首页 > 最新文献

Proceedings of the 2nd International Electronics Communication Conference最新文献

英文 中文
BC-Store: A Scalable Design for Blockchain Storage BC-Store:区块链存储的可扩展设计
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409940
I-Te Chou, Hung-Han Su, Yuling Hsueh, Chih-wen Hsueh
The blockchain technology has obtained significant success in the past decades. However, a serious underlying problem still exists in the blockchain system - data bloating. In the blockchain system, each (full) node must store the full data set in blockchain history, incurring significant storage pressure in the initial synchronization process and the following maintenance of the blockchain system. Data bloating is a challenging problem to be confronted in the immediate future of blockchain. To address this problem, in this paper, we introduce the BC-Store framework that deploys a data accessing model on an IPFS-cluster system to classify the hot and cold blockchain data. The hot data are stored in the local cache, whereas the cold data are stored in the IPFS cluster, thereby substantially shortening the blockchain initial synchronization time and saving a considerable amount of data storage. Empirical experimentation shows that our framework can reduce the local storage size from over 265GB to 4GB with a hit ratio of 77% for Bitcoin without significant performance degradation with the whole data shared in an IPFS cluster.
区块链技术在过去的几十年里取得了巨大的成功。然而,区块链系统中仍然存在一个严重的潜在问题——数据膨胀。在区块链系统中,每个(全)节点必须存储区块链历史中完整的数据集,这在区块链系统的初始同步过程和后续维护过程中会产生很大的存储压力。数据膨胀是区块链在不久的将来要面对的一个具有挑战性的问题。为了解决这个问题,在本文中,我们引入了BC-Store框架,该框架在ipfs集群系统上部署了一个数据访问模型,以对冷热区块链数据进行分类。热数据存储在本地缓存中,冷数据存储在IPFS集群中,从而大大缩短了区块链初始同步时间,节省了大量的数据存储。经验实验表明,我们的框架可以将本地存储大小从265GB以上减少到4GB,比特币的命中率为77%,并且在IPFS集群中共享整个数据时不会出现明显的性能下降。
{"title":"BC-Store: A Scalable Design for Blockchain Storage","authors":"I-Te Chou, Hung-Han Su, Yuling Hsueh, Chih-wen Hsueh","doi":"10.1145/3409934.3409940","DOIUrl":"https://doi.org/10.1145/3409934.3409940","url":null,"abstract":"The blockchain technology has obtained significant success in the past decades. However, a serious underlying problem still exists in the blockchain system - data bloating. In the blockchain system, each (full) node must store the full data set in blockchain history, incurring significant storage pressure in the initial synchronization process and the following maintenance of the blockchain system. Data bloating is a challenging problem to be confronted in the immediate future of blockchain. To address this problem, in this paper, we introduce the BC-Store framework that deploys a data accessing model on an IPFS-cluster system to classify the hot and cold blockchain data. The hot data are stored in the local cache, whereas the cold data are stored in the IPFS cluster, thereby substantially shortening the blockchain initial synchronization time and saving a considerable amount of data storage. Empirical experimentation shows that our framework can reduce the local storage size from over 265GB to 4GB with a hit ratio of 77% for Bitcoin without significant performance degradation with the whole data shared in an IPFS cluster.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123208797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network 5G蜂窝网络中抗搭便车攻击的轻量级D2D认证方案
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409952
M. Chow, M. Ma
As a promising feature in 5G, device-to-device (D2D) communication is the technology allowing adjacent mobile devices to communicate directly without relaying the data over base stations. D2D technology can potentially increase the network capacity by offloading network traffic in a distributed manner. However, there are also new security challenges such as free-riding attack prevention, device anonymity protection and end-to-end data secrecy. Also, since there are many mobile devices which have limited computational resources in 5G cellular network, there is a need to develop a lightweight authentication protocol which addresses all these security requirements with low computational overhead. In this paper, we propose a lightweight D2D authentication and key agreement protocol based on elliptic curve cryptography (ECC). Specifically, our proposed scheme makes use of the elliptic curve digital signature algorithm (ECDSA), elliptic curve Diffie-Hellman (ECDH) and authenticated encryption with associate data (AEAD) to provide secure device discovery, mutual authentication, key agreement and data transmission for all 5G D2D devices. Our scheme is computationally lightweight to be supported in any resource-constrained 5G devices, and it can resist several active and passive protocol attacks including eavesdropping, replay attack, man-in-the-middle attack and free-riding attack. We analyze the security of our protocol with Scyther to show our scheme is resistant to these attacks. Finally, performance evaluation shows our scheme is efficient for both UEs and CN with rationally low computational costs.
