Aleksandar Nedaković , Anton Hasselgren , Katina Kralevska , Danilo Gligoroski
{"title":"Hyperledger fabric platform for healthcare trust relations—Proof-of-Concept","authors":"Aleksandar Nedaković , Anton Hasselgren , Katina Kralevska , Danilo Gligoroski","doi":"10.1016/j.bcra.2023.100156","DOIUrl":"10.1016/j.bcra.2023.100156","url":null,"abstract":"<div><p>In recent years, blockchain technologies have expanded from the finance field to other areas that rely on trust-based solutions. The healthcare industry represents one such area, as digital transformation disrupts relationships between patients, healthcare professionals, and healthcare institutes. Patients and healthcare institutes lack a proficient tool to verify the credentials of medical professionals in a digital environment. Furthermore, healthcare professionals lack a tool where they are in control over their credentials. The first contribution of this paper is a proposal of a solution that leverages the private permissioned Hyperledger Fabric blockchain and smart contracts to provide a source of transparent trust for relationships within the healthcare industry. Second, we pave the ground for GDPR compliance by storing only the hash values on the blockchain. Third, we solve the problem of patient authentication by utilizing cryptographic techniques. Finally, we prove the usability of the proposed solution by implementing a user interface and creating a live deployment.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"4 4","pages":"Article 100156"},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000313/pdfft?md5=4fc8816ffa415cfbf3cf306bbe925945&pid=1-s2.0-S2096720923000313-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41674702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the impact of structural and temporal behaviors in Ethereum phishing users detection","authors":"Medhasree Ghosh , Dyuti Ghosh , Raju Halder , Joydeep Chandra","doi":"10.1016/j.bcra.2023.100153","DOIUrl":"10.1016/j.bcra.2023.100153","url":null,"abstract":"<div><p>The recent surge of Ethereum in prominence has made it an attractive target for various kinds of crypto crimes. Phishing scams, for example, are an increasingly prevalent cybercrime in which malicious users attempt to steal funds from a user's crypto wallet. This research investigates the effects of network architectural features as well as the temporal aspects of user activities on the performance of detecting phishing users on the Ethereum transaction network. We employ traditional machine learning algorithms to evaluate our model on real-world Ethereum transaction data. The experimental results demonstrate that our proposed features identify phishing accounts efficiently and outperform the baseline models by 4% in Recall and 5% in F1-score.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"4 4","pages":"Article 100153"},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000283/pdfft?md5=50e4e3c3baf2b450bd9efc03570baefa&pid=1-s2.0-S2096720923000283-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49005027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impact of fundamental factors and sentiments on the valuation of cryptocurrencies","authors":"Tiam Bakhtiar, Xiaojun Luo, Ismail Adelopo","doi":"10.1016/j.bcra.2023.100154","DOIUrl":"10.1016/j.bcra.2023.100154","url":null,"abstract":"<div><p>The valuation of cryptocurrencies is important given the increasing significance of this potential asset class. However, most state-of-the-art cryptocurrency valuation methods only focus on one of the fundamental factors or sentiments and use out-of-date data sources. In this study, a robust cryptocurrency valuation method is developed using up-to-date datasets. Using various panel regression models and moving-window regression tests, the impacts of fundamental factors and sentiments in the valuation of cryptocurrencies are explored with data covering from January 1, 2009 to April 30, 2023. The research shows the importance of sentiments and suggests that the fear and greed index can indicate when to make a cryptocurrency investment, while Google search interest in cryptocurrency is crucial when choosing the appropriate type of cryptocurrency. Moreover, consensus mechanism and initial coin offering have significant effects on cryptocurrencies without stablecoins, while their impacts on cryptocurrencies with stablecoins are insignificant. Other fundamental factors, such as the type of supply and the presence of smart contracts, do not have a significant influence on cryptocurrency. Findings from this study can enhance cryptocurrency marketisation and provide insightful guidance for investors, portfolio managers, and policymakers in assessing the utility level of each cryptocurrency.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"4 4","pages":"Article 100154"},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000295/pdfft?md5=c59a4ee198fce4778ae906f334cef529&pid=1-s2.0-S2096720923000295-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46399228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain protocols, data analysis, and applications","authors":"Damiano Di Francesco Maesa, Laura Ricci","doi":"10.1016/j.bcra.2023.100164","DOIUrl":"10.1016/j.bcra.2023.100164","url":null,"abstract":"","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"4 4","pages":"Article 100164"},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000398/pdfft?md5=ba0cca1cec506668d9bfb6bcfed91946&pid=1-s2.0-S2096720923000398-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A decentralized data evaluation framework in federated learning","authors":"Laveen Bhatia, Saeed Samet","doi":"10.1016/j.bcra.2023.100152","DOIUrl":"10.1016/j.bcra.2023.100152","url":null,"abstract":"<div><p>Federated Learning (FL) is a type of distributed deep learning framework in which multiple devices train a local model using local data, and the gradients of the local model are then sent to a central server that aggregates them to create a global model. This type of framework is ideal where data privacy is of utmost importance because the data never leave the local device. However, a major concern in FL is ensuring the data quality of local training data. Since there is no control over the local training data, ensuring