Pub Date : 2020-04-28DOI: 10.1109/ICBC48266.2020.9169421
A. Shrestha, Sandhya Joshi, Julita Vassileva
We propose a new free-ecommerce platform with blockchains that allows customers to connect to the seller directly, share personal data without losing control and ownership of it and apply it to the domain of shopping cart. Our new platform provides a solution to four important problems: private payment, ensuring privacy and user control, and incentives for sharing. It allows the trade to be open, transparent with immutable transactions that can be used for settling any disputes. The paper presents a case study of applying the framework for a shopping cart as one of the enterprise nodes of MultiChain which provides trading in ethers controlled by smart contracts and also collects users’ profile data and allows them to receive rewards for sharing their data with other business enterprises. It tracks who shared what, with whom, when, by what means and for what purposes in a verifiable fashion. The user data from the repository is converted into an open data format and shared via stream in the blockchain so that other nodes can efficiently process and use the data. The smart contract verifies and executes the agreed terms of use of the data and transfers digital tokens as a reward to the customer. The smart contract imposes double deposit collateral to ensure that all participants act honestly.
{"title":"Customer Data Sharing Platform: A Blockchain-Based Shopping Cart","authors":"A. Shrestha, Sandhya Joshi, Julita Vassileva","doi":"10.1109/ICBC48266.2020.9169421","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169421","url":null,"abstract":"We propose a new free-ecommerce platform with blockchains that allows customers to connect to the seller directly, share personal data without losing control and ownership of it and apply it to the domain of shopping cart. Our new platform provides a solution to four important problems: private payment, ensuring privacy and user control, and incentives for sharing. It allows the trade to be open, transparent with immutable transactions that can be used for settling any disputes. The paper presents a case study of applying the framework for a shopping cart as one of the enterprise nodes of MultiChain which provides trading in ethers controlled by smart contracts and also collects users’ profile data and allows them to receive rewards for sharing their data with other business enterprises. It tracks who shared what, with whom, when, by what means and for what purposes in a verifiable fashion. The user data from the repository is converted into an open data format and shared via stream in the blockchain so that other nodes can efficiently process and use the data. The smart contract verifies and executes the agreed terms of use of the data and transfers digital tokens as a reward to the customer. The smart contract imposes double deposit collateral to ensure that all participants act honestly.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128861417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-21DOI: 10.1109/ICBC48266.2020.9169458
Suat Mercan, Enes Erdin, K. Akkaya
The last decade has experienced a vast interest in Blockchain-based cryptocurrencies. However, slow confirmation times of transactions hamper their wide adoption for micropayments. The idea of establishing payment channel networks is one of the many proposed solutions to address this scalability. Due to the way these channels are created, both sides have a certain one-way capacity for making transactions. In this paper, we aim to increase the overall success rate of payments by effectively exploiting the fact that end-users are usually connected to the network at multiple points. The evaluation of the proposed method shows that compared to greedy and maxflow-based approaches, we can achieve much higher success rates.
{"title":"Improving Transaction Success Rate via Smart Gateway Selection in Cryptocurrency Payment Channel Networks","authors":"Suat Mercan, Enes Erdin, K. Akkaya","doi":"10.1109/ICBC48266.2020.9169458","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169458","url":null,"abstract":"The last decade has experienced a vast interest in Blockchain-based cryptocurrencies. However, slow confirmation times of transactions hamper their wide adoption for micropayments. The idea of establishing payment channel networks is one of the many proposed solutions to address this scalability. Due to the way these channels are created, both sides have a certain one-way capacity for making transactions. In this paper, we aim to increase the overall success rate of payments by effectively exploiting the fact that end-users are usually connected to the network at multiple points. The evaluation of the proposed method shows that compared to greedy and maxflow-based approaches, we can achieve much higher success rates.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116255850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-09DOI: 10.1109/ICBC48266.2020.9169451
Christos Karapapas, Iakovos Pittaras, N. Fotiou, George C. Polyzos
Decentralized systems, such as distributed ledgers and the InterPlanetary File System (IPFS), are designed to offer more open and robust services. However, they also create opportunities for illegal activities. We demonstrate how these technologies can be used to launch a ransomware as a service campaign. We show that criminals can transact with affiliates and victims without having to reveal their identity. Furthermore, by exploiting the robustness and resilience to churn of IPFS, as well as the decentralized computing capabilities of Ethereum, criminals can remain offline during most procedures, with many privacy guarantees.
