Journal articles on the topic 'Centralized transaction systems'

To see the other types of publications on this topic, follow the link: Centralized transaction systems.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Centralized transaction systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

YAKOVCHUK, MYKOLA, VITALY MIKHALEVSKY, and TETYANA SKRYPNYK. "COMPARISON OF MANAGEMENT EFFICIENCY IN DECENTRALIZED AND CENTRALIZED SYSTEMS." Herald of Khmelnytskyi National University 301, no. 5 (October 2021): 41–44. http://dx.doi.org/10.31891/2307-5732-2021-301-5-41-44.

Full text
Abstract:
This article describes and investigates the difference between a decentralized and a centralized information system. The efficiency of use and introduction of new technologies in production is studied. The construction of blockchain-based systems and their efficiency in solving the tasks are analyzed. Conclusions are formed about the tendency that the introduction of decentralization proves the need for digital management systems. At a time when the implementation of blockchain technology has greatly simplified the construction of new decentralized systems, which is a current trend in the world. The basis of blockchain technology is in a distributed information storage. It allows you to store important information simultaneously on many servers, and therefore keep them open and safe. For example, on the basis of this technology it is possible store both the history of customers’ bank transactions, voting results, and database of contracts, fingerprints or medical histories. And the information that stored simultaneously in many places, it is impossible to steal it, because in any case they can be restored from the original sources. As already mentioned, a blockchain, a block of transactions, is a structure for writing transaction groups. Transactions are carried out only when it is considered confirmed. It is reliable and convenient when it comes to making payments or the transfer of confidential data. So that the transaction is considered confirmed, its format and signatures must be verified. After that, the group transactions are recorded in a special block. In these blocks, all data is fast to verify. And in each subsequent information about the previous is stored. For example, in transactions on cryptocurrencies, the chain contains blocks information about all actions ever performed with bitcoins. The block includes a header and a list of transactions. The title of the block has its own hash, previous block hash, transaction hash and other additional official information. The first thing that is specified in the transaction block is getting a commission that will be as a reward, so the user who actually and will create this block. For transactions in the block tree hashing was used.
APA, Harvard, Vancouver, ISO, and other styles
2

Milev, Aleksandar, and Svetlana Vasileva. "MODELLING OF CENTRALIZED TWO-PHASE LOCKING WITH INTEGRATED MECHANISM OF TIMESTAMPS BY THE “WAIT – DIE” METHOD." Journal scientific and applied research 4, no. 1 (October 10, 2013): 66–73. http://dx.doi.org/10.46687/jsar.v4i1.82.

Full text
Abstract:
This paper presents an algorithm for two-phase locking (2PL) in which deadlocks of distributed transactions for distributed database management systems (DDBMS) are avoided. The method of timestamps is chosen for solving deadlocks and the centralized 2PL algorithm is implemented in DDBMS. The „wait - die” strategy of timestamps mechanism for deadlocks avoiding is presented in this paper. The simulation results of modeling “wait-die” algorithm are given by using GPSS World Personal Version for two and three elements length of distributed transaction.
APA, Harvard, Vancouver, ISO, and other styles
3

Joglekar, Prof Dr Pushkar, Vedant Parvekar, Aditya Sabde, Omkar Rasal, and Yogesh Rasal. "Blockchain Based Transaction Management System." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1514–18. http://dx.doi.org/10.22214/ijraset.2023.50029.

Full text
Abstract:
Abstract: The technology that supports bitcoin, known as blockchain, is still in its development. Blockchain technology has the potential to improve existing corporate procedures to make them more collaborative, transparent, secure, and effective.. The banking sector is among the first to take advantage of this technology's disruptive potential. One of the most intricate bank payment systems in the entire globe is the Indian banking system. The current infrastructure that the Indian banking system uses is centralized and based on the real-time gross settlement system. This centralized architecture causes transactions to process slowly and result in wasting. Additionally, it costs a lot for security and recovery considerations. Systems for real-time gross contracts should indeed meet high expectations for speed, stability, and security. The primary objective is to develop a system that provides security, confidentiality, and a decentralized money lending mechanism rather than converting old system to the blockchain platform. Here, a novel strategy that encourages a decentralized system and services built on the Ethereum blockchain is progressed. The system enables a number of services using distributed ledger technology, including loan checking, money transfer, and money deposit, among others.
APA, Harvard, Vancouver, ISO, and other styles
4

Dodmane, Radhakrishna, Raghunandan K. R., Krishnaraj Rao N. S., Bhavya Kallapu., Surendra Shetty, Muhammad Aslam, and Syeda Fizzah Jilani. "Blockchain-Based Automated Market Makers for a Decentralized Stock Exchange." Information 14, no. 5 (May 9, 2023): 280. http://dx.doi.org/10.3390/info14050280.

Full text
Abstract:
The advancements in communication speeds have enabled the centralized financial market to be faster and more complex than ever. The speed of the order execution has become exponentially faster when compared to the early days of electronic markets. Though the transaction speed has increased, the underlying architecture or models behind the markets have remained the same. These models come with their own disadvantages. The disadvantages are usually faced by non-institutional or small traders. The bigger players, such as financial institutions, have an advantage over smaller players because of factors such as information asymmetry and access to better infrastructure, which give them an advantage in terms of the speed of execution. This makes the centralized stock market an uneven playing field. This paper discusses the limitations of centralized financial markets, particularly the disadvantage faced by non-institutional or small traders due to information asymmetry and better infrastructure access by financial institutions. The authors propose the usage of blockchain technology and the data highway protocol to create a decentralized stock exchange that can potentially eliminate these disadvantages. The data highway protocol is used to generate new blocks with a flexible finality condition that allows for the consensus mechanism to configure security thresholds more freely. The proposed framework is compared with existing frameworks to confirm its effectiveness and identify areas that require improvement. The evaluation of the proposed approach showed that the improved highway protocol boosted the transaction rate compared to the other two mechanisms (PoS and PoW). Specifically, the transaction rate of the proposed model was found to be 2.2 times higher than that of PoS and 12 times higher than that of the PoW consensus model.
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Cheng, Ce Zhang, Jianliang Xu, and Jian Pei. "SlimChain." Proceedings of the VLDB Endowment 14, no. 11 (July 2021): 2314–26. http://dx.doi.org/10.14778/3476249.3476283.

Full text
Abstract:
Blockchain technology has emerged as the cornerstone of many decentralized applications operating among otherwise untrusted peers. However, it is well known that existing blockchain systems do not scale well. Transactions are often executed and committed sequentially in order to maintain the same view of the total order. Furthermore, it is necessary to duplicate both transaction data and their executions in every node in the blockchain network for integrity assurance. Such storage and computation requirements put significant burdens on the blockchain system, not only limiting system scalability but also undermining system security and robustness by making the network more centralized. To tackle these problems, in this paper, we propose SlimChain, a novel blockchain system that scales transactions through off-chain storage and parallel processing. Advocating a stateless design, SlimChain maintains only the short commitments of ledger states on-chain while dedicating transaction executions and data storage to off-chain nodes. To realize SlimChain, we propose new schemes for off-chain smart contract execution, on-chain transaction validation, and state commitment. We also propose optimizations to reduce network transmissions and a new sharding technique to improve system scalability further. Extensive experiments are conducted to validate the performance of the proposed SlimChain system. Compared with the existing systems, SlimChain reduces the on-chain storage requirements by 97% ~ 99%, while also improving the peak throughput by 1.4× ~ 15.6×.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Jianhua, Shengbo Sun, Zheng Chang, Bo Zhou, Yongli Wang, Jingyan Wang, and Shuo Wang. "Application of blockchain in integrated energy system transactions." E3S Web of Conferences 165 (2020): 01014. http://dx.doi.org/10.1051/e3sconf/202016501014.

Full text
Abstract:
Blockchain technology is the underlying technology of Bitcoin, which is fair, transparent and decentralized. The integrated energy system has the characteristics of open interconnection, user-centered and distributed peer-to-peer sharing, and its energy trading model will also be developed centrally to distributed. The characteristics of blockchain technology make it naturally applicable to energy transactions in integrated energy systems. This article first analyzes the characteristics of the integrated energy system market and summarizes the participants in the market. Then, based on the existing research and analysis, a blockchain-based energy transaction architecture is designed, and a weakly centralized management method is introduced. finally, the problems and challenges faced by the application of blockchain in energy transactions are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
7

Xiao, Yuanyuan, Chuangming Zhou, Xinpeng Guo, Yafei Song, and Chen Chen. "A Novel Decentralized E-Commerce Transaction System Based on Blockchain." Applied Sciences 12, no. 12 (June 7, 2022): 5770. http://dx.doi.org/10.3390/app12125770.

