Filters








84 Hits in 6.0 sec

Correction to: Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution

Paul Rimba, An Binh Tran, Ingo Weber, Mark Staples, Alexander Ponomarev, Xiwei Xu
2019 Information Systems Frontiers  
The model that was used for the testing and implementation is the right version. Therefore, the incorrect figure has not impacted the measurements and the conclusion of the article.  ...  The original version of this article, unfortunately, included the incorrect version of Fig. 1 . We have attached a corrected version of Fig. 1 below.  ...  The model that was used for the testing and implementation is the right version. Therefore, the incorrect figure has not impacted the measurements and the conclusion of the article.  ... 
doi:10.1007/s10796-019-09899-w fatcat:hchja3vu5zf5rgcxox6h26a2iy

An overview on smart contracts: Challenges, advances and platforms

Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping Chen, Jian Weng, Muhammad Imran
2019 Future generations computer systems  
As a result, smart contracts can cut down administration and save services costs, improve the efficiency of business processes and reduce the risks.  ...  Although smart contracts are promising to drive the new wave of innovation in business processes, there are a number of challenges to be tackled.This paper presents a survey on smart contracts.  ...  and the Fundamental Research Funds for the Central Universities.  ... 
doi:10.1016/j.future.2019.12.019 fatcat:usxpqm6vpzhefekeeukbwj4sku

Integrating Blockchain in Safety-Critical Systems: An Application to the Nuclear Industry

Manuel Diaz, Luis Llopis, Enrique Soler, Joaquin Trillo
2020 IEEE Access  
CONFLICTS OF INTEREST The authors declare that there is no conflict of interest regarding the publication of this manuscript.  ...  Our proposal will allow a new business line to be opened related to the integration of blockchain in the NPP inspection processes.  ...  that cost billions USD and cause the loss of hundreds of human lives [5] .  ... 
doi:10.1109/access.2020.3032322 fatcat:eqzidq724bbktbmbyxjzppl4n4

The Architectural Design Requirements of a Blockchain-Based Port Community System

Elnaz Irannezhad
2020 Logistics  
Availability—the readiness for correct service, and reliability—the continuity of correct service, are heavily reliant on the right choice being made for blockchain design for such a complex use case.  ...  This paper presents the value proposition of blockchain for Port Community Systems (PCS) by dissecting the business processes in port logistics and unfolding functionalities of blockchain in lowering the  ...  Acknowledgments: The author acknowledges the support provided by the Port of Brisbane Ltd. Pty., as part of the University of Queensland-Port of Brisbane Research Partnership.  ... 
doi:10.3390/logistics4040030 fatcat:blgs2ztbojgkhonmbnfxla6s2q

A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System

Pei Huang, Kai Fan, Hanzhe Yang, Kuan Zhang, Hui Li, Yintang Yang
2020 IEEE Access  
To address the trust problem between data owners and cloud service providers, we propose a collaborative auditing blockchain framework for cloud data storage.  ...  One way to ensure trustworthy preservation of cloud data is the remote data auditing method, through which data owners can check storage reliability of cloud system on demand and avoid potential data corruption  ...  As for compared schemes, their consensus members own no prior knowledge and are only responsible for the verification of signatures, which means that the DO still has to execute auditing process by itself  ... 
doi:10.1109/access.2020.2993606 fatcat:5uyvybthlnh6rizmlyrlctsqei

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Osama Alkadi, Nour Moustafa, Benjamin Turnbull
2020 IEEE Access  
Moreover, the ability to detect such malicious attacks is critical for conducting necessary mitigation, at an early stage, to minimise the impact of disruption and restore cloud operations and their live  ...  Collaborative NIDSs for cloud-based blockchain applications are also explained to demonstrate how blockchain can address challenges related to data privacy and trust management.  ...  , business modes, and systems requirements requires specific IDS design for cloud and grid to be executed separately [155] .  ... 
doi:10.1109/access.2020.2999715 fatcat:qz677wrupvcblbvcrm74owmjyu

Blockchain for Economically Sustainable Wireless Mesh Networks [article]

Aniruddh Rao Kabbinale, Emmanouil Dimogerontakis, Mennan Selimi, Anwaar Ali, Leandro Navarro, Arjuna Sathiaseelan, Jon Crowcroft
2019 arXiv   pre-print
We quantify the performance, bottlenecks and identify the current limitations and opportunities for improvement to serve locally the needs of wireless mesh networks, without the privacy and economic cost  ...  This means every participant can invest in resources, and pay or be paid for usage to recover the costs of network devices and maintenance.  ...  correct execution of a program’s logic.  ... 
arXiv:1811.04078v4 fatcat:jlmikg3srfe4dojoamkqjbgiay

