REVIEW | doi:10.20944/preprints202305.1874.v1
Subject: Computer Science And Mathematics, Security Systems Keywords: Security; Trusted Execution Environments; Technical Analysis; Privacy Preservation
Online: 26 May 2023 (07:17:51 CEST)
The main characteristics of blockchains, such as security and traceability, have enabled their use in many distinct scenarios, such as the rise of new cryptocurrencies and decentralized applications (dApps). However, part of the information exchanged with the typical blockchains is public, which can lead to privacy issues. To avoid or mitigate these issues, some blockchains are applying mechanisms to deal with data privacy. Trusted Execution Environments, the basis of confidential computing, and secure Multi-party Computation are two technologies that can be applied in that sense. In this paper, we analyzed seven blockchain technologies that apply mechanisms to improve data privacy. We defined seven technical questions related to common requirements for decentralized applications and, to answer each question, we reviewed the available documentation and gathered information from chat channels. We briefly present each blockchain technology and the answers to each technical question. Finally, we present a table summarizing the information and showing which technologies are more prominent.
ARTICLE | doi:10.20944/preprints202308.0178.v1
Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: Blockchain; Remote sensing data management; Distributed ledger technology; Trusted service; Security
Online: 2 August 2023 (08:43:07 CEST)
A large amount of raw data collected by satellites is processed by the production chain to obtain a large amount of product data, of which the secure exchange and storage is of interest to researchers in the field of remote sensing information science. Authentic, secure data is a critical foundation for data analysis and decision-making. And traditional centralized cloud computing systems are vulnerable to attacks, and once the central server is successfully attacked, all data will be lost. Distributed Ledger Technology (DLT) is an innovative computer technology that can ensure information security, traceability and tamper-proof, and can be applied to the field of remote sensing. Although there are many advantages to using DLT in remote sensing applications, there are some obstacles and limitations to its application. Remote sensing data has the characteristics of large data volume, spatiotemporal nature, global and so on, and it is difficult to store and interconnect remote sensing data in the blockchain. To address these issues, this paper proposes a trustworthy and decentralized system using blockchain. The novelty of this paper is to propose a multi-level blockchain architecture in which the system collects remote sensing data and stores it in the Interplanetary File System (IPFS) network, after generating the IPFS hash, the network rehashes the value again and uploads it on the Ethereum chain for public query. Distributed data storage improves data security, supports the secure exchange of information, and improves the efficiency of data management.
ARTICLE | doi:10.20944/preprints202302.0178.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: blockchain technology; trusted execution environment; attribute-based encryption; patient-driven inter- operability; Ethereum
Online: 10 February 2023 (03:48:35 CET)
With the rise of powerful computational technologies, healthcare systems are going through a paradigm shift to the era of healthcare 5.0, also known as" smart healthcare". This new-age healthcare system not only enhances the life of patients but also aims to reduce healthcare costs significantly. People's health data collected through various means, including various Internet of Things (IoT) devices, is too sensitive to be regulated by particular organisations owing to increasing privacy and security threats. The sheer size of data makes it difficult for centralised bodies to regulate, due to which third-party involvement is introduced, which again poses threats to the privacy of the data holder. Motivated by the abovementioned gaps, we propose a decentralised approach using Ethereum blockchain technology and Oasis protocol. The patient-driven solution approach effectively solves the privacy problem by providing complete control of data to the owner. Along with this, byproducts such as fine-grained access control and on-chain data processing capabilities are also obtained.