Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
A blockchain is a growing list of records, called blocks, that are linked using cryptography. Blockchain private and public keys are stored in a cryptocurrency wallet, but not the actual currency values. Wallets provide customers with the... more
A blockchain is a growing list of records, called blocks, that are linked using cryptography. Blockchain private and public keys are stored in a cryptocurrency wallet, but not the actual currency values. Wallets provide customers with the ability to send and receive virtual currency / tokens and tune their balance through interaction with blockchains. Multi-currency wallets may be broken down into 3 categories: software, hardware, and paper. Software wallets are web, mobile and desktop. Growing penetration of blockchain in many industries makes one to understand wallets in detail. There are a variety of wallet kinds to pick out from. This paper focuses on multi-currency wallets review exploring on features like supported currencies, anonymity, cost, platform support, key management, wallet recovery methods and fiat currencies supported.
Sharding is one of the most prominent concepts which involves the division of the network into shards for concurrent processing of transactions. Different sharding protocols are being implemented in blockchains to enhance its scalability.... more
Sharding is one of the most prominent concepts which involves the division of the network into shards for concurrent processing of transactions. Different sharding protocols are being implemented in blockchains to enhance its scalability. The existing blockchain systems create shards using proof-of-work consensus protocol. This research aims at developing a machine learning-based sharding process that uses the nodes’ geographical locations—latitudes and longitudes. IP addresses of the nodes are mapped to geographical coordinates, and these coordinates are then divided into shards using a suitable clustering algorithm. The nodes in the shards are geographically closer, thereby reducing the propagation delay in the network during intra-shard communication. GeoSharding has been tested to be significantly faster as compared to PoW-based sharding. This optimizes the network sharding process, thus escalating the scalability to a new level.
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency... more
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, central, or federated identity management models. In this exploratory work, the authors employ qualitative secondary case-based study research methodology to understand the challenges of the current digital identity management landscape and explore the possible benefits of DID as an emerging identity management paradigm. They propose a conceptual cube framework for analysing and studying various DID ...
Indian sign language (ISL) is one of the most used sign languages in the Indian subcontinent. This research aims at developing a simple Indian sign language recognition system based on convolutional neural network (CNN). The proposed... more
Indian sign language (ISL) is one of the most used sign languages in the Indian subcontinent. This research aims at developing a simple Indian sign language recognition system based on convolutional neural network (CNN). The proposed system needs webcam and laptop and hence can be used anywhere. CNN is used for image classification. Scale invariant feature transformation (SIFT) is hybridized with adaptive thresholding and Gaussian blur image smoothing for feature extraction. Due to unavailability of ISL dataset, a dataset of 5000 images, 100 images each for 50 gestures, has been created. The system is implemented and tested using python-based library Keras. The proposed CNN with hybrid SIFT implementation achieves 92.78% accuracy, whereas the accuracy of 91.84% was achieved for CNN with adaptive thresholding.
Audit logs serve as a crucial constituent for every organization that has a digital presence and are used to audit, store, and track modifications made to the data for efficient business intelligence. However, the audit logs are... more
Audit logs serve as a crucial constituent for every organization that has a digital presence and are used to audit, store, and track modifications made to the data for efficient business intelligence. However, the audit logs are unfortified to attacks that delegate the adversaries to alter data and corresponding audit logs without being disclosed. Two prominent attacks are the authorized access attack, in which the admin privileges are exploited to destabilize the system and the online attack, in which the known techniques like SQL injection is used, that tinkers the databases and hence requires detection. This paper presents BlockAudit: An extensible and tamper-proof system that provides fundamental designing features of audit logs and immutable properties of blockchain that facilitates having a secured and reliable audit log. Towards this, we implement our design schema for BlockAudit and outline its utility and operative procedures. The design is accomplished on a custom-built Proof-of-Authority blockchain and we analyze its performance using various factors like transaction rate, network size, latency, and payload size. Results reveal that typical audit logs can seamlessly transition into BlockAudit to attain more powerful security and safeguard against the investigated attacks on audit logs.