Full text
Abstract:
With the rapid development of e-commerce systems, the centralized service model gradually fails to meet the needs of SMEs. In the existing centralized e-commerce system, users’ transaction data and reputation scores are stored in a centralized cloud server, which has high storage cost, low processing efficiency, and the data is vulnerable to attacks and leaks. However, the existing decentralized e-commerce systems more than its reputation system to store the average credit score evaluation are receiving unfair evaluations against risk. The system of malicious nodes and no disciplinary measures, is not conducive to system development. To solve this problem, this paper proposes a blockchain-based decentralized e-commerce transaction system. The system commodity information is stored in the Interplanetary File System (IPFS) and the returned commodity addresses are stored in the blockchain to enhance the service performance. This paper proposes a reputation evaluation model based on multi-criteria decision making (MCDM), which can effectively resist unfair evaluation and collusion attacks, and proposes an incentive mechanism based on reputation value to reward and punish nodes, thus promoting the good circulation of the system. We implement the proposed system based on Ethereum. The experimental results show that the system has a small communication cost, accurately reflects the user’s reputation value, and has good availability and reliability.
APA, Harvard, Vancouver, ISO, and other styles
8

Gu, Yonggen, Dingding Hou, Xiaohong Wu, Jie Tao, and Yanqiong Zhang. "Decentralized Transaction Mechanism Based on Smart Contract in Distributed Data Storage." Information 9, no. 11 (November 17, 2018): 286. http://dx.doi.org/10.3390/info9110286.

Full text
Abstract:
Distributed data storage has received more attention due to its advantages in reliability, availability and scalability, and it brings both opportunities and challenges for distributed data storage transaction. The traditional transaction system of storage resources, which generally runs in a centralized mode, results in high cost, vendor lock-in and single point failure risk. To overcome the above shortcomings, considering the storage policy with erasure coding, in this paper we propose a decentralized transaction method for cloud storage based on a smart contract, which takes into account the resource cost for distributed data storage. First, to guarantee the availability and decrease the storing cost, a reverse Vickrey-Clarke-Groves (VCG) based auction mechanism is proposed for storage resource selection and transaction. Then we deploy and implement the proposed mechanism by designing a corresponding smart contract. Especially, we address the problem of how to implement a VCG-like mechanism in a blockchain environment. Based on the private chain of Ethereum, we make the simulation for the proposed storage transaction method. The results of simulation show that the proposed transaction model can realize competitive trading of storage resources and ensure the safe and economic operation of resource trading.
APA, Harvard, Vancouver, ISO, and other styles
9

Vishwakarma, Jaychand. "Transaction Processing Environment Kernelized Architecture in Multilevel Secure Application Policies." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 2 (February 28, 2018): 87. http://dx.doi.org/10.23956/ijarcsse.v8i2.577.

Full text
Abstract:
Multilevel security poses many challenging problems for transaction processing. The challenges are due to the conflicting requirements imposed by confidentiality, integrity, and availability} the three components of security. We identify these requirements on transaction processing in Multilevel Secure (MLS) database management systems (DBMSs) and survey the efforts of a number of researchers to meet these requirements .While our emphasis on centralized system based on kernelized Architecture, we briefly overview the research in the distributed MLS DBMSs as well.
APA, Harvard, Vancouver, ISO, and other styles
10

Jha, Sudan, Nishant Jha, Deepak Prashar, Sultan Ahmad, Bader Alouffi, and Abdullah Alharbi. "Integrated IoT-Based Secure and Efficient Key Management Framework Using Hashgraphs for Autonomous Vehicles to Ensure Road Safety." Sensors 22, no. 7 (March 25, 2022): 2529. http://dx.doi.org/10.3390/s22072529.

Full text
Abstract:
Autonomous vehicles offer various advantages to both vehicle owners and automobile companies. However, despite the advantages, there are various risks associated with these vehicles. These vehicles interact with each other by forming a vehicular network, also known as VANET, in a centralized manner. This centralized network is vulnerable to cyber-attacks which can cause data loss, resulting in road accidents. Thus, to prevent the vehicular network from being attacked and to prevent the privacy of the data, key management is used. However, key management alone over a centralized network is not effective in ensuring data integrity in a vehicular network. To resolve this issue, various studies have introduced a blockchain-based approach and enabled key management over a decentralized network. This technique is also found effective in ensuring the privacy of all the stakeholders involved in a vehicular network. Furthermore, a blockchain-based key management system can also help in storing a large amount of data over a distributed network, which can encourage a faster exchange of information between vehicles in a network. However, there are certain limitations of blockchain technology that may affect the efficient working of autonomous vehicles. Most of the existing blockchain-based systems are implemented over Ethereum or Bitcoin. The transaction-processing capability of these blockchains is in the range of 5 to 20 transactions per second, whereas hashgraphs are capable of processing thousands of transactions per second as the data are processed exponentially. Furthermore, a hashgraph prevents the user from altering the order of the transactions being processed, and they do not need high computational powers to operate, which may help in reducing the overall cost of the system. Due to the advantages offered by a hashgraph, an advanced key management framework based on a hashgraph for secure communication between the vehicles is suggested in this paper. The framework is developed using the concept of Leaving of Vehicles based on a Logical Key Hierarchy (LKH) and Batch Rekeying. The system is tested and compared with other closely related systems on the basis of the transaction compilation time and change in traffic rates.
APA, Harvard, Vancouver, ISO, and other styles
11

Kumar, Randhir, and Rakesh Tripathi. "Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain." International Journal of Information Security and Privacy 15, no. 2 (April 2021): 87–112. http://dx.doi.org/10.4018/ijisp.2021040105.

Full text
Abstract:
Provenance provides information about how data came to be in its present state. Recently, many critical applications are working with data provenance and provenance security. However, the main challenges in provenance-based applications are storage representation, provenance security, and centralized approach. In this paper, the authors propose a secure trading framework which is based on the techniques of blockchain that includes various features like decentralization, immutability, and integrity in order to solve the trust crisis in centralized provenance-based system. To overcome the storage representation of data provenance, they propose JavaScript object notation (JSON) structure. To improve the provenance security, they propose the access control language (ACL) rule. To implement the JSON structure and ACL rules, permissioned blockchain based tool “Hyperledger Composer” has been used. They demonstrate that their framework minimizes the execution time when the number of transaction increases in terms of storage representation of data provenance and security.
APA, Harvard, Vancouver, ISO, and other styles
12

Böhme, Rainer, Nicolas Christin, Benjamin Edelman, and Tyler Moore. "Bitcoin: Economics, Technology, and Governance." Journal of Economic Perspectives 29, no. 2 (May 1, 2015): 213–38. http://dx.doi.org/10.1257/jep.29.2.213.

Full text
Abstract:
Bitcoin is an online communication protocol that facilitates the use of a virtual currency, including electronic payments. Bitcoin's rules were designed by engineers with no apparent influence from lawyers or regulators. Bitcoin is built on a transaction log that is distributed across a network of participating computers. It includes mechanisms to reward honest participation, to bootstrap acceptance by early adopters, and to guard against concentrations of power. Bitcoin's design allows for irreversible transactions, a prescribed path of money creation over time, and a public transaction history. Anyone can create a Bitcoin account, without charge and without any centralized vetting procedure—or even a requirement to provide a real name. Collectively, these rules yield a system that is understood to be more flexible, more private, and less amenable to regulatory oversight than other forms of payment—though as we discuss, all these benefits face important limits. Bitcoin is of interest to economists as a virtual currency with potential to disrupt existing payment systems and perhaps even monetary systems. This article presents the platform's design principles and properties for a nontechnical audience; reviews its past, present, and future uses; and points out risks and regulatory issues as Bitcoin interacts with the conventional financial system and the real economy.
APA, Harvard, Vancouver, ISO, and other styles
13

Jinadu, O. T., O. V. Johnson, and M. Ganiyu. "Distributed Database System Optimization for Improved Service Delivery in Mobile and Cloud BigData Applications." International Journal of Computer Science and Mobile Computing 10, no. 9 (September 30, 2021): 38–45. http://dx.doi.org/10.47760/ijcsmc.2021.v10i09.004.

Full text
Abstract:
Many issues associated with managing centralized database include data isolation, redundancy, inconsistency, and atomicity of updates, among others; however, distributed database implementation over high-performance compute nodes maximizes information value across the networks. Also, analysis of bigdata generated/consumed over the mobile Internet, Internet of Things (IoT) and cloud computations necessitates low-latency reads and updates over cloud clusters. Conventionally, services in distributed systems demand optimized transactions. This paper examines transaction generation over distributed storage pool using suggested reference architectures of fragmentation using hybrid semi-join operations to offer mobility transparency as an additional ingredient of integrity transparency offer of DDBMS. Distributed storage pool is simulated using configured WLAN to activate multiple file transfers concurrently, engaging mobile nodes and large file sizes. Major functionality desired in the storage pool is improvised by storage virtualization whereby a global schema query optimizer effects transaction management to characterized latency-driven throughputs achieved by joint optimization of network and storage virtualization. Measurements and evaluations gave the best overall performance of low-latency reads and updates using the provisioned mobile-transmission control protocol (M-TCP). Appreciable improvement in service delivery is offered using distributed storage pool (DSP) facilitated with hybridized RAID construction and copy mechanisms. Improved response-time and speed-up transmissions evidently showed low-latency read and update transactions, depicting improved service delivery. Evaluating the DDBMS model simulated in the DSP architecture, all complexity (overheads) associated with conventional shared systems were minimized.
APA, Harvard, Vancouver, ISO, and other styles
14

Kim, Seong-Cheol, and Surender Reddy Salkuti. "Optimal power flow based congestion management using enhanced genetic algorithms." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 2 (April 1, 2019): 875. http://dx.doi.org/10.11591/ijece.v9i2.pp875-883.

