scholarly journals A Blockchain based PKI Validation System based on Rare Events Management

2020 ◽  
Vol 12 (2) ◽  
pp. 40
Author(s):  
Maurizio Talamo ◽  
Franco Arcieri ◽  
Andrea Dimitri ◽  
Christian H. Schunck

Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is an infrastructure based on a hierarchical model, but the use of PKIs in non-hierarchical contexts has exposed them to many types of attacks. Here, we discuss weaknesses exploited in past attacks and we propose a solution based on an original consensus algorithm developed for use on blockchain technology. In this implementation we retain the full functionality around X.509 certificates, i.e., for the triad (server name, server address, X.509 server certificate), and demonstrate a mechanism for obtaining fast consensus. The main properties of the solution are that a consensus may be reached even when not all members of the involved PKI participate in a transaction, and that no advanced trust agreement among PKIs is needed. The proposed solution is able to detect PKI attacks and can distinguish errors from attacks, allowing precise management of anomalies.

Author(s):  
Karthik C

Blockchain Technology is an emerging technology nowadays. The Blockchain was first used as a Peer-to-Peer ledger for registering Bitcoin transactions. The blockchain is a singly linked list which consists of a number of transactions. The blockchain is a decentralized distributed ledger which consists of a number of blocks organized in the form of a chain. A block in blockchain consists of two parts data and hash pointer. The first block in the blockchain is known as genesis block. The transactions and data in the block are secured by cryptography. The data inside a block in blockchain can be anything like bank transactions, backup data etc., which are recorded chronologically and publicly. The Hash pointer of a block is a unique code generated by a hash function like SHA256, SHA-3 etc., the hash function used in bitcoin blockchain. A block consists of a public key and a private key, using hash function digital signature is generated to the block. This is how the data inside the blockchain is so secured. The blocks are added into the blockchain by verifying the transaction in the block, the transactions are verified by miners. The miners use consensus algorithm to solve the blocks.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 391
Author(s):  
Dongjun Na ◽  
Sejin Park

As the use of internet of things (IoT) devices increases, the importance of security has increased, because personal and private data such as biometrics, images, photos, and voices can be collected. However, there is a possibility of data leakage or manipulation by monopolizing the authority of the data, since such data are stored in a central server by the centralized structure of IoT devices. Furthermore, such a structure has a potential security problem, caused by an attack on the server due to single point vulnerability. Blockchain’s, through their decentralized structure, effectively solve the single point vulnerability, and their consensus algorithm allows network participants to verify data without any monopolizing. Therefore, blockchain technology becomes an effective solution for solving the security problem of the IoT’s centralized method. However, current blockchain technology is not suitable for IoT devices. Blockchain technology requires large storage space for the endless append-only block storing, and high CPU processing power for performing consensus algorithms, while its opened block access policy exposes private data to the public. In this paper, we propose a decentralized lightweight blockchain, named Fusion Chain, to support IoT devices. First, it solves the storage size issue of the blockchain by using the interplanetary file system (IPFS). Second, it does not require high computational power by using the practical Byzantine fault tolerance (PBFT) consensus algorithm. Third, data privacy is ensured by allowing only authorized users to access data through public key encryption using PKI. Fusion Chain was implemented from scratch written using Node.js and golang. The results show that the proposed Fusion Chain is suitable for IoT devices. According to our experiments, the size of the blockchain dramatically decreased, and only 6% of CPU on an ARM core, and 49 MB of memory, is used on average for the consensus process. It also effectively protects privacy data by using a public key infrastructure (PKI).


2017 ◽  
Vol 3 (2) ◽  
pp. 29
Author(s):  
NURHAZIRAH HASHIM ◽  
MOHAMMAD ZAIM MOHD SALLEH ◽  
NOR SARA NADIA MUHAMAD YUNUS ◽  
INTAN SYAFINAZ MAT SHAFIE

The recent development in the ecommerce services has shown a variety of established companies participating in the web business environment including Islamic banks. Business with the mostexperience and success in using ecommerce are beginning to realize that the indicator of success or failure of the ecommerce environment was included in the online services. Nowadays, the trend ofa business is to serve the customer with best quality of services to enhance the consumer satisfaction and compete with the global competitors as online services enabled registered user to make productspurchase transaction only through website such as check and manage financial standing, transfer funds, bill payment, prepaid reload and so forth. However, in recent times, Islamic banking users faced problems with the online system such as cannot log in to the system, payment failure and  mostly security and privacy hindrance. Therefore, this study aimed to investigate the relationship between electronic service quality (e-SERVQUAL) and customer satisfaction towards IslamicOnline Banking Services users. Based on the sample size, only 76 respondents were selected to participate in this study by using a convenience sampling. Further, Pearson correlation and multipleregression were reported to analyze the mentioned relationship. The findings have shown that there is a positive relationship between e-SERVQUAL and customer satisfaction in using Islamic onlinebanking services. Based on the findings, Islamic online banking developer is recommended to improve more on their responsiveness in order to provide quick response to their customer’s requirements.  Moreover, they also should be more reliable in providing accurate information in performing the promised services. They must assure that all of their customers can quickly get responds and true feedback regarding their problems to ensure customer satisfy with service provided. Besides, the safety of the website and the protection of customer information alsoconsidered a vital action that should be concerned in order to increase the customers’ satisfaction.