设备到设备(D2D)通信是5G的一个有前途的功能,它允许相邻的移动设备直接通信,而无需通过基站中继数据。D2D技术可以通过以分布式方式卸载网络流量来潜在地增加网络容量。然而,也有新的安全挑战,如搭便车攻击防御、设备匿名保护和端到端数据保密。此外,由于5G蜂窝网络中有许多计算资源有限的移动设备,因此需要开发一种轻量级身份验证协议,以低计算开销解决所有这些安全需求。本文提出了一种基于椭圆曲线密码学(ECC)的轻量级D2D认证和密钥协商协议。具体而言,我们提出的方案利用椭圆曲线数字签名算法(ECDSA)、椭圆曲线Diffie-Hellman算法(ECDH)和关联数据认证加密(AEAD),为所有5G D2D设备提供安全的设备发现、相互认证、密钥协议和数据传输。我们的方案是计算轻量级的,可以在任何资源受限的5G设备上支持,并且可以抵抗多种主动和被动协议攻击,包括窃听、重放攻击、中间人攻击和搭便车攻击。我们用Scyther分析了协议的安全性,证明了我们的方案能够抵抗这些攻击。最后,性能评估表明我们的方案对ue和CN都是有效的,并且计算成本很低。
{"title":"A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network","authors":"M. Chow, M. Ma","doi":"10.1145/3409934.3409952","DOIUrl":"https://doi.org/10.1145/3409934.3409952","url":null,"abstract":"As a promising feature in 5G, device-to-device (D2D) communication is the technology allowing adjacent mobile devices to communicate directly without relaying the data over base stations. D2D technology can potentially increase the network capacity by offloading network traffic in a distributed manner. However, there are also new security challenges such as free-riding attack prevention, device anonymity protection and end-to-end data secrecy. Also, since there are many mobile devices which have limited computational resources in 5G cellular network, there is a need to develop a lightweight authentication protocol which addresses all these security requirements with low computational overhead. In this paper, we propose a lightweight D2D authentication and key agreement protocol based on elliptic curve cryptography (ECC). Specifically, our proposed scheme makes use of the elliptic curve digital signature algorithm (ECDSA), elliptic curve Diffie-Hellman (ECDH) and authenticated encryption with associate data (AEAD) to provide secure device discovery, mutual authentication, key agreement and data transmission for all 5G D2D devices. Our scheme is computationally lightweight to be supported in any resource-constrained 5G devices, and it can resist several active and passive protocol attacks including eavesdropping, replay attack, man-in-the-middle attack and free-riding attack. We analyze the security of our protocol with Scyther to show our scheme is resistant to these attacks. Finally, performance evaluation shows our scheme is efficient for both UEs and CN with rationally low computational costs.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Blockchain to Web: Paving the Last Mile for Releasing Chained Data from the Blocks 从区块链到网络:为从区块中释放链式数据铺平最后一英里
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409938
Belal Abu-Naim, Martin Hronsky, W. Klas
Blockchain systems make use of the Internet infrastructure to connect thousands of nodes in peer-to-peer (P2P) networks. These connected nodes form complex ecosystems encompassing various technologies that collaborate to offer millions of users distributed, decentralized, secure, and read-only data stores. With the proliferation of various private and public platforms and applications that are built on top of blockchain technology, rich sources of several types of simple or complex datasets have been created. Consequently, new requirements for managing these rich data sources, integrating them with their hosting environment, and making them discoverable have emerged. Fulfilling these requirements calls for extending the architecture of current blockchain systems by adding different layers that offer dedicated services for handling the data and allowing for integrating the blockchain-based platforms and applications with other systems, including Web-based applications. In this paper, we present a novel approach aiming at extending the architecture of current blockchain systems by adding new service layers for processing the data and offering new services to provide a bridge between blockchain systems and Web-based external applications enabling them to query, retrieve, and access the datasets managed by robust permission-based access control.
