99 Hits in 9.0 sec

Correction to: Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution

Paul Rimba, An Binh Tran, Ingo Weber, Mark Staples, Alexander Ponomarev, Xiwei Xu
2019 Information Systems Frontiers  
The model that was used for the testing and implementation is the right version. Therefore, the incorrect figure has not impacted the measurements and the conclusion of the article.  ...  The authors apologize for this error. The online version of the original article can be found at https://doi.  ...  The model that was used for the testing and implementation is the right version. Therefore, the incorrect figure has not impacted the measurements and the conclusion of the article.  ... 
doi:10.1007/s10796-019-09899-w fatcat:hchja3vu5zf5rgcxox6h26a2iy

An overview on smart contracts: Challenges, advances and platforms

Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping Chen, Jian Weng, Muhammad Imran
2019 Future generations computer systems  
As a result, smart contracts can cut down administration and save services costs, improve the efficiency of business processes and reduce the risks.  ...  Smart contract technology is reshaping conventional industry and business processes.  ...  and the Fundamental Research Funds for the Central Universities.  ... 
doi:10.1016/j.future.2019.12.019 fatcat:usxpqm6vpzhefekeeukbwj4sku

Survey on Homomorphic Encryption and Address of New Trend

Ayman Alharbi, Haneen Zamzami, Eman Samkri
2020 International Journal of Advanced Computer Science and Applications  
Encryption is the process of disguising text to ensure the confidentiality of data transmitted from one party to another.  ...  Example of these applications but not limited to : Vehicle to Vehicle (v2v) secure communication, cloud security, Vehicular ad-hoc networks (VANET), Blockchain, E-Voting, Data mining with privacy preserving  ...  Defining and quantifying privacy in the cloud is the first and most important problem.  ... 
doi:10.14569/ijacsa.2020.0110774 fatcat:f27kc4abbbbmddnjmwlz3ijmyu

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Osama Alkadi, Nour Moustafa, Benjamin Turnbull
2020 IEEE Access  
This paper reviews the background and related studies in the areas of cloud systems, intrusion detection and blockchain applications against cyber attacks.  ...  For more information, see 104894 VOLUME 8, 2020 O. Alkadi et al.: Review of Intrusion Detection and Blockchain Applications in the Cloud FIGURE 1.  ...  , business modes, and systems requirements requires specific IDS design for cloud and grid to be executed separately [155] .  ... 
doi:10.1109/access.2020.2999715 fatcat:qz677wrupvcblbvcrm74owmjyu

The Architectural Design Requirements of a Blockchain-Based Port Community System

Elnaz Irannezhad
2020 Logistics  
This paper presents the value proposition of blockchain for Port Community Systems (PCS) by dissecting the business processes in port logistics and unfolding functionalities of blockchain in lowering the  ...  Availability—the readiness for correct service, and reliability—the continuity of correct service, are heavily reliant on the right choice being made for blockchain design for such a complex use case.  ...  Acknowledgments: The author acknowledges the support provided by the Port of Brisbane Ltd. Pty., as part of the University of Queensland-Port of Brisbane Research Partnership.  ... 
doi:10.3390/logistics4040030 fatcat:blgs2ztbojgkhonmbnfxla6s2q

D5.7 Market Analysis and Exploitation - second year report

Vanessa Clemente, Tomás García, Arturo Medela, Orfefs Voutyras, George Palaiokrassas, Koumoto Takafumi, Akira Tsuge, Tadashi Okoshi, Jin Nakasawa, Aamir Bokhari, Kenji Tei, Keiko Doguchi (+2 others)
2020 Zenodo  
Report detailing the activities performed so far regarding market analysis and plans/reports for exploitation planning related activities.  ...  Dollars) 2017 2018 2019 2020 2021 Cloud Business Process Services (BPaaS) 42.6 46.4 50.1 54.1 58.4 Cloud Application Infrastructure Services (PaaS) 11.9 15.0 18.6 22.7 27.3 Cloud Application  ...  In this section we present different approaches and platforms based on Blockchain technology and IoT and compare them with M-Sec platform mainly in terms of preserving security and privacy.  Sensing-as-a-Service  ... 
doi:10.5281/zenodo.4237450 fatcat:h6dagn7pcndojcbnfuige2hbn4

A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System

Pei Huang, Kai Fan, Hanzhe Yang, Kuan Zhang, Hui Li, Yintang Yang
2020 IEEE Access  
To address the trust problem between data owners and cloud service providers, we propose a collaborative auditing blockchain framework for cloud data storage.  ...  One way to ensure trustworthy preservation of cloud data is the remote data auditing method, through which data owners can check storage reliability of cloud system on demand and avoid potential data corruption  ...  As for compared schemes, their consensus members own no prior knowledge and are only responsible for the verification of signatures, which means that the DO still has to execute auditing process by itself  ... 
doi:10.1109/access.2020.2993606 fatcat:5uyvybthlnh6rizmlyrlctsqei

When Distributed Ledger Technology meets Internet of Things – Benefits and Challenges [article]

