Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (236)

Search Parameters:
Keywords = hyperledger fabric

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 2702 KB  
Review
Advancing Compliance with HIPAA and GDPR in Healthcare: A Blockchain-Based Strategy for Secure Data Exchange in Clinical Research Involving Private Health Information
by Sabri Barbaria, Abderrazak Jemai, Halil İbrahim Ceylan, Raul Ioan Muntean, Ismail Dergaa and Hanene Boussi Rahmouni
Healthcare 2025, 13(20), 2594; https://doi.org/10.3390/healthcare13202594 - 15 Oct 2025
Viewed by 577
Abstract
Background: Healthcare data interoperability faces significant barriers, including regulatory compliance complexities, institutional trust deficits, and technical integration challenges. Current centralized architectures demonstrate inadequate mechanisms for balancing data accessibility requirements with patient privacy protection, as mandated by HIPAA and GDPR frameworks. Traditional compliance approaches [...] Read more.
Background: Healthcare data interoperability faces significant barriers, including regulatory compliance complexities, institutional trust deficits, and technical integration challenges. Current centralized architectures demonstrate inadequate mechanisms for balancing data accessibility requirements with patient privacy protection, as mandated by HIPAA and GDPR frameworks. Traditional compliance approaches rely on manual policy implementation and periodic auditing, which are insufficient for dynamic, multi-organizational healthcare data-sharing scenarios. Objective: This study develops and proposes a blockchain-based healthcare data management framework that leverages Hyperledger Fabric, IPFS, and the HL7 FHIR standard and incorporates automated regulatory compliance mechanisms via smart contract implementation to meet HIPAA and GDPR requirements. It assesses the theoretical system architecture, security characteristics, and scalability considerations. Methods: We developed a permissioned blockchain architecture that employs smart contracts for privacy policy enforcement and for patient consent management. The proposed system incorporates multiple certification authorities for patients, hospitals, and research facilities. Architectural evaluation uses theoretical modeling and system design analysis to assess a system’s security, compliance, and scalability. Results: The proposed framework demonstrated enhanced security through decentralized control mechanisms and cryptographic protection protocols. Smart contract-based compliance verification can automate routine regulatory tasks while maintaining human oversight in complex scenarios. The architecture supports multi-organizational collaboration with attribute-based access control and comprehensive audit-trail capabilities. Conclusions: Blockchain-based healthcare data-sharing systems provide enhanced security and decentralized control compared with traditional architectures. The proposed framework offers a promising solution for automating regulatory compliance. However, implementation considerations—including organizational readiness, technical complexity, and scalability requirements—must be addressed for practical deployment in healthcare settings. Full article
(This article belongs to the Section Digital Health Technologies)
Show Figures

Figure 1

39 pages, 5203 KB  
Technical Note
EMR-Chain: Decentralized Electronic Medical Record Exchange System
by Ching-Hsi Tseng, Yu-Heng Hsieh, Heng-Yi Lin and Shyan-Ming Yuan
Technologies 2025, 13(10), 446; https://doi.org/10.3390/technologies13100446 - 1 Oct 2025
Viewed by 500
Abstract
Current systems for exchanging medical records struggle with efficiency and privacy issues. While establishing the Electronic Medical Record Exchange Center (EEC) in 2012 was intended to alleviate these issues, its centralized structure has brought about new attack vectors, such as performance bottlenecks, single [...] Read more.
Current systems for exchanging medical records struggle with efficiency and privacy issues. While establishing the Electronic Medical Record Exchange Center (EEC) in 2012 was intended to alleviate these issues, its centralized structure has brought about new attack vectors, such as performance bottlenecks, single points of failure, and an absence of patient consent over their data. Methods: This paper describes a novel EMR Gateway system that uses blockchain technology to exchange electronic medical records electronically, overcome the limitations of current centralized systems for sharing EMR, and leverage decentralization to enhance resilience, data privacy, and patient autonomy. Our proposed system is built on two interconnected blockchains: a Decentralized Identity Blockchain (DID-Chain) based on Ethereum for managing user identities via smart contracts, and an Electronic Medical Record Blockchain (EMR-Chain) implemented on Hyperledger Fabric to handle medical record indexes and fine-grained access control. To address the dual requirements of cross-platform data exchange and patient privacy, the system was developed based on the Fast Healthcare Interoperability Resources (FHIR) standard, incorporating stringent de-identification protocols. Our system is built using the FHIR standard. Think of it as a common language that lets different healthcare systems talk to each other without confusion. Plus, we are very serious about patient privacy and remove all personal details from the data to keep it confidential. When we tested its performance, the system handled things well. It can take in about 40 transactions every second and pull out data faster, at around 49 per second. To give you some perspective, this is far more than what the average hospital in Taiwan dealt with back in 2018. This shows our system is very solid and more than ready to handle even bigger workloads in the future. Full article
Show Figures