区块链系统利用Internet基础设施连接点对点(P2P)网络中的数千个节点。这些连接的节点形成了包含各种技术的复杂生态系统,这些技术协作为数百万用户提供分布式、分散、安全和只读的数据存储。随着建立在区块链技术之上的各种私有和公共平台和应用程序的激增,已经创建了多种类型的简单或复杂数据集的丰富来源。因此,出现了管理这些丰富数据源、将其与托管环境集成以及使其可发现的新需求。为了满足这些需求,需要通过添加不同的层来扩展当前区块链系统的架构,这些层提供用于处理数据的专用服务,并允许将基于区块链的平台和应用程序与其他系统(包括基于web的应用程序)集成。在本文中,我们提出了一种新的方法,旨在通过增加新的服务层来处理数据,并提供新的服务来提供区块链系统和基于web的外部应用程序之间的桥梁,从而扩展当前区块链系统的体系结构,使它们能够查询、检索和访问由健壮的基于权限的访问控制管理的数据集。
{"title":"From Blockchain to Web: Paving the Last Mile for Releasing Chained Data from the Blocks","authors":"Belal Abu-Naim, Martin Hronsky, W. Klas","doi":"10.1145/3409934.3409938","DOIUrl":"https://doi.org/10.1145/3409934.3409938","url":null,"abstract":"Blockchain systems make use of the Internet infrastructure to connect thousands of nodes in peer-to-peer (P2P) networks. These connected nodes form complex ecosystems encompassing various technologies that collaborate to offer millions of users distributed, decentralized, secure, and read-only data stores. With the proliferation of various private and public platforms and applications that are built on top of blockchain technology, rich sources of several types of simple or complex datasets have been created. Consequently, new requirements for managing these rich data sources, integrating them with their hosting environment, and making them discoverable have emerged. Fulfilling these requirements calls for extending the architecture of current blockchain systems by adding different layers that offer dedicated services for handling the data and allowing for integrating the blockchain-based platforms and applications with other systems, including Web-based applications. In this paper, we present a novel approach aiming at extending the architecture of current blockchain systems by adding new service layers for processing the data and offering new services to provide a bridge between blockchain systems and Web-based external applications enabling them to query, retrieve, and access the datasets managed by robust permission-based access control.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133794850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhanced Security Approach Powered by Blockchain Technology with NFC to Prevent Fraudulence in Bank Letter of Credits 基于区块链技术和近场通信技术的增强安全方法,防止银行信用证欺诈
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409945
R. Subramaniam, S. Azzuhri, Ying Wah Teh
Letters of Credit (Letter-of-Credit) frauds are deceptive attempts against financial institutions, primarily by providing availing false/falsify documentation as a proof of shipment of goods when, either, inferior goods were shipped, or no delivery was made at all. Letter-of-Credit also maybe forged to be provided to the supplier to supply goods. Whereas parties can forfeit the Letter-of-Credit by someone with vast experience and expertise in finance commerce laws, and international laws and business processes. In this research, we aspire to come up with an option of incorporating NFC-enabled mobile application into Letter-of-credit. The application is powered by blockchain technology and would be crucial in helping the recipient of the Letter-of-credit to achieve easy verification of the legitimacy of the document. The idea of using blockchain to prevent Letter-of-Credit fraud may not be novel where some have already been put into reality. However, not much work done in combining an NFC enabled mobile application leveraging on blockchain technology to prevent Letter-of-Credits frauds. The study is intended for banks who are still in migration to paperless business and still depending on a physical Letter-of-Credit for their business transactions.