Full text
Abstract:
<p>Congestion management (CM) in the deregulated power systems is germane and of central importance to the power industry. In this paper, an optimal power flow (OPF) based CM approach is proposed whose objective is to minimize the absolute MW of rescheduling. The proposed optimization problem is solved with the objectives of total generation cost minimization and the total congestion cost minimization. In the centralized market clearing model, the sellers (i.e., the competitive generators) submit their incremental and decremental bid prices in a real-time balancing market. These can then be incorporated in the OPF problem to yield the incremental/ decremental change in the generator outputs. In the bilateral market model, every transaction contract will include a compensation price that the buyer-seller pair is willing to accept for its transaction to be curtailed. The modeling of bilateral transactions are equivalent to the modifying the power injections at seller and buyer buses. The proposed CM approach is solved by using the evolutionary based Enhanced Genetic Algorithms (EGA). IEEE 30 bus system is considered to show the effectiveness of proposed CM approach.</p>
APA, Harvard, Vancouver, ISO, and other styles
15

Isong, Bassey, Tshipuke Vhahangwele, and Adnan M. Abu-Mahfouz. "Blockchain-Enabled Vaccination Registration and Verification System in Healthcare Management." Journal of Information Systems and Informatics 5, no. 2 (May 27, 2023): 719–41. http://dx.doi.org/10.51519/journalisi.v5i2.497.

Full text
Abstract:
Client-server-based healthcare systems are unable to manipulate a high data volume, prone to a single failure point, limited scalability, and data integrity. Particularly, several measures introduced to help curb the spread of Covid-19 were not effective and patient records were not adequately managed and maintained. Most vaccination-proof certificates were forged by unauthorized parties and no standard verification medium exists. Therefore, this paper proposes a blockchain-enabled vaccination management system (VMS). VMS utilizes smart contracts to store encrypted patients record, generate vaccination certificates, and verify the legitimacy of the certificate using a QR code. VMS prototype is implemented using Ethereum, a public blockchain and simulations performed based on Apache JMeter and Hyperledger Caliper to assess its performance in terms of throughput, latency and response time, and the average time per transaction. Results show VMS achieved an average: response time of 132.24 ms, the throughput of 379.89 tps, latency of 204.60 ms, and time of transactions is 10s-12s for 1000 transactions. Also, its comparison with the centralized database shows the traditional database’s effectiveness in transaction processing but lacks data privacy and security strengths. We, therefore, recommend the use of blockchain in the healthcare system and other related sectors such as elections, and student records management to ensure data privacy and security and rid the system of a single point of failure.
APA, Harvard, Vancouver, ISO, and other styles
16

Khoa, Bui Thanh, and Tran Trong Huynh. "How Does Anxiety Affect the Relationship between the Customer and the Omnichannel Systems?" Journal of Theoretical and Applied Electronic Commerce Research 18, no. 1 (January 9, 2023): 130–49. http://dx.doi.org/10.3390/jtaer18010007.

Full text
Abstract:
Omnichannel is not just a marketing, e-commerce, or customer support buzzword. This future customer engagement platform helps businesses communicate with customers through centralized channels on a smart interface. It is difficult to achieve customer loyalty when the risk in online transactions, which creates anxiety, exists in all transaction processes in an omnichannel system. Hence, the purpose of this research was to analyze the influence of anxiety on relationships when clients purchase from an omnichannel platform using the stimulus–organism–response (SOR) paradigm. To fulfill study aims, qualitative and quantitative research approaches were used. In-depth interviews and focus group discussions were used to acquire qualitative data, while survey responses from 485 participants were used to collect quantitative data. This study’s results revealed relationships between consumer psychology factors such as perceived mental benefits, hedonic value, and anxiety. Moreover, customer anxiety in omnichannel can be measured as a novel and exact concept in marketing science and have a moderating role in the effect of perceived mental benefits on electronic loyalty and perceived mental benefits on hedonic value in omnichannel systems. As a result, enterprises were also offered various managerial implications to develop their omnichannel system.
APA, Harvard, Vancouver, ISO, and other styles
17

Romano, P., F. Quaglia, and B. Ciciani. "A lightweight and scalable e-transaction protocol for three-tier systems with centralized back-end database." IEEE Transactions on Knowledge and Data Engineering 17, no. 11 (November 2005): 1578–83. http://dx.doi.org/10.1109/tkde.2005.171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Fan, Caixiang, Sara Ghaemi, Hamzeh Khazaei, Yuxiang Chen, and Petr Musilek. "Performance Analysis of the IOTA DAG-Based Distributed Ledger." ACM Transactions on Modeling and Performance Evaluation of Computing Systems 6, no. 3 (September 30, 2021): 1–20. http://dx.doi.org/10.1145/3485188.

Full text
Abstract:
Distributed ledgers (DLs) provide many advantages over centralized solutions in Internet of Things projects, including but not limited to improved security, transparency, and fault tolerance. To leverage DLs at scale, their well-known limitation (i.e., performance) should be adequately analyzed and addressed. Directed acyclic graph-based DLs have been proposed to tackle the performance and scalability issues by design. The first among them, IOTA, has shown promising signs in addressing the preceding issues. IOTA is an open source DL designed for the Internet of Things. It uses a directed acyclic graph to store transactions on its ledger, to achieve a potentially higher scalability over blockchain-based DLs. However, due to the uncertainty and centralization of the deployed consensus, the current IOTA implementation exposes some performance issues, making it less performant than the initial design. In this article, we first extend an existing simulator to support realistic IOTA simulations and investigate the impact of different design parameters on IOTA’s performance. Then, we propose a layered model to help the users of IOTA determine the optimal waiting time to resend the previously submitted but not yet confirmed transaction. Our findings reveal the impact of the transaction arrival rate, tip selection algorithms, weighted tip selection algorithm randomness, and network delay on the throughput. Using the proposed layered model, we shed some light on the distribution of the confirmed transactions. The distribution is leveraged to calculate the optimal time for resending an unconfirmed transaction to the DL. The performance analysis results can be used by both system designers and users to support their decision making.
APA, Harvard, Vancouver, ISO, and other styles
19

Ayed, Rihab, Mohand-Saïd Hacid, Rafiqul Haque, and Abderrazak Jemai. "An updated dashboard of complete search FSM implementations in centralized graph transaction databases." Journal of Intelligent Information Systems 55, no. 1 (December 20, 2019): 149–82. http://dx.doi.org/10.1007/s10844-019-00579-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Galić, Zdravko, and Mario Vuzem. "A Generic and Extensible Core and Prototype of Consistent, Distributed, and Resilient LIS." ISPRS International Journal of Geo-Information 9, no. 7 (July 13, 2020): 437. http://dx.doi.org/10.3390/ijgi9070437.

Full text
Abstract:
The majority of the existing land information systems (LIS) are centralized, transaction processing systems based on object-relational database management systems for data storage, management, and retrieval. These traditional database management systems are dominantly based on a share-everything or share disk architecture and face challenges in meeting the performance and scalability requirements of distributed, data-intensive systems, including LIS. They support vertical, rather than horizontal scalability, which is of particular importance in distributed systems. In some cases, due to legal, administrative, or infrastructure constraints, LIS need to be distributed rather than centralized systems. Distributed computing systems and share-nothing architecture have become very popular, including new data processing platforms and frameworks with horizontal scalability and fault tolerance capabilities. In this paper, we present cdrLIS—a generic and extensible core of LIS based on relevant international standards and the NewSQL database management system (DBMS) that enables the implementation of consistent, distributed, highly-available, and resilient LIS. A generic core is implemented in the Go programming language and can be easily extended and adopted towards the implementation of a specific country profile. cdrLIS can be deployed either on a computer cluster or on cloud computing platforms and thus support the design and building of a new generation of distributed and resilient data-intensive applications and information systems in the land administration domain.
APA, Harvard, Vancouver, ISO, and other styles
21

Clavijo Suntura, Joel Harry. "Customer identification in currency exchange companies as per FATF recommendations." Journal of Money Laundering Control 23, no. 1 (December 19, 2019): 96–102. http://dx.doi.org/10.1108/jmlc-05-2019-0036.

Full text
Abstract:
Purpose The purpose of this paper is to determine if customers due to diligence measures laid down in Financial Action Task Force (FATF) Recommendation no. 10 can be applied to customers of currency exchange companies. Design/methodology/approach Currency exchange financial entities undertake financial transactions with occasional customers, for this reason, this research work is aimed at carrying out a study of the content of FATF Recommendation no. 10 regarding the applicability of due diligence measures to occasional customers. For this purpose, the analytical and interpretative methods have been used. Findings FATF Recommendation No. 10 about customer due diligence measures has been designed primarily for financial entities with regular customers, however, most customers of financial currency exchange companies are occasional customers. For such financial entities, customer identification is mandatory only for transactions above 15,000 USD/EUR, leaving a potential risk of money laundering for financial transactions below that threshold. Furthermore, within currency exchange companies, risk factor analysis and customers’ identity verification are performed only on regular customers. Originality/value Customer due diligence measures in currency exchange financial entities should not be subject to the transaction threshold. Moreover, it is necessary to adopt a centralized control system to avoid currency exchange companies infringement of their control systems.
APA, Harvard, Vancouver, ISO, and other styles
22

Garvit Chutani, Saras Garg, Tushar Arora and Sakshi Jh. "Blockchain for Improved Water Resource Management." International Journal for Modern Trends in Science and Technology 9, no. 01 (January 25, 2023): 54–58. http://dx.doi.org/10.46501/ijmtst0901009.