Pavlos Charalampidis, Alexandros Fragkiadakis
2020 arXiv   pre-print
There is a growing interest from both the academia and industry to employ distributed ledger technology in the Internet-of-Things domain for addressing security-related and performance challenges.  ...  This work explores the interplay between Internet-of-Things and distributed ledger technology, analysing the fundamental characteristics of this technology and discussing the related benefits and challenges  ...  Acknowledgements This research has been financed by the European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship and Innovation, under the call RE-SEARCH  ... 
arXiv:2008.12569v1 fatcat:e4qhcrin6vcyzg2diyqoksb3mi

Blockchain for Economically Sustainable Wireless Mesh Networks [article]

Aniruddh Rao Kabbinale, Emmanouil Dimogerontakis, Mennan Selimi, Anwaar Ali, Leandro Navarro, Arjuna Sathiaseelan, Jon Crowcroft
2019 arXiv   pre-print
We quantify the performance, bottlenecks and identify the current limitations and opportunities for improvement to serve locally the needs of wireless mesh networks, without the privacy and economic cost  ...  This means every participant can invest in resources, and pay or be paid for usage to recover the costs of network devices and maintenance.  ...  small number of servers where blockchain processes can execute, in several servers provided by different participants to ensure trust and reliability.  ... 
arXiv:1811.04078v4 fatcat:jlmikg3srfe4dojoamkqjbgiay

Integrating Blockchain in Safety-Critical Systems: An Application to the Nuclear Industry

Manuel Diaz, Luis Llopis, Enrique Soler, Joaquin Trillo
2020 IEEE Access  
CONFLICTS OF INTEREST The authors declare that there is no conflict of interest regarding the publication of this manuscript.  ...  that cost billions USD and cause the loss of hundreds of human lives [5] .  ...  acquisition information are already quantified through the analysis process.  ... 
doi:10.1109/access.2020.3032322 fatcat:eqzidq724bbktbmbyxjzppl4n4

Software Engineering Applications Enabled by Blockchain Technology: A Systematic Mapping Study

Selina Demi, Ricardo Colomo-Palacios, Mary Sánchez-Gordón
2021 Applied Sciences  
Additionally, findings reveal the potential of using blockchain technologies as an alternative to centralized systems, such as GitHub, Travis CI, and cloud-based package managers, and also to establish  ...  In this study, we aim to contribute to the body of knowledge of blockchain-oriented software engineering by providing an adequate overview of the software engineering applications enabled by blockchain  ...  in most of today's business processes.  ... 
doi:10.3390/app11072960 fatcat:r2wlufbqb5grbd7q2qbi7yijwu

Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges

Aisha Zahid Junejo, Manzoor Ahmed Hashmani, Mehak Maqbool Memon
2021 Applied Sciences  
An enormous portion of blockchain research is dedicated to the design and development of privacy protocols but not much has been achieved for proper assessment of these solutions.  ...  With the widespread of blockchain technology, preserving the anonymity and confidentiality of transactions have become crucial.  ...  Acknowledgments: The authors extend their deep regards and acknowledgement to Universiti Teknologi PETRONAS for provision of resources and materials for the completion of this research work.  ... 
doi:10.3390/app11157013 fatcat:3pvl77nsrbg63ntf6g3hoejwpu

SilentDelivery: Practical Timed-delivery of Private Information using Smart Contracts [article]

Chao Li, Balaji Palanisamy
2021 arXiv   pre-print
This paper proposes SilentDelivery, a secure, scalable and cost-efficient protocol for implementing timed information delivery service in a decentralized blockchain network.  ...  The results demonstrate that SilentDelivery is more secure and scalable compared to the state of the art and reduces the cost of running smart contracts by 85%.  ...  Scaling blockchain with off-chain execution Off-chain execution of smart contracts is a promising solution for improving blockchain scalability [34] , [35] , [36] .  ... 
arXiv:1912.07824v2 fatcat:o4k66bjinnesbnhluufyovqxze

Blockchain-enabled wireless communications: a new paradigm towards 6G

Jiaheng Wang, Xintong Ling, Yuwei Le, Yongming Huang, Xiaohu You
2021 National Science Review  
Importantly, we further propose a unified framework of the blockchain radio access network (B-RAN) as a trustworthy and secure paradigm for 6G networking by utilizing blockchain technologies with enhanced  ...  We first provide a brief introduction to the fundamentals of blockchain, and then we conduct a comprehensive investigation of the most recent efforts in incorporating blockchain into wireless communications  ...  Computing and storage The wide use of cloud processing and MEC makes computing and storage capacities valuable network resources, which can be efficiently managed by blockchain [73, 74] .  ... 
doi:10.1093/nsr/nwab069 pmid:34691739 pmcid:PMC8433085 fatcat:pz44xzyetnee7beegpy3vkkcua

5GZORRO_D.2.1. Use Cases and Requirements Definition

Adriana Fernandez August Betzler
2021 Zenodo  
into operational data lakes, coupled with distributed ledger technologies to implement a scalable and secure solution for the interworking and accountability of different actors of the service composition  ...  volumes of ubiquitous and pervasive 5G services, with security and trust.  ...  Thus, the services lack consideration for cost models when taking advantage of cloud content storage spanning on multiple cloud providers [34] .  ... 
doi:10.5281/zenodo.5211350 fatcat:khbocyw5uzektiukzzcwj7dsyy
« Previous Showing results 1 — 15 out of 99 results