Shoufeng Cao , Marcus Foth , Warwick Powell , Thomas Miller , Ming Li
{"title":"A blockchain-based multisignature approach for supply chain governance: A use case from the Australian beef industry","authors":"Shoufeng Cao , Marcus Foth , Warwick Powell , Thomas Miller , Ming Li","doi":"10.1016/j.bcra.2022.100091","DOIUrl":"10.1016/j.bcra.2022.100091","url":null,"abstract":"<div><p>This paper designed and implemented a blockchain-based multisignature approach to digitally transform supply chain governance in multi-tier food supply chains, particularly in a geographically dispersed beef supply chain. An exploratory case study was utilised to demonstrate the design, implementation, and evaluation of a blockchain-based multisignature approach that was deployed on the Smart Trade Networks (STN) Proof of Authority (PoA) blockchain system for data collection and validation in a beef supply chain context. The multisignature approach was implemented with a use case to track a shipment of 92 cattle and meat products through key events from farm to food service. The use-case deployment records approximately 6000 data points registered on the STN PoA blockchain system. The real-case deployment illustrates the capability of the blockchain-based multisignature approach to digitally improve beef supply chain governance by enabling whole-of-chain transparency and trustworthy information sharing and supports supply chain professionals to have a better understanding of how to unlock blockchain potential for supply chain transformation.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"3 4","pages":"Article 100091"},"PeriodicalIF":5.6,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209672092200032X/pdfft?md5=ca8355b38b1b14c69cd9d3e501f1099f&pid=1-s2.0-S209672092200032X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45900414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"URJA: A sustainable energy distribution and trade model for smart grids","authors":"Anjana Prabhakar , Tricha Anjali","doi":"10.1016/j.bcra.2022.100090","DOIUrl":"10.1016/j.bcra.2022.100090","url":null,"abstract":"<div><p>Energy has always been one of the fundamental elements in the growth of human society. It is crucial that we improve our energy management due to the ever-growing imbalance in demand-supply. The new wave in the energy sector is characterized by the three D's of decarbonization, decentralization, and digitalization. For a sustainable life, it is necessary that energy is tapped from alternative sources that are renewable to leave a minimal carbon footprint. To integrate different sources with the main power grid, we require two-way communication among them. This makes it indispensable that consumers are empowered to protect their privacy and make them the sole owners of their data. A good access control scheme would ensure security of data, and an efficient trading platform would ensure judicious use of the resources. Here, we propose a framework URJA with an access control scheme and an energy trading platform based on blockchain for a smart grid. The locally available renewable sources of energy are connected to the grid such that demand-supply is managed effectively without loss of efficiency and privacy. A customized consensus scheme based on trust ensures a quick operation in real-time.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"3 4","pages":"Article 100090"},"PeriodicalIF":5.6,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720922000318/pdfft?md5=f93fff7d32b2f201e9985069ca332052&pid=1-s2.0-S2096720922000318-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46443290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lydia Negka, Angeliki Katsika, G. Spathoulas, V. Plagianakos
{"title":"Blockchain state channels with compact states through the use of RSA accumulators","authors":"Lydia Negka, Angeliki Katsika, G. Spathoulas, V. Plagianakos","doi":"10.1016/j.bcra.2022.100114","DOIUrl":"https://doi.org/10.1016/j.bcra.2022.100114","url":null,"abstract":"","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"1 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54133303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dhanya Therese Jose, Jørgen Holme, Antorweep Chakravorty, Chunming Rong
{"title":"Integrating big data and blockchain to manage energy smart grids—TOTEM framework","authors":"Dhanya Therese Jose, Jørgen Holme, Antorweep Chakravorty, Chunming Rong","doi":"10.1016/j.bcra.2022.100081","DOIUrl":"10.1016/j.bcra.2022.100081","url":null,"abstract":"<div><p>The demand for electricity is increasing exponentially day by day, especially with the arrival of electric vehicles. In the smart community neighborhood project, electricity should be produced at the household or community level and sold or bought according to the demands. Since the actors can produce, sell, and buy according to the demands, thus the name prosumers. ICT solutions can contribute to this in several ways, such as machine learning for analyzing the household data for customer demand and peak hours for the usage of electricity, blockchain as a trustworthy platform for selling or buying, data hub, and ensuring data security and privacy of prosumers. TOTEM: Token for controlled computation is a framework that allows users to analyze the data without moving the data from the data owner's environment. It also ensures the data security and privacy of the data. Here, in this article, we will show the importance of the TOTEM architecture in the EnergiX project and how the extended version of TOTEM can be efficiently merged with the demands of the current and similar projects.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"3 3","pages":"Article 100081"},"PeriodicalIF":5.6,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720922000227/pdfft?md5=f3c2ab09a2947fe02472ae2772fd0b00&pid=1-s2.0-S2096720922000227-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47091865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaohu Zhou , Antonio Nehme , Vitor Jesus , Yonghao Wang , Mark Josephs , Khaled Mahbub , Ali Abdallah
