Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are increasing exponentially. However, framing resilient and correct smart contracts (SCs) for these smart application is a ...quite challenging task because of the complexity associated with them. SC is modernizing the traditional industrial, technical, and business processes. It is self-executable, self-verifiable, and embedded into the BC that eliminates the need for trusted third-party systems, which ultimately saves administration as well as service costs. It also improves system efficiency and reduces the associated security risks. However, SCs are well encouraging the new technological reforms in Industry 4.0, but still, various security and privacy challenges need to be addressed. In this paper, a survey on SC security vulnerabilities in the software code that can be easily hacked by a malicious user or may compromise the entire BC network is presented. As per the literature, the challenges related to SC security and privacy are not explored much by the authors around the world. From the existing proposals, it has been observed that designing a complex SCs cannot mitigate its privacy and security issues. So, this paper investigates various Artificial Intelligence (AI) techniques and tools for SC privacy protection. Then, open issues and challenges for AI-based SC are analyzed. Finally, a case study of retail marketing is presented, which uses AI and SC to preserve its security and privacy.
Ensuring Privacy and Security in E- Health Records Vora, Jayneel; Italiya, Prit; Tanwar, Sudeep ...
2018 International Conference on Computer, Information and Telecommunication Systems (CITS),
2018-July
Conference Proceeding
Mobile medicine and health care have been adopted on a very large scale with support from the influx of medical devices and increased usability of remote health services. These are combined with an ...approachable interest of the patients and a readily approachable conscience about their healthcare. This leads to a huge set of medical data. These data sets require secure transfer, archival and access. In this study, we have proposed an efficient approach to preserve the identity and also protect the privacy of clinical data using highly effective encryption scheme. Moreover, we have also discussed an authorization framework using access of varying degrees. Medical records are often accessed by various entities with varying degrees of authorization. In this study, we have implemented the AT&T scheme for managing the access control mechanism of patients data. Further, encryption is undertaken using ARCANA, that provides hierarchically satisfied access to various data resources. It utilizes the XACML access model to formulate the access control framework. The primary reason for using this model is the regulation to access the data through AT&T based on XACML policies. In addition to this, the encrypting of medical data using various authorization techniques have been required for the proper data access regulation. Which may impact trust of the users in the e-health paradigm and in turn increase the large-scale usability.