D5.7 Market Analysis and Exploitation - second year report

Vanessa Clemente, Tomás García, Arturo Medela, Orfefs Voutyras, George Palaiokrassas, Koumoto Takafumi, Akira Tsuge, Tadashi Okoshi, Jin Nakasawa, Aamir Bokhari, Kenji Tei, Keiko Doguchi (+2 others)
2020 Zenodo  
Report detailing the activities performed so far regarding market analysis and plans/reports for exploitation planning related activities.  ...  Dollars) 2017 2018 2019 2020 2021 Cloud Business Process Services (BPaaS) 42.6 46.4 50.1 54.1 58.4 Cloud Application Infrastructure Services (PaaS) 11.9 15.0 18.6 22.7 27.3 Cloud Application  ...  The same practice is employed with mobile, web and cloud applications and services used to access, manage and process data associated with M-Sec IoT devices.  ... 
doi:10.5281/zenodo.4237450 fatcat:h6dagn7pcndojcbnfuige2hbn4

When Distributed Ledger Technology meets Internet of Things – Benefits and Challenges [article]

Pavlos Charalampidis, Alexandros Fragkiadakis
2020 arXiv   pre-print
There is a growing interest from both the academia and industry to employ distributed ledger technology in the Internet-of-Things domain for addressing security-related and performance challenges.  ...  However, significant challenges arise mainly related to transaction processing speed and user privacy.  ...  Acknowledgements This research has been financed by the European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship and Innovation, under the call RE-SEARCH  ... 
arXiv:2008.12569v1 fatcat:e4qhcrin6vcyzg2diyqoksb3mi

SilentDelivery: Practical Timed-delivery of Private Information using Smart Contracts [article]

Chao Li, Balaji Palanisamy
2021 arXiv   pre-print
This paper proposes SilentDelivery, a secure, scalable and cost-efficient protocol for implementing timed information delivery service in a decentralized blockchain network.  ...  The results demonstrate that SilentDelivery is more secure and scalable compared to the state of the art and reduces the cost of running smart contracts by 85%.  ...  The results demonstrate that SilentDelivery is more secure and scalable compared to the state of the art and reduces the cost of running smart contracts by 85%.  ... 
arXiv:1912.07824v2 fatcat:o4k66bjinnesbnhluufyovqxze

Software Engineering Applications Enabled by Blockchain Technology: A Systematic Mapping Study

Selina Demi, Ricardo Colomo-Palacios, Mary Sánchez-Gordón
2021 Applied Sciences  
Additionally, findings reveal the potential of using blockchain technologies as an alternative to centralized systems, such as GitHub, Travis CI, and cloud-based package managers, and also to establish  ...  In this study, we aim to contribute to the body of knowledge of blockchain-oriented software engineering by providing an adequate overview of the software engineering applications enabled by blockchain  ...  in most of today's business processes.  ... 
doi:10.3390/app11072960 fatcat:r2wlufbqb5grbd7q2qbi7yijwu

Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges

Aisha Zahid Junejo, Manzoor Ahmed Hashmani, Mehak Maqbool Memon
2021 Applied Sciences  
An enormous portion of blockchain research is dedicated to the design and development of privacy protocols but not much has been achieved for proper assessment of these solutions.  ...  Further, we have introduced a concept of privacy precision that is a quantifiable measure to empirically assess privacy efficiency in blockchains.  ...  Acknowledgments: The authors extend their deep regards and acknowledgement to Universiti Teknologi PETRONAS for provision of resources and materials for the completion of this research work.  ... 
doi:10.3390/app11157013 fatcat:3pvl77nsrbg63ntf6g3hoejwpu

ABC: A Cryptocurrency-Focused Threat Modeling Framework [article]

Ghada Almashaqbeh, Allison Bishop, Justin Cappos
2019 arXiv   pre-print
The use cases further attest to the usefulness of ABC's tools for both cryptocurrency-based systems, as well as a cloud native security technology.  ...  The user study showed that around 71% of those who used ABC were able to identify financial security threats, as compared to only 13% of participants who used the popular framework STRIDE.  ...  Threat Model Accuracy To quantify accuracy, we compute the recall and precision values for the concrete threat scenarios found by each subject as compared to the reference threat models we built for ArchiveCoin  ... 
arXiv:1903.03422v2 fatcat:ubuy32d7kff6xiqutssplmpkg4

ARPA Whitepaper [article]

Derek Zhang, Alex Su, Felix Xu, Jiang Chen
2018 arXiv   pre-print
We propose a secure computation solution for blockchain networks.  ...  The correctness of computation is verifiable even under malicious majority condition using information-theoretic Message Authentication Code (MAC), and the privacy is preserved using Secret-Sharing.  ...  No prior knowledge is needed to set it up correctly. 2) Since dedicated nodes run MPC, the cost for conducting such work will be much lower. and 3) The MPC "cloud" can bring awareness to the business world  ... 
arXiv:1812.05820v1 fatcat:wpu3uxpo6vcftomeeeufovd3ai

Specification Of Security Enablers For Data Management

Marko Vukolic
2016 Zenodo  
This deliverable introduces the processing functions for data management in the SUPERCLOUD.  ...  The first part describes novel components pertaining to state-machine replication, which will be used to replicate critical pieces of SUPERCLOUD metadata across multiple clouds.  ...  For instance, since we have 68 distinct service locations, the solver would need to compare the storage cost of C(68, 10) > 2.9 × 10 11 combinations to find the most economic cloud service tolerating up  ... 
doi:10.5281/zenodo.263831 fatcat:ksk4ze2tuncfbexjzsorjnoabe
« Previous Showing results 1 — 15 out of 84 results