Figure 1

36 pages, 5130 KB  
Article
SecureEdge-MedChain: A Post-Quantum Blockchain and Federated Learning Framework for Real-Time Predictive Diagnostics in IoMT
by Sivasubramanian Ravisankar and Rajagopal Maheswar
Sensors 2025, 25(19), 5988; https://doi.org/10.3390/s25195988 - 27 Sep 2025
Viewed by 714
Abstract
The burgeoning Internet of Medical Things (IoMT) offers unprecedented opportunities for real-time patient monitoring and predictive diagnostics, yet the current systems struggle with scalability, data confidentiality against quantum threats, and real-time privacy-preserving intelligence. This paper introduces Med-Q Ledger, a novel, multi-layered framework [...] Read more.
The burgeoning Internet of Medical Things (IoMT) offers unprecedented opportunities for real-time patient monitoring and predictive diagnostics, yet the current systems struggle with scalability, data confidentiality against quantum threats, and real-time privacy-preserving intelligence. This paper introduces Med-Q Ledger, a novel, multi-layered framework designed to overcome these critical limitations in the Medical IoT domain. Med-Q Ledger integrates a permissioned Hyperledger Fabric for transactional integrity with a scalable Holochain Distributed Hash Table for high-volume telemetry, achieving horizontal scalability and sub-second commit times. To fortify long-term data security, the framework incorporates post-quantum cryptography (PQC), specifically CRYSTALS-Di lithium signatures and Kyber Key Encapsulation Mechanisms. Real-time, privacy-preserving intelligence is delivered through an edge-based federated learning (FL) model, utilizing lightweight autoencoders for anomaly detection on encrypted gradients. We validate Med-Q Ledger’s efficacy through a critical application: the prediction of intestinal complications like necrotizing enterocolitis (NEC) in preterm infants, a condition frequently necessitating emergency colostomy. By processing physiological data from maternal wearable sensors and infant intestinal images, our integrated Random Forest model demonstrates superior performance in predicting colostomy necessity. Experimental evaluations reveal a throughput of approximately 3400 transactions per second (TPS) with ~180 ms end-to-end latency, a >95% anomaly detection rate with <2% false positives, and an 11% computational overhead for PQC on resource-constrained devices. Furthermore, our results show a 0.90 F1-score for colostomy prediction, a 25% reduction in emergency surgeries, and 31% lower energy consumption compared to MQTT baselines. Med-Q Ledger sets a new benchmark for secure, high-performance, and privacy-preserving IoMT analytics, offering a robust blueprint for next-generation healthcare deployments. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

28 pages, 3255 KB  
Article
Design of an Intellectual Property Rights Certification System Based on a Consortium Blockchain
by Yifan Chu, Xiaoyang Zhou, Mingxin Lu, Chengfu Dong, Zhenyan Qin and Hua Wang
Electronics 2025, 14(19), 3788; https://doi.org/10.3390/electronics14193788 - 24 Sep 2025
Viewed by 367
Abstract
Under the background of economic globalization and the rapid development of the knowledge economy, a large number of intellectual property achievements in China need to flow efficiently in order to give full play to their value; however, the traditional method of rights confirmation [...] Read more.
Under the background of economic globalization and the rapid development of the knowledge economy, a large number of intellectual property achievements in China need to flow efficiently in order to give full play to their value; however, the traditional method of rights confirmation has problems, such as complicated operation, low efficiency, high cost, etc., and its practicability is limited. For this reason, this paper aims to construct an efficient intellectual property rights confirmation system by utilizing the characteristics of non-repudiation, non-tampering, traceability and distribution of the consortium chain. By designing smart contracts for user login and registration, rights confirmation, and transaction; combining with the Chameleon Signature algorithm to guarantee transaction security; and ensuring integration with the IPFS to improve the efficiency of file storage, this research develops an IPR confirmation system based on the consortium chain. This system was ultimately successfully deployed and tested, verifying that it operates with good efficiency and correctly realizes the expected functions. The findings show that the proposed system can effectively simplify the operation, provide reliable credentials, guarantee security and storage efficiency, and provide a feasible solution for intellectual property rights. Full article
(This article belongs to the Special Issue Novel Methods Applied to Security and Privacy Problems, Volume II)
Show Figures

