scholarly journals Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts

Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4440
Author(s):  
Alexandre Pinheiro ◽  
Edna Dias Canedo ◽  
Robson de Oliveira Albuquerque ◽  
Rafael Timóteo de Sousa Júnior

The management practicality and economy offered by the various technological solutions based on cloud computing have attracted many organizations, which have chosen to migrate services to the cloud, despite the numerous challenges arising from this migration. Cloud storage services are emerging as a relevant solution to meet the legal requirements of maintaining custody of electronic documents for long periods. However, the possibility of losses and the consequent financial damage require the permanent monitoring of this information. In a previous work named “Monitoring File Integrity Using Blockchain and Smart Contracts”, the authors proposed an architecture based on blockchain, smart contract, and computational trust technologies that allows the periodic monitoring of the integrity of files stored in the cloud. However, the experiments carried out in the initial studies that validated the architecture included only small- and medium-sized files. As such, this paper presents a validation of the architecture to determine its effectiveness and efficiency when storing large files for long periods. The article provides an improved and detailed description of the proposed processes, followed by a security analysis of the architecture. The results of both the validation experiments and the implemented defense mechanism analysis confirm the security and the efficiency of the architecture in identifying corrupted files, regardless of file size and storage time.

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Bo Mi ◽  
Ping Long ◽  
Yang Liu ◽  
Fengtian Kuang

Data deduplication serves as an effective way to optimize the storage occupation and the bandwidth consumption over clouds. As for the security of deduplication mechanism, users’ privacy and accessibility are of utmost concern since data are outsourced. However, the functionality of redundancy removal and the indistinguishability of deduplication labels are naturally incompatible, which bring about a lot of threats on data security. Besides, the access control of sharing copies may lead to infringement on users’ attributes and cumbersome query overheads. To balance the usability with the confidentiality of deduplication labels and securely realize an elaborate access structure, a novel data deduplication scheme is proposed in this paper. Briefly speaking, we drew support from learning with errors (LWE) to make sure that the deduplication labels are only differentiable during the duplication check process. Instead of authority matching, the proof of ownership (PoW) is then implemented under the paradigm of inner production. Since the deduplication label is light-weighted and the inner production is easy to carry out, our scheme is more efficient in terms of computation and storage. Security analysis also indicated that the deduplication labels are distinguishable only for duplication check, and the probability of falsifying a valid ownership is negligible.


2021 ◽  
Author(s):  
Mohammad Madine ◽  
Khaled Salah ◽  
Raja Jayaraman ◽  
Yousof Al-Hammadi ◽  
Junaid Arshad ◽  
...  

Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the ability for one blockchain network to interact and share data with another blockchain network. Contemporary cross-chain interoperability solutions are centralized and require re-engineering of the core blockchain stack to enable inter-communication and data sharing among heterogeneous blockchain networks. In this paper, we propose an application-based cross-chain interoperability solution that allows blockchain networks of any architecture type and industrial focus to inter-communicate, share data, and make requests. Our solution utilizes the decentralized applications as a distributed translation layer that is capable of communicating and understanding multiple blockchain networks, thereby delegating requests and parameters among them. The architecture uses incentivized verifier nodes that maintain the integrity of shared data facilitating them to be readable by the entities of their network. We define and describe the roles and requirements of major entities of inter-operating blockchain networks in the context of healthcare. We present a detailed explanation of the sequence of interactions needed to share an Electronic Medical Record (EMR) document from one blockchain network to another along with the required algorithms. We implement the proposed solution with Ethereum-based smart contracts for two hospitals and also present cost and security analysis for the cross-chain interoperability solution. We make our smart contracts code and testing scripts publicly available.


Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 88-104
Author(s):  
M. Raja ◽  
Dr.S. Dhanasekaran ◽  
Dr.V. Vasudevan

Many medical companies use cloud technology to collect, distribute and transmit medical records. Given the need for medical information, confidentiality is a key issue. In this study, we propose an encrypted scheme based on encrypted data for an electronic healthcare environment. We use hybrid Attribute based encryption and Triple DES encryption technique (ABETDES) scheme, including identity-based cryptography (IBC), to ensure data privacy through communication channels և to improve the reliability of cloud computing. There are also limited indicators of light processing and storage resources. This solves a serious maintenance problem and ensures that a private key is created where it is not blind. The introduction of a security option, a comprehensive security analysis to protect ciphertext, shows that our program is effective against many known attacks and compared to existing methods.


2021 ◽  
Author(s):  
Haya R. Hasan ◽  
Khaled Salah ◽  
Raja Jayaraman ◽  
Junaid Arshad ◽  
Ibrar Yaqoob ◽  
...  

COVID-19 has emerged as a highly contagious disease which has caused a devastating impact across the world with a very large number of infections and deaths. Timely and accurate testing is paramount to an effective response to this pandemic as it helps identify infections and therefore mitigate (isolate/cure) them. In this paper, we investigate this challenge and contribute by presenting a blockchain-based solution that incorporates self-sovereign identity, re-encryption proxies, and decentralized storage, such as the interplanetary file systems (IPFS). Our solution implements digital medical passports (DMP) and immunity certificates for COVID-19 test-takers. We present smart contracts based on the Ethereum blockchain written and tested successfully to maintain a digital medical identity for test-takers that help in a prompt trusted response directly by the relevant medical authorities. We reduce the response time of the medical facilities, alleviate the spread of false information by using immutable trusted blockchain, and curb the spread of the disease through DMP. We present a detailed description of the system design, development, and evaluation (cost and security analysis) for the proposed solution. Since our code leverages the use of the on-chain events, the cost of our design is almost negligible. We have made our smart contract codes publicly available on Github.


