scholarly journals Experimental Analysis of the Scalability of Ethereum Blockchain in a Private Network

Author(s):  
Iago S Ochôa ◽  
Rafael Piemontez ◽  
Lucas Martins ◽  
Valderi Reis Quietinho Leithardt ◽  
Cesar Albenes Zeferino

Blockchain technology has aroused the interest of researchers as it ensures security and privacy in decentralized applications. One of the platforms currently used for the development of new blockchain-based solutions is the Ethereum network. This article presents an experimental analysis of the scalability of this network to identify its cost and performance for several contracts in a simulated private Ethereum network. The results obtained demonstrate that storage operations for large amounts of data can prevent the use of blockchain due to the high cost of gas charged for this type of operation. The experiments also pointed out that processing operations which do not store information have a small cost of gas.

2020 ◽  
Vol 5 (2) ◽  
pp. 72-82
Author(s):  
Nemer Aburumman ◽  
Jihad Fraij ◽  
Róbert Szilágyi

In a world of nonstop developing technology, Blockchain has become a trusted tool to apply transparency in the public sector. The consensus mechanism provides trusted data that can support clear and adjusted as well as well-structured procedures. Nowadays, the public sector can increase trust by adapting Blockchain applications in the services offered to be e-government portals. In this paper, the researchers review the literature to identify the potential use cases and application of Blockchain in e-government services. This new technology along with its related applications will be discussed and defined. Moreover, the possibilities of using Blockchain in the public sector and its impact on organizational transformation, financial management, and performance are increasing. The study concluded that the use of blockchain technologies and applications is still limited in the public sector. Obstacles and barriers are related mostly to (security and privacy) and law and by-laws support. This paper will provide a useful reference for researchers in blockchain applications and their impact on e-government and propose future research questions that need to be addressed to inform how the public sector should approach the blockchain technology adoption.


Author(s):  
Priti Gupta ◽  
Abhishek Kumar ◽  
Achintya Singhal ◽  
Shantanu Saurabh ◽  
V. D. Ambeth Kumar

Blockchain provides innovative ideas for storing information, executing transactions, performing functions, creating trust in an open environment, etc. Even though cryptographers, mathematicians, and coders have been trying to bring the most trustable protocols to get authentication guarantee over various systems, blockchain technology is secure with no central authority in an open network system because of a large distributed network of independent users. If anyone tries to change the blockchain database, the current hash will also change, which does not match with the previous hash. In this way, blockchain creates privacy and trust in digital data by removing malleability attacks. In this chapter, security and privacy on the blockchain has been focused. The safety and privacy of blockchain are mainly engrossed on two things: firstly, uncovering few attacks suffered by blockchain systems and, secondly, putting specific and advanced proposals against such attacks.


2021 ◽  
Vol 11 (22) ◽  
pp. 10917
Author(s):  
Abdullah Ayub Khan ◽  
Asif Ali Laghari ◽  
Aftab Ahmed Shaikh ◽  
Sami Bourouis ◽  
Amir Madany Mamlouk ◽  
...  

Degree attestation verification and traceability are complex one-to-one processes between the Higher Education Commission (HEC) and universities. The procedure shifted to the digitalized manner, but still, on a certain note, manual authentication is required. In the initial process, the university verified the degree and stamp seal first. Then, a physical channel of degree submission to the receiving ends is activated. After that, the degree is attested while properly examining and analyzing the tamper records related to degree credentials through e-communication with the university for verification and validation. This issue poses a serious challenge to educational information integrity and privacy. Potentially, blockchain technology could become a standardized platform to perform tasks including issuing, verifying, auditing, and tracing immutable records, which would enable the HEC, universities, and Federal Education Ministry (FEM) to quickly and easily get attested and investigate the forge proof versions of certificates. Besides, decentralized distributed data blocks in chronological order provide high security between distributed ledgers, consensus engine, digital signature, smart contracts, permissioned application, and private network node transactions that guarantee degree record validation and traceability. This paper presents an architecture (HEDU-Ledger) and detail design of blockchain-enabled hyperledger fabric applications implementation for degree attestation verification and traceable direct channel design between HEC and universities. The hyperledger fabric endorses attestation records first, and then validates (committer) the degree and maintains the secure chain of tracing between stakeholder peer nodes. Furthermore, this HEDU-Ledger architecture avoids language and administrative barriers. It also provides robustness in terms of security and privacy of records and maintains integrity with secure preservation as compared to that of the other state-of-the-art methods.