Full text
Abstract:
One of the main issues over the ages has been the lack of water. The water supply networks are now being affected by the increased deployment of IOT technology and devices. The development of a trustworthy, auditable, and transparent traceable system like Blockchain is the product of creative research. Blockchain, a distributed ledger technology, introduces a fresh, creative strategy for the development of centralized, distrust-free systems. The use of blockchain technology eliminates corruption since it can keep track of every transaction. Blockchain has built-in capabilities for fault tolerance, immutability, transparency, and full transaction tracing for records that are saved, as well as for digital asset representation and transaction executions. The blockchain-based water management system described in this study is completely decentralized, with IoT devices collecting data as it is setup and adding it to the blockchain. We use the Ethereum blockchain to represent a supplier to consumer use case in our blockchain-based water management system. We also talk about the network's participants' duties in the water management system. Finally, we assessed the benefits of blockchain-based water management over existing ones and showed how it might benefit contemporary society.
APA, Harvard, Vancouver, ISO, and other styles
23

Khan, Abdullah Ayub, Asif Ali Laghari, Muhammad Shafiq, Shafique Ahmed Awan, and Zhaoquan Gu. "Vehicle to Everything (V2X) and Edge Computing: A Secure Lifecycle for UAV-Assisted Vehicle Network and Offloading with Blockchain." Drones 6, no. 12 (November 25, 2022): 377. http://dx.doi.org/10.3390/drones6120377.

Full text
Abstract:
Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over the last few years. The technology provides a new paradigm to design interconnected distributed nodes in Unmanned Aerial Vehicle (UAV)-assisted vehicle networks for communications between vehicles in smart cities. The process hierarchy of the current UAV-assisted networks is also becoming more multifaceted as more vehicles are connected, requiring accessing and exchanging information, performing tasks, and updating information securely. This poses serious issues and limitations to centralized UAV-assisted vehicle networks, directly affecting computing-intensive tasks and data offloading. This paper bridges these gaps by providing a novel, transparent, and secure lifecycle for UAV-assisted distributed vehicle communication using blockchain hyperledger technology. A modular infrastructure for Vehicle-to-Everything (V2X) is designed and ‘B-UV2X’, a blockchain hyperledger fabric-enabled distributed permissioned network-based consortium structure, is proposed. The participating nodes of the vehicle are interconnected with others in the chain of smart cities and exchange different information such as movement, etc., preserving operational logs on the blockchain-enabled immutable ledger. This automates IoV transactions over the proposed UAV-assisted vehicle-enabled consortium network with doppler spread. Thus, for this purpose, there are four different chain codes that are designed and deployed for IoV registration, adding new transactions, updating the ledger, monitoring resource management, and customized multi-consensus of proof-of-work. For lightweight IoV authentication, B-UV2X uses a two-way verification method with the defined hyperledger fabric consensus mechanism. Transaction protection from acquisition to deliverance and storage uses the NuCypher threshold proxy re-encryption mechanism. Simulation results for the proposed B-UV2X show a reduction in network consumption by 12.17% compared to a centralized network system, an increase in security features of up to 9.76%, and a reduction of 7.93% in the computational load for computed log storage.
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Le, Xuefeng Liu, and Xiaodong Lin. "A Fair and Privacy-Preserving Image Trading System Based on Blockchain and Group Signature." Security and Communication Networks 2021 (October 31, 2021): 1–18. http://dx.doi.org/10.1155/2021/5701258.

Full text
Abstract:
With the rise of digital images in our daily lives, there is a growing need to provide an image trading market where people can monetize their images and get desired images at prices that fit their budget. Those images are usually uploaded and stored onto centralized image trading service providers’ servers and the transactions for image trading are processed by these providers. Unfortunately, transaction unfairness and users’ privacy breaches have become major concerns since the service providers might be untrusted and able to manipulate image trading prices and infer users’ private information. Recently, several approaches have been proposed to address the unfairness issue by using the decentralized ledger technique and smart contract, but users’ privacy protection is not considered. In this paper, we propose a fair and privacy-preserving protocol that supports image fair exchange and protect user privacy. In particular, we exploit blockchain and Merkle tree to construct a fair image trading protocol with low communication overhead based on smart contract, which serves as an external judge that resolves disputes between buyers and sellers in image transactions. Moreover, we extend a popular short group signature scheme to protect users’ identity privacy, prevent linkability of transactions from being inferred, and ensure traceability of malicious users who may sell fake images and/or refuse to pay. Finally, we design and build a practical and open-source image trading system to evaluate the performance of our proposed protocol. Experimental results demonstrate its effectiveness and efficiency in real-world applications.
APA, Harvard, Vancouver, ISO, and other styles
25

Ismail, Anis, and Aziz Barbar. "A Simulation Framework for P2P Queries Routing for E-Business." International Journal of E-Entrepreneurship and Innovation 3, no. 2 (April 2012): 29–50. http://dx.doi.org/10.4018/jeei.2012040103.

Full text
Abstract:
On-line business transaction processing systems have so far been based on centralized or client-server architectures. The growing interest in Peer-to-Peer centralized or decentralized systems has inspired numerous research activities, though in a schema-based Peer-to-Peer (P2P) system, locating Peers (services) relevant to a given query is a basic problem for which different routing strategies of queries have been proposed. In this paper, the architecture, based on (Super-) Peers, is proposed, with a special focus on query routing. For an efficient query routing, (Super-) Peers having similar interests are grouped together and called Super-Super-Peers (SSP). Super-Peers submit queries that are often processed by members of this group. A SSP is a specific Super-Peer that contains knowledge about 1) its Super-Peers, and 2) the other SSP. Using data mining techniques knowledge is extracted by processing queries of Peers that transit on the network. The advantage of this distributed knowledge is that it avoids making semantic mapping between heterogeneous data sources owned by (Super-) Peers each time the system decides to route query to other (Super-) Peers.
APA, Harvard, Vancouver, ISO, and other styles
26

Repousis, Spyridon. "Money laundering and Greek banking payment and settlement systems." Journal of Money Laundering Control 19, no. 1 (January 4, 2016): 58–69. http://dx.doi.org/10.1108/jmlc-12-2014-0049.

Full text
Abstract:
Purpose – The purpose of this paper is to identify, categorize and describe the Greek banking payment and settlement systems and the way to SEPA. Also, the purpose is to describe authorities that supervise money laundering through Greek payment systems and identify major categories of suspicious transaction reports and amounts of criminal assets per each category. Design/methodology/approach – The Bank of Greece, central bank of Greece, has explicit tasks in the field of payment and settlement systems. In Greece, there are three payment and settlement systems: large-value payment system (TARGET2), retail payment systems and securities settlement systems. Findings – TARGET2 is based on a technically centralized platform (single shared platform – SSP), which is provided by the central banks of Germany, France and Italy, and it replaces the decentralized structure of the original TARGET system. Migration on TARGET2 took place in Greece on May 19, 2008. Ongoing cooperation between the European System of Central Banks and the banking community through extensive consultations facilitated the smooth migration to TARGET2. Retail payment systems consist of DIAS credit transfers, direct debits, check, ATM transactions and card payments. During the year 2013, DIAS cleared 144.13 million payment transactions with a total value of €184.1 billion. Most of the transactions were credit transfers SEPA compliant. Securities settlement systems operate on the delivery versus payment principle, whereby sales of securities and respective payments are affected simultaneously, as well as the principle of dual notice. Migration of Greek data systems toward SEPA through a regulatory framework will promote the use of common European standards and business practices for a fully automated and efficient processing of payment instruments. Bank of Greece and Greek Anti-Money Laundering and Counter Terrorist Financing Authority are responsible authorities to supervise illegal activity through bank payment systems. Data show that Greek bank payment systems were used during 2012 for tax evasion and for offences that result in imprisonment for over six months. Practical implications – Above findings are useful for information technology management, legislative and compliance authorities, investors and person that operate transactions with Greek banking payment and settlement systems. Originality/value – To the best of the author’s knowledge, it is the first study about Greek banking payment systems.
APA, Harvard, Vancouver, ISO, and other styles
27

Kim, Seungeun, Joohyung Kim, and Dongsoo Kim. "Implementation of a Blood Cold Chain System Using Blockchain Technology." Applied Sciences 10, no. 9 (May 11, 2020): 3330. http://dx.doi.org/10.3390/app10093330.

