You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

14 October 2019

Authentication Protocol for Cloud Databases Using Blockchain Mechanism

,
,
,
and
1
Department of CSE & IT, Jaypee University of Information Technology, Solan 173234, India
2
Graduate School, Duy Tan University, Da Nang 550000, Vietnam
3
Department of Energy Technology, Aalborg University, 6700 Esbjerg, Denmark
4
Oregon Renewable Energy Center (OREC), Department of Electrical Engineering and Renewable Energy, Oregon Tech, Klamath Falls, OR 97601, USA
This article belongs to the Special Issue Blockchain Security and Privacy for the Internet of Things

Abstract

Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user’s are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offline guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust.

1. Introduction

Data security has turned into significant concern because of the massive development of cloud computing and networks. Therefore, methods that shield the information from fabrication, interception, and modification have turned out to be a critical issue. A large amount of data is stored in the cloud database. The users can store, modify and retrieve the data anywhere in the world. Therefore, it is essential to secure privacy in a cloud databases [1]. According to the Information security breaches survey (ISBS), 2015 large organizations stated that there was an element 81% of staff involved in some of the breaches they suffered [2], 90% of organizations feel vulnerable to an insider threat according to the Insider Threat 2018 Report [3] and Forrester Research [4].
Insider threat is the most perilous threat that harms various organizations like Yahoo, Facebook, and Google. Richardson et al. [3] proved that the expense of the data records lost in insiders attack is more prominent than the expense of those lost to outsiders. This is because insiders know about the system framework and attack the profitable records, while outsiders take that information which is accessible [5,6]. According to the 2016 U.S. State of Cybercrime Survey [7], insiders are answerable for 27% of all electronic crimes. This survey also revealed that nearly one-third of the respondents thought that damage caused by insider attacks was more severe than the damage caused by outsider attacks.
The number of insiders may increase due to the transfer of data over the cloud, which leads to more insider threats. Additionally, new security systems are required to secure unauthorized data from the insiders because the insider knows how and where data ensured in the organization. Previously various algorithms have been used to secure the data from insider threat on the cloud. However, those algorithms do not secure the data from certified users who misuse their rights to violate the security of the system. Therefore, designing such an algorithm that can secure the data from insiders has turned into a critical demand because of the damage that can be induced by the insiders.
In literature, researchers have worked on other security issues like outside malicious attacks, access control issues, network breaches, data provenance, resource exhaustion, consistency management, etc. However, much less work has been proposed on anticipating insider attacks [1,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23], which is the primary objective of this study.
The existing user authentication techniques fail to secure the data from the insiders, due to the following loopholes: (1) The password of the user can be guessed easily by the insider. (2) The two-factor authentication used by Google authenticator (GA) to send codes to the user via Short Message Service is also not secure as the code sent on Short Message Service can be cracked by the attacker due to a security breach that could lose all user authentication codes [24]. (3) In the case of GA and other third-party authentication applications (TPAA), all the authentication codes are owned by a single identity that makes it more vulnerable [25].

1.1. Motivation

The research paper uses Blockchain mechanism as it is open to the public to resolve the above mentioned loopholes. Blockchain uses a decentralized approach, in which the chain is fully open to the public, and no sensitive data is stored. It is not possible for an insider to make changes in the user’s authentication data. To do changes in any existing node of Blockchain, all its previous nodes need to be changed. The services of cloud database which are accessible by the end-user is also authenticated with Blockchain mechanism.

1.2. Research Contribution

A novel authentication algorithm proposed for managing the insiders on the cloud by blockchain based authentication mechanism. The proposed work makes the following contribution:
  • The proposed mechanism is authenticating the insider as well as outsider attack on the system.
  • The peer-to-peer authentication is provided to the cloud database user via Blockchain mechanism.
  • The performance of the system is evaluated via formal system tool—Scyther and results demonstrate that the proposed mechanism is robust and secure.
The research paper is organized as follows- Section 2 presents the literature review of various prevention techniques against insider and outsider threats. Section 3 highlights the proposed authentication mechanism for insiders and cloud users. Section 4 includes the verification of the proposed methodology by using verification tool-Scyther and finally, the paper is concluded in Section 5.

3. Proposed Blockchain Authentication Mechanism (BAM)

This section explains the proposed authentication policies and Blockchain authentication protocol for an insider as well as a database cloud user.

