UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :article
Subject :L Education (General)
Main Author :Albahrey, Shihab Ahmed
Additional Authors :Zaidan, Bilal Bahaa
Al-Juboor, A. Z. Ansaef
Ali Hadi Mohsin
Bilal Bahaa
K. I. Mohammed
Alsalem, Mohammed Assim
Title :Blockchain authentication of network applications: taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions
Place of Production :Tanjong Malim
Publisher :Fakulti Seni, Komputeran dan Industri Kreatif
Year of Publication :2019
Corporate Name :Universiti Pendidikan Sultan Idris

Abstract : Universiti Pendidikan Sultan Idris
As the first and last line of defence in many cases, authentication is a crucial part of a system. With authentication, any unauthorised access to the system can be prevented. This work maps the research landscape through two means. The first is a comprehensive taxonomy of blockchain technology in authentication over networking. The second is identification of different types of authentication systems under various platforms that use blockchain technology. This work also provides useful and classified information which can enhance the understanding of how various authentication systems can be combined with blockchain technology. In addition, problems associated with this blockchain technology and proposed solutions are surveyed to fulfil the requirements of the network applications. Moreover, this work highlights the importance, capabilities, motivations and challenges of blockchain technology with distinct applications in various fields. Finally, recommendations and future research directions are discussed  

References

[1] R. Yu et al., “Authentication with Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network,” IEEE Access, vol. 5, pp. 24944–24951, 2017.

[2] J. Kishigami, S. Fujimura, H. Watanabe, A. Nakadaira, and A. Akutsu, “The Blockchain-Based Digital Content Distribution System,” Proc. - 2015 IEEE 5th Int. Conf. Big Data Cloud Comput. BDCloud 2015, no. February 2018, pp. 187–190, 2015.

[3] L. Zhang, H. Li, L. Sun, Z. Shi, and Y. He, “Poster: Towards Fully Distributed User Authentication with Blockchain,” 2017 IEEE Symp. Privacy-Aware Comput., pp. 202–203, 2017.

[4] X. Huang, C. Xu, P. Wang, and H. Liu, “LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem,” IEEE Access, vol. 6, no. c, pp. 13565–13574, 2018.

[5] A. Reyna et al., “On blockchain and its integration with IoT . Challenges and opportunities,” vol. 88, pp. 173–190, 2018.

[6] T. M. Fernández-caramés and S. Member, “A Review on the Use of Blockchain for the Internet of Things,” vol. 3536, no. c, pp. 1–23, 2018.

[7] M. Fukumitsu, S. Hasegawa, J. Iwazaki, M. Sakai, and D. Takahashi, “A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain,” Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, pp. 803–810, 2017.

[8] H.-W. Kim and Y.-S. Jeong, “Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain,” Human-centric Comput. Inf. Sci., vol. 8, no. 1, 2018.

[9] N. Kshetri, “Blockchain’s roles in strengthening cybersecurity and protecting privacy,” Telecomm. Policy, no. June, pp. 1–12, 2017.

[10] S. C. Cha, J. F. Chen, C. Su, and K. H. Yeh, “A Blockchain Connected Gateway for BLE-based Devices in the Internet of Things,” IEEE Access, vol. 6, pp. 24639–24649, 2018.

[11] H. Yang et al., “Blockchain-based Trusted Authentication in Cloud Radio over Fiber Network for 5G,” pp. 16–18, 2017.

[12] C. H. Lee and K. Kim, “Implementation of IoT System using BlockChain with Authentication and Data Protection,” pp. 936–940, 2018.

[13] Z. Yang, K. Zheng, K. Yang, and V. C. M. Leung, “A blockchain-based reputation system for data credibility assessment in vehicular networks,” IEEE Int. Symp. Pers. Indoor Mob. Radio Commun. PIMRC, vol. 2017–Octob, pp. 1–5, 2018.

[14] G. J. Ra and I. Y. Lee, “A study on KSI-based authentication management and communication for secure smart home environments,” KSII Trans. Internet Inf. Syst., vol. 12, no. 2, pp. 892–905, 2018.

[15] P. K. Sharma and J. H. Park, “Blockchain based Hybrid Network Architecture for the Smart City,” Futur. Gener. Comput. Syst., 2018.

[16] X. Zhu, Y. Badr, J. Pacheco, and S. Hariri, “Autonomic Identity Framework for the Internet of Things,” Proc. - 2017 IEEE Int. Conf. Cloud Auton. Comput. ICCAC 2017, pp. 69–79, 2017.

[17] Q. Lin, H. Yan, Z. Huang, W. Chen, J. Shen, and Y. Tang, “An ID-based linearly homomorphic signature scheme and its application in blockchain,” IEEE Access, vol. X, no. X, pp. 1–8, 2018.

[18] G. C. Polyzos and N. Fotiou, “Blockchain-assisted information distribution for the internet of things,” Proc. - 2017 IEEE Int. Conf. Inf. Reuse Integr. IRI 2017, vol. 2017–Janua, pp. 75–78, 2017.

[19] V. Sharma, I. You, F. Palmieri, D. N. K. Jayakody, and J. Li, “Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM,” IEEE Commun. Mag., vol. 56, no. 5, pp. 22–31, 2018.

