-Trust, a decentralized and auditable SGX-based data provenance system relying on highly distributed ledgers.  ...  ACKNOWLEDGMENTS This material is based upon work supported by the National Science Foundation under Grant ACI-1547467.  ... 
doi:10.5220/0009889302250237 dblp:conf/icete/KaanicheBLGR20 fatcat:45dkteydbbh3tbknpkzhj5w254

A Blockchain based Access Control Scheme

Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
Our approach relies on the use of smart auditable contracts deployed in blockchain infrastructures.  ...  Moreover, an implementation of the proposed solution based on Ethereum Blockchain is presented to show the applicability of our scheme in real-world scenarios.  ...  Our access control application makes use of a public blockchain technology for decentralized authentication, ensuring data auditability and transparency requirements.  ... 
doi:10.5220/0006855603340342 dblp:conf/icete/LaurentKLP18 fatcat:vttmkqxw5rhcpoyvo3hibrhg2y

Providing reliability and auditability to the IoT LwM2M protocol through Blockchain [article]

Cristian Martín, Iván Alba, Joaquín Trillo, Enrique Soler, Bartolomé Rubio, Manuel Díaz
2020 arXiv   pre-print
Blockchain has come to provide transparency, reliability as well as to increase the security in computer systems, especially in distributed ones like the Internet of Things (IoT).  ...  This integration provides reliability and auditability to the LwM2M protocol enabling IoT devices (LwM2M clients) to transparently interact with the protocol.  ...  ("Advanced Monitoring System Based on Deep Learning Services in Fog").  ... 
arXiv:2008.06694v1 fatcat:ci44v7nqp5cwjfjsndk3yjq3ie

VAMS: Verifiable Auditing of Access to Confidential Data [article]

Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch
2019 arXiv   pre-print
We demonstrate the practicality of our system with two prototypes, based on Hyperledger Fabric and Trillian.  ...  ., communication records and medical records) and used to make important decisions, there is a growing need for transparency in the way that the data is processed, while protecting the privacy of individuals  ...  VAMS uses append-only logs of data access requests, instantiated as either blockchain-based distributed ledgers or verifiable log-backed maps.  ... 
arXiv:1805.04772v4 fatcat:t7x3sfroujdwvpuevld2dutl4q
« Previous Showing results 1 — 15 out of 1,649 results