Computer
Mohanad A. Mohammed; Hala B. Abdul Wahab
Abstract
decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and ...
Read More ...
decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and outcomes from this conversion. An encryption scheme homomorphic technique (HE) is a method that encrypts the cipher data without the need to decrypt it,paillier encryption method is used. This paper aims to propose a system that integrates Paillier cryptosystem homomorphic technology with IoT and lightweight blockchain technology to provide decentralization to the IoT environment and improve security. The proposed system results in improving the IoT device’s work environment by solving the main challenges of security using blockchain, privacy using homomorphism, and data volume using blockchain. The data set used to implement and evaluate the proposed system is industrial internet of things data The dataset used in this paper is generated via machine industry 4.0 Storage System status which represents the system failure and work status. this system is evaluated using standard metrics used to evaluate the blockchain effectiveness and time, resources consumed and shows better results in time and power consumption.
Computer
Safa S. Abdul-Jabbar; Alaa K. Farhan; Rana F. Ghani
Abstract
Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships ...
Read More ...
Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and exploring how specific features of this new technology may transform traditional business methods. The primary objectives of this study are to summarize the significant Blockchain techniques used thus far, identify current challenges and barriers in this field, determine the limitations of each paper that could be used for future development, and assess the extent to which Blockchain and data analytics have been effectively used to evaluate performance objectively. Moreover, we aim to identify potential future research paths and suggest new criteria in this burgeoning discipline through our review.
Computer
Zainab A. Kamal; Rana F. Ghani
Abstract
the primary concerns with manual transactions include corruption, lack oftransparency, fraud, and mismanagement of distribution operations, all of which arecreated by traditional centralized applications, necessitating the migration to blockchaintechnology. In this work, a system is presented to secure ...
Read More ...
the primary concerns with manual transactions include corruption, lack oftransparency, fraud, and mismanagement of distribution operations, all of which arecreated by traditional centralized applications, necessitating the migration to blockchaintechnology. In this work, a system is presented to secure and monitor correspondencebetween several nodes and store it in a decentralized database in order to securedistributed ledger transactions and safeguard against fraud and tampering whentransactions are shared by multiple parties. The hashing that blockchain technologydelivers in each transaction ensures a high level of security. The hashing associated witheach transaction confirms all sending and receiving transactions. When a transaction issent from one node to another, the other node checks the hash accompanying thetransaction to see if it came from a registered node or an external node. Within theblockchain system, the nodes will check transaction correspondences. The system hasdemonstrated its effectiveness by delivering a more secure messaging system with highcredibility and tamper resistance. In addition, the time it takes to authenticate will be inreal time.
Iman Mohammed Hasan; Rana Fareed Ghani
Abstract
Today's insurance industry plays a significant role in a variety of fields, particularly in health insurance. As IoT technology advances, health insurers in IoT networks can obtain real-time medical data for individuals and issue individual insurance policies based on a person's lifestyle. However, sharing ...
Read More ...
Today's insurance industry plays a significant role in a variety of fields, particularly in health insurance. As IoT technology advances, health insurers in IoT networks can obtain real-time medical data for individuals and issue individual insurance policies based on a person's lifestyle. However, sharing personal data requires a guarantee of privacy and security. This paper suggests a Blockchain technology to solve this problem. The work presents a novel framework that integrates health insurers, IoT-based networks, and Blockchain technology to implement access control protocol using a smart contract for sharing the financial premium of insureds with the stakeholders as non-participants/authorized parties. The evaluation of the proposal results in authorized access within less time compared to traditional data-sharing systems, and the security analysis shows that proposal can protect data from potential threats.