3.1. Blockchain Mechanism

Zheng et al. [25], discussed the importance of the Blockchain mechanism. The author suggested that Blockchain helps in removing the limitations of many applications in existing technologies and increased system performance. Furthermore, the author observed that Blockchain was also useful in user authentication applications. The Blockchain uses Blockchain ID, which is bounded with a public key, and transferred the ownership of the private key to the intended user. The user signatures helped in verifying against the public key which is stored in the Blockchain ID. Minoli et al. [26] utilized the Blockchain at various security levels in an IoT-based health care system. The author noticed that Blockchain was resistant in modifications to existing data in a linked list of blocks. It removed the concept of a trusted third party for the authentication process. Furthermore, it worked as peer-to-peer in distributed systems, where the peer-supported state of a distributed ledger and network has no central control. The Blockchain mechanism is based on a decentralized approach, which provides numerous benefits over traditional authentication methodologies. It helps in tracking the previous records and activities of the user. For example, the current user-authenticated node is connected to the previous node as so on up to the starting node [27,28,29] as shown in Figure 1.
Figure 1. Blockchain starting from new node (genesis block).
Each Blockchain node further consists of elements working on many parameters. The first node/starting node of the Blockchain is known as the genesis block, and the node value of the index and previous hash are set as zero. The Timestamp records the time of node creation, and Predefined value stored in Current Hash value. The index value notified the position of the current block node in the chain.
The length of the hash value fixed and its alphanumeric value uniquely identifies the data or the digital data fingerprints. The first three digits of a valid hash should be zero. Furthermore, the same data value always mapped to the same hash value. It is computationally infeasible to convert hash value to data value. The current hash value is calculated by using a hashing function, as described in Equation (1).
H a s h i n g   f u c t i o n   ( I n d e x + P r e v i o u s   H a s h   v a l u e + T i m e s t a m p + D a t a + N o n c e   v a l u e ) = C u r r e n t   H a s h   v a l u e
The nonce value is used to find a valid hash. Therefore, it is required to find a nonce value that produced a valid hash when used with the rest of the information from that block.
Next, the user’s credentials’ information is stored in the cloud to authenticate users on the database cloud. The Blockchain is used to prevent any user data leakage. The user’s login detail saved in a cloud database which is authenticated in peer-to-peer architecture on the cloud database at various levels. Blockchain finds many applications in various areas [30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46].

3.2. Overall Framework

Algorithm and Theorem

Algorithm 1 highlights the essential steps of the proposed Blockchain authentication mechanism for cloud database. It covers both insider and outsider user. As demonstrated in the algorithm, initially it checks for user credentials, then checks for valid Blockchain node parameters. If all goes well, then the user gets authenticated. If the user’s credentials information does not exist in the cloud database, then the user is asked for retrying or for new user account creation.
Algorithm 1 User Authentication using Blockchain Mechanism.
Input: Request Q received at Blockchain Database Server/Cloudb, It checks for Q Request is from an insider (Bob) or an outsider.
Output: Access Granted or Rejected.
Step 1: If Request == Insider (Bob) Go to Step 2 else Go to step 5
Step 2: If Login ID &User Signature== Valid then continue this step else Go to Step 3
If current index value > Last stored index ˄Hash value ˄ Timestamp value˄ Nonce value == Valid then continue this step else Go to step 4.
Create New Blockchain node and Grant Authentication.
Step 3: If User ≠ ≠ Exist in Blockchain Database then for Retrying Go to Step 1 else continue this step
    Add new user Node (Genesis Block)
      Initialize Index value
      Allocate current Time stamp value
      Store Predefined value in Current Hash value
      Store Data value
      Allocate valid Nonce Value
  Update user record in Blockchain Database
Step 4:   Give error message and Exit
Step 5:   If User== Outsider Go to Step 2 else go to Step 3
Proof of Algorithm Correctness.
The following theorem proves that the user is authenticated using Blockchain.
Theorem 1.
All authentication conditions of the Blockchain are met if and only if, a user authenticated.
Proof. 
If all authentication conditions of the Blockchain met, the user authenticated.
P → Q
here in this statement P is “all authentication conditions of the Blockchain are met” which implies Q “user is authenticated”.
If the user is authenticated then all authentication conditions of the Blockchain were met
Q → P
here in this statement Q is “user is authenticated” which implies “all authentication conditions of the Blockchain were met”
It means P are Q are in bi-conditional statement P Q for this to be true either one of the statement should be true.
If all authentication conditions of the Blockchain are met, the user is authenticated.
( P   Q )
or
If all authentication conditions of the Blockchain were not met then the user is not authenticated.
( ¬ P ¬ Q )
P Q ( P Q ) ( ¬ P ¬ Q )
Here it can be seen that Left Hand Side is logically equivalent to Right Hand Side, it can be proved by taking Left Hand Side and deriving it.
P Q ( P Q ) ( Q P )
( ¬ P Q ) ( ¬ Q P )   ( NEGATING   THE   HYPOTHESIS )
[ ( ¬ P   Q ) ¬ Q ] [ ( ¬ P Q ) P ]   ( LAW   OF   DISTRIBUTIVE )
[ ( ¬ P ¬ Q ) ( Q ¬ Q ) ] [ ( ¬ P Q ) P ]   ( LAW   OF   DISTRIBUTIVE )
[ ( ¬ P ¬ Q ) F ] [ ( ¬ P Q ) P ]
( INVERSE   LAW   P ¬ P F AND   P F P   IDENTITY   LAW ) .
( ¬ P ¬ Q ) [ ( ¬ P Q ) P ]
( ¬ P ¬ Q ) [ ( ¬ P P ) ( Q P ) ]   ( LAW   OF   DISTRIBUTIVE )
( ¬ P ¬ Q ) [ F ( Q P ) ]
( INVERSE   LAW   P ¬ P F   AND   P F P   ( IDENTITY   LAW )
( ¬ P ¬ Q ) ( Q P )
( ¬ P ¬ Q ) ( P Q ) ( LAW   OF   COMMUTATIVE )
Hence it is proved that Left Hand Side is logically equivalent to Right Hand Side. □
The proposed methodology is proved by Theorem 1, which demonstrate that all authentication conditions of the Blockchain are met if and only if, the user is authenticated. Blockchain authentication provides a robust mechanism by authenticating any user when all said conditions are fulfilled, and even an attacker cannot change any data in any Blockchain node.