{"title":"AudiWFlow: Confidential, collusion-resistant auditing of distributed workflows","authors":"Xiaohu Zhou , Antonio Nehme , Vitor Jesus , Yonghao Wang , Mark Josephs , Khaled Mahbub , Ali Abdallah","doi":"10.1016/j.bcra.2022.100073","DOIUrl":"10.1016/j.bcra.2022.100073","url":null,"abstract":"<div><p>We discuss the problem of accountability when multiple parties cooperate towards an end result, such as multiple companies in a supply chain or departments of a government service under different authorities. In cases where a fully trusted central point does not exist, it is difficult to obtain a trusted audit trail of a workflow when each individual participant is unaccountable to all others. We propose AudiWFlow, an auditing architecture that makes participants accountable for their contributions in a distributed workflow. Our scheme provides confidentiality in most cases, collusion detection, and availability of evidence after the workflow terminates. AudiWFlow is based on verifiable secret sharing and real-time peer-to-peer verification of records; it further supports multiple levels of assurance to meet a desired trade-off between the availability of evidence and the overhead resulting from the auditing approach. We propose and evaluate two implementation approaches for AudiWFlow. The first one is fully distributed except for a central auxiliary point that, nevertheless, needs only a low level of trust. The second one is based on smart contracts running on a public blockchain, which is able to remove the need for any central point but requires integration with a blockchain.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"3 3","pages":"Article 100073"},"PeriodicalIF":5.6,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720922000148/pdfft?md5=acaeec002917db3fdf93808b9740c4f6&pid=1-s2.0-S2096720922000148-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46418558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain for decentralised rural development and governance","authors":"Ian Merrell","doi":"10.1016/j.bcra.2022.100086","DOIUrl":"10.1016/j.bcra.2022.100086","url":null,"abstract":"<div><p>Rural areas are steadily being marginalised in a global economy where ‘core/periphery’ models of development are dominant. To overcome this, rural areas have experimented with decentralised governance. However, this process is fraught with political, fiscal, and institutional difficulties. These often revolve around transparency and accountability issues and low participation rates. Blockchain technology could act as a social innovation to overcome issues in decentralised governance, and rural areas could even prove to be a fertile environment for future innovation. In this conceptual paper, the potential of blockchain technology is theoretically positioned in regional development discourses. After exploring how blockchain could be applied to rural governance and the barriers it needs to overcome to reach mass adoption, a new distributed model of governance is suggested.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"3 3","pages":"Article 100086"},"PeriodicalIF":5.6,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720922000276/pdfft?md5=a6488c516b8d2790b99641f3998fc99f&pid=1-s2.0-S2096720922000276-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46091407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The “Bitcoin Generator” Scam","authors":"Emad Badawi , Guy-Vincent Jourdan , Iosif-Viorel Onut","doi":"10.1016/j.bcra.2022.100084","DOIUrl":"10.1016/j.bcra.2022.100084","url":null,"abstract":"<div><p>The “Bitcoin Generator Scam” (BGS) is a cyberattack in which scammers promise to provide victims with free cryptocurrencies in exchange for a small mining fee. In this paper, we present a data-driven system to detect, track, and analyze the BGS. It works as follows: we first formulate search queries related to BGS and use search engines to find potential instances of the scam. We then use a crawler to access these pages and a classifier to differentiate actual scam instances from benign pages. Last, we automatically monitor the BGS instances to extract the cryptocurrency addresses used in the scam. A unique feature of our system is that it proactively searches for and detects the scam pages. Thus, we can find addresses that have not yet received any transactions.</p><p>Our data collection project spanned 16 months, from November 2019 to February 2021. We uncovered more than 8,000 cryptocurrency addresses directly associated with the scam, hosted on over 1,000 domains. Overall, these addresses have received around 8.7 million USD, with an average of 49.24 USD per transaction.</p><p>Over 70% of the active addresses that we are capturing are detected <strong>before</strong> they receive any transactions, that is, before anyone is victimized. We also present some post-processing analysis of the dataset that we have captured to aggregate attacks that can be reasonably confidently linked to the same attacker or group.</p><p>Our system is one of the first academic feeds to the APWG eCrime Exchange database. It has been actively and automatically feeding the database since November 2020.