Author(s):  
Mevlut Ersoy ◽  
Asım Sinan Yüksel ◽  
Cihan Yalcin

Internet of Things (IoT) security and privacy criteria are seen as an important challenge due to IoT architecture. In this study, the security of the IoT system that is created with devices integrated into the embedded system by means of various sensors has been ensured by using a single cryptographic structure. The data transmitted between the nodes in the IoT structure is transmitted to the central node using the Blockchain data structure. The transmitted data is verified at central nodes and the energies consumed between nodes during the transmission phase is detected. An infrastructure has been developed for how blockchain technology can be used in the IoT structure. In this study, an experimental environment was developed and comparative analysis were made in terms of energy consumption and data transfer rates.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1787
Author(s):  
Ezedin Barka ◽  
Sofiane Dahmane ◽  
Chaker Abdelaziz Kerrache ◽  
Mohamad Khayat ◽  
Farag Sallabi

Healthcare professionals and scholars have emphasized the need for IoT-based remote health monitoring services to track the health of the elderly. Such systems produce a large amount of data, necessitating the security and privacy of that data. On the other hand, Software Defined Networking (SDN) integration could be seen as a good solution to guarantee both flexibility and efficiency of the network which is even more important in the case of healthcare monitoring. Furthermore, Blockchain has recently been proposed as a game-changing tool that can be integrated into the Internet of Things (IoT) to have the optimal level of security and privacy. However, incorporating Blockchain into IoT networks, which rely heavily on patients’ health sensors, is extremely difficult. In this paper, a secure Healthcare Monitoring System (HMS) is proposed with a focus on trust management issues. The architecture seeks to protect multiple healthcare monitoring system components and preserves patient privacy by developing a security interface where separate security modules can be integrated to run side by side to ensure reliable HMS. The security framework architecture we propose takes advantage of the blockchain technology as a secure and timely information back-end. STHM is a proposal that uses Software-Defined Networking (SDN) as the communication medium that allows users to access SDN’s different functional and security technologies and services. Simulation results show that the use of Blockchain for the SDN-based healthcare monitoring can ensure the desired flexibility and security for a very lightweight additional overhead.


2021 ◽  
Author(s):  
Ayan Chatterjee ◽  
Andreas Prinz

UNSTRUCTURED The Internet of Medical Things (IoMT) combines medical devices and applications connected to healthcare information technology systems using network technologies. With the flourishing adaptation rate of Internet-enabled medical devices in healthcare applications, we need to guarantee the security and privacy of electronic health records (EHRs) and communications among these IoMT devices, exposed web services, and the underlying infrastructure. This research is a proof-of-concept (PoC) study for implementing an integrated security solution with Spring Security and KeyCloak open-access platform (SSK) to safeguard microservice architecture application programming interfaces (APIs). Subsequently, we extended the security solution with a virtual private network (VPN), Bcrypt hash, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure following the Norwegian data protection policies and General Data Protection Regulation (GDPR). In this study, we have not proposed any new security solution; however, we have focused on accomplishing a hybrid security solution based on the established frameworks (e.g., Spring Security) and open-access software product (e.g., Keycloak) to protect microservice APIs for a health eCoach system as a PoC study. This study describes the methodological, technical, and practical considerations to protect REST interfaces only and ensuring the privacy of data in the system. We validate our SSK security implementation by theoretical evaluation and experimental testing. In addition, we compare the test results with related studies qualitatively to determine the effectiveness of the hybrid security solution (SSK).


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Qinlong Huang ◽  
Yue He ◽  
Wei Yue ◽  
Yixian Yang

Data collaboration in cloud computing is more and more popular nowadays, and proxy deployment schemes are employed to realize cross-cloud data collaboration. However, data security and privacy are the most serious issues that would raise great concerns from users when they adopt cloud systems to handle data collaboration. Different cryptographic techniques are deployed in different cloud service providers, which makes cross-cloud data collaboration to be a deeper challenge. In this paper, we propose an adaptive secure cross-cloud data collaboration scheme with identity-based cryptography (IBC) and proxy re-encryption (PRE) techniques. We first present a secure cross-cloud data collaboration framework, which protects data confidentiality with IBC technique and transfers the collaborated data in an encrypted form by deploying a proxy close to the clouds. We then provide an adaptive conditional PRE protocol with the designed full identity-based broadcast conditional PRE algorithm, which can achieve flexible and conditional data re-encryption among ciphertexts encrypted in identity-based encryption manner and ciphertexts encrypted in identity-based broadcast encryption manner. The extensive analysis and experimental evaluations demonstrate the well security and performance of our scheme, which meets the secure data collaboration requirements in cross-cloud scenarios.


Author(s):  
Johan Muliadi Kerta ◽  
David Wennoris ◽  
Tonny Gunawan ◽  
Erny Erny

Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN), PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future. 


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Qingqing Xie ◽  
Fan Dong ◽  
Xia Feng

The blockchain technology achieves security by sacrificing prohibitive storage and computation resources. However, in mobile systems, the mobile devices usually offer weak computation and storage resources. It prohibits the wide application of the blockchain technology. Edge computing appears with strong resources and inherent decentralization, which can provide a natural solution to overcoming the resource-insufficiency problem. However, applying edge computing directly can only relieve some storage and computation pressure. There are some other open problems, such as improving confirmation latency, throughput, and regulation. To this end, we propose an edge-computing-based lightweight blockchain framework (ECLB) for mobile systems. This paper introduces a novel set of ledger structures and designs a transaction consensus protocol to achieve superior performance. Moreover, considering the permissioned blockchain setting, we specifically utilize some cryptographic methods to design a pluggable transaction regulation module. Finally, our security analysis and performance evaluation show that ECLB can retain the security of Bitcoin-like blockchain and better performance of ledger storage cost in mobile devices, block mining computation cost, throughput, transaction confirmation latency, and transaction regulation cost.


Sign in / Sign up

Export Citation Format

Share Document