30 Hits in 3.5 sec

Secure Computation of the kth-Ranked Element in a Star Network [article]

Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi
2019 arXiv   pre-print
We consider the problem of securely computing the kth-ranked element in a sequence of n private integers distributed among n parties.  ...  The individual integers are sensitive data, yet the kth-ranked element is of mutual interest to the parties.  ...  Introduction Given n parties each holding a private integer, we consider the problem of securely computing the k th -ranked element (KRE) of these n integers.  ... 
arXiv:1909.08347v1 fatcat:dd36hr3qszejllto5jbhbte2ci

Blockchain Economical Models, Delegated Proof of Economic Value and Delegated Adaptive Byzantine Fault Tolerance and their implementation in Artificial Intelligence BlockCloud

Qi Deng
2019 Journal of Risk and Financial Management  
The Artificial Intelligence BlockCloud (AIBC) is an artificial intelligence and blockchain technology based large-scale decentralized ecosystem that allows system-wide low-cost sharing of computing and  ...  The upper layers need to follow a set of economic policies strictly and run on a deterministic and robust protocol.  ...  (Li et al. 2018 ) conduct a study on security threats to blockchains, survey the corresponding real attacks by examining popular blockchains, and review security enhancement solutions that could be used  ... 
doi:10.3390/jrfm12040177 fatcat:23zlngrmsrgptipihg7ziantx4

Artificial Intelligence BlockCloud (AIBC) Technical Whitepaper [article]

Qi Deng
2019 arXiv   pre-print
The AIBC is an Artificial Intelligence and blockchain technology based large-scale decentralized ecosystem that allows system-wide low-cost sharing of computing and storage resources.  ...  The DABFT uses deep learning techniques to predict and select the most suitable BFT algorithm in order to achieve the best balance of performance, robustness, and security.  ...  , computing and storage node) in the blockchain.  ... 
arXiv:1909.12063v1 fatcat:rrbmupnb3bfrnexsvkuz4v73hi

Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks [article]

Yutao Jiao, Ping Wang, Dusit Niyato, Kongrath Suankaewmanee
2018 arXiv   pre-print
As an emerging decentralized secure data management platform, blockchain has gained much popularity recently.  ...  Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation.  ...  From the perspective of trustworthiness, the PoW-based blockchain is only as secure as the amount of computing power dedicated to mining tasks [12] .  ... 
arXiv:1804.09961v2 fatcat:ror6pr4ejzhhtftrez72wafqie

Towards Secure Blockchain-enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory [article]

Jiawen Kang, Zehui Xiong, Dusit Niyato, Dongdong Ye, Dong In Kim, Jun Zhao
2018 arXiv   pre-print
To ensure data sharing security and traceability, highefficiency Delegated Proof-of-Stake consensus scheme as a hard security solution is utilized to establish blockchain-enabled IoV (BIoV).  ...  In the first stage, a reputation-based voting scheme for the blockchain is proposed to ensure secure miner selection.  ...  The on-board units can perform simple computation, collect local data from sensing devices, and upload the data to the RSUs.  ... 
arXiv:1809.08387v1 fatcat:27njoxxkv5cq5plml2evnyaqaa

Integrated Energy Transaction Mechanisms Based on Blockchain Technology

Shengnan Zhao, Beibei Wang, Yachao Li, Yang Li
2018 Energies  
Finally, the smart contracts of the transactions were designed and deployed on the Ethereum private blockchain site to demonstrate the validity of the proposed transaction scheme.  ...  As a decentralized and distributed accounting mode, blockchain technology fits the requirements of distributed energy to participate in the energy market.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/en11092412 fatcat:ai3bjeu2vfae7a7s4sz5yes7cm

Scaling Blockchains: Can Elected Committees Help? [article]

Alon Benhaim, Brett Hemenway Falk, Gerry Tsoukalas
2021 arXiv   pre-print
In theory, the smaller the committee, the faster the blockchain can reach consensus and the more it can scale.  ...  Using EOS' Delegated Proof of Stake (DPoS) protocol as a backdrop, we show that identifying the optimal voting strategy is complex and practically out of reach.  ...  tokens on the blockchain.  ... 
arXiv:2110.08673v1 fatcat:u44kggwhdvguzjnordudf7hgym

Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft) [article]

George Bissias, Brian Neil Levine
2019 arXiv   pre-print
Bitcoin produces, on average, one block every 10 minutes. An unfortunate limitation of all deployed PoW blockchain systems is that the time between blocks has high variance.  ...  Blockchain systems are designed to produce blocks at a constant average rate. The most popular systems currently employ a Proof of Work (PoW) algorithm as a means of creating these blocks.  ...  Eventually the blockchain will fork on just one of those blocks, orphaning the other. If the set of transactions in the two blocks is not the same, then consensus is delayed.  ... 
arXiv:1709.08750v5 fatcat:lc5jg6xntrhwjliw44vs6qmepm

A Novel Range Search Scheme Based on Frequent Computing for Edge-Cloud Collaborative Computing in CPSS

