Skip to main content

2024 | Buch

Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications

herausgegeben von: Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan

Verlag: Springer Nature Singapore

Buchreihe : Contributions to Environmental Sciences & Innovative Business Technology

insite
SUCHEN

Über dieses Buch

This book focuses on the sustainable security practices in the domain of blockchain, quantum, and post-quantum technologies dealing with the real-time applications. The topics discussed in this book include banking applications, protection of digital assets in healthcare, military defense applications, supply chain management, secure messaging, and keyless secure infrastructures.
Blockchains and quantum technologies are the emerging technological developments both in academic and industrial domains. The problems related to quantum threat and execution of post-quantum signatures in a blockchain platform have become hot topics in today's scientific community because they have remarkably progressed in recent years and have found a variety of applications.
This book is a valuable resource for academicians, researchers, students, and technicians in the field of blockchain and quantum computing.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Blockchain-Based Privacy-Protected Reputation Model for Internet of Vehicles
Abstract
The Internet of Vehicles (IoV) is a promising emerging technology that could significantly contribute to the development of high-level transportation infrastructure. However, there are constraints to the traditional reputation management approach in the IoV sector. These include a small detection radius, the possibility of privacy issues, and the use of unstable centralised reputation servers. This chapter provides a reputation model for the IoV that makes use of blockchain technology to guarantee anonymity, so addressing these concerns. Traditional IoV reputation systems have a major flaw due to their reliance on a single reputation server. The integrity and dependability of reputation assessments are at risk due to the presence of potential vulnerabilities in these systems, which could allow for unauthorised data alteration or theft. Additionally, one could argue that the current IoV reputation method does not offer sufficient protection for user anonymity. The evaluation of car reputations frequently requires the inclusion of personal information, such as driving habits and location data. Lastly, it is important to note that there exists a distance threshold beyond which the aforementioned reputation technique may encounter difficulties in accurately detecting and identifying vehicles that exhibit malevolent behaviour. The aforementioned proposal employs a distributed reputation update method based on blockchain technology in order to address these issues. This strategy enhances the precision of reputation analysis by obviating the necessity for a centralised reputation server. Furthermore, the utilisation of a multi-key, fully homomorphic encryption methodology is employed for both the encryption and computation of evaluation data, thereby substantially mitigating the potential for privacy breaches. In order to mitigate the possibility of rogue vehicles eluding detection through reputation upgrades, a novel adaptive retroactive time interval adjustment approach has been devised. The simulation results indicate that the proposed approach effectively preserves user privacy while maintaining high detection rates for malicious vehicles, and also minimises the occurrence of false positives. Furthermore, the model exhibits a detection rate that surpasses gold-standard techniques by 32%.
Nikhil Kumar Singh, Deepak Singh Tomar, Rishi Kumar Singh
Chapter 2. Sustainable Blockchain and Supply Chain Management: Integration Issues, Challenges, Potentials and Applications
Abstract
Blockchain has improved openness, efficiency, and confidence in the global supply chain ecosystem. This chapter investigates blockchain’s critical role in supply chain operations, beginning with an analysis of its key principles: decentralization, immutability, and cryptographic security. It then digs into the advantages of blockchain integration, which include more transparency, simplified transactions, greater traceability, and improved collaboration among supply chain players. This section’s chapters address a wide range of blockchain integration topics, including supply chain digitization, smart contracts, data privacy, and decentralized applications. Real-world case studies demonstrate effective blockchain use in a variety of industries. Furthermore, it covers integration issues such as technological complexities, prices, laws, and governance, providing useful insights and best practices. The chapter also looks ahead to future themes including Internet of Things (IoT) and Artificial Intelligence (AI) integration, regulatory challenges, and scalability. It emphasizes the need of organizations embracing blockchain to achieve a competitive advantage and promote supply chain innovation. This chapter is a comprehensive resource for professionals, researchers, and students interested in learning about and using blockchain integration in supply chain management. It takes a comprehensive approach to the subject, delivering practical insights, case studies, and future perspectives to inspire and enable organizations to use blockchain technology for supply chain optimization and transformation.