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"3 3","pages":"Article 100084"},"PeriodicalIF":5.6,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720922000252/pdfft?md5=a7df82eff09935b151de207690c2950d&pid=1-s2.0-S2096720922000252-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45335163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based Internet of Musical Things","authors":"Luca Turchet , Chan Nam Ngo","doi":"10.1016/j.bcra.2022.100083","DOIUrl":"10.1016/j.bcra.2022.100083","url":null,"abstract":"<div><p>Blockchain technology is impacting several industries, including the creative industries and those operating in the Internet of Things (IoT). Lately, researchers' attention has been devoted to the application of blockchain in the recorded music industry. However, thus far, no research has investigated the use of such technology in the Internet of Musical Things (IoMusT). The IoMusT is a new area emerging in industry and academy as an extension of the IoT to the musical domain. The IoMusT itself, as the IoT, is a distributed network of musical things, which are objects augmented with information and communication technologies serving a musical purpose. The IoMusT vision requires, above all, IoT features such as decentralization, seamless authentication, transparency, data integrity and privacy, and self-maintenance, as well as the musical domain features such as efficient handling of copyrights and speed of royalties payment. Such features can be brought by blockchain. In this paper, we investigate the integration of blockchain technology with the IoMusT, and we name such synthesis “Blockchain-based IoMusT”. We present a vision for this new paradigm in terms of the novel opportunities that are enabled, and we propose a set of application scenarios enabled by technological integration. Finally, we outline the open research directions in this promising area.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"3 3","pages":"Article 100083"},"PeriodicalIF":5.6,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720922000240/pdfft?md5=9581aaf127cd91b7dc702ac944e76db1&pid=1-s2.0-S2096720922000240-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45810067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scalable blockchain-based scheme for traffic-related data sharing in VANETs","authors":"El-hacen Diallo , Omar Dib , Khaldoun Al Agha","doi":"10.1016/j.bcra.2022.100087","DOIUrl":"10.1016/j.bcra.2022.100087","url":null,"abstract":"<div><p>Recent advances in wireless technology and embedded systems enable vehicles to share relevant traffic-related data to improve the transportation Quality-of-Service (QoS). However, due to the ubiquitousness of cyber-attacks, it is challenging to ensure the integrity of the data collected from cars. This paper proposes a novel architecture for road traffic events management in Vehicular Ad hoc NETworks (VANETs) relying on a permissioned blockchain. It also introduces the concept of micro-transactions to minimize communication and storage overhead. Through simulations, a rigorous performance evaluation of the proposed approach was conducted, and the micro-transactions effectiveness was assessed. In addition, a comparison with close works in the literature was performed. The proposed scheme ensures road traffic records integrity and traceability, and simulation results on the considered scenarios showed good performance.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"3 3","pages":"Article 100087"},"PeriodicalIF":5.6,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720922000288/pdfft?md5=023819ec8e7f6360b5f7209e003975eb&pid=1-s2.0-S2096720922000288-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42755092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lawrence Mosley , Hieu Pham , Xiaoshi Guo , Yogesh Bansal , Eric Hare , Nadia Antony
{"title":"Towards a systematic understanding of blockchain governance in proposal voting: A dash case study","authors":"Lawrence Mosley , Hieu Pham , Xiaoshi Guo , Yogesh Bansal , Eric Hare , Nadia Antony","doi":"10.1016/j.bcra.2022.100085","DOIUrl":"https://doi.org/10.1016/j.bcra.2022.100085","url":null,"abstract":"<div><p>The transparent and immutable nature of blockchain provides incentives for organizations wishing to create and implement an open, decentralized governance structure. As members exercise their voting rights, a fault-tolerant record accumulates on the blockchain that can be analyzed to diagnose and intercept potential threats to the governing body. To date, there has not been a systematic study of on-chain governance with respect to voting. In this paper, we provide an analysis of blockchain governance through a case study of the first cryptocurrency to adopt on-chain voting, Dash. Our analysis introduces the key characteristics of blockchain governance, steps through a data-driven exploration of Dash's on-chain voting system, and highlights exploitable attack vectors and vulnerabilities for the subversion of Dash's on-chain voting system via a novel network analysis methodology. We then conclude with guidelines for other organizations looking to implement similar blockchain governance solutions while maintaining integrity in their operations.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"3 3","pages":"Article 100085"},"PeriodicalIF":5.6,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720922000264/pdfft?md5=5f1e39439d66cf1cfbfeca406d4d7290&pid=1-s2.0-S2096720922000264-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136538680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}