A patient agent to manage blockchains for remote patient monitoring
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 7th International Conference on Global Telehealth, GT 2018; Colombo, Sri Lanka; 10th-11th October 2018; published in Studies in Health Technology and Informatics Vol. 254, p. 105-115
- Full Text: false
- Reviewed:
- Description: Continuous monitoring of patient's physiological signs has the potential to augment traditional medical practice, particularly in developing countries that have a shortage of healthcare professionals. However, continuously streamed data presents additional security, storage and retrieval challenges and further inhibits initiatives to integrate data to form electronic health record systems. Blockchain technologies enable data to be stored securely and inexpensively without recourse to a trusted authority. Blockchain technologies also promise to provide architectures for electronic health records that do not require huge government expenditure that challenge developing nations. However, Blockchain deployment, particularly with streamed data challenges existing Blockchain algorithms that take too long to place data in a block, and have no mechanism to determine whether every data point in every stream should be stored in such a secure way. This article presents an architecture that involves a Patient Agent, coordinating the insertion of continuous data streams into Blockchains to form an electronic health record.
- Description: Studies in Health Technology and Informatics
Continuous patient monitoring with a patient centric agent : A block architecture
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 32700-32726
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including continuous remote patient monitoring (RPM). However, the complexity of RPM architectures, the size of data sets generated and limited power capacity of devices make RPM challenging. In this paper, we propose a tier-based End to End architecture for continuous patient monitoring that has a patient centric agent (PCA) as its center piece. The PCA manages a blockchain component to preserve privacy when data streaming from body area sensors needs to be stored securely. The PCA based architecture includes a lightweight communication protocol to enforce security of data through different segments of a continuous, real time patient monitoring architecture. The architecture includes the insertion of data into a personal blockchain to facilitate data sharing amongst healthcare professionals and integration into electronic health records while ensuring privacy is maintained. The blockchain is customized for RPM with modifications that include having the PCA select a Miner to reduce computational effort, enabling the PCA to manage multiple blockchains for the same patient, and the modification of each block with a prefix tree to minimize energy consumption and incorporate secure transaction payments. Simulation results demonstrate that security and privacy can be enhanced in RPM with the PCA based End to End architecture.
Adoption of blockchain technology in the Australian grains trade : an assessment of potential economic effects
- Authors: Gunasekera, Don , Valenzuela, Ernesto
- Date: 2020
- Type: Text , Journal article
- Relation: Economic Papers Vol. 39, no. 2 (2020), p. 152-161
- Full Text: false
- Reviewed:
- Description: Recent analysis of Blockchain use has highlighted considerable potential productivity gains arising from lower transaction costs between buyers and sellers of goods. This has been shown by recent examples of Blockchain use in the Australian grains sector. In this paper, we have further developed and quantified this concept of productivity gain by undertaking several illustrative scenarios using a general equilibrium model of the global economy. Our analysis indicates that an assumed modest growth (five per cent) in productivity due to Blockchain use in the grains sector could raise output by eight per cent over the medium term. If this is accompanied by Blockchain use in the Australian finance sector, grains output could reach ten per cent. This reflects the effect of reduction in transaction costs due to the use of Blockchain technology as a “distributed ledger technology” in grain trading. Further, it is anticipated that the wider effects of Blockchain-driven productivity enhancement of the Australian finance sector could contribute to approximately 2.5 per cent increase in GDP in the medium term, relative to what would otherwise be. © 2020 The Economic Society of Australia
Rapid health data repository allocation using predictive machine learning
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2020
- Type: Text , Journal article
- Relation: Health Informatics Journal Vol. 26, no. 4 (2020), p. 3009-3036
- Full Text:
- Reviewed:
- Description: Health-related data is stored in a number of repositories that are managed and controlled by different entities. For instance, Electronic Health Records are usually administered by governments. Electronic Medical Records are typically controlled by health care providers, whereas Personal Health Records are managed directly by patients. Recently, Blockchain-based health record systems largely regulated by technology have emerged as another type of repository. Repositories for storing health data differ from one another based on cost, level of security and quality of performance. Not only has the type of repositories increased in recent years, but the quantum of health data to be stored has increased. For instance, the advent of wearable sensors that capture physiological signs has resulted in an exponential growth in digital health data. The increase in the types of repository and amount of data has driven a need for intelligent processes to select appropriate repositories as data is collected. However, the storage allocation decision is complex and nuanced. The challenges are exacerbated when health data are continuously streamed, as is the case with wearable sensors. Although patients are not always solely responsible for determining which repository should be used, they typically have some input into this decision. Patients can be expected to have idiosyncratic preferences regarding storage decisions depending on their unique contexts. In this paper, we propose a predictive model for the storage of health data that can meet patient needs and make storage decisions rapidly, in real-time, even with data streaming from wearable sensors. The model is built with a machine learning classifier that learns the mapping between characteristics of health data and features of storage repositories from a training set generated synthetically from correlations evident from small samples of experts. Results from the evaluation demonstrate the viability of the machine learning technique used. © The Author(s) 2020.
