Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract‐Based Access Control, and Hash Authentication Codes for Cloud Security
Transactions on Emerging Telecommunications Technologies (TETT), Volume 35, Issue 11https://doi.org/10.1002/ett.70016ABSTRACTWith the increasing trend of outsourcing data to cloud services, ensuring data security and privacy has become crucial. Typically, data are stored on cloud servers in encrypted form to mitigate risks. However, accessing the encrypted data ...
With the increasing trend of outsourcing data to cloud services, ensuring data security and privacy has become crucial. Typically, data are stored on cloud servers in encrypted form to mitigate risks. However, accessing the encrypted data requires an ...
- research-articleOctober 2024
Privacy preserving decentralized swap derivative with deep learning based oracles leveraging blockchain technology and cryptographic primitives
Computers and Electrical Engineering (CENG), Volume 119, Issue PAhttps://doi.org/10.1016/j.compeleceng.2024.109510AbstractBlockchain technology is currently revolutionizing traditional financial and business models by eliminating the need for trusted third parties. Smart contracts, a specific aspect of blockchain technology, are digital agreements that facilitate ...
- research-articleSeptember 2024
Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1186–1197https://doi.org/10.1145/3650212.3680352A storage is a persistent memory whose contents are kept across different program executions. In the blockchain technology, storage contents are replicated and incur the largest costs of a program’s execution (a.k.a. gas fees). Storage costs are ...
- research-articleMay 2024
Machine Learning Algorithms to Detect Illicit Accounts on Ethereum Blockchain
ICFNDS '23: Proceedings of the 7th International Conference on Future Networks and Distributed SystemsPages 747–752https://doi.org/10.1145/3644713.3644838The rapid growth and psudonomity inherent in blockchain technology such as in Bitcoin and Ethereum has marred its original intent to reduce dependant on centralised system, but created an avenue for illicit activities, including fraud, phishing, scams, ...
- ArticleMarch 2024
Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems
Algorithms and Architectures for Parallel ProcessingPages 292–310https://doi.org/10.1007/978-981-97-0801-7_17AbstractPublic auditing mechanism can delegate a third-party auditor (TPA) to check the remote data integrity on behalf of data owners. However, the TPA, as an idealized and benefit-oriented entity, may not provide correct auditing results on time. To ...
-
- ArticleNovember 2023
Tikuna: An Ethereum Blockchain Network Security Monitoring System
Information Security Practice and ExperiencePages 462–476https://doi.org/10.1007/978-981-99-7032-2_27AbstractBlockchain security is becoming increasingly relevant in today’s cyberspace as it extends its influence in many industries. This paper focuses on protecting the lowest level layer in the blockchain, particularly the P2P network that allows the ...
- research-articleJuly 2023
Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 140, Issue Chttps://doi.org/10.1016/j.sysarc.2023.102898AbstractDue to the sharp increase in industrial data, cloud computing has been integrated into intelligent Industrial Internet of Things systems to store and process massive data. Since core data are key factors in the industrial production ...
- research-articleJune 2023
ReSuMo: a regression strategy and tool for mutation testing of solidity smart contracts
Software Quality Journal (KLU-SQJO), Volume 32, Issue 1Pages 225–253https://doi.org/10.1007/s11219-023-09637-1AbstractMutation testing is a powerful test adequacy assessment technique that can guarantee the deployment of deeply scrutinized and more reliable Smart Contract code. However, regularly evaluating the test suite during the evolution of a project can be ...
- research-articleJune 2023
Generative Adversarial Networks for Cyber Threat Hunting in Ethereum Blockchain
Distributed Ledger Technologies: Research and Practice (DLT), Volume 2, Issue 2Article No.: 9, Pages 1–19https://doi.org/10.1145/3584666Ethereum blockchain has shown great potential in providing the next generation of the decentralized platform beyond crypto payments. Recently, it has attracted researchers and industry players to experiment with developing various Web3 applications for ...
- research-articleDecember 2022
User authentication of industrial internet of things (IIoT) through Blockchain
Multimedia Tools and Applications (MTAA), Volume 82, Issue 12Pages 19021–19039https://doi.org/10.1007/s11042-022-14154-7AbstractThe Industrial IoT is starting an enormous advancement occasion in the industrial epoch. Data security as well as privacy becomes a challenge in almost every field in the real life for the duration of monitoring and collection of data in ...