Nishant Gupta, Ankit Kumar Jain
Chapter 3. Zero-Knowledge Proofs in Blockchain-Enabled Supply Chain Management
Abstract
The global supply chain has been influenced by recent technology advancements and manufacturing growth. To enhance transparency, traceability, and trust in supply chain management, innovative solutions are required. One promising tool is blockchain technology, although it presents challenges in preserving privacy and confidentiality of sensitive information. Zero-knowledge proofs (ZKPs) are a powerful cryptographic tool that can validate the authenticity of goods, certifications, and transaction records in supply chain management systems without exposing sensitive business information. By utilizing ZKPs, participants can maintain data integrity and prove provenance while keeping proprietary details confidential. In this way, supply chain transparency is maintained for authorized parties only. ZKPs can enhance privacy in supply chain transactions by validating data integrity without disclosing the actual information. This enables confidentiality while ensuring proof of compliance with specific standards or regulations. Additionally, ZKPs help prevent and detect fraudulent activities by identifying anomalies in supply chain data through advanced cryptographic techniques. The use of ZKPs is a critical tool in ensuring the security and reliability of supply chains. This article provides a comprehensive analysis of the research on blockchain-based management of the supply chain specifically focusing on ZKPs application. Furthermore, this article identifies technical considerations, scalability problems, and interoperability challenges that may arise while incorporating such mechanisms. Zero-knowledge proofs hold great promise for transforming supply chain management through increased data integrity, improved privacy protection, and fraud prevention. By incorporating ZKPs into their processes, businesses can establish trust with partners and consumers alike while boosting efficiency and mitigating risks across the entire supply chain ecosystem. This article is a valuable resource for those interested in supply chain data privacy and security. It highlights the significant role of ZKPs in such areas and supports further advancements in blockchain-based management.
Sameeksha Prasad, Namita Tiwari, Meenu Chawla, Deepak Singh Tomar
Chapter 4. A Sustainable Blockchain and Asymmetric Broadcast Encryption-Based Secure E-Healthcare System
Abstract
The value of healthcare records has skyrocketed due to the emergence of many new diseases and the ongoing pandemic situations. With these healthcare records spread across numerous healthcare provider entities in various locations, it has become time-consuming to manage them in physical form. Consequently, there is a growing need to transition to electronic healthcare records (EHRs). However, the current approach of managing EHRs at the centralized level creates a single point of failure and exposes users to numerous security risks which include amateur-level attacks and data breaches orchestrated by adversaries. Handling electronic health records from the Internet of Medical Things(IoMT) poses significant challenges due to the sensitive information involved, which makes it a prime target for attackers. Furthermore, managing modern healthcare systems is complex and expensive, demanding highly secure storage space. The recent COVID-19 pandemic has inflicted unprecedented costs and human suffering on a scale never seen before in the modern world. As long as diseases continue to resurface, we must strive to slow down pandemics by leveraging information systems empowered by new IT technologies. Blockchain technology emerges as one potential solution for achieving this goal. By enhancing health record management, blockchain can address these problems. Its rising popularity has sparked extensive research into different transaction schemes that specialize in privacy preservation across various fields. However, the public nature of blockchain, which exposes transaction information, introduces significant privacy risks. Therefore, it is crucial to construct an efficient scheme that is flexible in nature and ensures privacy preservation of transaction contents and reliable auditability, aspects that previous works have failed to adequately address. We propose a framework of broadcast encryption and a specific instance to provide conditional data access control. It relies on a specific dedicated asymmetric-key-based broadcast encryption scheme, which stores user encrypted credentials for the blockchain conditional data access control. Simultaneously, conditional access of the encrypted data that is stored in an off-chain source of the data is applicable to encrypted data. The blockchain environment facilitates interactive communication between users of data and data providers, providing the necessary data access control information. Our proposed solution is based on a blockchain enabled privacy-preserving transaction construction that utilizes an efficient asymmetric-key broadcast encryption method. By implementing this approach, we aim to overcome the limitations of previous works and ensure secure and private handling of healthcare transactions within the blockchain ecosystem.