that the local model is trained on clean data becomes challenging. A model trained on poor-quality data can have a significant impact on its accuracy. In this paper, we propose a decentralized approach using blockchain to ensure local model data quality. We use miners to validate each local model by checking its accuracy against a secret testing dataset. This is done using a smart contract that the miners invoke during the mining process. The local model is aggregated with the global model only if it passes a preset accuracy threshold. We test our proposed method on two datasets: the Brain Tumor Classification dataset from Kaggle, comprised of 7000 MRI images divided into two classes (Tumor/No Tumor), and the Medical MNIST dataset, which includes 58,954 images classified into six different classes: AbdomenCT, BreastMRI, ChestCT, Chest X-ray, Hand X-ray, and HeadCT. Our results show that our method outperforms the original FL approach in all experiments.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"4 4","pages":"Article 100152"},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000271/pdfft?md5=07c936a02b62c7c930cf9c4b0cd364c5&pid=1-s2.0-S2096720923000271-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47498130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MQTT and blockchain sharding: An approach to user-controlled data access with improved security and efficiency","authors":"P.S. Akshatha, S.M. Dilip Kumar","doi":"10.1016/j.bcra.2023.100158","DOIUrl":"10.1016/j.bcra.2023.100158","url":null,"abstract":"<div><p>The rapid growth of the Internet of Things (IoT) has raised security concerns, including MQTT protocol-based applications that lack built-in security features and rely on resource-intensive Transport Layer Security (TLS) protocols. This paper presents an approach that utilizes blockchain technology to enhance the security of MQTT communication while maintaining efficiency. This approach involves using blockchain sharding, which enables higher scalability, improved performance, and reduced computational overhead compared to traditional blockchain approaches, making it well-suited for resource-constrained IoT environments. This approach leverages Ethereum blockchain's smart contract mechanism to ensure trust, accountability, and user privacy. Specifically, we introduce a shard-based consensus mechanism that enables improved security while minimizing computational overhead. We also provide a user-controlled and secured algorithm using Proof-of-Access implementation to decentralize user access control to data stored in the blockchain network. The proposed approach is analyzed for usability, including metrics such as bandwidth consumption, CPU usage, memory usage, delay, access time, storage time, and jitter, which are essential for IoT application requirements. The analysis demonstrated that the approach reduces resource consumption, and the proposed system outperforms TLS and existing blockchain approaches in these metrics, regardless of the choice of the MQTT broker. Additionally, thoroughly addressing future research directions, including issues and challenges, ensures careful consideration of potential advancements in this domain.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"4 4","pages":"Article 100158"},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000337/pdfft?md5=a87db6be992926cd057321b8bd24cf25&pid=1-s2.0-S2096720923000337-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134934676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ULS-PBFT: An ultra-low storage overhead PBFT consensus for blockchain","authors":"Haoxiang Luo","doi":"10.1016/j.bcra.2023.100155","DOIUrl":"10.1016/j.bcra.2023.100155","url":null,"abstract":"<div><p>Since the Practical Byzantine Fault Tolerance (PBFT) consensus mechanism can avoid the performance bottleneck of blockchain systems caused by Proof of Work (PoW), it has been widely used in many scenarios. However, in the blockchain system, each node is required to back up all transactions and block data of the system, which will waste a lot of storage resources. It is difficult to apply to scenarios with limited storage resources such as unmanned aerial vehicle networks and smart security protection; thus, it is often used in small-scale networks. In order to deploy PBFT-based blockchain systems in large-scale network scenarios, we propose an ultra-low storage overhead PBFT consensus (ULS-PBFT), which groups nodes hierarchically to limit the storage overhead within the group. In this paper, we first propose an optimal double-layer PBFT consensus from the perspective of minimizing the storage overhead, and prove that this consensus can significantly reduce the storage overhead. In addition, we also investigate the superiority of ULS-PBFT in terms of communication overhead while setting the security threshold in the presence of the possibility of Byzantine nodes. The simulation results demonstrate the advantages of ULS-PBFT. Then, we extend such grouping idea to the blockchain system with <em>X</em>-layer PBFT and analyze its storage and communication overhead. Finally, the node grouping strategy of double-layer PBFT is studied for four application scenarios when the performance of storage overhead, communication overhead, and security are considered comprehensively.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"4 4","pages":"Article 100155"},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000301/pdfft?md5=156a29459a07f06b4350a52f6b079a43&pid=1-s2.0-S2096720923000301-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44214334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Janus: Toward preventing counterfeits in supply chains utilizing a multi-quorum blockchain","authors":"Vika Crossland , Connor Dellwo , Golam Bashar , Gaby G. Dagher","doi":"10.1016/j.bcra.2023.100157","DOIUrl":"10.1016/j.bcra.2023.100157","url":null,"abstract":"<div><p>The modern pharmaceutical supply chain lacks transparency and traceability, resulting in alarming rates of counterfeit products entering the market. These illegitimate products cause harm to end users and wreak havoc on the supply chain itself, costing billions of dollars in profit loss. In this paper, in response to the Drug Supply Chain Security Act (DSCSA), we introduce Janus, a novel pharmaceutical track-and-trace system that utilizes blockchain and cloning-resistant hologram tags to prevent counterfeits from entering the pharmaceutical supply chain. We design a multi-quorum consensus protocol that achieves load balancing across the network. We perform a security analysis to show robustness against various threats and attacks. The implementation of Janus proves that the system is fair, scalable, and resilient.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"4 4","pages":"Article 100157"},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000325/pdfft?md5=32e36d92a323a5ee29c977c97650f026&pid=1-s2.0-S2096720923000325-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48459524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amr El Koshiry , Entesar Eliwa , Tarek Abd El-Hafeez , Mahmoud Y. Shams