Blockchain leveraged decentralized IoT eHealth framework
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2020
- Type: Text , Journal article
- Relation: Internet of Things Vol. 9, no. March 2020 p. 100159
- Full Text:
- Reviewed:
- Description: Blockchain technologies recently emerging for eHealth, can facilitate a secure, decentral- ized and patient-driven, record management system. However, Blockchain technologies cannot accommodate the storage of data generated from IoT devices in remote patient management (RPM) settings as this application requires a fast consensus mechanism, care- ful management of keys and enhanced protocols for privacy. In this paper, we propose a Blockchain leveraged decentralized eHealth architecture which comprises three layers: (1) The Sensing layer –Body Area Sensor Networks include medical sensors typically on or in a patient body transmitting data to a smartphone. (2) The NEAR processing layer –Edge Networks consist of devices at one hop from data sensing IoT devices. (3) The FAR pro- cessing layer –Core Networks comprise Cloud or other high computing servers). A Patient Agent (PA) software replicated on the three layers processes medical data to ensure reli- able, secure and private communication. The PA executes a lightweight Blockchain consen- sus mechanism and utilizes a Blockchain leveraged task-offloading algorithm to ensure pa- tient’s privacy while outsourcing tasks. Performance analysis of the decentralized eHealth architecture has been conducted to demonstrate the feasibility of the system in the pro- cessing and storage of RPM data.
Timeless principles of taxpayer protection: how they adapt to digital disruption
- Authors: Bentley, Duncan
- Date: 2019
- Type: Text , Journal article
- Relation: eJournal of Tax Research Vol. 16, no. 3 (2019), p. 679-713
- Full Text:
- Reviewed:
- Description: Digital transformation will pose growing challenges to tax revenues and systems of taxation that were designed for another century. The tax rules may hasten slowly, but the record of response to the challenges of electronic commerce, and of base erosion and profit shifting, shows that tax administration is more adaptable. This article identifies the detailed nature of technological changes in electronics and systems; big data, automation and artificial intelligence; and security, including blockchain; as those changes affect tax administration. It highlights the critical taxpayer rights issues and applies accepted taxpayer rights frameworks. The article concludes that taxpayer rights principles are both highly adaptable to a digital world, and provide useful guidance to where urgent action and further research are required. © 2019 UNSW Business School™.
