Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3384943.3409424acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Security Control Components for Epidemic Prevention Donation Management Blockchain

Published: 06 October 2020 Publication History
  • Get Citation Alerts
  • Abstract

    After the outbreak of the new coronavirus pneumonia, it has been broadcasting soon. Medical supplies are out of used. Chinese people have provided medical supplies and raised donations to help Hubei Province, China. While, Red Cross Society of Hubei Branch and Wuhan Branch were suspected for unfair distribution of donated materials, the backlog of donated items, and inefficient assignment. These problems exposed public welfare organizations to the public sights. For information sharing, Jiangsu Province developed a new COVID-19 Donation Management Blockchain System (CDMBS). The system improves the transparency and credibility of donation information with the blockchain. Based on the overall architecture of Jiangsu's new coronavirus charity donation management blockchain, this paper designs various types of security control components. The components include the middleware for secure connection to protect the user certificate security. We designed CA certificate user management middleware to realize more secure registration and query functions for users with extended attributes. There is also a blockchain query middle with access control Software to ensure that important blockchain information is viewed securely. Experiments have verified the effectiveness and applicability of these security control components. It can be applied into a variety of scenarios in the CDMBS.

    References

    [1]
    Chao Xue, Chuang Lin, and Jie Hu. Scalability Analysis of Request Scheduling in Cloud Computing. TSINGHUA SCIENCE AND TECHNOLOGY, 24(3): 249--261, 2019.
    [2]
    Dian Shen, Junzhou Luo, Fang Dong, and Junxue Zhang. VirtCO: Joint Coflow Scheduling and Virtual Machine Placement in Cloud Data Centers. TSINGHUA SCIENCE AND TECHNOLOGY, 24(5): 630--644, 2019.
    [3]
    Lianyong Qi, Xuyun Zhang, Wanchun Dou, Chunhua Hu, Chi Yang, Jinjun Chen. A Two-stage Locality-Sensitive Hashing Based Approach for Privacy-Preserving Mobile Service Recommendation in Cross-Platform Edge Environment. Future Generation Computer Systems, 88: 636--643, 2018.
    [4]
    Phu Lai, Qiang He, Guangming Cui, Xiaoyu Xia, Mohamed Abdelrazek, Feifei Chen, John Hosking, John Grundy, and Yun Yang, Edge User Allocation with Dynamic Quality of Service, 17th International Conference on Service-Oriented Computing (ICSOC2019), Toulouse, France, 2019.
    [5]
    Xiaolong Xu, Xuyun Zhang, Maqbool Khan, Wanchun Dou, Shengjun Xue, Shui Yu. A Balanced Virtual Machine Scheduling Method for Energy-Performance Trade-offs in Cyber-Physical Cloud Systems. Future Generation Computer Systems, vol. 105, pp. 789--799, 2020.
    [6]
    Xiaolong Xu, Ruichao Mo, Fei Dai, Wenmin Lin, Shaohua Wan, Wanchun Dou. Dynamic Resource Provisioning with Fault Tolerance for Data-Intensive Meteorological Workflows in Cloud. IEEE Transactions on Industrial Informatics, 2019.
    [7]
    Qiang He, Rui Zhou, Xuyun Zhang, Yanchun Wang, Dayong Ye, Feifei Chen, John Grundy, Yun Yang, Keyword Search for Building Service-Based Systems, IEEE Transactions on Software Engineering (TSE), Vol. 43(7), pp. 658--674, 2017.
    [8]
    Xiaolong Xu, Xuyun Zhang, Maqbool Khan, Wanchun Dou, Shengjun Xue, Shui Yu. A Balanced Virtual Machine Scheduling Method for Energy-Performance Trade-offs in Cyber-Physical Cloud Systems. Future Generation Computer Systems, vol. 105, pp. 789--799, 2020.
    [9]
    Lianyong Qi, Xuyun Zhang, Wanchun Dou and Qiang Ni. A Distributed Locality-Sensitive Hashing based Approach for Cloud Service Recommendation from Multi-Source Data. IEEE Journal on Selected Areas in Communications, 35(11): 2616--2624, 2017.
    [10]
    Xiaolong Xu, Xihua Liu, Zhanyang Xu, Chuanjian Wang, Shaohua Wan, Xiaoxian Yang. Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks. Mobile Networks and Applications, 2019.
    [11]
    Hanwen Liu, Huaizhen Kou, Chao Yan, Lianyong Qi. Link prediction in Paper Citation Network to Construct Paper Correlated Graph. EURASIP Journal on Wireless Communications and Networking, 2019.