The advent of blockchain technology has expanded the horizon of many use cases. However, the supply chain industry has still not realized its full potential as the legacy Enterprise Resource Planning (ERP) systems and blockchain are not... more
The advent of blockchain technology has expanded the horizon of many use cases. However, the supply chain industry has still not realized its full potential as the legacy Enterprise Resource Planning (ERP) systems and blockchain are not interoperable. Currently, organizations are running on entirely different governance rules and blockchain versions. Knowledge of every entity involved in the supply chain is limited to their adjacent entities. Thus, a series of disconnected blockchain operates in an isolated ecosystem hindering the industry's growth. The paper's main objective is the implication of blockchain technology in the supply chain industry to accomplish traceability, privacy, transparency, immutability, data standardization, resource optimization, and efficiency. We plan to develop a high-fidelity prototype for end-to-end modeling between ERPs and blockchain. A two-stage architecture is proposed to achieve a balance between privacy and transparency. The business negotiations between two ERPs are automated by off-chain order relay and on-chain settlement. A signing algorithm makes proposal sending through ERP software tamper-proof. The solution for achieving interoperability can be independent of ERP by adding a plug-in module to ERP seamlessly communicating with the blockchain.
With the advent of blockchain, the trustless transactions between cross-border parties becomes easy. The profusion of eclectic tokens coming into the cryptocurrency world, one primary requirement is to enable robust and secure exchange... more
With the advent of blockchain, the trustless transactions between cross-border parties becomes easy. The profusion of eclectic tokens coming into the cryptocurrency world, one primary requirement is to enable robust and secure exchange between different varieties of tokens. With the rise of ICOs into the cryptocurrency market, the funding of research-based projects has become meteoric in nature. The dearth of knowledge about these different varieties of tokens is blocking amateur developers to unlock the true potential of the blockchain technology. There are myriad tokens, which are either fungible or non-fungible tokens that are used to represent different types of assets and research projects. This paper mainly focuses to provide an overview of tokens and comparative analysis for token standards available in the present cryptocurrency world.
Nowadays, with the advancement in information technology, great progress is seen in the healthcare domain. However, such advancement has also made healthcare data not only much bigger but also much more difficult to handle. Also, the data... more
Nowadays, with the advancement in information technology, great progress is seen in the healthcare domain. However, such advancement has also made healthcare data not only much bigger but also much more difficult to handle. Also, the data generated is in different formats and to access such largely scattered data is merely impossible. Health care today suffers from fragmented data, delayed communications, and disparate workflow tools caused by the lack of interoperability. Blockchain technology possesses key properties that can potentially address pressing issues in health care such as incomplete records at the time of care and difficult access to patients’ health information in a secure manner. The proposed solution emphasizes on solving a current problem of storing the largely scattered healthcare information in a decentralized fashion and allowing the access of data by the authorized persons only. This application manages authentication, confidentiality, accountability, and data sharing while handling sensitive health information.
A blockchain is a growing list of records, called blocks, that are linked using cryptography. Blockchain private and public keys are stored in a cryptocurrency wallet, but not the actual currency values. Wallets provide customers with the... more
A blockchain is a growing list of records, called blocks, that are linked using cryptography. Blockchain private and public keys are stored in a cryptocurrency wallet, but not the actual currency values. Wallets provide customers with the ability to send and receive virtual currency / tokens and tune their balance through interaction with blockchains. Multi-currency wallets may be broken down into 3 categories: software, hardware, and paper. Software wallets are web, mobile and desktop. Growing penetration of blockchain in many industries makes one to understand wallets in detail. There are a variety of wallet kinds to pick out from. This paper focuses on multi-currency wallets review exploring on features like supported currencies, anonymity, cost, platform support, key management, wallet recovery methods and fiat currencies supported.
With buses being a primary mode of transport for the common man, it is imperative that the bus transportation system works with optimal efficiency with respect to its resources. In Mumbai, there are 3600 buses running over 422 routes,... more
With buses being a primary mode of transport for the common man, it is imperative that the bus transportation system works with optimal efficiency with respect to its resources. In Mumbai, there are 3600 buses running over 422 routes, managed by Brihanmumbai Electric Supply and Transport (BEST) and carrying millions of citizens every day. The fleet distribution is currently updated every four months manually by BEST officers. As a result, scheduling and allocating solution of BEST is time consuming, error prone and inconsistent. The shortcomings of current approaches include the highly dynamic nature of traffic, consideration of infinite bus capacity and redefining routes completely. As the variation in the data over the short term weekly cycles is difficult to fit using linear and polynomial regression models, we find it unsuitable for our problem. Other regression models suffer from the lack of availability of attribute values for the next day to generate trip forecasts. Hence, we...
