2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)最新文献

筛选
英文 中文
Taxonomy and Universal Success Parameters of Token Models in Distributed Ledger Systems 分布式账本系统中令牌模型的分类和通用成功参数
Philip Toepffer, Dirk Thatmann
{"title":"Taxonomy and Universal Success Parameters of Token Models in Distributed Ledger Systems","authors":"Philip Toepffer, Dirk Thatmann","doi":"10.1109/BRAINS49436.2020.9223298","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223298","url":null,"abstract":"Token models introduced by Distributed Ledger Systems (DLS) such as Bitcoin or Ethereum enabled a fundamental shift in the economic structures of our society. This led not only to a large number of different token models but also to a multitude of development strategies for them. However, only a few of existing tokens proved a significant success on the market. The reason for that is a missing unified understanding of parameters required for success and the lack of standardization in token economics in general. This paper derives a unified token economics taxonomy considering regulatory authorities, practitioners, and academics. The taxonomy encompasses five dimensions which are essential for classifying token economics. Finally, this work derives eight universal success parameters of a token model and in a broader sense of DLS. The clear taxonomy and parameters will enable a more efficient and expedient approach for token development.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain brings confidence to facilitate the flow of data in the agricultural field 区块链带来信心,促进农业领域的数据流动
L. Topart, Philippe Genestier, Yvan Picaud
{"title":"Blockchain brings confidence to facilitate the flow of data in the agricultural field","authors":"L. Topart, Philippe Genestier, Yvan Picaud","doi":"10.1109/BRAINS49436.2020.9223315","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223315","url":null,"abstract":"In our digital world, farms are connected and produce more and more data. This source of data can be a precious input to address challenges of multi-performance agriculture. Beyond the services provided, access to farmers’ data depends on a clear understanding of their use, which must be done in a transparent way. Several codes of conduct at a national or international level push for a voluntary commitment to respect some good practices in the use of agricultural data. To provide a tool and answer farmer’s questions on the control of their data and the transparency of the data processing, we have designed an interoperable ecosystem of farmer consents management based on Blockchain, protecting farmers from no consented uses of their data.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131146506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Truth-Inducing Sybil Resistant Decentralized Blockchain Oracle 一个诱导真相的抗西比尔去中心化区块链Oracle
Yuxi Cai, G. Fragkos, Eirini-Eleni Tsiropoulou, A. Veneris
{"title":"A Truth-Inducing Sybil Resistant Decentralized Blockchain Oracle","authors":"Yuxi Cai, G. Fragkos, Eirini-Eleni Tsiropoulou, A. Veneris","doi":"10.1109/BRAINS49436.2020.9223272","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223272","url":null,"abstract":"Many blockchain applications use decentralized oracles to trustlessly retrieve external information as those platforms are agnostic to real-world information. Some existing decentralized oracle protocols make use of majority-voting schemes to determine the outcomes and/or rewards to participants. In these cases, the awards (or penalties) grow linearly to the participant stakes, therefore voters are indifferent between voting through a single or multiple identities. Furthermore, the voters receive a reward only when they agree with the majority outcome, a tactic that may lead to herd behavior. This paper proposes an oracle protocol based on peer prediction mechanisms with non-linear staking rules. In the proposed approach, instead of being rewarded when agreeing with a majority outcome, a voter receives awards when their report achieves a relatively high score based on a peer prediction scoring scheme. The scoring scheme is designed to be incentive compatible so that the maximized expected score is achieved only with honest reporting. A non-linear stake scaling rule is proposed to discourage Sybil attacks. This paper also provides a theoretical analysis and guidelines for implementation as reference.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133197306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
DefenseChain: Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense defensecchain:网络威胁情报共享和防御联盟区块链
Soumya Purohit, P. Calyam, Songjie Wang, RajaniKanth Yempalla, Justin Varghese
