Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 5 of 5
  • Item
    Blockchain based Data Access Control using Smart Contracts
    (Institute of Electrical and Electronics Engineers Inc., 2019) Kiran, A.; Dharanikota, S.; Annappa, A.
    The keystone of information security has been access control. Very often, User data is misused and users are oblivious to the use of their data by unauthorized parties. Current strategies to provide storage for confidential data and subsequent authentication involve relying on a trusted third party for the same, which could be victims of Denial of Service (DoS) attacks or technical failures. This paper examines a strategy where the underlying framework for providing Access Control is the blockchain, hence decentralizing the mechanism of providing access control. Further in this paper, we demonstrate and model the User Data access on the Ethereum framework. Personal Information of the user by a website or an application is retrieved on a need-to-know basis from the off-blockchain, as determined by the user, the true owner of the data. Personal data is highly protected and the different permissions to different websites or applications are determined by the Smart Contract. © 2019 IEEE.
  • Item
    Peer Consonance in Blockchain based Healthcare Application using AI-based Consensus Mechanism
    (Institute of Electrical and Electronics Engineers Inc., 2020) Kumar, N.; Parangjothi, C.; Guru, S.; Manjappa, M.
    The term 'Blockchain', commonly referred to as the brain behind the Bitcoin network, works on the simple principle of the presence of a distributed and decentralized ledger in a public or private network. Since blockchain is decentralized, it is the duty of the Consensus Algorithm to substantiate the details in the blockchain. Traditional consensus algorithms such as Proof of Work (PoW) and Proof of Stake (PoS), although widely used, are a matter of concern due to computationally expensive operations and convergence towards a monopolized system respectively. Though optimizations of PoW and PoS algorithms were subsequently introduced, their features precincts. This paper aims to provide a solution by presenting a consensus algorithm based on Artificial Intelligence (AI) technology while maintaining the fairness of the system. A Healthcare based system was set up on top of the blockchain network to generate the dataset about the miners in order to train our neural network. On the whole, it incorporated the advantages of the state of the art consensus models which can increase the efficiency of the healthcare industry while diminishing their demerits. © 2020 IEEE.
  • Item
    Comparative Study of Machine Learning Algorithms for Fraud Detection in Blockchain
    (Institute of Electrical and Electronics Engineers Inc., 2021) Bhowmik, M.; Sai Siri Chandana, T.; Rudra, B.
    Fraudulent transactions have a huge impact on the economy and trust of a blockchain network. Consensus algorithms like proof of work or proof of stake can verify the validity of the transaction but not the nature of the users involved in the transactions or those who verify the transactions. This makes a blockchain network still vulnerable to fraudulent activities. One of the ways to eliminate fraud is by using machine learning techniques. Machine learning can be of supervised or unsupervised nature. In this paper, we use various supervised machine learning techniques to check for fraudulent and legitimate transactions. We also provide an extensive comparative study of various supervised machine learning techniques like decision trees, Naive Bayes, logistic regression, multilayer perceptron, and so on for the above task. © 2021 IEEE.
  • Item
    Hybrid Voting System Using Blockchain
    (Institute of Electrical and Electronics Engineers Inc., 2024) Nikhare, R.V.
    Voting is a vital pillar of democracy, upholding the principles of representation and public expression. Over time, the quest for secure and efficient systems has driven the transition from paper ballots to Electronic Voting Machines (EVMs). Nonetheless, persistent concerns surrounding EVM security have spurred the exploration of blockchain-based voting systems. The inherent attributes of transparency and immutability offered by blockchain technology hold promise in augmenting the security and integrity of the voting process. However, blockchain-based voting systems encounter their own distinct challenges. This paper presents a pioneering hybrid voting system model that harmonizes the merits of existing systems with the potential of blockchain technology. In this hybrid model, the authentication of voters is collaboratively facilitated by government employees and blockchain technology. Subsequently, voters can securely register their votes within the blockchain. Striving to strike a delicate equilibrium between convenience and security, this model aims to engender a resilient and all-encompassing voting system that inspires trust. A comprehensive assessment of the strengths and limitations inherent in traditional voting systems is undertaken, while simultaneously exploring the vast potential of blockchain technology. By effectively addressing the concerns pertaining to security and integrity, the proposed hybrid model aspires to forge a path toward a voting system that is both resilient and unequivocally trusted. ©2024 IEEE.
  • Item
    D-DNS: A Decentralized Domain Name System on the Blockchain: Implementation and Assessment
    (Institute of Electrical and Electronics Engineers Inc., 2024) Divakarla, U.; Chandrasekaran, K.
    Cache poisoning and DDoS attacks are just two of the many ways that the Domain Name System (DNS), an essential part of the Internet infrastructure, can be attacked. Countermeasures have been suggested, although they are not without restrictions. This article introduces D-DNS, a domain name system built on blockchain technology that can offer effective and safe DNS services. D-DNS solves two issues with current blockchain-based DNS systems: the inefficient query handling and the computationally demanding Proof-of-Work (PoW) protocol. D-DNS accomplishes this by putting in place a domain index and a Proof-of-Stake (PoS) consensus mechanism. To evaluate the security of D-DNS versus legacy DNS in terms of attack success rate, attack cost, and attack surface, a new quantitative comparison is presented.. According to experimental results, the attack surface of D-DNS is substantially less than that of legacy DNS, the attack cost is a million times higher, and the chance of a successful attack on D-DNS is 1% of a successful attack on legacy DNS. When D-DNS query performance is compared to the most advanced commercial DNS implementations, it is demonstrated to achieve equivalent or even reduced query latency. © 2024 IEEE.