    [12]
    Dawid Poap and Marcin Wozniak. Voice Recognition by Neuro-Heuristic Method. TSINGHUA SCIENCE AND TECHNOLOGY, 24(1): 9--17, 2019.
    [13]
    Wenwen Gong, Lianyong Qi, Yanwei Xu. Privacy-aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment. Wireless Communications and Mobile Computing, vol. 2018, Article ID 3075849, 8 pages, 2018.
    [14]
    Xiaoxiao Chi, Chao Yan, Hao Wang, Wajid Rafique, Lianyong Qi. Amplified LSH-based Recommender Systems with Privacy Protection. Concurrency and Computation: Practice and Experience, 2020.
    [15]
    Lianyong Qi, Wanchun Dou, Wenping Wang, Guangshun Li, Hairong Yu, Shaohua Wan. Dynamic Mobile Crowdsourcing Selection for Electricity Load Forecasting. IEEE ACCESS, 6: 46926--46937, 2018.
    [16]
    Ivanaj, S., Nganmini, G. B., and Antoine, A. 2019. "Measuring E-Learners' Perceptions of Service Quality," Journal of Organizational and End User Computing (31:2), pp. 83--104.
    [17]
    Kim, H. 2019. "Investigating the Mediating Role of Social Networking Service Usage on the Big Five Personality Traits and on the Job Satisfaction of Korean Workers," Journal of Organizational and End User Computing (31:1), pp. 110--123.
    [18]
    Chang, K. C., and Seow, Y. M. 2019. "Protective Measures and Security Policy Non-Compliance Intention: It Vision Conflict as a Moderator," Journal of Organizational and End User Computing (31:1), pp. 1--21.
    [19]
    Qiang He, Jun Han, Feifei Chen, Yanchun Wang, Rajesh Vasa, Yun Yang, Hai Jin, QoS-Aware Service Selection for Customisable Multi-Tenant Service-Based Systems: Maturity and Approaches, International Conference on Cloud Computing (CLOUD2015), pp. 237--244, New York, USA, 2015.
    [20]
    Yanchun Wang, Qiang He, Dayong Ye, Yun Yang, Formulating Criticality-Based Cost-Effective Fault Tolerance Strategies for Multi-Tenant Service-Based Systems, IEEE Transactions on Software Engineering (TSE), Vol. 44(3), pp. 291--307, 2018.
    [21]
    J Hou, Q. Li, R. Tan, S. Meng, H. Zhang and S. Zhang, "An Intrusion Tracking Watermarking Scheme," in IEEE Access, vol. 7, pp. 141438--141455, 2019.
    [22]
    Qianmu Li, Yinhai Wang, Ziyuan Pu, Shuo Wang, Weibin Zhang (2019) A Time Series Association State Analysis Method in Smart Internet of Electric Vehicle Charging Network Attack. Transportation Research Record, vol. 2673, pp. 217--228.
    [23]
    Qianmu Li, Shunmei Meng, Sainan Zhang, Ming Wu, Jing Zhang, Milad Taleby Ahvanooey2 and Muhammad Shamrooz Aslam (2019) Safety Risk Monitoring of Cyber-Physical Power Systems Based on Ensemble Learning Algorithm. IEEE Access, Vol.7, pp. 24788--24805.
    [24]
    Ahmed Raza Rajput, Qianmu Li, Milad Taleby Ahvanooey, Isma Masood. EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain. IEEE Access 7: 84304--84317 (2019)
    [25]
    Abigail Akosua Addobea, Jun Hou, Qianmu Li. MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices. vol.2020, Article ID 7085623. 12 pages. https://doi.org/10.1155/2020/7085623
    [26]
    Qianmu Li, Shunmei Meng, Shuo Wang, Jing Zhang and Jun Hou (2019) CAD?Command-level Anomaly Detection for Vehicle-Road Collaborative Charging Network. IEEE Access, Vo.7, pp. 34910--34924.
    [27]
    Qianmu Li, Shunmei Meng, Sainan Zhang, Jun Hou, Lianyong Qi (2019) Complex Attack Linkage Decision-Making in Edge Computing Networks. IEEE Access, Vo. 7, pp. 12058 -- 12072.
    [28]
    J. Hou, Q. Li, S. Meng, Z. Ni, Y. Chen and Y. Liu, "DPRF: A Differential Privacy Protection Random Forest," in IEEE Access, vol. 7, pp. 130707--130720, 2019.
    [29]
    Hou, J., Li, Q., Cui, S. et al. low-cohesion differential privacy protection for industrial Internet. J Supercomputing (2020). vol. 7, pp. 1--23, https://doi.org/10.1007/s11227-019-03122-y
    [30]
    Gai, Keke, et al. "Differential Privacy-Based Blockchain for Industrial Internet-of-Things." IEEE Transactions on Industrial Informatics 16.6 (2019): 4156--4165.
    [31]
    Gai, Keke, et al. "Privacy-preserving energy trading using consortium blockchain in smart grid." IEEE Transactions on Industrial Informatics 15.6 (2019): 3548--3558.
    [32]
    Gai, Keke, et al. "Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks." IEEE Internet of Things Journal 6.5 (2019): 7992--8004.