{"title":"DefenseChain: Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense","authors":"Soumya Purohit, P. Calyam, Songjie Wang, RajaniKanth Yempalla, Justin Varghese","doi":"10.1109/BRAINS49436.2020.9223313","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223313","url":null,"abstract":"Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent threats, cryptojacking which threaten service availability. Recently, methods for threat information sharing and defense require co-operation and trust between multiple domains/entities. There is a need for mechanisms that establish distributed trust to allow for such a collective defense. In this paper, we present a novel threat intelligence sharing and defense system, namely “DefenseChain”, to allow organizations to have incentive-based and trustworthy co-operation to mitigate the impact of cyber attacks. Our solution approach features a consortium Blockchain platform to obtain threat data and select suitable peers to help with attack detection and mitigation. We propose an economic model for creation and sustenance of the consortium with peers through a reputation estimation scheme that uses ‘Quality of Detection’ and ‘Quality of Mitigation’ metrics. Our evaluation experiments with DefenseChain implementation are performed on an Open Cloud testbed with Hyperledger Composer and in a simulation environment. Our results show that the DefenseChain system overall performs better than state-of-the-art decision making schemes in choosing the most appropriate detector and mitigator peers. In addition, we show that our DefenseChain achieves better performance trade-offs in terms of metrics such as detection time, mitigation time and attack reoccurence rate. Lastly, our validation results demonstrate that our DefenseChain can effectively identify rational/irrational service providers.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Facilitating the Decentralised Exchange of Cryptocurrencies in an Order-Driven Market 在订单驱动的市场中促进加密货币的去中心化交易
Moritz Platt, F. Pierangeli, G. Livan, Simone Righi
{"title":"Facilitating the Decentralised Exchange of Cryptocurrencies in an Order-Driven Market","authors":"Moritz Platt, F. Pierangeli, G. Livan, Simone Righi","doi":"10.1109/BRAINS49436.2020.9223286","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223286","url":null,"abstract":"This article discusses a protocol to facilitate decentralised exchanges on an order-driven market through a consortium of market services operators. We discuss whether this hybrid protocol combining a centralised initiation phase with a decentralised execution phase outperforms fully centralised exchanges with regards to efficiency and security. Here, a fully efficient and fully secure protocol is defined as one where traders incur no trading costs or opportunity costs and counterparty risk is absent. We devise a protocol addressing the main downsides in the decentralised exchange process that uses a facilitating distributed ledger, maintains an order book and monitors the order status in real-time to provide accurate exchange rate information and performance scoring of participants. We show how performance ratings can lower opportunity costs and how a rolling benchmark rate of verifiable trades can be used to establish a trustworthy exchange rate between cryptocurrencies. The formal validation of the proposed technical mechanisms is the subject of future work.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115369653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing relationships between primary miners in Ethereum by analyzing on-chain transactions 通过分析链上交易来表征以太坊主矿工之间的关系
Daniel Rincon Silva
{"title":"Characterizing relationships between primary miners in Ethereum by analyzing on-chain transactions","authors":"Daniel Rincon Silva","doi":"10.1109/BRAINS49436.2020.9223303","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223303","url":null,"abstract":"It is widely accepted that Ethereum mining is highly centralized. Nonetheless, centralization has been mostly characterized by exclusively looking at the influence that independent miners or mining pools can have over the network. Moreover, models of mining behavior assume that miners are either unrelated or only relate via mining pools under highly structured and transparent agreements. If these assumptions and the predictions they entail were to be completely accurate, there would not be any evidence of on-chain transactions between miners, other than the ones expected from mining pool payouts. By looking at on-chain transactions between miners in the Ethereum Network we find that aside from the payouts from mining pools to small miners, there are also transactions that define relationships between mining pools, independent miners and between independent miners and mining pools. Furthermore, by characterizing the topology of the network of miner transactions, we find the emergence of highly connected clusters that control significant amounts of hashing power and exhibit relationships in the opposite direction of what theoretical models predict. This more nuanced characterization of mining centralization can help identify network vulnerabilities and inform protocol redesigns.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128440290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-IOTA: an efficient and fast metamorphism for IOTA E-IOTA:一种高效、快速的IOTA变质作用
Gewu Bu, Wassim Hana, M. Potop-Butucaru