Full text
Abstract:
As the population structure changes due to lower fertility rates and rapid aging, the blood supply available for blood transfusion decreases and demand increases. In most countries, blood management information systems, led by national institutions, operate centrally. However, existing centralized blood management systems have limitations in that they lack detailed blood information and, moreover, information is not reflected in real time. To solve this problem, this paper presents an innovative blood cold chain system based on blockchain technology. The proposed system aims to increase information visibility by recording the overall information on the blood supply and providing detailed blood information such as blood consumption and disposal to the distributed ledger. In addition, this paper proposes direct blood transactions between medical institutions in cases of emergency. Currently, blockchain technologies are being actively employed in the supply chain management and medical fields in addition to financial systems. Particularly, private blockchain techniques with limited participants are relatively fast and reliable, making them suitable for B2B (Business-to-Business) transactions. Therefore, the proposed system is based on the architecture of Hyperledger Fabric, a private blockchain technology implemented by the Hyperledger Composer tool. Information in the proposed blood cold chain system cannot be forged or tampered with, and information recorded and shared in real time is kept transparent. In addition, allowing for B2B blood transaction in special circumstances will minimize the blood supply time and enable patients to be transfused quickly. Moreover, the surplus blood of medical institutions will be used to increase the usage rate relative to the supply amount.
APA, Harvard, Vancouver, ISO, and other styles
28

Li, Longxi. "Optimal Coordination Strategies for Load Service Entity and Community Energy Systems Based on Centralized and Decentralized Approaches." Energies 13, no. 12 (June 19, 2020): 3202. http://dx.doi.org/10.3390/en13123202.

Full text
Abstract:
The energy interaction among a load service entity and community energy systems in neighboring communities leads to a complex energy generation, storage, and transaction problem. A load service entity is formed by a local electricity generation system, storage system, and renewable energy resources, which can provide ancillary services to customers and the utility grid. This paper proposes two coordination schemes for the interaction of community-based energy systems and load service entities based on game-theoretic frameworks. The first one is a centralized coordination scheme with full cooperation, in which the load service entity and community energy systems jointly activate the local resources. The second one is set as a decentralized coordination scheme to obtain a relative balance of interests among the market participants in a Stackelberg framework. Two mathematical models are developed for the day-ahead decision-making of the above energy management schemes. The Shapley value method, Karush-Kuhn-Tucker conditions, and strong dual theory are applied to solve the complex coordination problems. Numerical study shows the effectiveness of the coordination strategies that all stakeholders benefit from the proposed coordination schemes and create a win–win situation. In addition, sensitivity analysis is conducted to study the effects of system configuration, energy demand, and energy prices on the economic performance of all stakeholders. The results can serve as references for business managers of the load service entity.
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Rongkuan, and Xi Chen. "Research on Agricultural Product Traceability Technology (Economic Value) Based on Information Supervision and Cloud Computing." Computational Intelligence and Neuroscience 2022 (January 30, 2022): 1–10. http://dx.doi.org/10.1155/2022/4687639.

Full text
Abstract:
Traditional agricultural product traceability system adopts centralized storage, and the traceability process is solidified, which results in the low reliability of traceability results and the poor flexibility of the system. Aiming to solve this problem, blockchain technology is applied to supply chain traceability, and a supply chain traceability system based on sidechain technology is proposed. Goods management, information sharing, and product traceability in supply chain are realized through Ethereum smart contract. The sidechain technology is adopted to expand Ethereum so that it can meet the needs of practical applications. The experiment results show that the proposed system has a transaction function and information sharing function. Compared with similar trading systems, the proposed system has more advantages in throughput and security.
APA, Harvard, Vancouver, ISO, and other styles
30

Kwak, Subin, Joohyung Lee, Jangkyum Kim, and Hyeontaek Oh. "EggBlock: Design and Implementation of Solar Energy Generation and Trading Platform in Edge-Based IoT Systems with Blockchain." Sensors 22, no. 6 (March 21, 2022): 2410. http://dx.doi.org/10.3390/s22062410.

Full text
Abstract:
In this paper, to balance power supplement from the solar energy’s intermittent and unpredictable generation, we design a solar energy generation and trading platform (EggBlock) using Internet of Things (IoT) systems and blockchain technique. Without a centralized broker, the proposed EggBlock platform can promote energy trading between users equipped with solar panels, and balance demand and generation. By applying the second price sealed-bid auction, which is one of the suitable pricing mechanisms in the blockchain technique, it is possible to derive truthful bidding of market participants according to their utility function and induce the proceed transaction. Furthermore, for efficient generation of solar energy, EggBlock proposes a Q-learning-based dynamic panel control mechanism. Specifically, we set the instantaneous direction of the solar panel and the amount of power generation as the state and reward, respectively. The angle of the panel to be moved becomes an action at the next time step. Then, we continuously update the Q-table using transfer learning, which can cope with recent changes in the surrounding environment or weather. We implement the proposed EggBlock platform using Ethereum’s smart contract for reliable transactions. At the end of the paper, measurement-based experiments show that the proposed EggBlock achieves reliable and transparent energy trading on the blockchain and converges to the optimal direction with short iterations. Finally, the results of the study show that an average energy generation gain of 35% is obtained.
APA, Harvard, Vancouver, ISO, and other styles
31

Tony Haryanto and Kalamullah Ramli. "Secure Cybersecurity Information Sharing for Sectoral Organizations Using Ethereum Blockchain and IPFS." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 3 (June 2, 2023): 670–80. http://dx.doi.org/10.29207/resti.v7i3.4956.

Full text
Abstract:
The COVID-19 pandemic has resulted in increased cross-sector cyber-attacks. Passive and reactive cybersecurity techniques relying solely on technology are insufficient to combat sophisticated attacks, necessitating proactive and collaborative security measures to minimize attacks. Cybersecurity Information Sharing (CIS) enhances security via proactive and collaborative cybersecurity information exchange, but its implementation via cloud services faces threats from man in the middle (MITM) and distributed denial of service (DDoS) attacks, as well as a vulnerability in cloud storage involving centralized data control. These threats and vulnerabilities result in a lack of user confidence in the confidentiality, integrity, and availability of information. This paper proposes Secure Cybersecurity Information Sharing (SCIS) to secure Cybersecurity Information in sectoral organizations using the private interplanetary file system (IPFS) network and the private Ethereum Blockchain network. Private Ethereum Blockchain enables secure and transparent transaction logging, while Private IPFS network provides decentralized storage, addressing vulnerabilities in centralized storage systems. The outcomes of the tests reveal that the suggested SCIS system offers cybersecurity information availability, confidentiality, and integrity. SCIS provides a high level of security to protect cybersecurity information exchanged between sectoral organizations using the Private Ethereum Blockchain network and the Private IPFS network so that organizations can safely share and utilize information.
APA, Harvard, Vancouver, ISO, and other styles
32

Grepon, Benzar Glen, Niño Baran, Kenn Migan Vincent Gumonan, Aldwin Lester Martinez, and Mona Liel Lacsa. "Designing and Implementing e-School Systems: An Information Systems Approach to School Management of a Community College in Northern Mindanao, Philippines." International Journal of Computing Sciences Research 6 (January 1, 2022): 792–808. http://dx.doi.org/10.25147/ijcsr.2017.001.1.74.

Full text
Abstract:
Purpose–Colleges and Universities have been established to provide educational services to the people. Like any other organization, the school has processes and procedures similar to business or industry that involve admissions, processing of data, and generation of reports. Those processes are made possible through a centralized system in storing, processing, and retrieval of data and information, the majority of the schools in the country are already adopting computer-based systems to address their needs especially on their student and school-related transactions. The absence of a computer system and the complexity of the transactions of the college which makes the personnel be loaded with paper works in storingand keeping student records and information is the motivating factor why the School Management Information System has been designed and developed for a community college in the northern part of Mindanao.Method-This paper discusses the Major Functionalities and Modules of the systemthroughits implementation methodology which is the AgileModel and its impact on the delivery of services and procedures in the overall operation of the college.Results–The project has been evaluated based on ISO 25010,a quality model used for product/software quality evaluation systems. Based on the results of the evaluation, SMIS has been Functional, Usable, and Reliable with an average for every criterion above 4.04indicating very good performance based on a Likert scale descriptive interpretation.Conclusion–Based on the preceding findings of the study, the respondents agreed that the developed e-school system was functional and lifted the transaction process of the school. The faculty and staff have benefited from making use of the system. The overall quality and performance of the system was verygood in terms of functionality, usability, andreliability.Recommendations–It is recommended that future development such as the smartphone and tablet-based attendance monitoring should be integrated, a kiosk for grades and schedule viewing should also be placed inside the campus that is connected to the database server. Online student information systems should also be developed for the benefit of the students and parents, in easily monitoring school-related activities and requirements.Research Implications–The study enabled the centralization of school and student data in storing, processing and retrieval. The System has been implemented in the college and has been updated now and then for continuous quality improvement.
APA, Harvard, Vancouver, ISO, and other styles
33

Fathiyana, Rana Zaini, Syifa Nurgaida Yutia, and Dinda Jaelani Hidayat. "Prototype of Integrated National Identity Storage Security System in Indonesia using Blockchain Technology." JOIV : International Journal on Informatics Visualization 6, no. 1 (March 31, 2022): 109. http://dx.doi.org/10.30630/joiv.6.1.877.