Figure 1

14 pages, 4687 KB  
Proceeding Paper
Blockchain Model for Tracking Employees’ Location in the Company’s Premises
by Venelin Maleshkov, Veneta Aleksieva and Hristo Valchanov
Eng. Proc. 2025, 104(1), 11; https://doi.org/10.3390/engproc2025104011 - 25 Aug 2025
Viewed by 1734
Abstract
In the ever-evolving world full of technologies, blockchain proves itself to be the most secure way of dealing with tampering of data. This paper proposes an innovative model for tracking employees within facilities using RFID, IoT devices and blockchain technology implemented on the [...] Read more.
In the ever-evolving world full of technologies, blockchain proves itself to be the most secure way of dealing with tampering of data. This paper proposes an innovative model for tracking employees within facilities using RFID, IoT devices and blockchain technology implemented on the Hyperledger Fabric platform. The blockchain system supports a secure and tamper-proof recording of employee movement because it keeps the data in a decentralized system. Smart contracts automate activities like control access, generate alerts and create audit trails without the need for centralized management. This implementation shows a high level of security and efficiency, making it a good approach to improve monitoring and compliance within organizations. Full article
Show Figures

Figure 1

17 pages, 1684 KB  
Article
Privacy-Preserving EV Charging Authorization and Billing via Blockchain and Homomorphic Encryption
by Amjad Aldweesh and Someah Alangari
World Electr. Veh. J. 2025, 16(8), 468; https://doi.org/10.3390/wevj16080468 - 17 Aug 2025
Viewed by 669
Abstract
Electric vehicle (EV) charging infrastructures raise significant concerns about data security and user privacy because traditional centralized authorization and billing frameworks expose sensitive information to breaches and profiling. To address these vulnerabilities, we propose a novel decentralized framework that couples a permissioned blockchain [...] Read more.
Electric vehicle (EV) charging infrastructures raise significant concerns about data security and user privacy because traditional centralized authorization and billing frameworks expose sensitive information to breaches and profiling. To address these vulnerabilities, we propose a novel decentralized framework that couples a permissioned blockchain with fully homomorphic encryption (FHE). Unlike prior blockchain-only or blockchain-and-machine-learning solutions, our architecture performs all authorization and billing computations on encrypted data and records transactions immutably via smart contracts. We implemented the system on Hyperledger Fabric using the CKKS-based TenSEAL library, chosen for its efficient arithmetic on real-valued vectors, and show that homomorphic operations are executed off-chain within a secure computation layer while smart contracts handle only encrypted records. In a simulation involving 20 charging stations and up to 100 concurrent users, the proposed system achieved an average authorization latency of 610 ms, a billing computation latency of 310 ms, and transaction throughput of 102 Tx min while maintaining energy overhead below 0.14 kWh day per station. When compared to state-of-the-art blockchain-only approaches, our method reduces data exposure by 100%, increases privacy from “moderate” to “very high,” and achieves similar throughput with acceptable computational overhead. These results demonstrate that privacy-preserving EV charging is practical using present-day cryptography, paving the way for secure, scalable EV charging and billing services. Full article
(This article belongs to the Special Issue New Trends in Electrical Drives for EV Applications)
Show Figures