2021 ◽  
Author(s):  
Mohammad Madine ◽  
Khaled Salah ◽  
Raja Jayaraman ◽  
Yousof Al-Hammadi ◽  
Junaid Arshad ◽  
...  

Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the ability for one blockchain network to interact and share data with another blockchain network. Contemporary cross-chain interoperability solutions are centralized and require re-engineering of the core blockchain stack to enable inter-communication and data sharing among heterogeneous blockchain networks. In this paper, we propose an application-based cross-chain interoperability solution that allows blockchain networks of any architecture type and industrial focus to inter-communicate, share data, and make requests. Our solution utilizes the decentralized applications as a distributed translation layer that is capable of communicating and understanding multiple blockchain networks, thereby delegating requests and parameters among them. The architecture uses incentivized verifier nodes that maintain the integrity of shared data facilitating them to be readable by the entities of their network. We define and describe the roles and requirements of major entities of inter-operating blockchain networks in the context of healthcare. We present a detailed explanation of the sequence of interactions needed to share an Electronic Medical Record (EMR) document from one blockchain network to another along with the required algorithms. We implement the proposed solution with Ethereum-based smart contracts for two hospitals and also present cost and security analysis for the cross-chain interoperability solution. We make our smart contracts code and testing scripts publicly available.


2020 ◽  
Author(s):  
Ilhaam Omar ◽  
Mazin Debe ◽  
Raja Jayaraman ◽  
Khaled Salah ◽  
Mohammed Omar ◽  
...  

<div>The COVID-19 pandemic has severely impacted many industries, in particular the healthcare sector exposing systemic vulnerabilities in emergency preparedness, risk mitigation, and supply chain management. A major challenge during the pandemic was related to the increased demand of Personal Protective Equipment (PPE) resulting in critical shortages for healthcare and frontline workers. The lack of information visibility combined with the inability to precisely track product movement within the supply chain requires an robust traceability solution. Blockchain technology is a distributed ledger that ensures a transparent,</div><div>safe, and secure exchange of data among supply chain stakeholders. The advantages of adopting blockchain technology to manage and track PPE products in the supply chain include decentralized control, security, traceability,</div><div>and auditable time-stamped transactions. In this paper, we present a blockchain-based approach using smart contracts to transform PPE supply chain operations. We propose a generic framework using Ethereum smart contracts and</div><div>decentralized storage systems to automate the processes and information exchange and present detailed algorithms that capture the interactions among supply chain stakeholders. The smart contract code was developed and tested in Remix environment, and the code is made publicly available on Github. We present detailed cost and security analysis incurred by the stakeholders in the supply chain. Adopting a blockchain-based solution for PPE supply chains is economically viable and provides a streamlined, secure, trusted, and transparent mode of communication among various stakeholders.</div>


Author(s):  
Adithya M. ◽  
Dr. Shanthini B.

Secure information deduplication can altogether decrease the correspondence and capacity overheads in distributed storage benefits and has potential applications in our large information-driven society. Existing information deduplication plans are commonly intended to either oppose savage power assaults or guarantee the effectiveness and information accessibility, yet not the two conditions. We are additionally not mindful of any current plan that accomplishes responsibility, in the feeling of lessening copy data divulgence (e.g., to decide if plain-writings of two scrambled messages are indistinguishable). Right now, examine the three-level cross-space design and propose an effective and protection safeguarding huge information deduplication in distributed storage (from now on alluded to as EPCDD). EPCDD accomplishes both protection safeguarding and information accessibility and opposes beast power assaults. Plus, we consider the responsibility to offer preferable protection affirmations over existing plans. We at that point show that EPCDD beats existing contending plans, as far as calculation, correspondence, and capacity overheads. Additionally, the time unpredictability of copy search in EPCDD is logarithmic.


1964 ◽  
Vol 12 (01) ◽  
pp. 211-231 ◽  
Author(s):  
Marion I. Barnhart ◽  
Sue A. McCutcheon ◽  
Jeanne M. Riddle ◽  
Julius M. Ohorodnik

SummaryProteins concerned in blood coagulation and clot lysis were studied during a fulminating and fatal case of thrombotic thrombocytopenic purpura.One outstanding feature was the enhanced synthesis of several different plasma proteins. Specific fluorescent antibodies were used to detect cellular synthesis and storage of fibrinogen, prothrombin, albumin, Profibrinolysin and gamma globulin. Most liver cells were actively producing fibrinogen, prothrombin and albumin. Bone marrow eosinophils were synthesizing Profibrinolysin. Peripheral blood eosinophils still contained their packages of Profibrinolysin as if they were transporting this to intravascular thrombi.Another significant finding was that polymorphonuclear leucocytes in the blood were marked with fluorescent antifibrinogen. Breakdown products of fibrin contained in these leucocytes most likely accounted for the attraction of the fluorescent marker. Polymorphonuclear leucocytes may provide an important defense mechanism for individuals in a thrombotic state.


Sign in / Sign up

Export Citation Format

Share Document