A patient agent controlled customized blockchain based framework for internet of things
- Authors: Uddin, Md Ashraf
- Date: 2021
- Type: Text , Thesis , PhD
- Full Text:
- Description: Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures known as Internet of Things. New Blockchain for the Internet of Things models promise secure solutions for eHealth, smart cities, and other applications. These models pave the way for continuous monitoring of patient’s physiological signs with wearable sensors to augment traditional medical practice without recourse to storing data with a trusted authority. However, existing Blockchain algorithms cannot accommodate the huge volumes, security, and privacy requirements of health data. In this thesis, our first contribution is an End-to-End secure eHealth architecture that introduces an intelligent Patient Centric Agent. The Patient Centric Agent executing on dedicated hardware manages the storage and access of streams of sensors generated health data, into a customized Blockchain and other less secure repositories. As IoT devices cannot host Blockchain technology due to their limited memory, power, and computational resources, the Patient Centric Agent coordinates and communicates with a private customized Blockchain on behalf of the wearable devices. While the adoption of a Patient Centric Agent offers solutions for addressing continuous monitoring of patients’ health, dealing with storage, data privacy and network security issues, the architecture is vulnerable to Denial of Services(DoS) and single point of failure attacks. To address this issue, we advance a second contribution; a decentralised eHealth system in which the Patient Centric Agent is replicated at three levels: Sensing Layer, NEAR Processing Layer and FAR Processing Layer. The functionalities of the Patient Centric Agent are customized to manage the tasks of the three levels. Simulations confirm protection of the architecture against DoS attacks. Few patients require all their health data to be stored in Blockchain repositories but instead need to select an appropriate storage medium for each chunk of data by matching their personal needs and preferences with features of candidate storage mediums. Motivated by this context, we advance third contribution; a recommendation model for health data storage that can accommodate patient preferences and make storage decisions rapidly, in real-time, even with streamed data. The mapping between health data features and characteristics of each repository is learned using machine learning. The Blockchain’s capacity to make transactions and store records without central oversight enables its application for IoT networks outside health such as underwater IoT networks where the unattended nature of the nodes threatens their security and privacy. However, underwater IoT differs from ground IoT as acoustics signals are the communication media leading to high propagation delays, high error rates exacerbated by turbulent water currents. Our fourth contribution is a customized Blockchain leveraged framework with the model of Patient-Centric Agent renamed as Smart Agent for securely monitoring underwater IoT. Finally, the smart Agent has been investigated in developing an IoT smart home or cities monitoring framework. The key algorithms underpinning to each contribution have been implemented and analysed using simulators.
- Description: Doctor of Philosophy
Enhanced profitability of photovoltaic plants by utilizing cryptocurrency-based mining load
- Authors: Eid, Bilal , Islam, Md Rabiul , Shah, Rakibuzzaman , Nahid, Abdullah , Kouzani, Abbas , Mahmud, M.
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Transactions on Applied Superconductivity Vol. 31, no. 8 (2021), p.
- Full Text: false
- Reviewed:
- Description: The grid connected photovoltaic (PV) power plants (PVPPs) are booming nowadays. The main problem facing the PV power plants deployment is the intermittency which leads to instability of the grid. In order to stabilize the grid, either energy storage device - mainly batteries - or a power curtailment technique can be used. The additional cost on utilizing batteries make it not preferred solution, because it leads to a drop in the return on investment (ROI) of the project. A good alternative, is using a customized load (such as; cryptocurrency-based loads) which consumes the surplus energy. This paper investigating the usage of a customized load - cryptocurrency mining rig - to create an added value for the owner of the plant and increase the ROI of the project. These devices are widely used to perform the required calculations for validating the transactions on the network of the Blockchain. A comparison between the ROI of the mining rig and the battery have been conducted in this study. Based on this study the mining rig has superior ROI of 7.7% - in the case with the lowest ROI - compared to 4.5% for battery. Moreover, an improved controlling strategy is developed to combine both the battery and mining rig in the same system. The developed strategy is able to keep the profitability as high as possible during the fluctuation of the mining network. © 2002-2011 IEEE.
Factors affecting the organizational adoption of blockchain technology : extending the technology–organization– environment (TOE) framework in the Australian context
- Authors: Malik, Saleem , Chadhar, Mehmood , Vatanasakdakul, Savanid , Chetty, Madhu
- Date: 2021
- Type: Text , Journal article
- Relation: Sustainability (Switzerland) Vol. 13, no. 16 (2021), p.
- Full Text:
- Reviewed:
- Description: Blockchain technology (BCT) has been gaining popularity due to its benefits for almost every industry. However, despite its benefits, the organizational adoption of BCT is rather limited. This lack of uptake motivated us to identify the factors that influence the adoption of BCT from an organizational perspective. In doing this, we reviewed the BCT literature, interviewed BCT experts, and proposed a research model based on the TOE framework. Specifically, we theorized the role of technological (perceived benefits, compatibility, information transparency, and disintermediation), organizational (organization innovativeness, organizational learning capability, and top management support), and environmental (competition intensity, government support, trading partners readiness, and standards uncertainty) factors in the organizational adoption of BCT in Australia. We confirmed the model with a sample of adopters and potential adopter organizations in Aus-tralia. The results show a significant role of the proposed factors in the organizational adoption of BCT in Australia. Additionally, we found that the relationship between the influential factors and BCT adoption is moderated by “perceived risks”. The study extends the TOE framework by adding factors that were ignored in previous studies on BCT adoption, such as perceived information trans-parency, perceived disintermediation, organizational innovativeness, organizational learning capa-bility, and standards uncertainty. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.
