102 Hits in 6.4 sec

Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services [article]

Roman Matzutt and Jan Pennekamp and Erik Buchholz and Klaus Wehrle
2020 pre-print
We thus present AnonBoot, a Sybil-resistant medium to securely bootstrap distributed anonymity services via public blockchains.  ...  While the security of these services is often well-researched, security implications of their required bootstrapping processes are usually neglected: Users either jointly conduct the anonymization themselves  ...  The responsibility for the content of this publication lies with the authors. The authors thank Jöran Wiechert for his support with the prototype.  ... 
doi:10.1145/3320269.3384729 arXiv:2004.06386v1 fatcat:d5pifyi3mbbyznzxxah7pqtd6i

Bitcoin's Blockchain Peer-to-Peer Network Security Attacks and Countermeasures

Mahmoud Mostafa
2020 Indian Journal of Science and Technology  
Various types of network attacks including Distributed Denial-of-Service (DDoS) attack, Sybil attack, double-spending, transaction malleability, and attacks on mining pools, etc. encourage great privacy  ...  Such blockchain systems are used for various purposes, such as for digital payments or utilization of cryptocurrency to perform particular business transactions e.g., to accept payment for their services  ...  In most cases, the DDoS attacks have been utilized to target internet servers of large corporations, for example, banks, online business retailers, and even significant public and government services.  ... 
doi:10.17485/ijst/2020/v13i07/149691 fatcat:nawpor2irfcprohecctelfrcsa

Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies [article]

David Cerezo Sánchez
2020 arXiv   pre-print
of Sybil-resistant mechanisms such as Proof-of-Work (i.e., high energy and environmental costs) and Proof-of-Stake (i.e., capital hoarding and lower transaction volume).  ...  Solving one of the most pressing problems in blockchains, a zk-PoI cryptocurrency is proved to have the following advantageous properties: - an incentive-compatible protocol for the issuing of cryptocurrency  ...  A previous work [AABM17] on secure identity registration on distributed ledgers achieved anonymity from a credential issuer, but the pre-authentication is non-anonymous, it doesn't consider Sybil-resistance  ... 
arXiv:1905.09093v2 fatcat:djetqb5mcvh3vo4hdsenyobiuu

Online Voting System - Powered by Blockchain

Vaibhav Sinha and Sachin Garg
2021 International journal of modern trends in science and technology  
Blockchain is a disruptive technology of the current era and promises to improve the overall resilience of e-voting systems.  ...  This paper presents an effort to leverage benefits of blockchain such as cryptographic foundations and transparency to achieve an effective scheme for e voting.  ...  In continuation of this work, we are focused at improving the resistance of blockchain technology to the 'double spending' problem which will translate as 'double voting' for e-voting systems.  ... 
doi:10.46501/ijmtst070116 fatcat:6nmytwr2breondr7c2tmg2dqoa

Towards Blockchain-based Auditable Storage and Sharing of IoT Data [article]

Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, Simon Duquennoy
2017 arXiv   pre-print
In this paper, we present a blockchain-based design for the IoT that brings a distributed access control and data management.  ...  We enable a secure and resilient access control management, by utilizing the blockchain as an auditable and distributed access control layer to the storage layer.  ...  Solving the puzzle is referred to as the proof-of-work and ensures as well resistance against Sybil attacks.  ... 
arXiv:1705.08230v2 fatcat:qlws62hmj5cihnadrnw2szi75u

Towards Blockchain-based Auditable Storage and Sharing of IoT Data

Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, Simon Duquennoy
2017 Proceedings of the 2017 on Cloud Computing Security Workshop - CCSW '17  
In this paper, we present a blockchain-based design for the IoT that brings a distributed access control and data management.  ...  We enable a secure and resilient access control management, by utilizing the blockchain as an auditable and distributed access control layer to the storage layer.  ...  Solving the puzzle is referred to as the proof-of-work and ensures as well resistance against Sybil attacks.  ... 
doi:10.1145/3140649.3140656 dblp:conf/ccs/ShafaghBHD17 fatcat:mjeabtvsajfr3fhfpqei5lizw4

Blockchain Storage Load Balancing Among DHT Clustered Nodes [article]

Ryosuke Abe
2019 arXiv   pre-print
In this thesis, to reduce storage capacity with keeping the independence of each node, we propose a storage load balancing scheme "KARAKASA" using Distributed Hash Table (DHT).  ...  In KARAKASA, nodes distributedly keep the whole blockchain among DHT networked nodes. We evaluated KARAKASA from the view of storage capacity and independence.  ...  In Bitcoin, each node store transactions in a public ledger. The public ledger is called "Blockchain."  ... 
arXiv:1902.02174v1 fatcat:c2wjoegycfgkzkoz4jknfnzkau

Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network

Saurabh Singh, A.S.M. Sanwar Hosen, Byungun Yoon
2021 IEEE Access  
Blockchain technology can also be applied to the Internet of Things (IoT). The advancement of IoT technology in various domains has led to substantial progress in distributed systems.  ...  Blockchain concept requires a decentralized data management system for storing and sharing the data and transactions in the network.  ...  the privacy of transactions in networks, but ensuring anonymity is difficult because the blockchain ledger is public.  ... 
doi:10.1109/access.2021.3051602 fatcat:2psy7mq6zrhhnjzg35d6aaecsq

A Security Reference Architecture for Blockchains [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Pawel Szalachowski
2019 arXiv   pre-print
The main focus of this work is to systematize knowledge about security and privacy issues of blockchains.  ...  The scope of our work mainly covers aspects related to the decentralized nature of blockchains, while we mention common operational security issues and countermeasures only tangentially.  ...  Traffic analysis using Sybil listeners can reveal the linkage of node IP addresses and their transactions [33] . Countermeasures include using VPNs or anonymization services, such as Tor. See Sec.  ... 
arXiv:1904.06898v1 fatcat:aa3p3x6dy5fidlodgy3ak5twru


Harry Halpin
2017 Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17  
Second, secure messaging applications ranging from Signal to WhatsApp may deliver the content in an encrypted form, but they do not protect the metadata of the message and they rely on centralized servers  ...  NEXTLEAP is also working with the PANORAMIX EC project to use a generic mix networking infrastructure to hide the metadata of the messages themselves and plans to add privacy-enhanced data analytics that  ...  that the blockchain is privacy-preserving and anonymous, while it is actually a public ledger that is transparent and allows easy data-mining.  ... 
doi:10.1145/3098954.3104056 dblp:conf/IEEEares/Halpin17 fatcat:z74xcth2ezhwji3ytsunuudpae

The Onion Name System

Jesse Victors, Ming Li, Xinwen Fu
2017 Proceedings on Privacy Enhancing Technologies  
Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client.  ...  plugin for Tor, simplify our design and threat model by embedding OnioNS within the Tor network, and provide mechanisms for authenticated denial-of-existence with minimal networking costs.  ...  We thank the anonymous reviewers for their insightful comments and suggestions that helped to significantly improve the paper, and also thank Rob Jansen for shepherding our paper.  ... 
doi:10.1515/popets-2017-0003 dblp:journals/popets/VictorsLF17 fatcat:l7fjubhpy5axrpw5fcyzy37y5i

SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks

Tanesh Kumar, An Braeken, Vidhya Ramani, Ijaz Ahmad, Erkki Harjula, Mika Ylianttila
2019 2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)  
In this context, both Blockchain and Edge computing are considered as promising technologies to fulfill the vision and requirements for the future Industry 4.0.  ...  This paper focuses on identifying the major security challenges in the IIoT blockchain-edge related networks.  ...  ACKNOWLEDGMENT This work was supported by Academy of Finland, under the projects: Industrial Edge, MEC-AI, WiFiUS: Massive IoT and 6Genesis Flagship projects (grant 318927).  ... 
doi:10.1109/rndm48015.2019.8949107 dblp:conf/rndm/KumarBRAHY19 fatcat:zsbccrawufdtllhwytpekgcp3u

WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts [article]

Ádám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres
2021 IACR Cryptology ePrint Archive  
Although the public nature of this design lacks strong guarantees for privacy, it does not rule it out. A number of methods have been proposed to strengthen privacy.  ...  This work introduces WabiSabi 1 , a new protocol for centrally coordinated CoinJoin implementations utilizing keyed verification anonymous credentials and homomorphic value commitments.  ...  Acknowledgements We would like to acknowledge the inputs and invaluable contributions of ZmnSCPxj, Yahia Chiheb, Thaddeus Dryja, Adam Gibson, Dan Gould, Ethan Heilman, Max Hillebrand, Aviv Milner, Jonas  ... 
dblp:journals/iacr/FicsorKOS21 fatcat:dqovollia5gjbo7p7e6kmdnrba

An Optimal Algorithm for Secure Transactions in Bitcoin Based on Blockchain

Jazem Mutared Alanazi, Ahmad Ali AlZubi
2023 Intelligent Automation and Soft Computing  
Because it is changing how economic transactions are carried out, the blockchain is one of the technical developments that has a lot of promise for this progress.  ...  As a result, in light of the Bitcoin blockchain system's privacy issues, this scheme combines the concept of coin mixing with encrypted transaction technology to create a truly anonymous blockchain system  ...  Acknowledgement: The authors would like to thank the editors and reviewers for their review and recommendations. And the Researchers Supporting Project for supporting this work by Project No: (No.  ... 
doi:10.32604/iasc.2023.030287 fatcat:e5lono42uva6dfayiasyejzc2q

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  We propose the security reference architecture (SRA) for blockchains, which adopts a stacked model (similar to the ISO/OSI) describing the nature and hierarchy of various security and privacy aspects.  ...  the case of anonymization services.  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi
« Previous Showing results 1 — 15 out of 102 results