2nd EBTSRA 2020: Second International Workshop on Emerging Blockchain Technology Solutions for Real-World Applications (EBTSRA)

Session WS4-1

Session 1

Conference
9:00 AM — 10:30 AM CST
Local
Aug 8 Sat, 8:00 PM — 9:30 PM CDT

Trusted Computing with Commodity Hardware and Software - How Blockchain Can Help

Zhijun (William) Zhang ([email protected]), World Bank Group, USA

0
This talk does not have an abstract.

A Review on Blockchain for Medical Delivery Drones in 5G-IoT Era: Progress and Challenges

Partha Pratim Ray (Sikkim University, India); Kien Nguyen (Chiba University, Japan)

0
Medical delivery drones are gradually becoming an inseparable part of smart human society, especially with the emergence of 5G and existing internet of things (IoT). A wide range of medical facilities can be leveraged via drone-based delivery aspects. Being a nascent stage of development, this field of application faces significant drawbacks from reliable and secure e-healthcare. In this paper, we discuss the importance of blockchain to improve decentralization, privacy, and consensus-aware medical product delivery by the drones. We firstly review the background of blockchain, 5G-IoT ecosystem and unmanned aerial vehicles (UAVs). Secondly, we review existing UAVs capable of performing medial delivery. We also find whether such drones are technically viable to work accordance to the 5G-IoT era. Thirdly, we propose a modified multi-modal aspect behind medical delivery drones under the 5G-IoT assisted blockchain ecosystem. Fourthly, we propose an architecture comprising 5G, IoT, blockchain, and medical delivery drones with extraterrestrial communication support from satellites. Lastly, we discuss key open research challenges and provide a future road map.

Session Chair

Keping Yu

Session WS4-2

Session 2

Conference
11:00 AM — 12:30 PM CST
Local
Aug 8 Sat, 10:00 PM — 11:30 PM CDT

Empirical Analysis of Bitcoin network (2016-2020)

Ajay Kumar and Kumar Abhishek (NIT Patna, India); Pranav Nerurkar (VJTI Mumbai, India); Muhammad Rukunuddin Ghalib (VIT University, Vellore, India); Achyut Shankar (Amity University, India); Zheng Wen (Waseda University, Japan); Xin Qi (Global Information and Telecommunication Institute, Waseda University, Japan)

1
Bitcoin system (or Bitcoin) is a peer-to-peer and decentralized payment system that uses cryptocurrency named bitcoins (BTCs) and was released as open-source software in 2009. Bitcoin platform has attracted both social and anti-social elements. On the one hand, it is social as it ensures the exchange of value, maintaining trust in a cooperative, community-driven manner without the need for a trusted third party. At the same time, it is anti-social as it creates hurdles for law enforcement to trace suspicious transactions due to anonymity and privacy. To understand how the social and anti-social tendencies in the user base of Bitcoin affect its evolution, there is a need to analyze the Bitcoin system as a network. The current paper aims to explore the local topology and geometry of the Bitcoin network during its first decade of existence. Bitcoin transaction data from 01 Jan 2016 00:00:00 GMT to 08 May 2020 13:21:33 GMT was processed for this purpose to build a Bitcoin user graph.

Fighting COVID-19 and helping economy reopen by using blockchain technology

Weimin Xin (XingHanDa Technologies, China)

1
This paper introduced a best practice on personal health data management on blockchain technology. When the global community is dealing with COVID-19 pandemic and economy reopen strategy, a solid solution is needed to cover various aspects: health data collection and monitoring, data privacy control, immutable data record, global identity and cross region collaboration. By using distributed ledger technology, decentralized identity, verifiable credential, and distributed storage, we built the GreenPass solution to address COVID-19 mitigation and economy reopen issues at the community level. We also envision GreenPass solution as the personal data vault with data ownership and permission management, as a green passport for a person to the future of "data as a personal property right" new world.