信用证(Letter-of-Credit)欺诈是针对金融机构的欺骗企图,主要是在发运劣质货物或根本没有交付货物的情况下,提供有效的虚假/伪造文件作为货物装运的证明。信用证也可能是伪造的,提供给供应商供应货物。然而,当事人可以由在金融、商业法、国际法和业务流程方面具有丰富经验和专业知识的人放弃信用证。在这项研究中,我们希望提出一种将nfc支持的移动应用程序纳入信用证的选择。该应用程序由区块链技术提供支持,对于帮助信用证的接收者轻松验证文件的合法性至关重要。使用区块链来防止信用证欺诈的想法可能并不新鲜,因为有些已经被付诸实践。然而,在结合NFC支持的移动应用程序利用区块链技术来防止信用证欺诈方面做的工作并不多。这项研究的目的是为那些仍在向无纸化业务迁移、仍依赖实物信用证进行业务交易的银行。
{"title":"Enhanced Security Approach Powered by Blockchain Technology with NFC to Prevent Fraudulence in Bank Letter of Credits","authors":"R. Subramaniam, S. Azzuhri, Ying Wah Teh","doi":"10.1145/3409934.3409945","DOIUrl":"https://doi.org/10.1145/3409934.3409945","url":null,"abstract":"Letters of Credit (Letter-of-Credit) frauds are deceptive attempts against financial institutions, primarily by providing availing false/falsify documentation as a proof of shipment of goods when, either, inferior goods were shipped, or no delivery was made at all. Letter-of-Credit also maybe forged to be provided to the supplier to supply goods. Whereas parties can forfeit the Letter-of-Credit by someone with vast experience and expertise in finance commerce laws, and international laws and business processes. In this research, we aspire to come up with an option of incorporating NFC-enabled mobile application into Letter-of-credit. The application is powered by blockchain technology and would be crucial in helping the recipient of the Letter-of-credit to achieve easy verification of the legitimacy of the document. The idea of using blockchain to prevent Letter-of-Credit fraud may not be novel where some have already been put into reality. However, not much work done in combining an NFC enabled mobile application leveraging on blockchain technology to prevent Letter-of-Credits frauds. The study is intended for banks who are still in migration to paperless business and still depending on a physical Letter-of-Credit for their business transactions.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123767928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure File Sharing System Based on IPFS and Blockchain 基于IPFS和区块链的安全文件共享系统
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409948
Hsiao-Shan Huang, Tian-Sheuan Chang, Jhih-Yi Wu
There is a great interest in many approaches towards blockchain in providing a solution to record transactions in a decentralized way. However, there are some limitations when storing large files or documents on the blockchain. In order to meet the requirements of storing relatively large data, a decentralized storage medium is produced. IPFS is a distributed file system which is content-addressable. It works very similar to the blockchain network. There are some attempts which take advantage of the blockchain concept and IPFS to design new approaches. Unfortunately, there are some inefficiencies in sharing data using the combination of IPFS and blockchain. In this paper, we proposed a secure file sharing system that brings a distributed access control and group key management by the adoption of the IPFS proxy. The IPFS proxy which plays an important role in the design is adopted to take responsibility for the control policies. The combination of the IPFS server and the blockchain network with the adoption of the IPFS proxy make a secure file sharing system which the members on the system can create new groups or join different groups by their own choice. Although there is no access control mechanism in IPFS server and blockchain network, the secure file sharing system manages the access control policies. The members access files only belong to the group they authorized.