{"title":"Ransomware as a Service using Smart Contracts and IPFS","authors":"Christos Karapapas, Iakovos Pittaras, N. Fotiou, George C. Polyzos","doi":"10.1109/ICBC48266.2020.9169451","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169451","url":null,"abstract":"Decentralized systems, such as distributed ledgers and the InterPlanetary File System (IPFS), are designed to offer more open and robust services. However, they also create opportunities for illegal activities. We demonstrate how these technologies can be used to launch a ransomware as a service campaign. We show that criminals can transact with affiliates and victims without having to reveal their identity. Furthermore, by exploiting the robustness and resilience to churn of IPFS, as well as the decentralized computing capabilities of Ethereum, criminals can remain offline during most procedures, with many privacy guarantees.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123257841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-07DOI: 10.1109/ICBC48266.2020.9169457
Jaya Gupta, Swaprava Nath
Skill verification is a central problem in workforce hiring. Companies and academia often face the difficulty of ascertaining the skills of an applicant since the certifications of the skills claimed by a candidate are generally not immediately verifiable and costly to test. Blockchains have been proposed in the literature for skill verification and tamper-proof information storage in a decentralized manner. However, most of these approaches deal with storing the certificates issued by traditional universities on the blockchain. Among the few techniques that consider the certification procedure itself, questions like (a) scalability with limited staff, (b) uniformity of grades over multiple evaluators, or (c) honest effort extraction from the evaluators are usually not addressed. We propose a blockchain-based platform named SkillCheck, which considers the questions above, and ensure several desirable properties. The platform incentivizes effort in grading via payments with tokens which it generates from the payments of the users of the platform, e.g., the recruiters and test takers. We provide a detailed description of the design of the platform along with the provable properties of the algorithm.
{"title":"SkillCheck: An Incentive-based Certification System using Blockchains","authors":"Jaya Gupta, Swaprava Nath","doi":"10.1109/ICBC48266.2020.9169457","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169457","url":null,"abstract":"Skill verification is a central problem in workforce hiring. Companies and academia often face the difficulty of ascertaining the skills of an applicant since the certifications of the skills claimed by a candidate are generally not immediately verifiable and costly to test. Blockchains have been proposed in the literature for skill verification and tamper-proof information storage in a decentralized manner. However, most of these approaches deal with storing the certificates issued by traditional universities on the blockchain. Among the few techniques that consider the certification procedure itself, questions like (a) scalability with limited staff, (b) uniformity of grades over multiple evaluators, or (c) honest effort extraction from the evaluators are usually not addressed. We propose a blockchain-based platform named SkillCheck, which considers the questions above, and ensure several desirable properties. The platform incentivizes effort in grading via payments with tokens which it generates from the payments of the users of the platform, e.g., the recruiters and test takers. We provide a detailed description of the design of the platform along with the provable properties of the algorithm.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132784664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a technique for rebalancing link weights in decentralized credit networks. Credit networks are peer-to-peer trust-based networks that enable fast and inexpensive cross-currency transactions compared to traditional bank wire transfers. Although researchers have studied security of transactions and privacy of users of such networks, and have invested significant efforts into designing efficient routing algorithms for credit networks, comparatively little work has been done in the area of replenishing credit links of users in the network. This is achieved by a process called rebalancing that enables a poorly funded user to create incoming as well as outgoing credit links. We propose a system where a user with zero or no link weights can create incoming links with existing, trusted users in the network, in a procedure we call balance transfer, followed by creating outgoing links to existing or new users that would like to join the network, a process we call bailout. Both these processes together constitute our proposed rebalancing mechanism.
{"title":"Balance Transfers and Bailouts in Credit Networks using Blockchains*","authors":"Lalitha Muthu Subramanian, Roopa Vishwanathan, Kartick Kolachala","doi":"10.1109/ICBC48266.2020.9169442","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169442","url":null,"abstract":"In this paper, we propose a technique for rebalancing link weights in decentralized credit networks. Credit networks are peer-to-peer trust-based networks that enable fast and inexpensive cross-currency transactions compared to traditional bank wire transfers. Although researchers have studied security of transactions and privacy of users of such networks, and have invested significant efforts into designing efficient routing algorithms for credit networks, comparatively little work has been done in the area of replenishing credit links of users in the network. This is achieved by a process called rebalancing that enables a poorly funded user to create incoming as well as outgoing credit links. We propose a system where a user with zero or no link weights can create incoming links with existing, trusted users in the network, in a procedure we call balance transfer, followed by creating outgoing links to existing or new users that would like to join the network, a process we call bailout. Both these processes together constitute our proposed rebalancing mechanism.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131080483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-25DOI: 10.1109/ICBC48266.2020.9169395
Hao Guo, Wanxin Li, E. Meamari, Chien-Chung Shen, Mark M. Nejad
The global Electronic Health Record (EHR) market is growing dramatically and has already hit $31.5 billion in 2018. To safeguard the security of EHR data and privacy of patients, fine-grained information access and sharing mechanisms are essential for EHR management. This paper proposes a hybrid architecture of blockchain and edge nodes to facilitate EHR management. In this architecture, we utilize attribute-based multi-signature (ABMS) scheme to authenticate user’s signatures without revealing the sensitive information and multi-authority attribute-based encryption (ABE) scheme to encrypt EHR data which is stored on the edge node. We develop the blockchain module on Hyperledger Fabric platform and the ABMS module on Hyperledger Ursa library. We measure the signing and verifying time of the ABMS scheme under different settings, and experiment with the authentication events and access activities which are logged as transactions in blockchain.