4. Experimentation Results

Experimental tests were carried out with the formal method tool Scyther. The tool facilitates to conduct experiment with bounded as well as unbounded number of sessions. Scyther automatically verifies all the security protocols. Scyther’s adversary model is based on the Dolev–Yao model [47]. Scyther creates an attack graph on detecting an attack. It is based on the pattern-refinement algorithm that gives the brief and to the point representation of sets traces (infinite) [48]. Scyther allows to specify all the security requirements in terms of claim events [49]. Scyther contains four claim events: Alive, Nisynch, Secret and Commitment [50]. The process of achieving the intended communication with some events is described as “Alive”. Nisynch stands for non-injective synchronization which ensure that the intended sender sends all messages received by the receiver in a synchronized manner. Commitment is a promise that is made by one party to the other. It is confidential user data that is achieved by using Secret.
The results are shown in Figure 2. The status Ok means there were no attacks within bounds. The nonce is a session variable which ensures no old value reused. Scyther is used to verify these security requirements. It can be seen from Figure 2 that all four claims have achieved and verified. The comparisons between the proposed scheme and other related authentication schemes are presented in Table 3.
Figure 2. The output for the Scyther claim test for I, B and A.
Table 3. The security comparison of the proposed scheme and other related authentication scheme’s.
It can be concluded that the proposed solution resisted the well-known primary attacks and guaranteed the primary security requirements, and highy efficient in operation.
From Figure 3, it is proved, that the proposed mechanism for user authentication withstands all possible attacks and no attack was found within its bounds. It also verifies the working of protocol has been successfully achieved by the automatic claims.
Figure 3. The verification result of the automatic claim.

5. Conclusions

The research paper comprehensively explained the security flaw’s existing in the cloud environment and has proved how insiders, as well as outsiders, can bypass the authentication system in cloud databases. Furthermore, a Blockchain authentication mechanism for counterfeiting insider as well as outsider attacks is proposed. Blockchain provides numerous benefits in the case of authentication as it is tamperproof and user data is stored in a secured list. Blockchain is a promising technology finds new areas to be explored in coming time [51,52,53,54].
The proposed system is tested using Scyther formal system tool against various attacks to evaluate the performance. The results prove that the proposed system is highly efficient and successful in mitigating various outsider and insider threat’s. It also enhances the security of the cloud environment by identifying all sorts of possible attacks. Moreover, the working of the protocol is also verified based on the four claims and Scyther proved that proposed protocol is robust enough for real-time working environments.
User privileges allow granting of a different set of authorization rules for a different set of users.In future work, work will focus more on authorization policies to club with authentication rules so that required user privileges can be granted and user access control can be enhanced by allowing user control and monitoring.