Visual Cryptography eventually focused on a technique encryption and decryption of either text or images. This paper gives the brief idea of cryptography and watermarking on images. For that the new term Progressive Visual Cryptography... more
Visual Cryptography eventually focused on a technique encryption and decryption of either text or images. This paper gives the brief idea of cryptography and watermarking on images. For that the new term Progressive Visual Cryptography (PVC) comes in which we create n number of shares of a secret image. Progressive Visual Cryptography (PVC) means progressively recover the secret image by superimposing the n shares of particular secret image. We have the scheme structure given below for making n shares of any secret image. This scheme structure possibly gives sharing matrices which gives the idea about how secret image can distribute among n shares. The scheme structure implemented in matlab. With the help of determination of various types of pixels the watermark embedding technique is implemented in this paper after finding the prediction error using those pixels. This technique is also implemented in matlab for both grayscale and color images.
Blockchain is one of the most promising technologies of the future. But till date, it is mostly used for transactions that involve mostly cryptocurrencies. To expand the scope of blockchain beyond cryptocurrency, it is really important to... more
Blockchain is one of the most promising technologies of the future. But till date, it is mostly used for transactions that involve mostly cryptocurrencies. To expand the scope of blockchain beyond cryptocurrency, it is really important to rethink the structure of existing blockchain architecture. One of the major factors which hold blockchain back from being an option to host real-world applications is its lack of Scalability. This paper presents the solution to scale blockchain using the concept of Autonomous Sidechains based on the Plasma framework. Instead of forcing the implementation of all transactions to the mainchain, we propose to create a new sidechain for every decentralized application. The sidechains created are autonomous with respect to each other, with mainchain acting as a backbone of the entire network. This concept increases the scalability of the blockchain by increasing the number of transactions network can process at a time.
With the flooding of a large variety of isolated blockchain solutions into the technological world, one major challenge is to enable efficient interoperable interchain and intrachain exchanges. The dearth of inter-operating among these... more
With the flooding of a large variety of isolated blockchain solutions into the technological world, one major challenge is to enable efficient interoperable interchain and intrachain exchanges. The dearth of inter-operating among these eclectic tokens is hindering the profits that can be earned by potential investors. The myriads of tokens that are flooding into the blockchain ecosystem need to interoperate amongst each other. This paper proposes a mechanism to provide better atomic intrachain token swaps. Our blockchain solution can assist the exchange of these eclectic heterogeneous tokens securely, using digital signatures and hashed time lock contracts, which reduces the problem of interoperability. This paper presents a solution which is token standard agnostic and provides effective intrinsic smart contracts facilitating token exchange and thus reducing the counterparty risk.
With forensics playing such a crucial role in today's data-driven world, this paper addresses the need to explore the different mobile device forensic tools available. Open Source and Commercial tools are two domains in close... more
With forensics playing such a crucial role in today's data-driven world, this paper addresses the need to explore the different mobile device forensic tools available. Open Source and Commercial tools are two domains in close contention, with contrasting considerations such as accessibility and security. This paper aims at performing a comparative analysis of the various commercial and open source mobile device forensic tools, with respect to predefined software parameters and by employing a cross-device and test-driven approach. The test scenarios are structured to assess whether the selected tools possess the capabilities of a holistic one, while responding to threats and scenarios pertaining to the digital realm. The Commercial Tools under consideration are MOBILedit! Forensic (including Phone Forensics Express) and Cellebrite's UFED Physical Analyzer, while the Open Source Tools are — The Sleuth Kit (including Autopsy) and SANS SIFT. The result of this paper is a comparison matrix, which could help in identifying the best-fit solution as per the need of the investigation. It could also indicate the degree to which open source tools are comparable to (or better than) their commercial counterparts, and answer questions like — Can open source tools be a suitable replacement for the proprietary tools? Can this in reality, be a feasible shift for the forensic industry?
Parallel systems have potentially exponential number of execution interleaving sequences. Each execution interleaving sequence can be used as a test scenario to evaluate the correctness of the system. Both the exponential interleaving... more
Parallel systems have potentially exponential number of execution interleaving sequences. Each execution interleaving sequence can be used as a test scenario to evaluate the correctness of the system. Both the exponential interleaving space and non-deterministic execution make testing concurrent systems a challenging task. Concurrency errors are classified as synchronization, data-race, data inconsistency, starvation, and deadlock. A good test suite must have test scenarios that uncover above all classes of errors. Selecting test scenarios to uncover above errors needs a systematic analysis of test scenarios to classify them into one of concurrency behaviors. In this paper, we propose an approach to analyze test scenarios from UML models using a state-based classifier. First, we present an extension to UML models to represent data access-tags, which help generating data-access traces. Then, we generate test scenarios from extended UML models using existing test scenario generation techniques. After that, we analyze test scenarios using enhanced state machine diagram (ESMD) classifier for concurrency behaviors, like sequentilization, synchronization, blocking, and non-blocking scenarios. Experimental results show ESMD classifier classifies test scenario accurately thereby helping to design test suite for concurrency testing. Selected test scenarios achieve better concurrency behavior coverage and avoid false test scenarios.