Blockchain leveraged task migration in body area sensor networks
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th Asia-Pacific Conference on Communications, APCC 2019 p. 177-184
- Full Text:
- Reviewed:
- Description: Blockchain technologies emerging for healthcare support secure health data sharing with greater interoperability among different heterogeneous systems. However, the collection and storage of data generated from Body Area Sensor Net-works(BASN) for migration to high processing power computing services requires an efficient BASN architecture. We present a decentralized BASN architecture that involves devices at three levels; 1) Body Area Sensor Network-medical sensors typically on or in patient's body transmitting data to a Smartphone, 2) Fog/Edge, and 3) Cloud. We propose that a Patient Agent(PA) replicated on the Smartphone, Fog and Cloud servers processes medical data and execute a task offloading algorithm by leveraging a Blockchain. Performance analysis is conducted to demonstrate the feasibility of the proposed Blockchain leveraged, distributed Patient Agent controlled BASN. © 2019 IEEE.
- Description: E1
A Decentralized Patient Agent Controlled Blockchain for Remote Patient Monitoring
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 15th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2019 Vol. 2019-October, p. 207-214
- Full Text: false
- Reviewed:
- Description: Blockchain emerging for healthcare provides a secure, decentralized and patient driven record management system. However, the storage of data generated from IoT devices in remote patient management applications requires a fast consensus mechanism. In this paper, we propose a lightweight consensus mechanism and a decentralized patient software agent to control a remote patient monitoring (RPM) system. The decentralized RPM architecture includes devices at three levels; 1) Body Area Sensor Network-medical sensors typically on or in patient's body transmitting data to a Smartphone, 2) Fog/Edge, and 3) Cloud. We propose that a Patient Agent(PA) software replicated on the Smartphone, Fog and Cloud servers processes medical data to ensure reliable, secure and private communication. Performance analysis has been conducted to demonstrate the feasibility of the proposed Blockchain leveraged, distributed Patient Agent controlled remote patient monitoring system. © 2019 IEEE.
- Description: E1
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne; Australia; 13th-15th February 2019 Vol. 2019-February, p. 1135-1142
- Full Text:
- Reviewed:
- Description: Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure communication protocol using a sign-encryption technique between power constrained IoT devices and a Gateway. The sign encryption also preserves privacy. We propose that a Software Agent executing on the Gateway selects a Miner node using performance parameters of Miners. Simulations demonstrate that the recommended Miner selection outperforms Proof of Works selection used in Bitcoin and Random Miner Selection.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
A blockchain-based solution for enhancing security and privacy in smart factory
- Authors: Wan, Jafu , Li, Jiapeng , Imran, Muhammad , Li, Di
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 15, no. 6 (2019), p. 3652-3660
- Full Text: false
- Reviewed:
- Description: Through the Industrial Internet of Things (IIoT), a smart factory has entered the booming period. However, as the number of nodes and network size become larger, the traditional IIoT architecture can no longer provide effective support for such enormous system. Therefore, we introduce the Blockchain architecture, which is an emerging scheme for constructing the distributed networks, to reshape the traditional IIoT architecture. First, the major problems of the traditional IIoT architecture are analyzed, and the existing improvements are summarized. Second, we introduce a security and privacy model to help design the Blockchain-based architecture. On this basis, we decompose and reorganize the original IIoT architecture to form a new multicenter partially decentralized architecture. Then, we introduce some relative security technologies to improve and optimize the new architecture. After that we design the data interaction process and the algorithms of the architecture. Finally, we use an automatic production platform to discuss the specific implementation. The experimental results show that the proposed architecture provides better security and privacy protection than the traditional architecture. Thus, the proposed architecture represents a significant improvement of the original architecture, which provides a new direction for the IIoT development. © 2005-2012 IEEE.