Author Contributions

Conceptualization, G.D., R.M. and A.N.; Methodology, G.D., R.M.; Software, G.D.; Validation, P.S. and E.H.; Formal Analysis, G.D., R.M. and P.S.; Investigation, G.D., A.N. and R.M.; Resources, G.D. and R.M.; Data Curation, G.D. and R.M.; Writing-Original Draft Preparation, G.D., R.M., A.N. and P.S.; Writing-Review & Editing, G.D., A.N. and P.S.; Visualization, A.N., G.D. and E.H.; Supervision, A.N., P.S. and E.H.; Project Administration, G.D., R.M. and P.S.; Funding Acquisition, P.S. and E.H.

Funding

No funding received for this research work.

Acknowledgments

We authors express our gratitude to Department of Energy Technology, Aalborg University, Esbjerg, Denmark for provided insight technical information.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wu, Z.; Xu, G.; Lu, C.; Chen, E.; Jiang, F.; Li, G. An effective approach for the protection of privacy text data in the CloudDB. World Wide Web 2018, 21, 915–938. [Google Scholar] [CrossRef]
  2. InfoSecurity Europe and PwC: 2015 Information Security Breaches Survey. Available online: https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-digital.pdf (accessed on 5 June 2019).
  3. Insider Threat 2018 Report. Available online: https://www.ca.com/content/dam/ca/us/files/ebook/insider-threat-report.pdf (accessed on 5 June 2019).
  4. Forrester Corporation: The Value of Corporate Secrets. 2016. Available online: https://www.nsi.org/pdf/reports/The%20Value%20of% 20Corporate%20Secrets.pdf (accessed on 12 October 2015).
  5. Bhatia, T.; Verma, A.K. Data security in mobile cloud computing paradigm: A survey, taxonomy and open research issues. J. Supercomput. 2017, 73, 2558–2631. [Google Scholar] [CrossRef]
  6. Ghafir, I.; Saleem, J.; Hammoudeh, M.; Faour, H.; Prenosil, V.; Jaf, S.; Baker, T. Security threats to critical infrastructure: The human factor. J. Supercomput. 2018, 74, 4986–5002. [Google Scholar] [CrossRef]
  7. Current State of Cybercrime. 2018. Available online: https://www.rsa.com/content/dam/premium/en/white-paper/2016-current-state-of-cybercrime.pdf (accessed on 8 March 2019).
  8. Moon, C.S.; Chung, S.; Endicott-Popovsky, B. A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks. In International Workshop on Information Security Applications; Springer: Cham, Switzerland, 2013; pp. 260–271. [Google Scholar]
  9. Yaseen, Q.; Panda, B. Predicting and preventing insider threat in relational database systems. In IFIP International Workshop on Information Security Theory and Practices; Springer: Berlin/Heidelberg, Germany, 2010; pp. 368–383. [Google Scholar]
  10. Yaseen, Q.; Panda, B. Insider threat mitigation: Preventing unauthorized knowledge acquisition. Int. J. Inf. Secur. 2012, 11, 269–280. [Google Scholar] [CrossRef]
  11. Yaseen, Q.; Jararweh, Y.; Panda, B.; Althebyan, Q. An insider threat aware of access control for cloud relational databases. Clust. Comput. 2017, 20, 2669–2685. [Google Scholar] [CrossRef]
  12. Dou, Z.; Khalil, I.; Khreishah, A.; Al-Fuqaha, A. Robust insider attacks countermeasure for Hadoop: Design and implementation. IEEE Syst. J. 2018, 12, 1874–1885. [Google Scholar] [CrossRef]
  13. Shaghaghi, A.; Kanhere, S.S.; Kaafar, M.A.; Bertino, E.; Jha, S. Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. arXiv 2018, arXiv:1807.02593. [Google Scholar]
  14. Chattopadhyay, P.; Wang, L.; Tan, Y.P. Scenario-based insider threat detection from cyber activities. IEEE Trans. Comput. Soc. Syst. 2018, 99, 1–16. [Google Scholar] [CrossRef]
  15. Baracaldo, N.; Palanisamy, B.; Joshi, J. G-sir: An insider attack resilient geo-social access control framework. IEEE Trans. Dependable Secur. Comput. 2017, 16, 84–98. [Google Scholar] [CrossRef]