[20] M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, “Bubbles of Trust: A decentralized blockchainbased authentication system for IoT,” Comput. Secur., vol. 78, pp. 126–142, 2018.

[21] S. Khan and R. Khan, “Multiple authorities attribute-based verification mechanism for Blockchain mircogrid transactions,” Energies, vol. 11, no. 5, pp. 1–13, 2018.

[22] J. Brogan, I. Baskaran, and N. Ramachandran, “Authenticating Health Activity Data Using Distributed Ledger Technologies,” Comput. Struct. Biotechnol. J., vol. 16, pp. 257–266, 2018.

[23] P. Zhanga, J. Whitea, D. C. Schmidta, G. Lenzb, and S. T. Rosenbloomc, “{FHIRChain}: Applying Blockchain to Securely and Scalably Share Clinical Data,” Comput. Struct. Biotechnol. J., vol. 16, pp. 1–30, 2018.

[24] H.-T. Wu and C.-W. Tsai, “Toward Blockchains for Health-Care Systems: Applying the Bilinear Pairing Technology to Ensure Privacy Protection and Accuracy in Data Sharing,” IEEE Consum. Electron. Mag., vol. 7, no. 4, pp. 65–71, 2018.

[25] Y. Ji, J. Zhang, J. Ma, C. Yang, and X. Yao, “BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems,” J. Med. Syst., vol. 42, no. 8, 2018.

[26] S. Wei, S. Li, P. Liu, and M. Liu, “BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys,” Secur. Commun. Networks, vol. 2018, 2018.

[27] J. G. Faisca and J. Q. Rogado, “Personal cloud interoperability Fully Decentralized Identity Management,” WoWMoM 2016 - 17th Int. Symp. a World Wireless, Mob. Multimed. Networks, 2016.

[28] Y. Zhang, R. H. Deng, X. Liu, and D. Zheng, “Blockchain based efficient and robust fair payment for outsourcing services in cloud computing,” Inf. Sci. (Ny)., vol. 462, pp. 262–277, 2018.

[29] N. Lasla, M. Younis, W. Znaidi, and D. Ben Arbia, “Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITS,” 2018 9th IFIP Int. Conf. New Technol. Mobil. Secur., no. i, pp. 1–5, 2018.

[30] J. H. Lee, “BIDaaS: Blockchain Based ID As a Service,” IEEE Access, vol. 6, pp. 2274–2278, 2017.

[31] T. Sanda and H. Inaba, “Proposal of new authentication method in Wi-Fi access using Bitcoin 2.0,” 2016 IEEE 5th Glob. Conf. Consum. Electron. GCCE 2016, pp. 0–4, 2016.

[32] C. Lin, D. He, X. Huang, K. K. R. Choo, and A. V. Vasilakos, “BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0,” J. Netw. Comput. Appl., vol. 116, no. February, pp. 42–52, 2018.

[33] J. Morrison, “Context integrity measurement architecture: A privacy-preserving strategy for the era of ubiquitous computing,” 2016 IEEE 7th Annu. Ubiquitous Comput. Electron. Mob. Commun. Conf. UEMCON 2016, 2016.

[34] S. Raju, S. Boddepalli, S. Gampa, Q. Yan, and J. S. Deogun, “Identity management using blockchain for cognitive cellular networks,” IEEE Int. Conf. Commun., 2017.

[35] C. Lin, D. He, X. Huang, M. K. Khan, and K. R. Choo, “A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-based Identity Management Systems,” IEEE Access, vol. 4, no. c, 2018.

[36] Y. Niu, L. Wei, C. Zhang, J. Liu, and Y. Fang, “An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain,” 2017 IEEE/CIC Int. Conf. Commun. China, no. Iccc, pp. 1–6, 2017.

[37] E. O. Kiktenko et al., “Quantum-secured blockchain,” Quantum Sci. Technol., vol. 3, no. 3, p. 035004, 2018.

[38] F. Hawlitschek, B. Notheisen, and T. Teubner, “The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy,” Electron. Commer. Res. Appl., vol. 29, pp. 50– 63, 2018.

[39] I. Purdon and E. Erturk, “Perspectives of Blockchain Technology, its Relation to the Cloud and its Potential Role in Computer Science Education,” Eng. Technol. Appl. Sci. Res., vol. 8, no. 1, pp. 2412–2416, 2018.

[40] R. Rivera, J. G. Robledo, V. M. Larios, and J. M. Avalos, “How digital identity on blockchain can contribute in a smart city environment,” 2017 Int. Smart Cities Conf. ISC2 2017, vol. 00, no. c, 2017.

[41] C. Sullivan and E. Burger, “E-residency and blockchain,” Comput. Law Secur. Rev., vol. 33, no. 4, pp. 470–481, 2017.

[42] G. Wolfond, “A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada’s Public and Private Sectors,” Technol. Innov. Manag. Rev., vol. 7, no. 10, pp. 35–40, 2017.

[43] M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Futur. Gener. Comput. Syst., vol. 82, pp. 395–411, 2018.

[44] J. Park and J. Park, “Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions,” Symmetry (Basel)., vol. 9, no. 8, p. 164, 2017.

[45] N. M. Kumar and P. K. Mallick, “Blockchain technology for security issues and challenges in IoT,” Procedia Comput. Sci., vol. 132, pp. 1815–1823, 2018.

 


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.