Full text
Abstract:
Approximately 29 institutions in Indonesia issue were identifying numbers, such as ID cards, driving licenses, BPJS, etcetera. In general, the identity storage system is designed with a centralized system and managed by each government agency. However, this system has some disadvantages, like data replication and redundancy. Furthermore, the Indonesian government is now undertaking a program through the Ministry of Home Affairs to use population data for public services by providing access to organizations cooperating for population data use. With a centralized database managed by a single entity, data abuse can occur and rely on third parties, the sole authority of the national identity data. The blockchain-based solution described in this paper to integrate a national identity system can provide the advantages of a population data utilization program. The system designed can facilitate convenience in sharing and updating population data while also ensuring the security and integrity of the population data. The citizens do not have to worry about the possibility of data misuse by user institutions. Blockchain technology offers decentralization through the participation of members across a distributed network. There is no single point of failure, and no single user may alter the transaction record. Our proposed approach could help the government of Indonesia secure citizens' private information and increase transparency in information management.
APA, Harvard, Vancouver, ISO, and other styles
34

Ahmet Kurt, Suat Mercan, Enes Erdin, and Kemal Akkaya. "3-of-3 multisignature approach for enabling lightning network micro-payments on IoT devices." ITU Journal on Future and Evolving Technologies 2, no. 5 (July 23, 2021): 53–67. http://dx.doi.org/10.52953/wzpc8083.

Full text
Abstract:
Bitcoin's success as a cryptocurrency enabled it to penetrate into many daily life transactions. Its problems regarding the transaction fees and long validation times are addressed through an innovative concept called the Lightning Network (LN) which works on top of Bitcoin by leveraging off-chain transactions. This made Bitcoin an attractive micropayment solution that can also be used within certain IoT applications (e.g., toll payments) since it eliminates the need for traditional centralized payment systems. Nevertheless, it is not possible to run LN and Bitcoin on resource-constrained IoT devices due to their storage, memory, and processing requirements. Therefore, in this paper, we propose an efficient and secure protocol that enables an IoT device to use LN's functions through a gateway LN node even if it is not trusted. The idea is to involve the IoT device only in signing operations, which is possible by replacing LN's original 2-of-2 multisignature channels with 3-of-3 multisignature channels. Once the gateway is delegated to open a channel for the IoT device in a secure manner, our protocol enforces the gateway to request the IoT device's cryptographic signature for all further operations on the channel such as sending payments or closing the channel. LN's Bitcoin transactions are revised to incorporate the 3-of-3 multisignature channels. In addition, we propose other changes to protect the IoT device's funds from getting stolen in possible revoked state broadcast attempts. We evaluated the proposed protocol using a Raspberry Pi considering a toll payment scenario. Our results show that timely payments can be sent and the computational and communication delays associated with the protocol are negligible.
APA, Harvard, Vancouver, ISO, and other styles
35

D., Danalakshmi, Gopi R., A. Hariharasudan, Iwona Otola, and Yuriy Bilan. "Reactive Power Optimization and Price Management in Microgrid Enabled with Blockchain." Energies 13, no. 23 (November 24, 2020): 6179. http://dx.doi.org/10.3390/en13236179.

Full text
Abstract:
The energy market is gradually changing from centralized trading to peer-to-peer trading due to the tremendous increase in a microgrid with green energy resources. When more generating units are included in the microgrid, the possibilities of more reactive power flows exist in the system that leads to high transmission loss which has to be optimized. The reactive power is one of the essential ancillary services in the microgrid towards preserving the voltage in the transmission and distribution line. The major contribution of the paper is towards managing the ancillary service in the distributed energy network economically and technically. This study aims to estimate and optimize the power loss, reactive power, and price management as well. Towards optimization, the self-balanced differential evolution algorithm (SBDE) is used in this study. A distribution system operator is involved in coordinating the sellers and buyers. The proposed layered microgrid architecture uses the blockchain technology for reactive power price management by providing transparency and security among peers. The process of converging various transactions into a block and adding in the distributed blockchain is illustrated. Multiple transactions are performed by using the proposed methodology, giving efficient energy transaction. The results show that the power loss is minimized using SBDE algorithm for different cases. Additionally, the study has demonstrated the price allocation of the optimal reactive power obtained from providers. The blockchain technology embedded in reactive power pricing will play a significant role in the evolution of traditional power distribution systems to active distribution networks.
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Ang, Xiu-Bo Chen, Shengwei Xu, Zhuo Wang, Zhengyang Li, Liwei Xu, Yanshuo Zhang, and Ying Chen. "A Secure Scheme Based on a Hybrid of Classical-Quantum Communications Protocols for Managing Classical Blockchains." Entropy 25, no. 5 (May 17, 2023): 811. http://dx.doi.org/10.3390/e25050811.

Full text
Abstract:
Blockchain technology affords data integrity protection and building trust mechanisms in transactions for distributed networks, and, therefore, is seen as a promising revolutionary information technology. At the same time, the ongoing breakthrough in quantum computation technology contributes toward large-scale quantum computers, which might attack classic cryptography, seriously threatening the classic cryptography security currently employed in the blockchain. As a better alternative, a quantum blockchain has high expectations of being immune to quantum computing attacks perpetrated by quantum adversaries. Although several works have been presented, the problems of impracticality and inefficiency in quantum blockchain systems remain prominent and need to be addressed. First, this paper develops a quantum-secure blockchain (QSB) scheme by introducing a consensus mechanism—quantum proof of authority (QPoA) and an identity-based quantum signature (IQS)—wherein QPoA is used for new block generation and IQS is used for transaction signing and verification. Second, QPoA is developed by adopting a quantum voting protocol to achieve secure and efficient decentralization for the blockchain system, and a quantum random number generator (QRNG) is deployed for randomized leader node election to protect the blockchain system from centralized attacks like distributed denial of service (DDoS). Compared to previous work, our scheme is more practical and efficient without sacrificing security, greatly contributing to better addressing the challenges in the quantum era. Extensive security analysis demonstrates that our scheme provides better protection against quantum computing attacks than classic blockchains. Overall, our scheme presents a feasible solution for blockchain systems against quantum computing attacks through a quantum strategy, contributing toward quantum-secured blockchain in the quantum era.
APA, Harvard, Vancouver, ISO, and other styles
37

Yang, Yang, Minglei Bao, Yi Ding, Yonghua Song, Zhenzhi Lin, and Changzheng Shao. "Review of Information Disclosure in Different Electricity Markets." Energies 11, no. 12 (December 6, 2018): 3424. http://dx.doi.org/10.3390/en11123424.

Full text
Abstract:
Electricity markets have been established in many countries of the world. Electricity and services are traded in the competitive environment of electricity markets, which generates a large amount of information during the operation process. To maintain transparency and foster competition of electricity markets, timely and precise information regarding the operation of electricity market should be disclosed to the market participants through a centralized and authorized information disclosure mechanism. However, the information disclosure mechanism varies greatly in electricity markets because of different market models and transaction methods. This paper reviews information disclosure mechanisms of several typical electricity markets with the poolco model, bilateral contract model, and hybrid model. The disclosed information and clearing models in these markets are summarized to provide an overview of the present information disclosure mechanisms in typical deregulated power systems worldwide. Moreover, the various experiences for establishing an efficient information disclosure mechanism is summarized and discussed.
APA, Harvard, Vancouver, ISO, and other styles
38

Nair, Rajit, Syed Nasrullah Zafrullah, P. Vinayasree, Prabhdeep Singh, Musaddak Maher Abdul Zahra, Tripti Sharma, and Fardin Ahmadi. "Blockchain-Based Decentralized Cloud Solutions for Data Transfer." Computational Intelligence and Neuroscience 2022 (May 30, 2022): 1–12. http://dx.doi.org/10.1155/2022/8209854.

Full text
Abstract:
Cloud computing has increased its service area and user experience above traditional platforms through virtualization and resource integration, resulting in substantial economic and societal advantages. Cloud computing is experiencing a significant security and trust dilemma, requiring a trust-enabled transaction environment. The typical cloud trust model is centralized, resulting in high maintenance costs, network congestion, and even single-point failure. Also, due to a lack of openness and traceability, trust rating findings are not universally acknowledged. “Blockchain is a novel, decentralised computing system. Its unique operational principles and record traceability assure the transaction data’s integrity, undeniability, and security. So, blockchain is ideal for building a distributed and decentralised trust infrastructure. This study addresses the difficulty of transferring data and related permission policies from the cloud to the distributed file systems (DFS). Our aims include moving the data files from the cloud to the distributed file system and developing a cloud policy. This study addresses the difficulty of transferring data and related permission policies from the cloud to the DFS. In DFS, no node is given the privilege, and storage of all the data is dependent on content-addressing. The data files are moved from Amazon S3 buckets to the interplanetary file system (IPFS). In DFS, no node is given the privilege, and storage of all the data is dependent on content-addressing.
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Naiyu, Xiao Zhou, Xin Lu, Zhitao Guan, Longfei Wu, Xiaojiang Du, and Mohsen Guizani. "When Energy Trading Meets Blockchain in Electrical Power System: The State of the Art." Applied Sciences 9, no. 8 (April 15, 2019): 1561. http://dx.doi.org/10.3390/app9081561.