{"title":"Unlocking the power of blockchain in education: An overview of innovations and outcomes","authors":"Amr El Koshiry , Entesar Eliwa , Tarek Abd El-Hafeez , Mahmoud Y. Shams","doi":"10.1016/j.bcra.2023.100165","DOIUrl":"10.1016/j.bcra.2023.100165","url":null,"abstract":"<div><p>Blockchain is a revolutionary technology that has the potential to revolutionize various industries, including finance, supply chain management, healthcare, and education. Its decentralized, secure, and transparent nature makes it ideal for use in industries where trust, security, and efficiency are of paramount importance. The integration of blockchain technology into the education system has the potential to greatly improve the efficiency, security, and credibility of the educational process. By creating secure and transparent platforms for tracking and verifying students' academic achievements, blockchain technology can help to create a more accessible and trustworthy education system, making it easier for students to showcase their skills and knowledge to potential employers. While the potential benefits of blockchain in education are significant, there are also several challenges that must be addressed in order to fully realize the potential of this technology in the educational sector. Some of the major challenges include adoption, technical knowledge, interoperability, regulation, cost, data privacy and security, scalability, and accessibility. The necessary equipment for the implementation of blockchain technology in education is diverse and critical to the success of this innovative technology. Organizations should carefully consider this equipment when planning their implementation of blockchain technology in education to ensure the efficient and secure transfer of educational data and transactions within the blockchain network. Blockchain technology has the potential to play a significant role in promoting sustainability education and advancing the sustainability goals of both individuals and organizations. Organizations should consider incorporating blockchain technology into their sustainability education programs, in order to enhance the transparency, verifiability, and efficiency of their sustainability-related activities. While the use of blockchain technology in education is still in its early stages, the available data suggest that it has significant potential to transform the education sector and improve the efficiency and transparency of educational systems.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"4 4","pages":"Article 100165"},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000404/pdfft?md5=cd97ade3a6e2f24bee393bddcd3c7235&pid=1-s2.0-S2096720923000404-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135412440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sepideh HajiHosseinKhani , Arash Habibi Lashkari , Ali Mizani Oskui
{"title":"Unveiling vulnerable smart contracts: Toward profiling vulnerable smart contracts using genetic algorithm and generating benchmark dataset","authors":"Sepideh HajiHosseinKhani , Arash Habibi Lashkari , Ali Mizani Oskui","doi":"10.1016/j.bcra.2023.100171","DOIUrl":"10.1016/j.bcra.2023.100171","url":null,"abstract":"<div><p>Smart contracts (SCs) are crucial in maintaining trust within blockchain networks. However, existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness, while approaches based on Deep Neural Networks (DNNs) struggle with detecting complex vulnerabilities due to limited data availability. This paper proposes a novel approach for analyzing SC vulnerabilities. Our method leverages an advanced form of the Genetic Algorithm (GA) and includes the development of a comprehensive benchmark dataset consisting of 36,670 Solidity source code samples. The primary objective of our study is to profile vulnerable SCs effectively. To achieve this goal, we have devised an analyzer called SCsVulLyzer based on GAs, designed explicitly for profiling SCs. Additionally, we have carefully curated a new dataset encompassing a wide range of examples, ensuring the practical validation of our approach. Furthermore, we have established three distinct taxonomies that cover SCs, profiling techniques, and feature extraction. These taxonomies provide a systematic classification and analysis of information, improving the efficiency of our approach. Our methodology underwent rigorous testing through experimentation, and the results demonstrated the superior capabilities of our model in detecting vulnerabilities. Compared to traditional and DNN-based approaches, our approach achieved higher precision, recall, and F1-score, which are widely used metrics for evaluating model performance. Across all these metrics, our model showed exceptional results. The customization and adaptations we implemented within the GA significantly enhanced its effectiveness. Our approach detects SC vulnerabilities more efficiently and facilitates robust exploration. These promising results highlight the potential of GA-based profiling to improve the detection of SC vulnerabilities, contributing to enhanced security in blockchain networks.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 1","pages":"Article 100171"},"PeriodicalIF":5.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000465/pdfft?md5=3d59e17ff3aef14044707e48b0743a5f&pid=1-s2.0-S2096720923000465-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}