Figure 1

42 pages, 5651 KB  
Article
Towards a Trustworthy Rental Market: A Blockchain-Based Housing System Architecture
by Ching-Hsi Tseng, Yu-Heng Hsieh, Yen-Yu Chang and Shyan-Ming Yuan
Electronics 2025, 14(15), 3121; https://doi.org/10.3390/electronics14153121 - 5 Aug 2025
Viewed by 1254
Abstract
This study explores the transformative potential of blockchain technology in overhauling conventional housing rental systems. It specifically addresses persistent issues, such as information asymmetry, fraudulent listings, weak Rental Agreements, and data breaches. A comprehensive review of ten academic publications highlights the architectural frameworks, [...] Read more.
This study explores the transformative potential of blockchain technology in overhauling conventional housing rental systems. It specifically addresses persistent issues, such as information asymmetry, fraudulent listings, weak Rental Agreements, and data breaches. A comprehensive review of ten academic publications highlights the architectural frameworks, underlying technologies, and myriad benefits of decentralized rental platforms. The intrinsic characteristics of blockchain—immutability, transparency, and decentralization—are pivotal in enhancing the credibility of rental information and proactively preventing fraudulent activities. Smart contracts emerge as a key innovation, enabling the automated execution of Rental Agreements, thereby significantly boosting efficiency and minimizing reliance on intermediaries. Furthermore, Decentralized Identity (DID) solutions offer a robust mechanism for securely managing identities, effectively mitigating risks associated with data leakage, and fostering a more trustworthy environment. The suitability of platforms such as Hyperledger Fabric for developing such sophisticated rental systems is also critically evaluated. Blockchain-based systems promise to dramatically increase market transparency, bolster transaction security, and enhance fraud prevention. They also offer streamlined processes for dispute resolution. Despite these significant advantages, the widespread adoption of blockchain in the rental sector faces several challenges. These include inherent technological complexity, adoption barriers, the need for extensive legal and regulatory adaptation, and critical privacy concerns (e.g., ensuring compliance with GDPR). Furthermore, blockchain scalability limitations and the intricate balance between data immutability and the necessity for occasional data corrections present considerable hurdles. Future research should focus on developing user-friendly DID solutions, enhancing blockchain performance and cost-efficiency, strengthening smart contract security, optimizing the overall user experience, and exploring seamless integration with emerging technologies. While current challenges are undeniable, blockchain technology offers a powerful suite of tools for fundamentally improving the rental market’s efficiency, transparency, and security, exhibiting significant potential to reshape the entire rental ecosystem. Full article
(This article belongs to the Special Issue Blockchain Technologies: Emerging Trends and Real-World Applications)
Show Figures

Figure 1

24 pages, 1806 KB  
Article
Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain
by Semra Tebrizcik, Süleyman Ersöz, Elvan Duman, Adnan Aktepe and Ahmet Kürşad Türker
Appl. Sci. 2025, 15(15), 8460; https://doi.org/10.3390/app15158460 - 30 Jul 2025
Viewed by 864
Abstract
Many hospitals still lack digital traceability in hygiene and cleaning management, leading to operational inefficiencies and inconsistent quality control. This study aims to establish cleaning and hygiene processes in healthcare services that are planned in accordance with standards, as well as to enhance [...] Read more.
Many hospitals still lack digital traceability in hygiene and cleaning management, leading to operational inefficiencies and inconsistent quality control. This study aims to establish cleaning and hygiene processes in healthcare services that are planned in accordance with standards, as well as to enhance the traceability and sustainability of these processes through digitalization. This study proposes a Hyperledger Fabric-based blockchain architecture to establish a reliable and transparent quality assurance system in process management. The proposed Quality Assurance Model utilizes digital technologies and IoT-based RFID devices to ensure the transparent and reliable monitoring of cleaning processes. Operational data related to cleaning processes are automatically recorded and secured using a decentralized blockchain infrastructure. The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. Additionally, the execute–order–validate mechanism supports effective data sharing among stakeholders, and consensus algorithms along with chaincode rules enhance the reliability of processes. A working prototype was implemented and validated using Hyperledger Caliper under resource-constrained cloud environments, confirming the system’s feasibility through over 100 TPS throughput and zero transaction failures. Through the proposed system, cleaning/hygiene processes in patient rooms are conducted securely, contributing to the improvement of quality standards in healthcare services. Full article
Show Figures