人们对区块链的许多方法都很感兴趣,因为它们提供了一种以分散的方式记录交易的解决方案。然而,在区块链上存储大型文件或文档时存在一些限制。为了满足存储较大数据量的要求,一种去中心化的存储介质应运而生。IPFS是一个内容可寻址的分布式文件系统。它的工作原理与区块链网络非常相似。有一些尝试利用区块链概念和IPFS来设计新方法。不幸的是,结合使用IPFS和区块链共享数据存在一些效率低下的问题。本文提出了一种采用IPFS代理实现分布式访问控制和组密钥管理的安全文件共享系统。采用在设计中起重要作用的IPFS代理承担控制策略的责任。IPFS服务器与区块链网络的结合,采用IPFS代理,构成了一个安全的文件共享系统,系统成员可以自行选择创建新的组或加入不同的组。虽然在IPFS服务器和区块链网络中没有访问控制机制,但安全文件共享系统管理访问控制策略。成员访问的文件只属于他们授权的组。
{"title":"A Secure File Sharing System Based on IPFS and Blockchain","authors":"Hsiao-Shan Huang, Tian-Sheuan Chang, Jhih-Yi Wu","doi":"10.1145/3409934.3409948","DOIUrl":"https://doi.org/10.1145/3409934.3409948","url":null,"abstract":"There is a great interest in many approaches towards blockchain in providing a solution to record transactions in a decentralized way. However, there are some limitations when storing large files or documents on the blockchain. In order to meet the requirements of storing relatively large data, a decentralized storage medium is produced. IPFS is a distributed file system which is content-addressable. It works very similar to the blockchain network. There are some attempts which take advantage of the blockchain concept and IPFS to design new approaches. Unfortunately, there are some inefficiencies in sharing data using the combination of IPFS and blockchain. In this paper, we proposed a secure file sharing system that brings a distributed access control and group key management by the adoption of the IPFS proxy. The IPFS proxy which plays an important role in the design is adopted to take responsibility for the control policies. The combination of the IPFS server and the blockchain network with the adoption of the IPFS proxy make a secure file sharing system which the members on the system can create new groups or join different groups by their own choice. Although there is no access control mechanism in IPFS server and blockchain network, the secure file sharing system manages the access control policies. The members access files only belong to the group they authorized.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126988214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Responsible Self-Funding in Dash Governance System 达世币治理体系中的负责任自筹资金
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409939
I. Chistiakov, Y. Yanovich
Decentralized voting and self-funding allow cryptocurrencies to make joint decisions and finance their development. Dash cryptocurrency has a working self-funding and decision-making system for supporting event and improvement proposals---the Dash Governance System. While it is fully operational, as currently designed, it does not incentivize voting efficiency. The Dash Governance System struggles to scale, with the number of proposals rising, as each participant needs to review each proposal. This work introduces a new mechanism for processing proposals. It meets scalability and makes thoughtful voting the most profitable strategy.
去中心化投票和自筹资金允许加密货币共同决策并为其发展提供资金。达世币加密货币有一个有效的自筹资金和决策系统,用于支持事件和改进建议——达世币治理系统。虽然它按照目前的设计全面运作,但它并没有激励投票效率。随着提案数量的增加,Dash治理系统难以扩展,因为每个参与者都需要审查每个提案。这项工作引入了一种处理提案的新机制。它符合可扩展性,并使深思熟虑的投票成为最有利可图的策略。
{"title":"Responsible Self-Funding in Dash Governance System","authors":"I. Chistiakov, Y. Yanovich","doi":"10.1145/3409934.3409939","DOIUrl":"https://doi.org/10.1145/3409934.3409939","url":null,"abstract":"Decentralized voting and self-funding allow cryptocurrencies to make joint decisions and finance their development. Dash cryptocurrency has a working self-funding and decision-making system for supporting event and improvement proposals---the Dash Governance System. While it is fully operational, as currently designed, it does not incentivize voting efficiency. The Dash Governance System struggles to scale, with the number of proposals rising, as each participant needs to review each proposal. This work introduces a new mechanism for processing proposals. It meets scalability and makes thoughtful voting the most profitable strategy.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Conceptual Model for Blockchain-based Auditing Information System 基于区块链的审计信息系统概念模型
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409949
Ke Wang, Yu Zhang, Elizabeth Chang
Blockchain is viewed as one of the most promising and disruptive inventions and is considered to have the potential to significantly change current auditing profession and reshape the business ecosystem. With the advancement of blockchain, it has been concerned in some studies that auditing could be significantly impacted and eventually replaced. Meanwhile, another viewpoint argues that blockchain technology would push the existing auditing industry to a new direction rather than eliminating the need for auditing in the immediate future. This discussion can hardly be settled without evaluation, however, studies exploring how blockchain technology can be employed in auditing practice or how continuous auditing can be conducted using blockchain technology are limited. This paper analyses the impact of blockchain features on existing audit processes and discusses the possibility of applying blockchain characteristics including immutability, distributed ledger, real-time settlement to the auditing domain. Based on the systematic analysis, this study proposes a conceptual model for blockchain-based auditing information system, which provides solutions to employ blockchain technology in auditing profession, significantly improving the efficiency and effectiveness of auditing and promoting the transformation of the auditing paradigm to real-time, continuous and intelligent auditing.