Full text
Abstract:
With the rapid growth of renewable energy resources, energy trading has been shifting from the centralized manner to distributed manner. Blockchain, as a distributed public ledger technology, has been widely adopted in the design of new energy trading schemes. However, there are many challenging issues in blockchain-based energy trading, e.g., low efficiency, high transaction cost, and security and privacy issues. To tackle these challenges, many solutions have been proposed. In this survey, the blockchain-based energy trading in the electrical power system is thoroughly investigated. Firstly, the challenges in blockchain-based energy trading are identified and summarized. Then, the existing energy trading schemes are studied and classified into three categories based on their main focuses: energy transaction, consensus mechanism, and system optimization. Blockchain-based energy trading has been a popular research topic, new blockchain architectures, models and products are continually emerging to overcome the limitations of existing solutions, forming a virtuous circle. The internal combination of different blockchain types and the combination of blockchain with other technologies improve the blockchain-based energy trading system to better satisfy the practical requirements of modern power systems. However, there are still some problems to be solved, for example, the lack of regulatory system, environmental challenges and so on. In the future, we will strive for a better optimized structure and establish a comprehensive security assessment model for blockchain-based energy trading system.
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, Haotian, Shuming Xiong, Samuel Akwasi Frimpong, and Mingzheng Zhang. "A Consortium Blockchain-Based Agricultural Machinery Scheduling System." Sensors 20, no. 9 (May 6, 2020): 2643. http://dx.doi.org/10.3390/s20092643.

Full text
Abstract:
The introduction of a consortium blockchain-based agricultural machinery scheduling system will help improve the transparency and efficiency of the data flow within the sector. Currently, the traditional agricultural machinery centralized scheduling systems suffer when there is a failure of the single point control system, and it also comes with high cost managing with little transparency, not leaving out the wastage of resources. This paper proposes a consortium blockchain-based agricultural machinery scheduling system for solving the problems of single point of failure, high-cost, low transparency, and waste of resources. The consortium blockchain-based system eliminates the central server in the traditional way, optimizes the matching function and scheduling algorithm in the smart contract, and improves the scheduling efficiency. The data in the system can be traced, which increases transparency and improves the efficiency of decision-making in the process of scheduling. In addition, this system adopts a crowdsourcing scheduling mode, making full use of idle agricultural machinery in the society, which can effectively solve the problem of resource waste. Then, the proposed system implements authentication access mechanisms, and allows only authorized users into the system. It includes transactions based on digital currency and eliminates third-party platform to charge service fees. Moreover, participating organizations have the opportunity to obtain benefits and reduce transaction costs. Finally, the upper layers supervision improves the efficiency and security of consensus algorithm, allows supervisors to block users with malicious motives, and always ensures system security.
APA, Harvard, Vancouver, ISO, and other styles
41

Zhang, Xiaohui, Xianghua Miao, and Mingying Xue. "A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing." Security and Communication Networks 2022 (August 10, 2022): 1–20. http://dx.doi.org/10.1155/2022/7760509.

Full text
Abstract:
The CTI (Cyber Threat Intelligence) sharing and exchange is an effective method to improve the responsiveness of the protection party. Blockchain technology enables sharing collaboration consortium to conduct a trusted CTI sharing and exchange without a centralized institution. However, the distributed connectivity of the blockchain-based CTI sharing model proposed before exposes the systems to byzantine attacks. The compromised members of partner organizations will further decrease the accuracy and trust level of CTI by generating false reporting. This paper proposes a new blockchain-based CTI model to address the unbalance issues of performance in speed, scalability, and security, which combines consortium blockchain and distributed reputation management systems to achieve automated analysis and response of tactical threat intelligence. In addition, the novel consensus algorithm of consortium blockchain that is fit for CTI sharing and exchange is introduced in this paper. The new consensus algorithm is called “Proof-of Reputation” (PoR) consensus, which meets the requirements of transaction rate and makes the consensus in a creditable network environment through constructing a reputation model. Finally, the effectiveness and security performance of the proposed model and consensus algorithm is verified by experiments.
APA, Harvard, Vancouver, ISO, and other styles
42

Children's Health Defense Team. "Planned Surveillance and Control by Global Technocrats: A Big-Picture Look at the Current Pandemic Beneficiaries." International Journal of Vaccine Theory, Practice, and Research 1, no. 2 (January 5, 2021): 143–71. http://dx.doi.org/10.56098/ijvtpr.v1i2.7.

Full text
Abstract:
Global financial patterns and pronouncements point to a seismic overhaul of governance and financial systems that is playing out beneath the surface of the Covid-19 pandemic, reaching far beyond the health domain. Increased centralized control has the potential to create an unbridgeable chasm between a tiny handful of winners and a majority of losers. To foster an integrated analysis of the technocratic and financial forces and agendas at play, this rapid review identifies some of the pandemic’s principal beneficiaries across the interwoven financial, tech, biopharmaceutical, and military-intelligence sectors, assessing developments in the context of the accelerating global push for technocratic consolidation and control. The evidence suggests that Trojan horse coronavirus vaccines may challenge bodily integrity and informed consent in entirely new ways, transporting invasive technologies into people’s brains and bodies. Technologies such as brain-machine interfaces, digital identity tracking devices, and cryptocurrency-compatible chips would contribute to the central banking goal of replacing currencies with digital transaction and identification systems and creating a global control grid that connects the world population to the military-pharma-intelligence cloud of the global technocrats. Moreover, using vaccines as a delivery vehicle for surveillance technologies cancels any legal liability.
APA, Harvard, Vancouver, ISO, and other styles
43

Noh, Siwan, Sang Uk Shin, and Kyung-Hyune Rhee. "PyRos: A State Channel-Based Access Control System for a Public Blockchain Network." Security and Communication Networks 2020 (November 27, 2020): 1–13. http://dx.doi.org/10.1155/2020/8891183.

Full text
Abstract:
Blockchain is a technology that enables the implementation of a decentralized system by replacing the role of the centralized entity with the consensus of participants in the system to solve the problem of subordination to the centralized entity. Blockchain technology is being considered for application in numerous fields; however, the scalability limitation of a public blockchain has led many researchers to consider private blockchains, which reduce the security of the system while improving scalability. A state channel represents a leading approach among several scalability solutions, intended to address public blockchain scalability challenges while ensuring the security of the blockchain network. Participants in the channel perform the process of updating the state of the channel outside the blockchain. This process can proceed very quickly because it does not require the consensus of the blockchain network, but still, like on-chain, it can guarantee features such as irreversibility. In this paper, we propose the PyRos protocol, an access control system that supports the trading and sharing of data between individuals on a public blockchain based on the state channel. As far as we know, the research using the off-chain state channel for access control has not been proposed yet, so PyRos is a new approach in this field. In PyRos, user-defined access control policies are stored off-chain, and policy updates are always rapid regardless of the performance of the blockchain network. Moreover, PyRos provides means to prevent malicious participants from arbitrarily using the channel’s previous state while resolving constraints due to scalability problems, along with privacy guarantees for the transaction content. To evaluate the efficiency and security of PyRos, we provide qualitative analysis of security requirements and analysis in terms of the performance of public blockchain platforms.
APA, Harvard, Vancouver, ISO, and other styles
44

Kozlov, D. I. "Optimization of depository accounting system of stock and obligation market with application of blockchain." Statistics and Economics 16, no. 2 (May 14, 2019): 80–88. http://dx.doi.org/10.21686/2500-3925-2019-2-80-88.

Full text
Abstract:
Purpose of the study. The first goal of the study is a comparative analysis of the models of the accounting system of the stock market operating on the territory of the Russia, in particular, the model of the distributed accounting system and the model of the centralized accounting with the use of the central depository are considered. The second goal is to apply the distributed ledger technology in the development of a new model for the stock market accounting system. The goals are conditioned by the growing interest to the technology and similarity of its internal processes with the system of accounting of digital assets. The needs in optimization of the existing accounting system, bringing the system to the logical centralization are revealed. The application of distributed ledger technology for the purpose of unification of depository accounting systems is proposed. The analysis of efficiency of the given models is carried out and the criteria of efficiency estimation of each model are revealed. Materials and methods. For carrying out the research the works of description of register system genesis of stock market in Russia were applied. Works of Russian and foreign researchers in the field of influence of technology of distributed registers on accounting system and business processes of organizations are studied. The methodology for comparing models was the approach to the development of highly specialized evaluation criteria that meet the needs of the largest number of stock market participants. Results. Evaluation criteria were developed, on the basis of which the comparison of the existing models of the accounting system of stock market and the projected model on the distributed ledger technology was carried out. The needs for optimization of the existing accounting system of Russia, bring the system to the logical centralization of interaction of elements are revealed. Suggestions for the use of distributed ledger technology in order to unite the register systems of obligations have been developed The variety of elements of the accounting system of the Russian stock market was determined a large number of indicators used in comparisons of models, as well as a variety of approaches, both to the construction of the indicators themselves and to the collection of data to ensure their calculation and comparison. Conclusion. According to the results of the research it was determined that the decentralized model of the stock market accounting system on the distributed ledger technology in comparison with the classic model reduces the transaction cost of obligation right accounting operations, optimizes the complexity of the processes of interaction between the elements of the system, such as depositories and registrars, increases the transparency of the stock market, the processes of the transition of assets rights, due to which the liquidity of such assets and the increases investors interest. Decentralized model standardizes the of communication data, which has a positive effect on the indicators of information systems of participants. In comparison with the centralized model, the decentralized model eliminates the central depository transaction commission, eliminates monopolization to choose the direction of stock market depository accounting system development. Finally, the positive influence of the decentralized model on the stock market as a whole was revealed. The resulting form of relations will reduce the main cost indicators of the accounting system elements, such as transaction costs, the cost of support and development of information systems, the number of necessary formats for the application of interaction with counterparties.
APA, Harvard, Vancouver, ISO, and other styles
45

Ahamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "A Secure Mobile Payment Framework in MANET Environment." International Journal of E-Business Research 9, no. 1 (January 2013): 54–84. http://dx.doi.org/10.4018/jebr.2013010104.

