Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2021
…
6 pages
1 file
Blockchain has become one of the most common methods for securing transfer data through decentralized peer-to-peer systems and has received extensive attention in recent years. Blockchain is an immutable ledger that allows the execution of a transaction in a secure and decentralized manner. This sophisticated but secure mechanism has an excellent reputation and has increased its customer base. Despite substantial attention, the blockchain system has many challenges that must be ad-dressed. This paper proposes a solution that provides a standard framework for mobile payments using blockchain technology. We further discuss security-related issues and attempt to determine the potential pitfalls with which such mechanisms can be exploited. We also investigate how popular currencies such as Bitcoin utilize security arrangements for safe transactions via mobile devices.
Mobile payment refers to the transfer of funds using a mobile device in exchange for goods or services. We present in this study, a taxonomy for the mobile payment platforms based on their architectures, communication technologies between their components, and targeted services (local commerce or remote payment), with enlightenment on security issues and limitations of different platforms. We also analyze the Blockchain as a potential technology to overcome these limitations, while pointing out problems of this technology that prevent it from being suitable for mobile commerce. At last, we indicate future research directions to deal with challenges in mobile payment platforms, and in Blockchain.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Blockchain is a type of distributed ledger that sits on the internet for recording transaction and maintaining a permanent and verifiable record-set of information. Token was created to reduce the government's control over cross-border transactions and to speed up the transaction process by removing the need for third-party intermediaries, Blockchain, on the other hand, provides a secure environment that token needs for peer-to-peer transactions. In other words, blockchain acts as bitcoin's ledger and maintains all the transactions of token. Token has a high degree of anonymity. Though the transactions are visible, it is close to impossible to identify the user. It is the purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double spending or high security. We propose a solution to the double-spending
International Journal of Innovative Research in Engineering & Management (IJIREM), 2023
Internet Banking offers clients the availability of dealing with one's assets whenever, anyplace. In any case, any web-based exchanges will be inclined to security dangers. Existing framework utilizes two way validation factors(OTP) that are handily broken by digital assailants prompting clients having their record subtleties compromised while not having the arrangement of aggressor's recognizable proof. Thus in this paper we propose a versatile SIM sequential based check framework to protect portable exchanges on cell phones with Blockchain based waiter side secure framework. The supporter character module(sim) chronic number is enlisted with the client's record and in the event that a gatecrasher attempts to start an exchange from some other sim, there emerges a befuddle of the login certifications then framework sends area data of the interloper to the bank. The bank then cautions the enrolled client via mailing them the interloper's subtleties. Since the versatile sim chronic number is remarkable to the sim and isn't physically rather separated, there is no chance of gatecrasher starting the exchange from another gadget, subsequently defeating the worries connected with OTP. The Ethereum Blockchain innovation gives server side information base security by checking the advanced marks during the exchange and agreement calculation for exchange affirmation. Blockchain based security is numerically demonstrated for secure financial exchange.
2018 Seventh International Conference on Communications and Networking (ComNet)
With the increasing number of connected devices and the number of online transactions today, managing all these transactions and devices and maintaining network security is a research issue. Current solutions are mainly based on cloud computing infrastructures, which require servers high-end and broadband networks to provide data storage and computing services. These solutions have a number of significant disadvantages, such as high maintenance costs of centralized servers, critical weakness of Internet Of Things applications, security and trust issues, etc. The blockchain is seen as a promising technique for addressing the mentioned security issues and design new decentralization frameworks. However, this new technology has a great potential in the most diverse technological fields. In this paper, we focus on presenting an overview of blockchain technology, highlighting its advantages, limitations and areas of application. The originality of this work resides in the comparison between the different blockchain systems and their security schemes and the perspective of integrating this technology into secured systems models for our comfort and our private life.
The emergence of digital technology has changed people's lives forever. In the financial sector, there have been numerous hazards and scams discovered. Banking systems have a centralised database, making it easier for an attacker to gain access to data and making the system insecure. The problems of this centralised approach can be minimised by changing the structure and using block-chain technology instead of tokens. Block-chain uses a decentralised design to store and retrieve data across a database. Database hacking attacks are reduced as a result. Each block in the network confirms block-chain transactions, increasing their security and supporting the financial system.