In software engineering, system modeling is the process of formulating a representation of a real system in an abstract way to understand its behavior. Software testing encourages reusing these models for testing purpose. This expedites... more
In software engineering, system modeling is the process of formulating a representation of a real system in an abstract way to understand its behavior. Software testing encourages reusing these models for testing purpose. This expedites the process of test case generation. UML structural and behavioral specification diagrams have been used by testing researchers for generation of test scenarios and test data. The aim of this survey is to improve the understanding of UML based testing techniques. We have focused on test case generation from the behavioral specification diagrams, namely sequence, state chart and activity diagrams. We classify the various research approaches that are based on formal specifications, graph theoretic, heuristic testing, and direct UML specification processing. We discuss the issues of test coverage associated with these approaches.
The recent escalation of individual, independent blockchain networks has engendered the need for a robust solution to communication between the various token networks. The solution must conform to industry standards and must be... more
The recent escalation of individual, independent blockchain networks has engendered the need for a robust solution to communication between the various token networks. The solution must conform to industry standards and must be universally endorsed. This research paper explores various studies and implementations conducted under the topic of interoperability between different blockchain networks. Discovering various aspects of a blockchain system, comparing existing solutions and proposing a solution for communication between any two token blockchain networks are the steps effectuated. The proposed solution allows for a secure transfer of tokens between homogeneous blockchains using the concept of hash time locked contracts. Involving a self-enlisted middleman in the transaction eliminates the need for an external interface or a centralised authority for transaction, and reinforces trust. As a result, a safe and reliable transfer of tokens without the involvement of a centralised third party takes place. The solution warrants a mass adoption for further testing, however, it executes in a stable environment between two homogeneous token blockchain networks.
This paper presents a hybrid approach of generating test cases using sequence diagram with genetic algorithm. Sequence diagram shows the method call dependencies that exist among the methods that potentially appear in a method call... more
This paper presents a hybrid approach of generating test cases using sequence diagram with genetic algorithm. Sequence diagram shows the method call dependencies that exist among the methods that potentially appear in a method call sequence, which is good for integration testing. In this work, we use genetic algorithm to generate interclass method sequences using the sequence diagram. Main focus of the work is to exploit sequence diagram using genetic algorithm to search method sequences leading to usable behavior in application domain. Method sequences generated by this approach are used to generate test cases for dynamic execution. The test cases are generated for integration level testing. This results in a model based testing technique for object oriented software. Experimental results show that a test case covers major scenarios leading to both valid and invalid flows of a given scenario. Test cases generated using genetic algorithm improves the method coverage as well as exception coverage as shown in the result.
... An activity diagram is transformed into intermedi-ate model as an extended control flow graph (ECFG), which is used to generate test cases and test data. ... In our approach we have used ECFG as an intermediate representation. ...
Abstract An UML statechart diagram is used to model the dynamic aspects of object oriented software systems. A Finite State Machine (FSM) and an Extended Finite State Machine (EFSM) are commonly used for Model Based-Testing (MBT). A test... more
Abstract An UML statechart diagram is used to model the dynamic aspects of object oriented software systems. A Finite State Machine (FSM) and an Extended Finite State Machine (EFSM) are commonly used for Model Based-Testing (MBT). A test case generation from ...
ABSTRACT Concurrent programming is increasingly being used in many applications with the advent of multi-cores. The necessary support for execution of multi-threading is getting richer. Notwithstanding, a concurrent program may behave... more
ABSTRACT Concurrent programming is increasingly being used in many applications with the advent of multi-cores. The necessary support for execution of multi-threading is getting richer. Notwithstanding, a concurrent program may behave nondeterministically, it may result in different outputs with the same input in different runs. The aim of this study is to generate test sequences for concurrency from unified modelling language (UML) behavioral models such as sequence and activity diagrams. Generating exhaustive test cases for all concurrent interleaving sequences is exponential in size. Therefore, it is necessary to find adequate test cases in presence of concurrency to uncover errors due to, e.g., data race, synchronization and deadlocks. In order to generate adequate test cases a novel search algorithm, which we call concurrent queue search (CQS) is proposed. The CQS handles random nature of concurrent tasks. To generate test scenarios, a sequence diagram is converted into an activity diagram. An activity diagram encapsulates sequential, conditional, iterative and concurrent ows of the control. By the experimental results, it was observed that test sequences generated by CQS algorithm are superior as compared to DFS and BFS search algorithms.