Challenges and opportunities for blockchain technology adoption : a systematic review
- Authors: Chhina, Shipra , Chadhar, Mehmood , Vatanasakdakul, Savanid , Chetty, Madhu
- Date: 2019
- Type: Text , Conference paper
- Relation: 30th Australasian Conference on Information Systems (ACIS), 9-11 December, Perth (Australia)
- Full Text:
- Reviewed:
- Description: Blockchain technology promises to significantly impact current business processes in industries from various sectors and reduce transactional cost. Firms, suppliers, government, financial institutions etc. are anticipating a business model transformation through blockchain by accomplishing a decentralized architecture of interorganizational dealings without intermediaries. In spite of its immense potential, however, there are key challenges of blockchain implementation which need to be studied for identifying the opportunities arising and for its successful implementations in future. In this paper, we aim to identify these challenges for blockchain adoption and classify them for clearer understanding. To pursue this effectively, this paper follows a hybrid model of systematic literature review. This paper also explicitly enumerates future research opportunities to lead industry and researchers in correct directions
A blockchain model for fair data sharing in deregulated smart grids
- Authors: Samuel, Omaji , Javaid, Nadeem , Awais, Muhammad , Ahmed, Zeeshan , Imran, Muhammad , Guizani, Mohsen
- Date: 2019
- Type: Text , Conference paper
- Relation: 2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa 9-13 December 2019
- Full Text: false
- Reviewed:
- Description: The emergence of smart home appliances has generated a high volume of data on smart meters belonging to different customers. However, customers can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage the customers' participation, this paper proposes an access control mechanism by fairly compensating customers for their participation in data sharing via blockchain using the concept of differential privacy. We addressed the computational issues of existing ethereum blockchain by proposing a proof of authority consensus protocol through the Pagerank mechanism in order to derive the reputation scores. Experimental results show the efficiency of the proposed model to minimize privacy risk, and maximize aggregator's profit. In addition, gas consumption, as well as the cost of the computational resources, is reduced. © 2019 IEEE.
Novel one time signatures (NOTS) : a compact post-quantum digital signature scheme
- Authors: Shahid, Furqan , Ahmad, Iftikhar , Imran, Muhammad , Shoaib, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE access Vol. 8, no. (2020), p. 15895-15906
- Full Text:
- Reviewed:
- Description: The future of the hash based digital signature schemes appears to be very bright in the upcoming quantum era because of the quantum threats to the number theory based digital signature schemes. The Shor's algorithm is available to allow a sufficiently powerful quantum computer to break the building blocks of the number theory based signature schemes in a polynomial time. The hash based signature schemes being quite efficient and provably secure can fill in the gap effectively. However, a draw back of the hash based signature schemes is the larger key and signature sizes which can prove a barrier in their adoption by the space critical applications, like the blockchain. A hash based signature scheme is constructed using a one time signature (OTS) scheme. The underlying OTS scheme plays an important role in determining key and signature sizes of a hash based signature scheme. In this article, we have proposed a novel OTS scheme with minimized key and signature sizes as compared to all of the existing OTS schemes. Our proposed OTS scheme offers an 88% reduction in both key and signature sizes as compared to the popular Winternitz OTS scheme. Furthermore, our proposed OTS scheme offers an 84% and an 86% reductions in the signature and the key sizes respectively as compared to an existing compact variant of the WOTS scheme, i.e. WOTS + .
6G wireless systems : a vision, architectural elements, and future directions
- Authors: Khan, Latif , Yaqoob, Ibrar , Imran, Muhammad , Han, Zhu , Hong, Choong
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 147029-147044
- Full Text:
- Reviewed:
- Description: Internet of everything (IoE)-based smart services are expected to gain immense popularity in the future, which raises the need for next-generation wireless networks. Although fifth-generation (5G) networks can support various IoE services, they might not be able to completely fulfill the requirements of novel applications. Sixth-generation (6G) wireless systems are envisioned to overcome 5G network limitations. In this article, we explore recent advances made toward enabling 6G systems. We devise a taxonomy based on key enabling technologies, use cases, emerging machine learning schemes, communication technologies, networking technologies, and computing technologies. Furthermore, we identify and discuss open research challenges, such as artificial-intelligence-based adaptive transceivers, intelligent wireless energy harvesting, decentralized and secure business models, intelligent cell-less architecture, and distributed security models. We propose practical guidelines including deep Q-learning and federated learning-based transceivers, blockchain-based secure business models, homomorphic encryption, and distributed-ledger-based authentication schemes to cope with these challenges. Finally, we outline and recommend several future directions. © 2013 IEEE.