  16. Tsai, J.L.; Lo, N.W. A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 2015, 9, 805–815. [Google Scholar] [CrossRef]
  17. Yang, T.C.; Lo, N.W.; Liaw, H.T.; Wu, W.C. A secure smart card authentication and authorization framework using in multimedia cloud. Multimed. Tools Appl. 2017, 76, 11715–11737. [Google Scholar] [CrossRef]
  18. Kumari, S.; Karuppiah, M.; Das, A.K.; Li, X.; Wu, F.; Kumar, N. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 2018, 74, 6428–6453. [Google Scholar] [CrossRef]
  19. Shajina, A.R.; Varalakshmi, P. A novel dual authentication protocol (DAP) for multi-owners in cloud computing. Clust. Comput. 2017, 20, 507–523. [Google Scholar] [CrossRef]
  20. Anakath, A.S.; Rajakumar, S.; Ambika, S. Privacy-preserving multi-factor authentication using trust management. Clust. Comput. 2017, 1–7. [Google Scholar] [CrossRef]
  21. Chaudhry, S.A.; Kim, I.L.; Rho, S.; Farash, M.S.; Shon, T. An improved anonymous authentication scheme for distributed mobile cloud computing services. Clust. Comput. 2017. [Google Scholar] [CrossRef]
  22. Kumar, S.; Singh, S.K.; Singh, A.K.; Tiwari, S.; Singh, R.S. Privacy-preserving security using biometrics in cloud computing. Multimed. Tools Appl. 2018, 77, 11017–11039. [Google Scholar] [CrossRef]
  23. Chatterjee, K. Biometric re-authentication: An approach towards achieving transparency in user authentication. Multimed. Tools Appl. 2019, 78, 6679–6700. [Google Scholar]
  24. Cresitello-Dittmar, B. Application of the Blockchain For Authentication and Verification of Identity. Independent Paper. 2016. [Google Scholar]
  25. Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of Blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE International Congress on Big Data (Big Data Congress); IEEE: Piscataway, NJ, USA, 2017; pp. 557–564. [Google Scholar]
  26. Minoli, D.; Occhiogrosso, B. Blockchain mechanisms for IoT security. Internet Things 2018, 1, 1–13. [Google Scholar] [CrossRef]
  27. Blockchain Demo. Available online: https://blockchaindemo.io/ (accessed on 5 June 2019).
  28. Niranjanamurthy, M.; Nithya, B.N.; Jagannatha, S. Analysis of Blockchain technology: Pros, cons, and SWOT. Clust. Comput. 2018, 1–15. [Google Scholar] [CrossRef]
  29. Zheng, B.K.; Zhu, L.H.; Shen, M.; Gao, F.; Zhang, C.; Li, Y.D.; Yang, J. Scalable and privacy-preserving data sharing based on Blockchain. J. Comput. Sci. Technol. 2018, 33, 557–567. [Google Scholar] [CrossRef]
  30. Tian, H.; He, J.; Ding, Y. Medical Data Management on Blockchain with Privacy. J. Med. Syst. 2019, 43, 26. [Google Scholar] [CrossRef] [PubMed]
  31. Ryu, J.H.; Sharma, P.K.; Jo, J.H.; Park, J.H. A Blockchain-based decentralized efficient investigation framework for IoT digital forensics. J. Supercomput. 2019, 1–16. [Google Scholar] [CrossRef]
  32. Knirsch, F.; Unterweger, A.; Engel, D. Privacy-preserving Blockchain-based electric vehicle charging with dynamic tariff decisions. Comput. Sci. Res. Dev. 2018, 33, 71–79. [Google Scholar] [CrossRef]
  33. Mengelkamp, E.; Notheisen, B.; Beer, C.; Dauer, D.; Weinhardt, C. A Blockchain-based smart grid: Towards sustainable local energy markets. Comput. Sci. Res. Dev. 2018, 33, 207–214. [Google Scholar] [CrossRef]
  34. Zegzhda, D.P.; Moskvin, D.A.; Myasnikov, A.V. Assurance of Cyber Resistance of the Distributed Data Storage Systems Using Blockchain Technology. Autom. Control Comput. Sci. 2018, 52, 1111–1116. [Google Scholar] [CrossRef]
  35. Dasgupta, D.; Shrein, J.M.; Gupta, K.D. A survey of Blockchain from the security perspective. J. Bank. Financ. Technol. 2019, 3, 1–17. [Google Scholar] [CrossRef]
