SAID: ECC-Based Secure Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System

2022-01-24
Rizwan, Muhammad
Sohail, Muhammad Noman
Asheralieva, Alia
Anjum, Adeel
Angın, Pelin
The fast digital transformation the world experienced in the past few decades has created a multitude of information resources distributed over the Internet and accessed by many different entities. The sharing of these resources needs to be secure and trustworthy to protect the privacy of data and data providers. Privacy and reliability are major concerns especially in blockchain-based data storage systems, as data are held by different owners. Each data provider tries to increase its share of profit by collaborating with other data providers. To ensure secure data sharing in such a decentralized environment, authentication and verification of shared data is needed. This paper proposes a mutual authentication mechanism based on Elliptic Curve Cryptography (ECC) using hash-based message authentication code (HMAC) to provide anonymity and integrity during the communication process in blockchain-based data sharing. To evaluate the fairness of profit sharing based on data providers' contributions and data utility, we propose the use of the Shapley value techniques. The performed security analysis demonstrates that our proposed approach is resilient against replay, secret disclosure, and traceability attacks.
IEEE International Conference on Blockchain

Suggestions

Optimization of an online course with web usage mining
Akman, LE; Akkan, B; Baykal, Nazife (2004-02-18)
The huge amount of information existing in the World Wide Web constitutes an ideal environment to implement data mining techniques. Web mining is the mining of web data. There are different applications of web mining: web content mining, web structure mining and web usage mining. In our study we analyzed an online course by web usage mining techniques in order to optimize the navigation paths, the duration of the time spend on each page and the number of visits throughout the semester of the course. Moreove...
Improved probabilistic matrix factorization model for sparse datasets /
Ar, Yılmaz; Taşkaya Temizel, Tuğba; Department of Information Systems (2014)
The amount of information on the World Wide Web has increased significantly owing to advancing web and information technologies. This has made it difficult for users to obtain relevant and useful information thus there is a need for information filtering. Recommender Systems (RS) have emerged as a technique to overcome the problem. Collaborative Filtering (CF) that is one of the widely used RS approaches aims to predict users’ preference concerning an item. The main idea behind CF is the users who agreed in...
A model for instructors' adoption of learning management systems: Empirical Validation in higher education context
Findik Coşkunçay, Duygu; Özkan Yıldırım, Sevgi (2013-04-01)
Through the rapid expansion of information technologies, Learning Management Systems have become one of the most important innovations for delivering education. However, successful implementation and management of these systems are primarily based on the instructors' adoption. In this context, this study aims to understand behavioral intentions of higher education instructors towards Learning Management Systems and further to identify the influencing factors. A multidimensional research model has been propo...
A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing
Bhargava, Bharat; Angın, Pelin; Ranchal, Rohit; Lingayat, Sunil (2015-01-01)
The past decade has witnessed immense developments in the field of network computing thanks to the rise of the cloud computing paradigm, which enables shared access to a wealth of computing and storage resources without needing to own them. While cloud computing facilitates on-demand deployment, mobility and collaboration of services, mechanisms for enforcing security and performance constraints when accessing cloud services are still at an immature state. The highly dynamic nature of networks and clouds ma...
Empirical investigation of Internet banking usage in Turkey
Daneshgadeh, Salva; Özkan Yıldırım, Sevgi; Department of Information Systems (2013)
With the fast development of Information and Communication Technologies (ICT), internet banking has become more popular worldwide. This study empirically investigates the factors impact internet banking usage by Turkish bank customers. A unique Internet Banking Usage Model (IBUM) was developed in this study. The proposed model incorporated 10 factors named usefulness, ease of use, compatibility, control, social influence, risk, website features, alliance service, awareness of service and customization/perso...
Citation Formats
M. Rizwan, M. N. Sohail, A. Asheralieva, A. Anjum, and P. Angın, “SAID: ECC-Based Secure Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System,” presented at the IEEE International Conference on Blockchain, Melbourne, Avustralya, 2022, Accessed: 00, 2022. [Online]. Available: https://ieeexplore.ieee.org/document/9680591.