{"title":"Attribute-based Multi-Signature and Encryption for EHR Management: A Blockchain-based Solution","authors":"Hao Guo, Wanxin Li, E. Meamari, Chien-Chung Shen, Mark M. Nejad","doi":"10.1109/ICBC48266.2020.9169395","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169395","url":null,"abstract":"The global Electronic Health Record (EHR) market is growing dramatically and has already hit $31.5 billion in 2018. To safeguard the security of EHR data and privacy of patients, fine-grained information access and sharing mechanisms are essential for EHR management. This paper proposes a hybrid architecture of blockchain and edge nodes to facilitate EHR management. In this architecture, we utilize attribute-based multi-signature (ABMS) scheme to authenticate user’s signatures without revealing the sensitive information and multi-authority attribute-based encryption (ABE) scheme to encrypt EHR data which is stored on the edge node. We develop the blockchain module on Hyperledger Fabric platform and the ABMS module on Hyperledger Ursa library. We measure the signing and verifying time of the ABMS scheme under different settings, and experiment with the authentication events and access activities which are logged as transactions in blockchain.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130590779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-12DOI: 10.1109/ICBC48266.2020.9169405
Subhra Mazumdar, S. Ruj, R. Singh, Arindam Pal
Payment channel networks (PCN) are used in cryptocurrencies to enhance the performance and scalability of off-chain transactions. Except for opening and closing of a payment channel, no other transaction requests accepted by a PCN are recorded in the Blockchain. In practical scenario, it may not be possible to transfer high valued payment across a single path. For such cases, splitting up the transaction value across multiple paths is a better approach. While there exists several approaches which route transactions via several paths, such techniques are quite inefficient, as the decision on the number of splits must be taken at the initial phase of the routing algorithm [39]. Such decisions are made by not taking into account the residual capacity of each channel in the network. Other approaches leak sensitive information, and are quite computationally expensive [26]. To the best of our knowledge, our proposed scheme HushRelay is an efficient privacy preserving routing algorithm, solving the problems encountered in existing works. On comparing the performance of our algorithm with existing routing scheme SpeedyMurmur [39] on real instances, we observed that HushRelay attains a higher success ratio with less execution time.
{"title":"HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments","authors":"Subhra Mazumdar, S. Ruj, R. Singh, Arindam Pal","doi":"10.1109/ICBC48266.2020.9169405","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169405","url":null,"abstract":"Payment channel networks (PCN) are used in cryptocurrencies to enhance the performance and scalability of off-chain transactions. Except for opening and closing of a payment channel, no other transaction requests accepted by a PCN are recorded in the Blockchain. In practical scenario, it may not be possible to transfer high valued payment across a single path. For such cases, splitting up the transaction value across multiple paths is a better approach. While there exists several approaches which route transactions via several paths, such techniques are quite inefficient, as the decision on the number of splits must be taken at the initial phase of the routing algorithm [39]. Such decisions are made by not taking into account the residual capacity of each channel in the network. Other approaches leak sensitive information, and are quite computationally expensive [26]. To the best of our knowledge, our proposed scheme HushRelay is an efficient privacy preserving routing algorithm, solving the problems encountered in existing works. On comparing the performance of our algorithm with existing routing scheme SpeedyMurmur [39] on real instances, we observed that HushRelay attains a higher success ratio with less execution time.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121252733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-23DOI: 10.1109/ICBC48266.2020.9169429
Regio A. Michelin, Nadeem Ahmed, S. Kanhere, A. Seneviratne, S. Jha
The video footage produced by surveillance cameras is important evidence to support criminal investigations. Video evidence can be sourced from public (trusted) as well as private (untrusted) surveillance systems. This raises the issue of establishing integrity for information provided by the untrusted video sources. In this paper, we present a framework to ensure the data integrity of the stored videos, allowing authorities to validate whether video footage has not been tampered with. Our proposal uses a lightweight blockchain technology to store the video metadata as blockchain transactions to support the validation of video integrity. Our evaluations show that the overhead introduced by employing the blockchain to create the transactions introduces a minor latency of a few milliseconds.