区块链被视为最有前途和颠覆性的发明之一,被认为有可能显著改变当前的审计行业并重塑商业生态系统。随着区块链的发展,一些研究担心审计可能会受到重大影响并最终被取代。与此同时,另一种观点认为,区块链技术将把现有的审计行业推向一个新的方向,而不是在不久的将来消除审计的需要。这个讨论不经过评估就很难解决,然而,关于区块链技术如何应用于审计实践或如何使用区块链技术进行持续审计的研究是有限的。本文分析了区块链特征对现有审计流程的影响,并讨论了将区块链特征(包括不变性、分布式账本、实时结算)应用于审计领域的可能性。本研究在系统分析的基础上,提出了基于区块链的审计信息系统概念模型,提供了将区块链技术应用于审计行业的解决方案,显著提高了审计的效率和有效性,促进了审计范式向实时、连续、智能审计的转变。
{"title":"A Conceptual Model for Blockchain-based Auditing Information System","authors":"Ke Wang, Yu Zhang, Elizabeth Chang","doi":"10.1145/3409934.3409949","DOIUrl":"https://doi.org/10.1145/3409934.3409949","url":null,"abstract":"Blockchain is viewed as one of the most promising and disruptive inventions and is considered to have the potential to significantly change current auditing profession and reshape the business ecosystem. With the advancement of blockchain, it has been concerned in some studies that auditing could be significantly impacted and eventually replaced. Meanwhile, another viewpoint argues that blockchain technology would push the existing auditing industry to a new direction rather than eliminating the need for auditing in the immediate future. This discussion can hardly be settled without evaluation, however, studies exploring how blockchain technology can be employed in auditing practice or how continuous auditing can be conducted using blockchain technology are limited. This paper analyses the impact of blockchain features on existing audit processes and discusses the possibility of applying blockchain characteristics including immutability, distributed ledger, real-time settlement to the auditing domain. Based on the systematic analysis, this study proposes a conceptual model for blockchain-based auditing information system, which provides solutions to employ blockchain technology in auditing profession, significantly improving the efficiency and effectiveness of auditing and promoting the transformation of the auditing paradigm to real-time, continuous and intelligent auditing.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs 基于MOEA的vanet中ids特征选择算法设计
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409953
Junwei Liang, M. Ma
Intrusion detection systems (IDSs) is crucial for the security of Vehicle Ad Hoc Networks (VANETs), as it can accurately detect both the inner and outer attacks. However, the redundant features and the sparse samples of fatal attacks in VANETs datasets cause the heavy time-consumption and imbalanced problems respectively. In this paper, a feature selection algorithm based on a many-objective optimization algorithm (FS-MOEA) is proposed for IDSs in VANETs, in which Non-dominant Sorting Genetic Algorithm-III (NSGA-III) serves as the many-objective evolutionary algorithm. Two improvements, called Bias and Weighted (B&W) niche-preservation and Analytic Hierarchy Process (AHP) prioritizing, are further designed in FS-MOEA. B&W niche-preservation is used to counterbalance the imbalanced problem among the different classes of datasets by assigning rare classes higher priorities in the niching selection process. AHP prioritizing is employed to search the optimal feature subset from the non-dominant feature subsets in the Pareto Front of FS-MOEA. Experimental results show that the proposed FS-MOEA can not only improve the performance of IDSs in VANETs by decreasing the redundancy and irrelevances of features but also alleviate the negative impact of the imbalanced problem.