Security and privacy aspects of cloud computing : a smart campus case study
- Authors: Gill, Sajid , Razzaq, Mirza , Ahmad, Muneer , Almansour, Fahad , Haq, Ikram
- Date: 2022
- Type: Text , Journal article
- Relation: Intelligent Automation and Soft Computing Vol. 31, no. 1 (2022), p. 117-128
- Full Text:
- Reviewed:
- Description: The trend of cloud computing is accelerating along with emerging technologies such as utility computing, grid computing, and distributed computing. Cloud computing is showing remarkable potential to provide flexible, cost- effective, and powerful resources across the internet, and is a driving force in today’s most prominent computing technologies. The cloud offers the means to remotely access and store data while virtual machines access data over a network resource. Furthermore, cloud computing plays a leading role in the fourth industrial revolution. Everyone uses the cloud daily life when accessing Dropbox, various Google services, and Microsoft Office 365. While there are many advantages in such an environment, security issues such as data privacy, data security, access control, cyber-attacks, and data availability, along with performance and reliability issues, exist. Efficient security and privacy measures should be implemented by cloud service providers to ensure the privacy, confidentiality, integrity, and availability of data services. However, cloud service providers have not been providing enough secure and reliable services to end users. Blockchain is a technology that is improving cloud computing. This revolutionary technology offers persuasive data integrity properties and is used to tackle security problems. This research presents a detailed analysis of privacy and security challenges in the cloud. We demonstrate the importance of security challenges in a case study in the context of smart campus security, which will encourage researchers to examine security issues in cloud computing in the future. © 2022, Tech Science Press. All rights reserved. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Ikram Haq” is provided in this record**
Blockchain-based data privacy management with Nudge theory in open banking
- Authors: Wang, Hao , Ma, Shenglan , Dai, Hong-Ning , Imran, Muhammad , Wang, Tongsen
- Date: 2020
- Type: Text , Journal article
- Relation: Future Generation Computer Systems Vol. 110, no. (2020), p. 812-823
- Full Text:
- Reviewed:
- Description: Open banking brings both opportunities and challenges to banks all over the world especially in data management. A blockchain as a continuously growing list of records managed by a peer-to-peer network is widely used in various application scenarios; and it is commonly agreed that the blockchain technology can improve the protection of financial data privacy. However, current blockchain technology still poses some challenges in fully meeting the needs of financial data privacy protection. In order to address the existing problems, this paper proposes a new data privacy management framework based on the blockchain technology for the financial sector. The framework consists of three components: (1) a data privacy classification method according to the characteristics of financial data; (2) a new collaborative-filtering-based model; and (3) a data disclosure confirmation scheme for customer strategies based on the Nudge Theory. We implement a prototype and propose a set of algorithms for this framework. The framework is validated through field experiments and laboratory experiments. © 2019 Elsevier B.V.
CRT-BIoV : a cognitive radio technique for blockchain-enabled internet of vehicles
- Authors: Rathee, Geetanjali , Ahmad, Farhan , Kurugollu, Fatih , Azad, Muhammad , Iqbal, Razi , Imran, Muhammad
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Transactions on Intelligent Transportation Systems Vol. 22, no. 7 (2021), p. 4005-4015
- Full Text: false
- Reviewed:
- Description: Cognitive Radio Network (CRN) is considered as a viable solution on Internet of Vehicle (IoV) where objects equipped with cognition make decisions intelligently through the understanding of both social and physical worlds. However, the spectrum availability and data sharing/transferring among vehicles are critical improving services and driving safety metrics where the presence of Malicious Devices (MD) further degrade the network performance. Recently, a blockchain technique in CRN-based IoV has been introduced to prevent data alteration from these MD and allowing the vehicles to track both legal and illegal activities in the network. In this paper, we provide the security to IoV during spectrum sensing and information transmission using CRN by sensing the channels through a decision-making technique known as Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS), a technique that evokes the trust of its Cognitive Users (CU) by analyzing certain predefined attributes. Further, blockchain is maintained in the network to trace every activity of stored information. The proposed mechanism is validated rigorously against several security metrics using various spectrum sensing and security parameters against a baseline solution in IoV. Extensive simulations suggest that our proposed mechanism is approximately 70% more efficient in terms of malicious nodes identification and DoS threat against the baseline mechanism. © 2000-2011 IEEE.