Figure 1

27 pages, 1601 KB  
Article
A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps
by Zhonghao Zhai, Junyi Liu, Xinying Liu, Yanqin Mao, Xinjun Zhang, Jialin Ma and Chunhua Jin
Future Internet 2025, 17(8), 338; https://doi.org/10.3390/fi17080338 - 28 Jul 2025
Viewed by 525
Abstract
The Industrial Internet of Things (IIoT), a key enabler of Industry 4.0, integrates advanced communication technologies with the industrial economy to enable intelligent manufacturing and interconnected systems. Secure and reliable identity authentication in the IIoT becomes essential as connectivity expands across devices, systems, [...] Read more.
The Industrial Internet of Things (IIoT), a key enabler of Industry 4.0, integrates advanced communication technologies with the industrial economy to enable intelligent manufacturing and interconnected systems. Secure and reliable identity authentication in the IIoT becomes essential as connectivity expands across devices, systems, and domains. Blockchain technology presents a promising solution due to its decentralized, tamper-resistant, and traceable characteristics, facilitating secure and transparent identity verification. However, current blockchain-based cross-domain authentication schemes often lack a lightweight design, rendering them unsuitable for latency-sensitive and resource-constrained industrial environments. This paper proposes a lightweight cross-domain authentication scheme that combines blockchain with Chebyshev chaotic mapping. Unlike existing schemes relying heavily on Elliptic Curve Cryptography or bilinear pairing, our design circumvents such computationally intensive primitives entirely through the algebraic structure of Chebyshev polynomials. A formal security analysis using the Real-Or-Random (ROR) model demonstrates the scheme’s robustness. Furthermore, performance evaluations conducted with Hyperledger Fabric and the MIRACL cryptographic library validate the method’s effectiveness and superiority over existing approaches in terms of both security and operational efficiency. Full article
Show Figures

Figure 1

24 pages, 4612 KB  
Article
A Privacy Preserving Attribute-Based Access Control Model for the Tokenization of Mineral Resources via Blockchain
by Padmini Nemala, Ben Chen and Hui Cui
Appl. Sci. 2025, 15(15), 8290; https://doi.org/10.3390/app15158290 - 25 Jul 2025
Viewed by 538
Abstract
The blockchain technology is transforming the mining industry by enabling mineral reserve tokenization, improving security, transparency, and traceability. However, controlling access to sensitive mining data remains a challenge. Existing access control models, such as role-based access control, are too rigid because they assign [...] Read more.
The blockchain technology is transforming the mining industry by enabling mineral reserve tokenization, improving security, transparency, and traceability. However, controlling access to sensitive mining data remains a challenge. Existing access control models, such as role-based access control, are too rigid because they assign permissions based on predefined roles rather than real-world conditions like mining licenses, regulatory approvals, or investment status. To address this, this paper explores an attribute-based access control model for blockchain-based mineral tokenization systems. ABAC allows access permissions to be granted dynamically based on multiple attributes rather than fixed roles, making it more adaptable to the mining industry. This paper presents a high-level system design that integrates ABAC with the blockchain using smart contracts to manage access policies and ensure compliance. The proposed model is designed for permissioned blockchain platforms, where access control decisions can be automated and securely recorded. A comparative analysis between ABAC and RBAC highlights how ABAC provides greater flexibility, security, and privacy for mining operations. By introducing ABAC in blockchain-based mineral reserve tokenization, this paper contributes to a more efficient and secure way of managing data access in the mining industry, ensuring that only authorized stakeholders can interact with tokenized mineral assets. Full article
Show Figures