- research-articleDecember 2022
Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computing
Journal of Information Security and Applications (JISA), Volume 71, Issue Chttps://doi.org/10.1016/j.jisa.2022.103353AbstractRational miners in the blockchain may admit the validity of search results directly to conserve calculation overhead without executing the validation. Such phenomenon is known as the Verifier's Dilemma that the search results of the blockchain-...
- research-articleNovember 2022
MANDO-GURU: vulnerability detection for smart contract source code by heterogeneous graph embeddings
ESEC/FSE 2022: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1736–1740https://doi.org/10.1145/3540250.3558927Smart contracts are increasingly used with blockchain systems for high-value applications. It is highly desired to ensure the quality of smart contract source code before they are deployed. This paper proposes a new deep learning-based tool, MANDO-GURU, ...
- research-articleOctober 2022
Multi-level caching and data verification based on ethereum blockchain
AbstractEthereum realizes the application of programs on the blockchain through smart contracts and the peer-to-peer transmission of nodes through consensus mechanisms. In this paper, through smart contracts, cache nodes and three-level cache mechanism ...
- research-articleOctober 2022
Blockchain for record-keeping and data verifying: proof of concept
- Razatulshima Ghazali,
- Faizura Haneem Mohamed Ali,
- Hussin Abu Bakar,
- Mohammad Nazir Ahmad,
- Nazleeni Samiha Haron,
- Abdullah Hisam Omar,
- Ali Ahmadian
Multimedia Tools and Applications (MTAA), Volume 81, Issue 25Pages 36587–36605https://doi.org/10.1007/s11042-021-11336-7AbstractThe paper aims to show how blockchain, particularly Ethereum private blockchain, performs as a record keeper for Malaysian Muslim marriage records as a case study. The study also aims to demonstrate how blockchain technology conserves marriage ...
- ArticleDecember 2020
An Insecurity Study of Ethereum Smart Contracts
Security, Privacy, and Applied Cryptography EngineeringPages 188–207https://doi.org/10.1007/978-3-030-66626-2_10AbstractEthereum is the second most valuable cryptocurrency, right after Bitcoin. The most distinguishing feature of Ethereum was the introduction of smart contracts which are essentially small computer programs that sit on top of the blockchain. They are ...
- ArticleDecember 2020
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors
AbstractPublic integrity auditing enables a user to delegate a third-party auditor (TPA) to periodically audit the integrity of the outsourced data. Whereas, the security of public auditing schemes relies on the trustworthiness of TPA: once TPA misbehaves,...
- ArticleNovember 2020
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network
AbstractEthereum is one of the largest blockchain networks in the world. Its feature of smart contracts is unique among the other crypto-currencies and gained wider attention. However, smart contracts are vulnerable to attacks and financial fraud within ...
- ArticleOctober 2020
Robust Blockchain-Based Cross-Platform Audio Copyright Protection System Using Content-Based Fingerprint
Web Information Systems Engineering – WISE 2020Pages 201–212https://doi.org/10.1007/978-3-030-62008-0_14AbstractCopyright infringement is a serious problem in the digital media industry. The traditional watermarking methods can neither protect copyright against attacks, especially the de-synchronization attacks, nor achieve cross-platform copyright ...
- research-articleNovember 2019
Utilization of blockchain for mitigating the distributed denial of service attacks
AbstractDistributed Denial of Service (DDoS) attacks cause devastating effects on the web services and hence harm the digital availability. The DDoS attackers use vulnerabilities exposed through new networking technologies like wireless, mobile, IoT, ...
- short-paperJuly 2019
SAFEVM: a safety verifier for Ethereum smart contracts
ISSTA 2019: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 386–389https://doi.org/10.1145/3293882.3338999Ethereum smart contracts are public, immutable and distributed and, as such, they are prone to vulnerabilities sourcing from programming mistakes of developers. This paper presents SAFEVM, a verification tool for Ethereum smart contracts that makes use ...