Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
8 results
Search Results
Item The Dependency of Healthcare on Security: Issues and Challenges(Springer Science and Business Media Deutschland GmbH info@springer-sbm.com, 2021) Kittur, L.J.; Mehra, R.; Chandavarkar, B.R.Information security and privacy in the sector of healthcare is an important issue that has to be given importance. With the growing adoption of electronic health records of patients, the need of accessing and sharing information between different healthcare professionals is also increasing. This gives rise to the attention that has to be provided for securing the information. Also the adoption of the Internet of Things in wireless body sensor networks, leads to the usage of Cloud and Fog in healthcare systems. Thus pointing towards secure methods of accessing, storing, processing of sensitive data. In this paper, an overview of different issues and challenges pertaining to the security of healthcare systems is presented. Also, the solutions to address the security concerns in the healthcare systems are also discussed. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item Survey on security of biometric data using cryptography(Institute of Electrical and Electronics Engineers Inc., 2021) Thawre, A.; Hariyale, A.; Chandavarkar, B.R.Biometric Cryptography is the biometric tokenization used for authentication with public-key infrastructure (PKI). In particular, biometric cryptography provides the convenience of authentication via fingerprint, face, eye, voice, palm, etc.-with none of the risks posed by having the biometrics take the form of a shared secret. With comfort, biometric verification gives more security than as it were conventional cryptography-based confirmation. Since biometric highlights of each human being are distinctive from each other, that makes it difficult to get to in an unauthorized way and it jams the privacy at the time of verification since there's no plausibility of snooping. In this manner, these days the utilization of biometric-based confirmation has expanded and utilized in versatile, portable workstation, and numerous other gadgets are utilizing biometric-based verification and biometric information stored in biometric gadgets and programmers are exceptionally shrewd they can render biometric information, can take it, and not at all like username or password biometric information can not alter, due to unique feature of biometrics. It implies, compromising biometric information will be until the end of life, and programmers can take advantage of it, so the security of biometric information is a vital issue. This paper gives some idea about cryptography methods that are capable to secure biometric data and we have presented four cryptography methods which are Biometric Encryption, Blockchain, Cancelable biometrics, and Visual cryptography. This paper also provides some challenges, issues in biometric, and future direction. © 2021 IEEE.Item Misinformation Detection Through Authentication of Content Creators(Springer, 2023) KSudhama, K.; Siddamsetti, S.G.; G, P.; Chandavarkar, B.R.Recent technological advancements have made content modification and recreation easier and practically undetectable without suitable verification techniques. Users can change data from social media with photo, video, and text editing tools and share the updated content in a different context. As a result, online social media platforms are suitable for distributing fake news and misinformation. Misinformation can take several forms, including one or more types of multimedia, such as text, photos, videos. The modified contents provide fake evidence to the user, leading to various misconceptions. Generally, fake news has eye-catching headlines attracting the readers. These are called click-baits. The content of these click-baits often differs from what the headlines suggest. There are also many fake websites whose IP addresses are slightly modified versions of popular news agencies. Users easily get fooled to open the website as its address seems legitimate. These issues indicate the importance of identifying legitimate content creators from non-legitimate ones. This chapter focuses on authenticating the legitimate content creators verified by a trusted entity using certificates and blockchain technology. Also, check for fakeness in their content using natural language processing and image processing techniques. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.Item Adoption of Blockchain Technology in Land Registry Systems(Institute of Electrical and Electronics Engineers Inc., 2023) Sah, C.K.; Chandavarkar, B.R.The adoption of blockchain technology in land registry systems has gained significant attention in recent years due to its potential to increase efficiency, transparency, and security. This paper provides an overview of the current state of land registry systems and the challenges they face, in-cluding issues related to fraud, corruption, and a lack of trust. Then it discusses how blockchain technology can address these challenges by providing a decentralized, tamper-proof, and transparent platform for recording land transactions. The paper also examines some of the existing blockchain-based land registry systems and their features, using approaches and methodologies, including the use of smart contracts and digital signatures. Finally, the paper discusses the potential benefits and limitations of adopting blockchain technology in land registry systems and provides recommendations for policymakers and stakeholders interested in implementing these systems. © 2023 IEEE.Item AuthBlock: Authentication Framework Using Ethereum Blockchain(Springer Science and Business Media Deutschland GmbH, 2023) Kamble, S.; Chandavarkar, B.R.When employing authentication mechanisms to store user credentials, a