Deep Learning-based Management For Wastewater Treatment Plants Under Blockchain Environment

Keyi Wan, Zhiwei Guo, Jianhui Wang, Wenru Zeng, Xu Gao and Yu Shen (Chongqing Technology and Business University, China); Keping Yu (Waseda University, Japan)

0
Smart management for sewage treatment plants has always been a hot issue. It is generally implemented on the basis of a data scheduling platform, in which intelligent algorithms can be embedded. The most essential problem for such management is to predict daily business volumes, including amount and quality of wastewater. To achieve a comprehensive perspective, the generation of wastewater is viewed as collaborative effect of multiple factors in social system. This paper proposes a deep learning-based management for sewage treatment plants. Specially, it combines two classical neural network models to construct a hybrid model for precise prediction of business volumes. At last, a set of experiments are carried out to assess the proposed management mechanism. Results reveal that it performs better than general baselines.

Session Chair

Achyut Shankar

Session WS4-3

Session 3

Conference
2:00 PM — 3:30 PM CST
Local
Aug 9 Sun, 1:00 AM — 2:30 AM CDT

PDKSAP: Perfected Double-Key Stealth Address Protocol without Temporary Key Leakage in Blockchain

Cong Feng (Wuhan University & Shenzhen New Generation Information Technology Institute Co., Ltd, China); Tan Liang and Huan Xiao (Sichuan Normal University, China); Xin Qi (Global Information and Telecommunication Institute, Waseda University, Japan); Keping Yu and Zheng Wen (Waseda University, Japan); You Jiang (Shenzhen New Generation Information Technology Institute Co., Ltd, China)

0
The stealth address protocol is to create a one-time temporary output address of a transaction, hide its real output address, destroy the association between the input address and the real output address to achieve privacy protection for user identities in the transaction. However, the widely used double-key stealth address protocol (DKSAP) requires the sender to transmit the temporary public key along with the transaction, which enables attackers to easily identify stealth and non-stealth transactions and can lead to the loss of some private information. We propose a double-key stealth address protocol without temporary key leakage -- PDKSAP by which senders and receivers maintain local transaction record databases to record the number of transactions with other users. Senders and receivers generate a temporary key pair for a transaction based on the number of transactions between them, which prevent leaking the transaction temporary key. Finally, we verify the protocol through experiments.

Proof-of-Work cryptocurrency mining: a statistical approach to fairness

Shengnan Li (University of Zurich, Switzerland)

1
In Proof-of-Work Blockchain-based systems, the ledger is kept consistent through some participants solving cryptopuzzles, usually referred to as block mining. Conventional wisdom asserts that the mining protocol is incentive-compatible. However, whether some strategic mining behaviors occur in practice or not, has been the subject of extensive debate. In this paper, we target this question by detecting anomalies in the statistics of consecutive blocks among several popular cryptocurrency systems. Firstly, we measure the inequality of mining revenue distribution in each system. Secondly, we propose a statistical method to identify the selfish mining (SM) behavior, a mining attack strategy posited by Eyal and Sirer in 2014. Our method is based on abnormal (statistically significant) high probability of continuously mining blocks. Finally, we extend our method to detect the mining cartels, in which miners secretly get together and share information about newly mined blocks. Our analysis will contribute to the research of fairness in cryptocurrency mining by providing evidence that the aforementioned strategic mining behaviors do take place in practice.

Research on network security protection technology of energy industry based on blockchain

Ke Yang, Huimin Liao, Lihua Zhao, Shangzhuo Zheng and Hongwei Li (State Grid Electronic Commerce Co., Ltd., China)

0
The energy industry's comprehensive automation and digital boom is accelerating, which not only makes the energy business management more efficient, but also brings new hidden dangers for network security. The network security mechanism based on blockchain has the characteristics of decentralization, non tampering, traceability, high trust and multi-party consensus. The application of blockchain technology will become an important technical means to improve network security. Aiming at the main network security problems faced by the energy industry, this paper proposes a security protection solution based on blockchain technology from the aspects of identity authentication, data protection and security operation and maintenance, which provides a new technical idea for improving the network security protection ability of the energy industry.

Session Chair

Keping Yu

Made with in Toronto · Privacy Policy · © 2022 Duetone Corp.