    Cited By

    View all
    • (2022)A Comprehensive Review of the Technological Solutions to Analyse the Effects of Pandemic Outbreak on Human LivesMedicina10.3390/medicina5802031158:2(311)Online publication date: 18-Feb-2022
    • (2022)A Blockchain-based Material Donation Platform2022 International Conference on Blockchain Technology and Information Security (ICBCTIS)10.1109/ICBCTIS55569.2022.00061(246-254)Online publication date: Jul-2022
    • (2021)Applications of Technological Solutions in Primary Ways of Preventing Transmission of Respiratory Infectious Diseases—A Systematic Literature ReviewInternational Journal of Environmental Research and Public Health10.3390/ijerph18201076518:20(10765)Online publication date: 14-Oct-2021
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure
    October 2020
    223 pages
    ISBN:9781450376105
    DOI:10.1145/3384943
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 October 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blockchain
    2. network management
    3. network security services
    4. security control

    Qualifiers

    • Research-article

    Funding Sources

    • The 4th project Research on the Key Technology of Endogenous Security Switches
    • 2018 Jiangsu Province Major Technical Research Project Information Security Simulation System?
    • Fundamental Research Funds for the Central Universities
    • the 2020 Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of China

    Conference

    ASIA CCS '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 44 of 12 submissions, 367%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)27
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Comprehensive Review of the Technological Solutions to Analyse the Effects of Pandemic Outbreak on Human LivesMedicina10.3390/medicina5802031158:2(311)Online publication date: 18-Feb-2022
    • (2022)A Blockchain-based Material Donation Platform2022 International Conference on Blockchain Technology and Information Security (ICBCTIS)10.1109/ICBCTIS55569.2022.00061(246-254)Online publication date: Jul-2022
    • (2021)Applications of Technological Solutions in Primary Ways of Preventing Transmission of Respiratory Infectious Diseases—A Systematic Literature ReviewInternational Journal of Environmental Research and Public Health10.3390/ijerph18201076518:20(10765)Online publication date: 14-Oct-2021
    • (2021)Secure COVID-19 Treatment with Blockchain and IoT-Based FrameworkIntelligent Sustainable Systems10.1007/978-981-16-6369-7_70(785-800)Online publication date: 17-Dec-2021
    • (undefined)Mapping Distributed Ledger Technology Characteristics to Use Cases in Healthcare: A Structured Literature ReviewACM Transactions on Computing for Healthcare10.1145/3653076

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media