Full text
Abstract:
In this paper the authors propose a Secure Mobile Payment Framework in Multi hop Cellular Network environment (which is an integration of cellular networks and mobile ad hoc networks) using Mobile Agent technology and Digital Signature with Message Recovery (DSMR) mechanism based on ECDSA mechanism. Secure communication in Multi hop Cellular Networks is a nontrivial task because of lack of infrastructure, no prior trust relationships among nodes due to the absence of a centralized authority. Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism provides secure mobile payments in Multi hop Cellular Networks. Mobile Agent technology has many benefits such as bandwidth conservation, reduction of latency, reduction of completion time, Asynchronous (disconnected) communications. Digital Signature with Message Recovery based on ECDSA eliminates the need of adopting PKI cryptosystems. The proposed protocol ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, prevents Double Spending, Overspending and Money laundering. The security properties of the proposed protocol have been verified successfully using BAN Logic, AVISPA and Scyther Tools and presented with results.
APA, Harvard, Vancouver, ISO, and other styles
46

Kamilia, Tarisa, Eliezer M Putra S, Syachla Malikha, and Seftin Fitri Ana Wati. "Designing Information System Inventory and Transaction Reports Web-Based Using ICONIX Process Method." Inform : Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi 8, no. 1 (January 24, 2023): 14–26. http://dx.doi.org/10.25139/inform.v8i1.4733.

Full text
Abstract:
Tjangkir Kopi is a small-medium enterprise (MSMEs) engaged in food and beverage in West Java, precisely in City. There is a problem in the current business process, namely in managing the stock of materials that are still done manually through the Microsoft Excel application, which is very likely to occur misunderstandings. Competition in the Food and Beverage Industry is getting tougher, making MSMEs Tjangkir Kopi have to improve their business processes by creating an information system that helps develop their business to achieve a competitive advantage. In addition, there is still a lack of fulfillment of job descriptions for each employee and centralized report data. The System to be Built helps quickly and directly integrate with material stock and expenditure data in the database, so there won't be material stock problems in the warehouse. This system makes transaction reports on business processes much more effective because the data is automated. This research aims to analyze and design systems to support better inventory management and transaction reports and to support business processes with more complete and clear diagrams using the ICONIX Process method. This research explains the stages of analysis by collecting data through interviews and literature studies. The stages of system design produce business process proposals supported by GUI design, use case diagrams, domain models, robustness diagrams, sequence diagrams, and class diagrams. The results of research through analysis and system design using the ICONIX process method, it is hoped that Tjangkir Kopi can use it as an illustration of business processes to develop the business to be better and able to compete with competitors.
APA, Harvard, Vancouver, ISO, and other styles
47

Huang, Tao. "Resource Sharing of Smart City Based on Blockchain." Wireless Communications and Mobile Computing 2021 (October 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/5886024.

Full text
Abstract:
The concept of smart city refers to the improvement of the quality of life of the city by making full use of idle resources by sharing. However, limited by the technical level, the current resource sharing system mostly adopts centralized data storage mode. Systems managed in this way are vulnerable to multiple threats. The tested blockchain technology with the characteristics of decentralization and tamper resistance can effectively prevent various risks. Starting with the architecture of blockchain intelligent contract, this paper puts forward a structural optimization factor model of intelligent contract. To optimize the structure of blockchain intelligent contract, the gas optimization theory is put forward by changing the order, reducing the use of costly EVM data fields, reducing redundant fields, and optimizing intelligent contract codes. Experimental analysis of the proposed model is carried out, and the effectiveness of the proposed method is verified by comparing the transaction execution time of cost calculation with the cost of executing gas, which can provide reference for the selection of intelligent contract organization structure of smart city resource sharing system.
APA, Harvard, Vancouver, ISO, and other styles
48

Zhou, Jiapeng, Yuxiang Feng, Zhenyu Wang, and Danyi Guo. "Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain." Sensors 21, no. 4 (February 23, 2021): 1540. http://dx.doi.org/10.3390/s21041540.

Full text
Abstract:
The development of information technology has brought great convenience to our lives, but at the same time, the unfairness and privacy issues brought about by traditional centralized systems cannot be ignored. Blockchain is a peer-to-peer and decentralized ledger technology that has the characteristics of transparency, consistency, traceability and fairness, but it reveals private information in some scenarios. Secure multi-party computation (MPC) guarantees enhanced privacy and correctness, so many researchers have been trying to combine secure MPC with blockchain to deal with privacy and trust issues. In this paper, we used homomorphic encryption, secret sharing and zero-knowledge proofs to construct a publicly verifiable secure MPC protocol consisting of two parts—an on-chain computation phase and an off-chain preprocessing phase—and we integrated the protocol as part of the chaincode in Hyperledger Fabric to protect the privacy of transaction data. Experiments showed that our solution performed well on a permissioned blockchain. Most of the time taken to complete the protocol was spent on communication, so the performance has a great deal of room to grow.
APA, Harvard, Vancouver, ISO, and other styles
49

Islam, Md Rafiqul, Muhammad Mahbubur Rahman, Mohammed Ataur Rahman, Muslin Har Sani Mohamad, and Abd Halim Embang. "A Review on Blockchain Technology for Distribution of Energy." International Journal of Engineering Materials and Manufacture 7, no. 2 (April 22, 2022): 61–70. http://dx.doi.org/10.26776/ijemm.07.02.2022.03.

Full text
Abstract:
The alternative energy generation sources have increased drastically from centralized systems to distributed systems which increases the stability of energy distribution management systems and reduces the distribution cost as well. On the other hand, it reduces the probability of major area electricity blackout chances and decreases the energy distribution loss. For proper distribution and management of energy, there are different types of advanced technologies like artificial intelligence, and the Internet of Things (IoT) available, but a blockchain automated system is one of the best choices and is highly recommended. Various aspects of blockchain technology and energy management system have been discussed in this review paper where a total number of 423 journal papers, articles, and online information sources have been reviewed in the initial stage, and finally, 63 published research articles have been selected for review. There are several topics, including technology overview in energy management systems, blockchain application of energy trading, blockchain technology implementation challenges, distributed energy management system with Ethereum, and a conclusion with some recommendations have been discussed. Blockchain and Distributed Ledger Technology (DLT) are highly transparent, authenticate, and secure systems that can be used for distributing the energy between distributor and consumer without an intermediator which increases the overall efficiency of the system. This paper aims to highlight the blockchain and distributed ledger technology and how it works as well as optimize the transaction processing cost among the participants of the consortium network. This paper will make a significant contribution to the new research work and in the field of energy management systems.
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Xiaohui, Mingying Xue, and Xianghua Miao. "A Consensus Algorithm Based on Risk Assessment Model for Permissioned Blockchain." Wireless Communications and Mobile Computing 2022 (August 26, 2022): 1–21. http://dx.doi.org/10.1155/2022/8698009.

Full text
Abstract:
Blockchain is characterized by privacy, traceability, and security features as a novel framework of distributed ledger technologies. Blockchain technology enables stakeholders to conduct trusted data sharing and exchange without a trusted centralized institution. These features make blockchain applications attractive to enhance trustworthiness in very different contexts. Due to unique design concepts and outstanding performance, blockchain has become a popular research topic in industry and academia in recent years. Every participant is anonymous in a permissionless blockchain represented by cryptocurrency applications such as Bitcoin. In this situation, some special incentive mechanisms are applied to the permissionless blockchain, such as “mined” native cryptocurrency to solve the trust issues of the permissionless blockchain. In many use cases, permissionless blockchain has bottlenecks in transaction throughput performance, which restricts further application in the real world. A permissioned blockchain can reach a consensus among a group of entities that do not establish an entire trust relationship. Unlike permissionless blockchains, the participants must be identified in permissioned blockchains. By relying on the traditional crash fault-tolerant consensus protocols, permissioned blockchains can achieve high transaction throughput and low latency without sacrificing security. However, how to balance the security and consensus efficiency is still the issue that needs to be solved urgently in permissioned blockchains. As the core module of blockchain technology, the consensus algorithm plays a vital role in the performance of the blockchain system. Thus, this paper proposes a new consensus algorithm for permissioned blockchain, the Risk Assessment-based Consensus (RAC) protocol, combined with the decentralized design concept and the risk-node assessment mechanism to address the unbalance issues of performance in speed, scalability, and security.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography