User authentication and access control to blockchain-based forensic log data
- Authors: Islam, Md Ezazul , Islam, Md Rafiqul , Chetty, Madhu , Lim, Suryani , Chadhar, Mehmood
- Date: 2023
- Type: Text , Journal article
- Relation: Eurasip Journal on Information Security Vol. 2023, no. 1 (2023), p.
- Full Text:
- Reviewed:
- Description: For dispute resolution in daily life, tamper-proof data storage and retrieval of log data are important with the incorporation of trustworthy access control for the related users and devices, while giving access to confidential data to the relevant users and maintaining data persistency are two major challenges in information security. This research uses blockchain data structure to maintain data persistency. On the other hand, we propose protocols for the authentication of users (persons and devices) to edge server and edge server to main server. Our proposed framework also provides access to forensic users according to their relevant roles and privilege attributes. For the access control of forensic users, a hybrid attribute and role-based access control (ARBAC) module added with the framework. The proposed framework is composed of an immutable blockchain-based data storage with endpoint authentication and attribute role-based user access control system. We simulate authentication protocols of the framework in AVISPA. Our result analysis shows that several security issues can efficiently be dealt with by the proposed framework. © 2023, The Author(s).
Is blockchain for internet of medical things a panacea for COVID-19 pandemic?
- Authors: Li, Xuran , Tao, Bishenghui , Dai, Hong-Ning , Imran, Muhammad , Wan, Dehuan , Li, Dengwang
- Date: 2021
- Type: Text , Journal article
- Relation: Pervasive and Mobile Computing Vol. 75, no. (2021), p.
- Full Text: false
- Reviewed:
- Description: The outbreak of the COVID-19 pandemic has deeply influenced the lifestyle of the general public and the healthcare system of the society. As a promising approach to address the emerging challenges caused by the epidemic of infectious diseases like COVID-19, Internet of Medical Things (IoMT) deployed in hospitals, clinics, and healthcare centers can save the diagnosis time and improve the efficiency of medical resources though privacy and security concerns of IoMT stall the wide adoption. In order to tackle the privacy, security, and interoperability issues of IoMT, we propose a framework of blockchain-enabled IoMT by introducing blockchain to incumbent IoMT systems. In this paper, we review the benefits of this architecture and illustrate the opportunities brought by blockchain-enabled IoMT. We also provide use cases of blockchain-enabled IoMT on fighting against the COVID-19 pandemic, including the prevention of infectious diseases, location sharing and contact tracing, and the supply chain of injectable medicines. We also outline future work in this area. © 2021 Elsevier B.V.
A blockchain-based privacy-preserving mechanism with aggregator as common communication point
- Authors: Yahaya, Adamu , Javaid, Nadeem , Khalid, Rabiya , Imran, Muhammad , Guizani, Mohsen
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: The high penetration of renewable energy resources into the distributed system and their intermittent behavior of the non-dispatchable generation causes issues of demand supply mismatch and serious security and privacy concerned in the system. It is believed that incorporating blockchain will reduce costs, enhance data security, and improve the system efficiency. However, privacy issues are not completely eliminated and can hinder the wide applications of blockchain. In the study, we present a Reputation Based Starvation Free Energy Allocation Policy (Reputation-SFEAP) in a decentralized and distributed blockchain-based energy trading; while keeping Aggregator as Common Communication Point. In addition, Identity-Based encryption (ID-Based encryption) technique is added that improves transactional information privacy. According to the research analysis, it is observed that the proposed system model has optimal and fair energy allocation algorithms, which prevent all the energy users from energy starvation and share the available energy accordingly. Moreover, the incorporated encryption system has greater security-privacy level, which protects passive attacker and disguises attacker from penetration. © 2020 IEEE.
Investigating smart home security : is blockchain the answer?
- Authors: Arif, Samrah , Khan, M. Arif , Rehman, Sabih , Kabir, Muhammad , Imran, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 117802-117816
- Full Text:
- Reviewed:
- Description: Smart Home automation is increasingly gaining popularity among current applications of Internet of Things (IoT) due to the convenience and facilities it provides to the home owners. Sensors are employed within the home appliances via wireless connectivity to be accessible remotely by home owners to operate these devices. With the exponential increase of smart home IoT devices in the marketplace such as door locks, light bulbs, power switches etc, numerous security concerns are arising due to limited storage and processing power of such devices, making these devices vulnerable to several attacks. Due to this reason, security implementations in the deployment of these devices has gained popularity among researchers as a critical research area. Moreover, the adoption of traditional security schemes has failed to address the unique security concerns associated with these devices. Blockchain, a decentralised database based on cryptographic techniques, is gaining enormous attention to assure security of IoT systems. The blockchain framework within an IoT system is a fascinating substitute to the traditional centralised models, which has some significant concerns in fulfilling the demand of smart homes security. In this article, we aim to examine the security of smart homes by instigating the adoption of blockchain and exploring some of the currently proposed smart home architectures using blockchain technology. To present our findings, we describe a simple secure smart home framework based on a refined version of blockchain called Consortium blockchain. We highlight the limitations and opportunities of adopting such an architecture. We further evaluate our model and conclude with the results by designing an experimental testbed using a few household IoT devices commonly available in the marketplace. © 2013 IEEE.
Timeless principles of taxpayer protection: how they adapt to digital disruption
- Authors: Bentley, Duncan
- Date: 2019
- Type: Text , Journal article
- Relation: eJournal of Tax Research Vol. 16, no. 3 (2019), p. 679-713
- Full Text:
- Reviewed:
- Description: Digital transformation will pose growing challenges to tax revenues and systems of taxation that were designed for another century. The tax rules may hasten slowly, but the record of response to the challenges of electronic commerce, and of base erosion and profit shifting, shows that tax administration is more adaptable. This article identifies the detailed nature of technological changes in electronics and systems; big data, automation and artificial intelligence; and security, including blockchain; as those changes affect tax administration. It highlights the critical taxpayer rights issues and applies accepted taxpayer rights frameworks. The article concludes that taxpayer rights principles are both highly adaptable to a digital world, and provide useful guidance to where urgent action and further research are required. © 2019 UNSW Business School™.