subtle point to note is that they are easily vulnerable to cyber attacks like sharing of user data without their consent, password stealing on a large scale, etc. By decentralizing ownership of credentials and providing a framework for confirming one’s record in an unalterable chain of data, i.e., Distributed Ledger Technology (DLT) in general and blockchain can provide a solution. Blockchain technology can help reduce the risk of attacks and user data leaks through backdoors by establishing a secure platform for online service providers to authenticate users without a single point of failure. Blockchain is being utilized increasingly for trusted, decentralized, secure registration, authentication, and valuation of digital assets (assets, real estate, etc.) and transactions, governing interactions, recording data, and managing identity among numerous parties. Smart contracts are used to do transactions on the blockchain. This work aims to analyze the shortcomings of traditional authentication systems and hence provide a blockchain-based authentication solution to address them. In this paper, we suggest AuthBlock, a robust, lightweight, and secure blockchain-based authentication system. It can be used by multiple parties as an authentication framework in parallel without any interference. The proposed approach leverages the Ethereum blockchain along with its provision of smart contracts. The proposed method is tested on the Ethereum localnet created using Go Ethereum (Geth) and evaluated to analyze user authentication, verification, and cost. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item Mitigation of Trust-Related Issues in Cryptocurrency Payments Using Machine Learning: A Review(Springer Science and Business Media Deutschland GmbH, 2023) Shridhar Kallurkar, H.; Chandavarkar, B.R.Cryptocurrency is a type of fiat currency in digital form, unlike the physical money that is commonly used for daily purposes. A blockchain is a base on which a cryptocurrency operates, i.e., it is a growing list of records of transactions happening in a particular cryptocurrency. Trust in a cryptocurrency comes into the picture when two stakeholders, virtually unknown to each other, are confident or not about each other’s reliability in the context of whether each one is getting the service they intended to get. Trust in cryptocurrency can exist between any two stakeholders, such as users, merchants, government agencies, and blockchain technology, who are a part of cryptocurrency transactions. Furthermore, direct or indirect involvement of different stakeholders in cryptocurrency transactions results in issues such as lack of transparency, ease of use, regulations of the government, privacy, security of users, etc. Traditional approaches to anomaly detection in blockchain primarily use machine learning methods because they can infer patterns from historical data to give decent accuracy on test data. This survey presents trust in a cryptocurrency payment and its issues. Furthermore, it also shows the mitigation approaches which use machine learning techniques to address these issues. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item BlockFIR: Blockchain based First Information Report System(Institute of Electrical and Electronics Engineers Inc., 2023) Kamble, S.; Chandavarkar, B.R.India is experiencing a sharp rise in criminal activity. This is a serious problem, as many of these crimes go unreported. Although there is an online platform for the police to store First Information Reports (FIR) and Non-Cognizable Reports (NCR), most FIRs are still written by hand. This is inefficient and can lead to errors. Additionally, the complainant must typically be at the police station to report a cognizable offense. This can be inconvenient and time-consuming, especially for victims who live in rural areas. In 2009, the Crime and Criminal Tracking Network and Systems (CCTNS) were launched as an efficient e-governance system. This system has helped to improve the reporting of crimes, but it is still a centralized system. This means that it is vulnerable to cyberattacks and can be easily shut down by a single point of failure. Therefore, a fully decentralized system is required to ensure no single point of failure and that complaints are handled safely and securely to prevent unauthorized access. This paper proposes a blockchain-based solution called BlockFIR to manage complaints against cognizable and non-cognizable offenses. Using this system, complaints can be registered by users. The police stations will be able to see complaints registered in their jurisdiction, register FIRs/NCRs accordingly, and take action on them. Through a prototype implementation using Go-Ethereum (Geth), smart contracts, and Django web server, we demonstrate the practical use of BlockFIR. We show that our system can be easily used by users, police personnel, and Higher Authorities to improve the current systems in India. © 2023 IEEE.Item Smart Contract Vulnerabilities and Detection Methods: A Survey(Institute of Electrical and Electronics Engineers Inc., 2024) Gurjar, A.; Chandavarkar, B.R.Smart contracts are fundamental to blockchain technology, enabling automated contract execution without intermediaries. Their widespread adoption, particularly on platforms like Ethereum, has led to significant digital asset holdings. However, the immutability of blockchain magnifies the impact of even minor errors during smart contract development, potentially resulting in substantial financial losses. Given the frequency of vulnerabilities in existing contracts, secure smart contract development is essential. This paper conducts a comprehensive review of known vulnerabilities and detection methods to guide a more secure approach to smart contract development and promote safer blockchain ecosystems. © 2024 IEEE.