Zongmin Cui, Zhixing Lu, Hyunho Yang, Yue Zhang, Shunli Zhang
2020 IEEE Access  
In this paper, we focus on a basic problem of geo-tagged data: find the top-k frequent terms among the geo-tagged data in a specific region from the cloud.  ...  And then an efficient kTermsSearch algorithm is presented to compute top-k frequent terms in a given region. Finally, extensive experiments verify the validity of the proposed scheme.  ...  Meanwhile, blockchain technology is expected to solve the security and privacy issues of data sharing, which makes it more secure and feasible for human society to share and use the generated massive data  ... 
doi:10.1109/access.2020.2991068 fatcat:vlxknzjf5fcmbb464wcp7cm6a4

Novel Stream Ciphering Algorithm for Big Data Images Using Zeckendorf Representation

Liangshun Wu, Hengjin Cai, Rajesh Kaluri
2021 Wireless Communications and Mobile Computing  
There is an obvious contradiction between the security and privacy and the widespread use of big data. Nowadays, the most important engine to provide confidentiality is encryption.  ...  on hardware depletion, and the method is highly key sensitive and shows good resistance against noise attacks and statistical attacks.  ...  Acknowledgments This work is sponsored by the National Natural Science Foundation of China under grant number 61832014.  ... 
doi:10.1155/2021/4637876 fatcat:howuicrcfbbtloxtdp7nf7vidy

Technical Program

2021 2020 IEEE Information Theory Workshop (ITW)  
Similarly to the inherent secrecy nature of the classical SK scheme, we show that the proposed scheme is also secure by itself, which indicates that the feedback secrecy capacity of the two-user Gaussian  ...  It is shown here to be effective also in assisting the encoder: it achieves the helper capacity on the single-user Gaussian channel, on the multiple-access Gaussian channel, on the Exponential channel,  ...  The construction depends on the computation of min-rank of a matrix, which is computationally intensive. In [A. A. Mahesh, N. S. Karat and B. S.  ... 
doi:10.1109/itw46852.2021.9457668 fatcat:j425ygeajrbd5esztbe5zgygty

Secure Composition for Hardware Systems (Dagstuhl Seminar 19301)

Divya Arora, Ilia Polian, Francesco Regazzoni, Patrick Schaumont, Michael Wagner
2019 Dagstuhl Reports  
The seminar helped define new research challenges, and activities are underway to put the topic of secure composition higher on the agenda of the respective communities.  ...  The Dagstuhl seminar "Secure Composition for Hardware Systems", which took place on July 21-26, 2019, focused on secure composition of systems which contain hardware blocks.  ...  There may still be a large software attack surface in some cases (e.g., integer overflow in TZ Secure OS) Memory integrity & anti-replay are very hard on performance/area Many TEEs rely on hardware sharing  ... 
doi:10.4230/dagrep.9.7.94 dblp:journals/dagstuhl-reports/AroraPRS19 fatcat:bwsa4luz6fb7ri7q62p5vxpefa

Reliable data collection in participatory trials to assess digital healthcare apps [article]

JunSeok Park, Seongkuk Park, Gwangmin Kim, Kwangmin Kim, Jaegyun Jung, Sunyong Yoo, Gwan-Su Yi, Doheon Lee
2020 bioRxiv   pre-print
Digital healthcare mobile apps are experiencing exponential growth due to the development of the mobile network and widespread usage of smartphones.  ...  The existing platforms are not suitable to collect reliable data for evaluating the effectiveness of the apps.  ...  CORUS also uses Blockchain technology. We developed a 654 data falsification prevention feature based on the data immutability characteristics of 655 blockchain technology [85] .  ... 
doi:10.1101/2020.02.05.935049 fatcat:lkelxzhbfzhyxbclcc7bu7jcay

Applications in Security and Evasions in Machine Learning: A Survey

Ramani Sagar, Rutvij Jhaveri, Carlos Borrego
2020 Electronics  
Accordingly, as a supplement to this point, we also analyze the different types of adversarial attacks on the ML models.  ...  Moreover, we illustrate the adversarial attacks based on the attackers' knowledge about the model and addressed the point of the model at which possible attacks may be committed.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics9010097 fatcat:ttmpehdctjhbdk7arxgczl6224

Blockchain adoption factors for SMEs in supply chain management

Filippo Lanzini, Jolien Ubacht, Joachim De Greeff
So far, only limited evidence is available on the perspective of Small and Medium-sized Enterprises (SMEs) on the adoption of blockchain-based applications in their business processes.  ...  A supply chain network can benefit from the visibility of the flow of goods, money, and information enabled by blockchain technology.  ...  Best-Worst Method Protocol We used the Best-Worst Method (BWM) to compute the weights of the identified factors and, hence, to rank them based on their importance.  ... 
doi:10.18757/jscms.2021.5624 fatcat:gdyywb3zybfo5kn4voq5qupa5e
« Previous Showing results 1 — 15 out of 30 results