入侵检测系统(ids)是车辆自组织网络(vanet)安全的关键,因为它可以准确地检测到内部和外部的攻击。然而,VANETs数据集的致命攻击特征的冗余性和样本的稀疏性分别造成了大量的耗时和不平衡问题。本文提出了一种基于多目标优化算法(FS-MOEA)的多目标特征选择算法,其中非优势排序遗传算法- iii (NSGA-III)作为多目标进化算法。在FS-MOEA中进一步设计了两种改进,即偏置加权(B&W)生态位保存和层次分析法(AHP)优先级排序。采用B&W小生境保护方法,在小生境选择过程中为稀有类分配更高的优先级,以平衡不同类别数据集之间的不平衡问题。采用层次分析法从FS-MOEA Pareto Front的非优势特征子集中搜索最优特征子集。实验结果表明,所提出的FS-MOEA不仅可以通过减少特征的冗余和不相关来提高vanet中ids的性能,还可以缓解不平衡问题的负面影响。
{"title":"Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs","authors":"Junwei Liang, M. Ma","doi":"10.1145/3409934.3409953","DOIUrl":"https://doi.org/10.1145/3409934.3409953","url":null,"abstract":"Intrusion detection systems (IDSs) is crucial for the security of Vehicle Ad Hoc Networks (VANETs), as it can accurately detect both the inner and outer attacks. However, the redundant features and the sparse samples of fatal attacks in VANETs datasets cause the heavy time-consumption and imbalanced problems respectively. In this paper, a feature selection algorithm based on a many-objective optimization algorithm (FS-MOEA) is proposed for IDSs in VANETs, in which Non-dominant Sorting Genetic Algorithm-III (NSGA-III) serves as the many-objective evolutionary algorithm. Two improvements, called Bias and Weighted (B&W) niche-preservation and Analytic Hierarchy Process (AHP) prioritizing, are further designed in FS-MOEA. B&W niche-preservation is used to counterbalance the imbalanced problem among the different classes of datasets by assigning rare classes higher priorities in the niching selection process. AHP prioritizing is employed to search the optimal feature subset from the non-dominant feature subsets in the Pareto Front of FS-MOEA. Experimental results show that the proposed FS-MOEA can not only improve the performance of IDSs in VANETs by decreasing the redundancy and irrelevances of features but also alleviate the negative impact of the imbalanced problem.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129106072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Supply Chain Model Based on Smart Contract 基于智能合约的新型供应链模型
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409942
Haitao Liu
Facing on bursting of the huge quantity of trade, the problem of finance by micro and small firms, the expansion of business development of core enterprise in supply chain, the development of comprehensive finance services, it is not well worked by traditional ways. Moreover it is more and more restricting the development of supply chain. Considering the advantages of automatic executing and high efficiency of smart contract, the feature of decentralization, security, trustworthiness and anti-tampering of blockchain, it was presented a novel supply chain model based on smart contract and blockchain for solving the problem totally. The model relied on the core enterprise of supply chain, integrated the upstream and downstream industries, constructed a consortium chain, that consisted of core enterprise, financial institutions, suppliers and dealers, formed an encrypted credit named ET (Electronic Trust) based on the trustworthiness of the trust industries chain. Actually, ET is equaled to the actual credit, it could be paid for the suppliers according to the cargo value before the last settlement. So the ET could combine the virtual and actual capital. Thus it also could further solve the common pain points of supply chain.