  36. Huh, J.H.; Seo, K. Blockchain-based mobile fingerprint verification and automatic login platform for future computing. J. Supercomput. 2019, 75, 3123–3139. [Google Scholar] [CrossRef]
  37. Nagasubramanian, G.; Sakthivel, R.K.; Patan, R.; Gandomi, A.H.; Sankayya, M.; Balusamy, B. Securing e-health records using keyless signature infrastructure Blockchain technology in the cloud. Neural Comput. Appl. 2019, 1–9. [Google Scholar] [CrossRef]
  38. Xue, J.; Xu, C.; Zhao, J.; Ma, J. Identity-based public auditing for cloud storage systems against malicious auditors via Blockchain. Sci. China Inf. Sci. 2019, 62, 32104. [Google Scholar] [CrossRef]
  39. Lee, B.; Lee, J.H. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment. J. Supercomput. 2017, 73, 1152–1167. [Google Scholar] [CrossRef]
  40. Yu, Q.; Meeuw, A.; Wortmann, F. Design and implementation of a Blockchain multi-energy system. Energy Inform. 2018, 1, 17. [Google Scholar] [CrossRef]
  41. Malomo, O.O.; Rawat, D.B.; Garuba, M. Next-generation cybersecurity through a Blockchain-enabled federated cloud framework. J. Supercomput. 2018, 74, 5099–5126. [Google Scholar] [CrossRef]
  42. Altulyan, M.; Yao, L.; Kanhere, S.S.; Wang, X.; Huang, C. A unified framework for data integrity protection in people-centric smart cities. Multimed. Tools Appl. 2019, 1–14. [Google Scholar] [CrossRef]
  43. Feng, L.; Zhang, H.; Tsai, W.T.; Sun, S. System architecture for high-performance permissioned Blockchains. Front. Comput. Sci. 2019, 1–15. [Google Scholar] [CrossRef]
  44. Brilliantova, V.; Thurner, T.W. Blockchain and the future of energy. Technol. Soc. 2019, 57, 38–45. [Google Scholar] [CrossRef]
  45. Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On Blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
  46. Chen, G.; Xu, B.; Lu, M.; Chen, N.S. Exploring blockchain technology and its potential applications for education. Smart Learn. Environ. 2018, 5, 1. [Google Scholar] [CrossRef]
  47. Amadio, R.M.; Charatonik, W. On name generation and set-based analysis in the Dolev-Yao model. In International Conference on Concurrency Theory; Springer: Berlin/Heidelberg, Germany, 2002. [Google Scholar]
  48. Cremers, C.J. The Scyther Tool: Verification, falsification, and analysis of security protocols. In International Conference on Computer–Aided Verification; Springer: Berlin/Heidelberg, Germany, 2008; pp. 414–418. [Google Scholar]
  49. Cremers, C. Scyther. Semantics and Verification of Security Protocols; University Press Eindhoven: Eindhoven, The Netherlands, 2006. [Google Scholar]
  50. Yang, H.; Oleshchuk, V.A.; Prinz, A. Verifying Group Authentication Protocols by Scyther. JoWUA 2016, 7, 3–19. [Google Scholar]
  51. Singh, S.P.; Nayyar, A.; Kumar, R.; Sharma, A. Fog computing: From architecture to edge computing and big data processing. J. Supercomput. 2018, 75, 1–36. [Google Scholar] [CrossRef]
  52. Pramanik, P.K.D.; Pareek, G.; Nayyar, A. Security and Privacy in Remote Healthcare: Issues, Solutions, and Standards. In Telemedicine Technologies; Academic Press: Cambridge, MA, USA, 2019; pp. 201–225. [Google Scholar]
  53. Nayyar, A.; Jain, R.; Mahapatra, B.; Singh, A.Q. Cyber Security Challenges for Smart Cities. In Driving the Development, Management, and Sustainability of Cognitive Cities; IGI Global: Hershey, PA, USA, 2019; pp. 27–54. [Google Scholar]
  54. Tandon, A.; Nayyar, A. A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyber threat. In Data Management, Analytics and Innovation; Springer: Singapore, 2019; pp. 403–420. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.