2021
Blockchain, a circulated record innovation, can possibly be conveyed in a wide scope of utilizations. Among these applications, decentralized payment frameworks (for example Bitcoin) have been perhaps the most developed blockchain applications with inescapable appropriation. While the early plans (for example Bitcoin) are regularly the cash of decision by cybercriminals, they just give pseudo-secrecy, as in anybody can de-anonymize Bitcoin exchanges by utilizing data in the blockchain. To reinforce the security insurance of decentralized payment frameworks, various arrangements, for example, Monero and Zerocash have been proposed. Notwithstanding, totally Decentralized Anonymous Payment (DAP) frameworks can be criminally misused, for instance in online coercion and illegal tax avoidance exercises. Perceiving the significance of guideline, we present a novel meaning of Decentralized Conditional Anonymous Payment (DCAP) and portray the comparing security necessities. To develop a soli...
International Journal of Advance Research Ideas and Innovations in Technology
The blockchain is a decentralized transaction and managing the data. This technology introduced on the first for Bitcoin cryptocurrency which makes easier for the transaction. Blockchain technology has highly raised up in 2008. The main purpose of the Blockchain technology is to provide security, anonymity and data integrity without any third party organization in control of the transactions. This helps on improving in research areas especially from the perspective of technical challenges and limitations. In this research, we have conducted survive mapping study with the goal of presenting the Blockchain technology. The main objective of the researchers is to make the challenges in understanding the current research areas. This the future way to developing more and more on Blockchain technology. A blockchain is just a chain and list of blocks which secures the transfer of funds, by using a digital signature algorithm to prove ownership. Each block in the blockchain will have its own digital signature. We create a web page that contains the login and registration page. We create a key pair of each user that contains the private key and public key. Every time we check this blockchain is valid or not. The main reason for the paper is to research and focus on revealing and improving limitations of Blockchain from privacy and security perspectives. On the basis of this studying the blockchain we highly recommend the researchers to develop in the future.
INTERNATIONAL CONFERENCE ON INTELLIGENT AND SMART COMPUTATION (ICIASC-2023), 2024
The present era is witnessing rapid development in the smartphone revolution, where mobile users can access many required services through mobile applications. These services include healthcare, finance, learning, insurance, and the Internet of Things. Android has become the most popular smartphone operating system, and this rapidly increasing adoption of Android has led to a significant increase in the number of malware compared to previous years, resulting in issues related to the insecurity of mobile applications and the violation of their users' privacy. A large role in this mobile phone revolution has been played by the emergence of blockchain technology (BCT), which represents an effective way to develop applications, improve their security, and protect the privacy of their users. The aim of this paper is to design a system architecture for the software and provide a prototype that uses BCT at its core for the purpose of storing and sharing malicious data while also integrating a malicious detection technique. We employed the design science research approach to guide our project. Through this approach, we successfully integrated a malware detection technique with BCT in an Android application, resulting in a decentralized feature that enables peers to add and share malware data. Furthermore, we have developed an easy-to-use interface that allows users to interact with the blockchain in the Android application. This interface displays the results of the malware signature detection algorithm and enables users to take appropriate action if malware is detected. We have employed a design science methodology to develop a software framework, and open-source code meeting the tool's requirements has been provided. Finally, the proposed methodology has been evaluated against the existing methodologies and compared with the other techniques to demonstrate the effectiveness of the blockchain-based detection tools.