{"title":"E-IOTA: an efficient and fast metamorphism for IOTA","authors":"Gewu Bu, Wassim Hana, M. Potop-Butucaru","doi":"10.1109/BRAINS49436.2020.9223294","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223294","url":null,"abstract":"IOTA opened recently a new line of research in distributed ledgers area by targeting algorithms that ensure a high throughput for the transactions generated in IoT systems. Transactions are continuously appended to an acyclic structure called Tangle. Each new transaction selects and approves, as parents, two existing transactions who have not been approved yet (called Tips). Recent research indicates that, IOTA suffers from a Fairness Problem, where a part of submitted transactions might not be approved by new coming transactions. They are called Left-Behind transactions. Recently, G-IOTA has been proposed: by using the Left-Behind Protection mechanism, G-IOTA can fix the fairness problem. G-IOTA, however, needs additional computation resources for left-behind protection mechanism, which is not suitable for an energy-aware IoT system. Furthermore, both IOTA and G-IOTA suffer from a potential security defect. This side effect reduces the Unpredictability when transactions are appended to the tangle. Leaking the unpredictability, an adversary can easily induce the tendency of transactions appending to the tangle. This approach is called Prediction Attack. In this paper, we propose E-IOTA to solve the fairness problem and at the same time, guarantee the unpredictability of the tangle. Interestingly, our real scenario simulation shows that E-IOTA offers better performance efficiency compared to G-IOTA and even original IOTA. Simultaneously, E-IOTA retains the core data structure of IOTA, which makes E-IOTA be compatible with current IOTA implementation. Our solution can therefore be a perfect alternative solution for current IOTA.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Process Scheduling of Personal Identity Verification on Decentralized Trust 去中心化信任下的个人身份验证进程调度
Koki Inoue, Dai Suzuki, T. Kurita, Satoshi Imai
{"title":"Process Scheduling of Personal Identity Verification on Decentralized Trust","authors":"Koki Inoue, Dai Suzuki, T. Kurita, Satoshi Imai","doi":"10.1109/BRAINS49436.2020.9223301","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223301","url":null,"abstract":"Several working groups are coping with an ecosystem where a user manages his/her own digital identity (ID) information among different organizations or companies by decentralized manner. We have also been developing a platform for trustworthy ID exchange, named IDYX. In the platform, personal identity verification (PIV) process will be realized by verifying credentials about users’ information issued by other organizations. Thanks to that kind of the ID cooperation, the users can prove their ID online by using the credentials and will no longer need to take procedure for every organization when updating their ID information registered there. However, the organizations’ policies to identify a user and relationships among the organizations bring a complicated problem, that is, how to get a better schedule of ID cooperation around them. In this paper, we formulate the scheduling problem as an integer linear programming, and propose a heuristic method based on graph structure. Numerical experiments show that the heuristic approach has feasible scalability for practical use.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DMix: decentralized mixer for unlinkability DMix:去中心化的不可连接混合器
Fadi Barbàra, C. Schifanella
{"title":"DMix: decentralized mixer for unlinkability","authors":"Fadi Barbàra, C. Schifanella","doi":"10.1109/BRAINS49436.2020.9223282","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223282","url":null,"abstract":"We present a protocol that lets participants operate a decentralized mixer to exchange coins in the Bitcoin blockchain. DMix does not need the election of any leader and respects both the unlinkability and the atomicity properties, so that there is no possibility to correlate addresses or lose funds using the protocol. We leverage the MuSig aggregate signatures. This aggregation scheme is based on the Schnorr signature scheme, a recent proposal for a ECDSA alternative, the current Bitcoin signature scheme. We also present an analysis of the method and mitigation of attacks.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134511784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AI pedigree verification platform using blockchain 使用区块链的AI家谱验证平台
Yasutaka Kawamoto, Akihiro Kobayashi
{"title":"AI pedigree verification platform using blockchain","authors":"Yasutaka Kawamoto, Akihiro Kobayashi","doi":"10.1109/BRAINS49436.2020.9223307","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223307","url":null,"abstract":"In order for AI to be accepted by society and become a social infrastructure technology, the ethical aspect of AI is also important in addition to the technical aspect of AI. This paper proposes “AI pedigree verification platform” to verify “what kind of data is used to train the AI model at hand”. Building such the system using an existing database system is problematic in terms of system availability and integrity of the registration content. Therefore, we constructed the proposed system using Hyperledger Fabric (HF), which is a blockchain infrastructure. In this way, the proposed system can ensure the availability of the system and the integrity of the registration content. To ensure the reproducibility of the AI model, the data items in the system were created based on the “Reproducibility list” proposed by authoritative society for AI. Since the integrity and reproducibility of the data in the blockchain can be ensured, this system enables automatic AI model generation using open data and automatic trading of AI models.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131740932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信