Figure 1

18 pages, 2840 KB  
Article
A Cross-Chain Solution to Connect Multiple DNS Blockchains in Consensus Roots System
by Linkai Zhu, Shanwen Hu, Zeyu Zhang and Changpu Meng
Appl. Sci. 2025, 15(13), 7422; https://doi.org/10.3390/app15137422 - 2 Jul 2025
Viewed by 1090
Abstract
The Domain Name System (DNS) is a key part of the Internet, and it is used for global domain name resolution. However, it has security risks due to its centralized or semi-centralized design and reliance on a few root servers. To improve DNS [...] Read more.
The Domain Name System (DNS) is a key part of the Internet, and it is used for global domain name resolution. However, it has security risks due to its centralized or semi-centralized design and reliance on a few root servers. To improve DNS security and long-term stability, this study proposes the consensus roots system, a blockchain-based distributed domain architecture. The system uses a 1 + N master-subchain structure to solve the problem of trust and data synchronization across blockchains. The master chain acts as a relay and uses Hyperledger Fabric, a consortium blockchain platform, to support semi-centralized cross-chain communication. Subchains are local blockchains that need to connect with the master chain. To ensure safe and reliable transactions, the system uses a staged-proposal atomic swap method on the master chain. Compared to prior approaches, this work introduces a cross-chain architecture that enables more efficient trust synchronization, reducing latency and improving scalability without compromising security. Full article
(This article belongs to the Special Issue Security and Reliability Assessment for Blockchain)
Show Figures

Figure 1

29 pages, 2303 KB  
Article
Denial-of-Service Attacks on Permissioned Blockchains: A Practical Study
by Mohammad Pishdar, Yixing Lei, Khaled Harfoush and Jawad Manzoor
J. Cybersecur. Priv. 2025, 5(3), 39; https://doi.org/10.3390/jcp5030039 - 30 Jun 2025
Viewed by 1747
Abstract
Hyperledger Fabric (HLF) is a leading permissioned blockchain platform designed for enterprise applications. However, it faces significant security risks from Denial-of-Service (DoS) attacks targeting its core components. This study systematically investigated network-level DoS attack vectors against HLF, with a focus on threats to [...] Read more.
Hyperledger Fabric (HLF) is a leading permissioned blockchain platform designed for enterprise applications. However, it faces significant security risks from Denial-of-Service (DoS) attacks targeting its core components. This study systematically investigated network-level DoS attack vectors against HLF, with a focus on threats to its ordering service, Membership Service Provider (MSP), peer nodes, consensus protocols, and architectural dependencies. In this research, we performed experiments on an HLF test bed to demonstrate how compromised components can be exploited to launch DoS attacks and degrade the performance and availability of the blockchain network. Key attack scenarios included manipulating block sizes to induce latency, discarding blocks to disrupt consensus, issuing malicious certificates via MSP, colluding peers to sabotage validation, flooding external clients to overwhelm resources, misconfiguring Raft consensus parameters, and disabling CouchDB to cripple data access. The experimental results reveal severe impacts on the availability, including increased latency, decreased throughput, and inaccessibility of the ledger. Our findings emphasize the need for proactive monitoring and robust defense mechanisms to detect and mitigate DoS threats. Finally, we discuss some future research directions, including lightweight machine learning tailored to HLF, enhanced monitoring by aggregating logs from multiple sources, and collaboration with industry stakeholders to deploy pilot studies of security-enhanced HLF in operational environments. Full article
(This article belongs to the Special Issue Cyber Security and Digital Forensics—2nd Edition)
Show Figures

Figure 1

33 pages, 8285 KB  
Article
TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing
by Hisham Ali, William J. Buchanan, Jawad Ahmad, Marwan Abubakar, Muhammad Shahbaz Khan and Isam Wadhaj
Future Internet 2025, 17(7), 289; https://doi.org/10.3390/fi17070289 - 27 Jun 2025
Viewed by 923
Abstract
We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture supports fine-grained access control and immutability through smart contract-enforced trust policies. The system combines Ciphertext-Policy [...] Read more.
We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture supports fine-grained access control and immutability through smart contract-enforced trust policies. The system combines Ciphertext-Policy Attribute-Based Encryption (CP-ABE) with temporal, spatial, and controlled revelation constraints to grant data owners precise control over shared intelligence. To ensure scalable decentralized storage, encrypted CTI is distributed via the IPFS, with blockchain-anchored references ensuring verifiability and traceability. Using STIX for structuring and TAXII for exchange, the framework complies with the GDPR requirements, embedding revocation and the right to be forgotten through certificate authorities. The experimental validation demonstrates that TrustShare achieves low-latency retrieval, efficient encryption performance, and robust scalability in containerized deployments. By unifying decentralized technologies with cryptographic enforcement and regulatory compliance, TrustShare sets a foundation for the next generation of sovereign and trustworthy threat intelligence collaboration. Full article
(This article belongs to the Special Issue Distributed Machine Learning and Federated Edge Computing for IoT)
Show Figures