Snehlata Yadav, Vivek Yadav
Chapter 5. Computational Analysis of Interference for Sustainable Operation of Wireless Networks
Abstract
In wireless networks, data transmission is affected by interference from radio waves, and some data packets get discarded during transmission due to weak signal strength. As a result, data transmission is hazardous, and network operations are unreliable. This work addresses the investigation of co-channel and adjacent channel interference for sustainable operation of IEEE 802.11 networks. The goal of this work is to measure the level of signal interference experienced by access points and its impact on network performance. The Riverbed modeler tool was used to monitor and compute interference in the wireless network. According to the study results, the major cause of excessive interference is improper wireless channel distribution to access points.
Ram Krishan
Chapter 6. Advanced Techniques for Digital Evidence Preservation: The Power of Blockchain and Machine Learning
Abstract
Cybercrime is one of the fastest-growing crimes worldwide, and they are increasing in volume, sophistication, and cost. According to numerous reports such as Cybersecurity Ventures and others it is estimated that every seven seconds, cyber attackers penetrated into Cyber Systems. As a result, one of the essential parts of any system for storing and handling all the events is the log system. However, the system is not robust, and detecting an anomaly in logs has been challenging because of the continuous and ever-changing log events and their mutability property. Attackers attempt to modify the logs in order to avoid being discovered, which extends the time between detection and triage. In this work, we propose a novel model using Blockchain to problem of log analysis by suggesting two modules, anomaly detection using different machine learning models and Distributed Immutable storage system for securely storing the logs. We also present descriptive and user-friendly Web Application by integrating all modules using HTML, CSS, and Flask Framework on the Heroku cloud environment. Using proposed Hybrid Machine Learning Model, we are able to achieve 99.7% accuracy for detecting network anomalies.
Rizwan Ur Rahman, Deepak Singh Tomar, Gaurav Pramod Kacharea, Meeraj Mahendra Gawde, Tenzin Tsundue, Pavan Kumar, Hamiden Abd El Wahed Khalifa
Chapter 7. Quantum Resilience and Distributed Trust: The Promise of Blockchain and Quantum Computing in Defense
Abstract
The combination of blockchain technology with quantum computing has opened up new doors for improving the safety and effectiveness of a diverse variety of business sectors. The most recent readily available technologies, such as blockchain and quantum computing, play a crucial role in improving both safety and efficiency, which in turn makes a wide range of previously unavailable possibilities available in a variety of industries. This chapter goes into one of the most fascinating industries, namely the defense industry and the armed forces. Both of these industries have only somewhat lately begun to make use of modern technology in order to address complex problems and enhance operational efficiency. These cutting-edge technologies find applications in a variety of fields, most notably the military and defense sectors, to improve safety standards in their respective industries. The technologies that are discussed in this chapter are now seeing widespread implementation across a variety of sectors, including the military, the defense industry, and even the food business. This article examines their uses in the context of using blockchain technology to guarantee safe communication and the storage of data. In addition to this, it highlights the benefits of applying the principles of quantum computing to matters pertaining to military and defense-related tasks. This chapter highlights a number of real-world situations that stand to profit from the combination of blockchain technology for secure data storage and transmission inside military networks and quantum computing for research and development activities. These scenarios are discussed in further detail throughout the chapter. These hypothetical situations are analyzed in great detail and presented. This chapter also provides some insight into where blockchain technology and quantum computing are headed in the future, taking into consideration their present level of use and the continuous resolution of technical obstacles. This article is full with useful information for researchers and professionals who are interested in improving the safety of military and defense operations by using blockchain technology and quantum computing. By integrating these technologies, the goal is to make a contribution to the development of sustainable security practices for real-time applications. This chapter comes to a close with a discussion of some of the most pressing issues facing society today, including questions about breaches of personal privacy and the possibility that these technologies may be used for military purposes. It does so by carrying out an ethical study of the consequences surrounding the usage of technologies in defense and military applications such as blockchain and quantum computing. The results of this analysis shed light on their influence on concerns relating to privacy and security. Thus, the purpose of this chapter is to provide a detailed analysis of the ways in which blockchain technology and quantum computing might work together to improve safety and productivity across a variety of industries, with a specific emphasis on defense and military applications. It covers ethical issues and provides a forward-looking viewpoint, making it an invaluable resource for academics and professionals who want to develop security practices in various fields.