2013 ◽  
Vol 401-403 ◽  
pp. 1900-1903
Author(s):  
Xu Mei Zhang ◽  
Qiao Ling Fan

The informationalization construction is playing an increasingly important role for the development of enterprise group.However, there are problems that enterprise group has to be faced with, like the rapid growth of data, the continuous increase in purchase and maintenance costs of software and hardware equipment, the overlapping allocation of IT resources and so on. To solve these problems, a hierarchical model of intensive management of IT resources of enterprise group based on cloud services was established, and intensive management modes of software, hardware and knowledge of enterprise group were proposed as well.


Author(s):  
Brian Tuan Khieu ◽  
Melody Moh

A cloud-based public key infrastructure (PKI) utilizing blockchain technology is proposed. Big data ecosystems have scalable and resilient needs that current PKI cannot satisfy. Enhancements include using blockchains to establish persistent access to certificate data and certificate revocation lists, decoupling of data from certificate authority, and hosting it on a cloud provider to tap into its traffic security measures. Instead of holding data within the transaction data fields, certificate data and status were embedded into smart contracts. The tests revealed a significant performance increase over that of both traditional and the version that stored data within blocks. The proposed method reduced the mining data size, and lowered the mining time to 6.6% of the time used for the block data storage method. Also, the mining gas cost per certificate was consequently cut by 87%. In summary, completely decoupling the certificate authority portion of a PKI and storing certificate data inside smart contracts yields a sizable performance boost while decreasing the attack surface.


2021 ◽  
pp. 171-180
Author(s):  
Surya Bhushan Kumar ◽  
Ranjan Kumar Mandal ◽  
Kuntal Mukherjee ◽  
Rajiv Kumar Dwivedi

Entropy ◽  
2019 ◽  
Vol 21 (9) ◽  
pp. 887 ◽  
Author(s):  
Xin Sun ◽  
Mirek Sopek ◽  
Quanlong Wang ◽  
Piotr Kulicki

While Blockchain technology is universally considered as a significant technology for the near future, some of its pillars are under a threat of another thriving technology, Quantum Computing. In this paper, we propose important safeguard measures against this threat by developing a framework of a quantum-secured, permissioned blockchain called Logicontract (LC). LC adopts a digital signature scheme based on Quantum Key Distribution (QKD) mechanisms and a vote-based consensus algorithm to achieve consensus on the blockchain. The main contribution of this paper is in the development of: (1) unconditionally secure signature scheme for LC which makes it immune to the attack of quantum computers; (2) scalable consensus protocol used by LC; (3) logic-based scripting language for the creation of smart contracts on LC; (4) quantum-resistant lottery protocol which illustrates the power and usage of LC.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jianwen Hu ◽  
Yuling Chen ◽  
Xiaojun Ren ◽  
Yixian Yang ◽  
Xiaobin Qian ◽  
...  

As the technical support of the industrial Internet of Things, blockchain technology has been widely used in energy trading, data transactions, and Internet of Vehicles. However, most of the existing energy trading models only address the transaction security and transaction privacy issues that arise in the energy trading process, ignoring the fairness of resource allocation and transaction equity in the trading process. In order to tackle those problems, an energy trading scheme called HO-TRAD is proposed in this paper to improve the efficiency of model trading while ensuring the fairness of energy trading. We propose a new trading strategy in the HO-TRAD energy trading scheme that guarantees fairness in the allocation of trading resources by introducing an entity’s active reputation value. Use smart contracts to achieve transparency and ensure fairness in the transaction process. Based on the identity verification foundation of the consortium chain, the scheme enhances the existing PBFT consensus algorithm and improves the efficiency of model transactions. The experimental simulation indicates that the scheme requires less transaction time and has higher transaction fairness and security.


A blockchain is decentralized immutable ledger technology maintaining integrity. So to conduct tamperproof election it’s one of the approach towards it. Smart contracts are Self executed code that is written on Ethereum platform in blockchain. An E-voting system should be completely secure and does not allow voting twice that is double spending in blockchain. So it should be completely transparent. In research work electronic voting application is implemented and tested using smart contract on Ethereum platform with the help of metamask wallet. The results of ballots and votes will be stored on Ethereum blockchain with the help of consensus algorithm proof of stake. This consensus is used in validating a transaction with concept of majority approval. Current electronic voting system requires a centralized authority to control the procedure from ballot input to result output and for monitoring of election. While blockchain technology provide decentralized system which is open across connected nodes. Blockchain assets provide increased level of system security from hacking and fraud. Every transaction in blockchain is time-stamped and signed digitally with the help of cryptographic algorithms, and it assigns unique hash value to every block so it can be trace easily. Blockchain technology is one of solutions because it embraces a decentralized system and the entire databases are owned by many users. The blockchain technology also has much vulnerability due to which many attacks like 51% attack, Double Spending attack, DDOS attack, Sybil attack, Eclipse attack and Routing attack can be performed on it.


Sign in / Sign up

Export Citation Format

Share Document