{"title":"Leveraging lightweight blockchain to establish data integrity for surveillance cameras","authors":"Regio A. Michelin, Nadeem Ahmed, S. Kanhere, A. Seneviratne, S. Jha","doi":"10.1109/ICBC48266.2020.9169429","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169429","url":null,"abstract":"The video footage produced by surveillance cameras is important evidence to support criminal investigations. Video evidence can be sourced from public (trusted) as well as private (untrusted) surveillance systems. This raises the issue of establishing integrity for information provided by the untrusted video sources. In this paper, we present a framework to ensure the data integrity of the stored videos, allowing authorities to validate whether video footage has not been tampered with. Our proposal uses a lightweight blockchain technology to store the video metadata as blockchain transactions to support the validation of video integrity. Our evaluations show that the overhead introduced by employing the blockchain to create the transactions introduces a minor latency of a few milliseconds.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130075339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-23DOI: 10.1109/ICBC48266.2020.9169449
Muhammad Anas Imtiaz, D. Starobinski, A. Trachtenberg
Orphan transactions are those whose parental income sources are missing at the time that they are processed. These transactions typically languish in a local buffer until evicted or all their parents are discovered, at which point they may be propagated further. So far, there has been little work in the literature on characterizing the nature and impact of such orphans. Yet, it is intuitive that they should affect performance of the Bitcoin network. This work thus seeks to methodically research such effects through a measurement campaign of orphan transactions on live Bitcoin nodes. Our data show that, surprisingly, orphan transactions tend to have fewer parents on average than non-orphan transactions. The salient features of their missing parents are a lower fee, a larger size, and a lower transaction fee per byte than all other received transactions. We also find out that the network overhead incurred by these orphan transactions can be significant, exceeding 17% when using the default orphan memory pool size (i.e.,100 transactions). However, this overhead can be made negligible, without significant computational or memory demands, if the pool size is simply increased to 1000 transactions.
{"title":"Characterizing Orphan Transactions in the Bitcoin Network","authors":"Muhammad Anas Imtiaz, D. Starobinski, A. Trachtenberg","doi":"10.1109/ICBC48266.2020.9169449","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169449","url":null,"abstract":"Orphan transactions are those whose parental income sources are missing at the time that they are processed. These transactions typically languish in a local buffer until evicted or all their parents are discovered, at which point they may be propagated further. So far, there has been little work in the literature on characterizing the nature and impact of such orphans. Yet, it is intuitive that they should affect performance of the Bitcoin network. This work thus seeks to methodically research such effects through a measurement campaign of orphan transactions on live Bitcoin nodes. Our data show that, surprisingly, orphan transactions tend to have fewer parents on average than non-orphan transactions. The salient features of their missing parents are a lower fee, a larger size, and a lower transaction fee per byte than all other received transactions. We also find out that the network overhead incurred by these orphan transactions can be significant, exceeding 17% when using the default orphan memory pool size (i.e.,100 transactions). However, this overhead can be made negligible, without significant computational or memory demands, if the pool size is simply increased to 1000 transactions.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125650031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-21DOI: 10.1109/ICBC48266.2020.9169481
G. D. Putra, Volkan Dedeoglu, S. Kanhere, R. Jurdak
Heterogeneous and dynamic IoT environments require a lightweight, scalable, and trustworthy access control system for protection from unauthorized access and for automated detection of compromised nodes. Recent proposals in IoT access control systems have incorporated blockchain to overcome inherent issues in conventional access control schemes. However, the dynamic interaction of IoT networks remains uncaptured. Here, we develop a blockchain based Trust and Reputation System (TRS) for IoT access control, which progressively evaluates and calculates the trust and reputation score of each participating node to achieve a self-adaptive and trustworthy access control system. Trust and reputation are explicitly incorporated in the attribute-based access control policy, so that different nodes can be assigned to different access right levels, resulting in dynamic access control policies. We implement our proposed architecture in a private Ethereum blockchain comprised of a Docker container network. We benchmark our solution using various performance metrics to highlight its applicability for IoT contexts.
{"title":"Trust Management in Decentralized IoT Access Control System","authors":"G. D. Putra, Volkan Dedeoglu, S. Kanhere, R. Jurdak","doi":"10.1109/ICBC48266.2020.9169481","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169481","url":null,"abstract":"Heterogeneous and dynamic IoT environments require a lightweight, scalable, and trustworthy access control system for protection from unauthorized access and for automated detection of compromised nodes. Recent proposals in IoT access control systems have incorporated blockchain to overcome inherent issues in conventional access control schemes. However, the dynamic interaction of IoT networks remains uncaptured. Here, we develop a blockchain based Trust and Reputation System (TRS) for IoT access control, which progressively evaluates and calculates the trust and reputation score of each participating node to achieve a self-adaptive and trustworthy access control system. Trust and reputation are explicitly incorporated in the attribute-based access control policy, so that different nodes can be assigned to different access right levels, resulting in dynamic access control policies. We implement our proposed architecture in a private Ethereum blockchain comprised of a Docker container network. We benchmark our solution using various performance metrics to highlight its applicability for IoT contexts.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}