The year 2020 saw remarkable domination of Android devices. Android’s large share of the global market (85%) places it first in the list of preferred targets for mobile cybercrime. Computer attacks try to control and access confidential user information by exploiting the various vulnerabilities present in the various components of the Android ecosystem. This thesis aims to propose a new Framework named ANDROSCANREG (Android Permissions Scan Registry) which incorporates an extensible approach for analyzing Android applications initially based on permissions and deployed in a decentralized and distributed system. The mentioned framework is based on the emerging technology called "Blockchain" whose potential is approved for transparency, availability, security, and reliability without resorting to a central trusted entity. Furthermore, in our efforts to improve the implementation of this Framework, we have proposed a new consensus algorithm called "Proof of Conformity -PoC-" in order to improve the reliability of consensus algorithms whose node weight calculation is based on one (or more) distinctive measurable criterion (stake, power, etc.). This improvement relates to the addition of a new impact factor called "Node Security Metric (NSM)" in the calculation of the node weight. NSM is primarily based on the weight recalculation of each network node based on the security and stability of its respective software and hardware environment. PoC weight recalculation is based on Common Vulnerability Scoring System (CVSS) vulnerabilities, our new approach aims to strengthen the node security index and encourage participants, respecting the recommended security requirements, to take advantage of their proactivity, vigilance, and compliance by increasing their chance of being selected as a Leader (validator) and winning rewards corresponding to the effort deployed. Besides, PoC has been theoretically evaluated via simulation scenarios through which significant results have been obtained showing that our approach ensures more likelihood for the more secure participating nodes to be designated as a validator based on their compliance rates represented by their NSM scores. Moreover, we thought as part of our research axis to equitably reward active participants. Indeed, we have presented a new approach for calculating rewards and penalties for systems based on Blockchain technology. The objective of our proposal is to ensure a new source of income in order to retain participants by guaranteeing them permanent profitability in exchange for their active participation in the stability and security of the Blockchain network to which they belong. We have studied and analyzed existing systems that, in general, favor the monopoly of rewards by attributing them either only to the Leader node (elected by a consensus algorithm) or benefit the Leader from a large part of the rewards and distributing the rest to a shortlist of participants. The result of our study shows that our approach offers more benefits by ensuring permanent, dynamic, and proportional rewards for all participating nodes according to their scores and compliance rate, the latter impacts the gradual penalty system put in place, which verifies the compliance of each node to the Blockchain protocol rules. A new innovative concept of operations execution in a Blockchain network was also proposed in this thesis. Indeed, the new approach improves the traditional data validation processes opted by Blockchain-based systems by allowing their nodes to adopt different and modifiable environments at any time in order to reduce the false positive rate and help identify polymorphic treatments and thus improve the reliability of the final results.
Gabema Academy, 2023
This study investigates the potential for blockchain technology to revolutionise the processing of digital transactions by bringing about improvements in safety, transparency, and confidence. The use of blockchain technology results in the creation of a decentralised architecture that does away with the need for opaque third-party middlemen. Blockchain technology enables peer-to-peer transactions to take place with an unparalleled level of security assurances. These guarantees are made possible through cryptographic signature, distributed consensus, immutable ledgers, and other technological aspects. This article presents an overview of blockchain technology and discusses the ways in which its characteristics, such as decentralisation, transparency, and immutability, enhance security in comparison to more conventional systems. Following that, it investigates a variety of applications spanning banking, contracts, supply chains, voting, identification, and other domains that potentially gain higher transaction integrity with the use of blockchain technology. Despite this, blockchain is still a relatively new technology that faces obstacles in the form of scalability, interoperability, legislation, and other concerns that have yet to be resolved. If these challenges can be surmounted, blockchain technology has a tremendous potential to revolutionise the way transactions are conducted in the digital economy by enhancing its efficacy, transparency, auditability, and trustworthiness. However, careful investigation and development are still required in order to incorporate blockchain designs in a way that is complementary to preexisting systems. In general, the blockchain technology sets the groundwork for establishing extremely resilient, decentralised, and secure digital transaction processing.
Trabajos de …, 2007
Anveshana’s International Journal Of Research In Education, Literature, Psychology And Library Sciences, 2019
Arena Online https://arena.org.au/cruel-irony-or-structural-cruelty-how-good-people-are-destroying-our-universities/., 2020
Dhaka University law journal, 2012
NURT SVD , 2018
International Journal of Urban and Regional Research, 2010
Transplantation Proceedings - TRANSPLANT PROC, 2006
Theoretical and Applied Fracture Mechanics, 2020
Frontiers in Ecology and Evolution, 2020
Revista Brasileira de Entomologia, 2020
Neurochemistry International, 1995
Bulletin of Marine …, 2009