Figure 1

24 pages, 2593 KB  
Review
A Comprehensive Analysis of Integrating Blockchain Technology into the Energy Supply Chain for the Enhancement of Transparency and Sustainability
by Narendra Gariya, Anjas Asrani, Adhirath Mandal, Amir Shaikh and Dowan Cha
Energies 2025, 18(11), 2951; https://doi.org/10.3390/en18112951 - 4 Jun 2025
Cited by 5 | Viewed by 2044
Abstract
The energy sector underwent a significant transformation with increasing demand for efficiency, transparency, and sustainability. The traditional or conventional system often faces several challenges, such as inefficient energy trading, a lack of transparency in renewable energy generation verification, and complex regulatory guidelines that [...] Read more.
The energy sector underwent a significant transformation with increasing demand for efficiency, transparency, and sustainability. The traditional or conventional system often faces several challenges, such as inefficient energy trading, a lack of transparency in renewable energy generation verification, and complex regulatory guidelines that affect its widespread adoption. Thus, blockchain technology has emerged as a potential solution to overcome these challenges, as it is known for its transparent, secure, and decentralized nature. However, despite the promising application of blockchain, its integration into the energy supply chain (ESC) is underexplored. The purpose of this research is to analyze the potential applications of blockchain technology in ESC in order to enhance efficiency, transparency, and sustainability in energy systems. The aim is to investigate the integration of blockchain with emerging technologies (such as IoTs, smart contracts, and P2P energy trading) in order to optimize energy production, distribution, and consumption. Furthermore, by comparing different blockchain platforms (like Ethereum, Solana, Hedera, and Hyperledger Fabric), this study discusses the security and scalability challenges of using blockchain in energy systems. It also examines the practical use cases of blockchain for the tokenization of RECs, dynamic energy pricing, and P2P energy trading by providing the Energy Web Foundation and Power Ledger as real-world examples. The article concludes that blockchain technology has the potential to transform ESC by enabling decentralized energy trading, which subsequently enhances transparency in energy transactions and the verification of renewable energy generation. It also identifies smart contracts and tokenization of energy assets as key parameters for dynamic pricing models and efficient trading mechanisms. However, regulatory and scalability challenges remain significant obstacles to its widespread adoption. Finally, this study provides the basis for future advancement in the adoption of blockchain technology in ESC, which offers a valuable resource for industry professionals, regulating authorities, and researchers. Full article
(This article belongs to the Section B: Energy and Environment)
Show Figures

Figure 1

16 pages, 643 KB  
Article
Secure and Transparent Space Exploration Data Management Using a Hybrid Blockchain Model
by Jaehyun Kim, Miguel Cartagena and Sunghwan Kim
Appl. Sci. 2025, 15(11), 6060; https://doi.org/10.3390/app15116060 - 28 May 2025
Viewed by 996
Abstract
This study proposes a hybrid blockchain system for secure and transparent data management in multinational space missions. By combining public and private blockchains, the model enables open access to non-sensitive data while protecting confidential mission records. Data integrity is ensured through cryptographic proofs [...] Read more.
This study proposes a hybrid blockchain system for secure and transparent data management in multinational space missions. By combining public and private blockchains, the model enables open access to non-sensitive data while protecting confidential mission records. Data integrity is ensured through cryptographic proofs without exposing the underlying content, and a cross-chain protocol enables real-time synchronization between chains without relying on centralized intermediaries. The system was implemented using Ethereum and Hyperledger Fabric and tested with real extravehicular activity data. Results show that it effectively detects data tampering, enforces access control, and synchronizes records with low latency. Compared to traditional centralized systems, this approach offers improved resilience, auditability, and trust across organizations. It provides a practical foundation for future space data infrastructures requiring both transparency and confidentiality. Full article
Show Figures

Figure 1

Back to TopTop