面对巨额贸易量的爆发式增长、小微企业融资难、供应链核心企业业务拓展、综合金融服务的发展等问题,传统的金融服务方式已不能很好地发挥作用。而且,它越来越制约着供应链的发展。考虑到智能合约自动执行和高效的优势,以及区块链的去中心化、安全、可信和抗篡改的特点,提出了一种基于智能合约和区块链的新型供应链模型,以全面解决这一问题。该模型以供应链核心企业为依托,整合上下游产业,构建由核心企业、金融机构、供应商、经销商组成的财团链,基于信托产业链的可信赖性,形成名为ET (Electronic Trust)的加密信用。其实ET等于实际信用证,可以按照上次结算前的货物价值支付给供应商。所以ET可以把虚拟资本和实际资本结合起来。从而也可以进一步解决供应链的共同痛点。
{"title":"A Novel Supply Chain Model Based on Smart Contract","authors":"Haitao Liu","doi":"10.1145/3409934.3409942","DOIUrl":"https://doi.org/10.1145/3409934.3409942","url":null,"abstract":"Facing on bursting of the huge quantity of trade, the problem of finance by micro and small firms, the expansion of business development of core enterprise in supply chain, the development of comprehensive finance services, it is not well worked by traditional ways. Moreover it is more and more restricting the development of supply chain. Considering the advantages of automatic executing and high efficiency of smart contract, the feature of decentralization, security, trustworthiness and anti-tampering of blockchain, it was presented a novel supply chain model based on smart contract and blockchain for solving the problem totally. The model relied on the core enterprise of supply chain, integrated the upstream and downstream industries, constructed a consortium chain, that consisted of core enterprise, financial institutions, suppliers and dealers, formed an encrypted credit named ET (Electronic Trust) based on the trustworthiness of the trust industries chain. Actually, ET is equaled to the actual credit, it could be paid for the suppliers according to the cargo value before the last settlement. So the ET could combine the virtual and actual capital. Thus it also could further solve the common pain points of supply chain.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124609383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
High Performance Peer-to-peer Data Dissemination for Decentralized Wireless Sensor Networks Firmware Updating 分布式无线传感器网络固件更新的高性能点对点数据传播
Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409951
Natchanon Nuntanirund, N. Nupairoj
Data dissemination is an important feature to enable reconfigurations and firmware updates in wireless sensor networks. Typically, data disseminations in modern wireless sensor networks are based on multicast-based algorithms which may not be the most efficient ways because they do not guarantee packet delivery. In this paper, we present a reliable data dissemination algorithm for distributed wireless sensor networks. It derives some features from BitTorrent such as segmented file transfer, choking, and optimistic unchoking to improve performance. The evaluation result shows that our algorithm performs better than multicast-based algorithms in term of download speed up to 58.97% and energy efficiency up to 79.39%.
在无线传感器网络中,数据传播是实现重新配置和固件更新的重要功能。通常,现代无线传感器网络中的数据传播基于基于多播的算法,这可能不是最有效的方式,因为它们不能保证数据包的传输。本文提出了一种适用于分布式无线传感器网络的可靠数据分发算法。它继承了BitTorrent的一些特性,如分段文件传输、阻塞和乐观解除阻塞,以提高性能。评估结果表明,该算法的下载速度可达58.97%,能效可达79.39%,优于基于组播的算法。
{"title":"High Performance Peer-to-peer Data Dissemination for Decentralized Wireless Sensor Networks Firmware Updating","authors":"Natchanon Nuntanirund, N. Nupairoj","doi":"10.1145/3409934.3409951","DOIUrl":"https://doi.org/10.1145/3409934.3409951","url":null,"abstract":"Data dissemination is an important feature to enable reconfigurations and firmware updates in wireless sensor networks. Typically, data disseminations in modern wireless sensor networks are based on multicast-based algorithms which may not be the most efficient ways because they do not guarantee packet delivery. In this paper, we present a reliable data dissemination algorithm for distributed wireless sensor networks. It derives some features from BitTorrent such as segmented file transfer, choking, and optimistic unchoking to improve performance. The evaluation result shows that our algorithm performs better than multicast-based algorithms in term of download speed up to 58.97% and energy efficiency up to 79.39%.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2nd International Electronics Communication Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1