Shalom Akhai, Vipul Kumar
Chapter 8. Integration of Blockchain and the Internet of Things in Healthcare Sector
Abstract
The benchmarking of blockchain-based Internet of Things (IoT) healthcare Industry 4.0 systems falls under the multi-criteria decision-making (MCDM) predicament owing to the analysis, relevance, and attribute nature of several security and privacy factors. IoT technology aims to simplify the collection of distributed data inside healthcare practices, speed information exchange, and increase knowledge processing across various collaborative organizations. IoT blockchain architecture offers an excellent platform for the secure dependable and efficient collection, delivery, and retention of healthcare-related data from networked devices. Blockchain’s particular attributes, including Decentralized governance, security, privacy, transparency, and inviolability, are some of the primary grounds for using it in healthcare systems. Incorporating this technology into a healthcare facility involves the establishment of an extra blockchain components framework that is tailored to the healthcare institution’s architecture. Integrating unique security solutions for edge networks inside the Internet of Medical Things (IoMT) has been created as a cutting-edge bio-analytical tool for optimizing human health by incorporating network-connected biomedical equipment with software applications. As an outcome of the combined efficacy of IoMT and blockchain, healthcare personnel’s duties in diagnosing and securely sustaining patient data are simplified. It has the potential to revolutionize clinical research in the healthcare industry. Wearable sensors and an IoMT network allow patients, medical professionals, and caregivers to collaborate. IoT-driven fog computing is being developed in the healthcare industry to accelerate the delivery of services and facilities to the public at large, possibly safeguarding countless lives and radically enhancing the quality of healthcare. Healthcare, being one of the key businesses, has experienced several cybersecurity difficulties, including malware assaults and Distributed Denial-of-Service (DDoS) attacks. The increased demand for medical equipment and drugs has unfortunately given rise to illegal activities such as black marketing and counterfeiting. Blockchain technology has the potential to make it easier to develop a standardized database for collecting data across clinical trials while preserving the greatest degree of patient data privacy. Blockchain technology is used to securely store digital health records (DHR) while maintaining the integrity of the source data in order to protect patient identities and privacy. Data management, security, data sharing, and patient privacy are just a few of the Electronic Health Records (EHR)-related challenges that blockchain can address. Next-generation Healthcare IoT (HIoT) applications might be one of the sectors transformed by the blockchain network as a technical improvement.
Rajesh Singh, Anita Gehlot, Shaik Vaseem Akram, Ravindra Sharma, Praveen Kumar Malik
Chapter 9. Quantum-Resistant Cryptography to Prevent from Phishing Attack Exploiting Blockchain Wallet
Abstract
Blockchain technology is a way to maintain a decentralized and distributed digital ledger that allows multiple parties to maintain a shared database without the need for a central authority. Common application areas of blockchain where security is a significant concern are cryptocurrency, supply chain management, financial services, healthcare, voting systems, and intellectual copyright protection. But, attackers are exploiting phishing attacks to impersonate the blockchain wallet by tricking novice users. Phishing is one of the top ten attack scenarios to mimic the user by taking him in confidence as a legitimate one to reveal their private keys, seed phrases, and login credentials. Users can protect themselves from phishing attacks and their consequences by adopting or following best practices such as verifying the authenticity before taking any action, being cautious of hyperlinks, using secure website connections, enabling two-way authentication, raising awareness. But, due to the human nature of forgiveness and a lack of knowledge, users are still exploited by phishing attacks. Service providers are also responsible for managing secure transactions and protecting novice users from any fraudulent attack, including phishing. Quantum computing can contribute to strong security and prevent users from phishing attacks that target blockchain wallets. Potential methods of quantum computing to secure against phishing attacks include quantum cryptography, quantum-resistant cryptography, quantum random number generation, enhanced digital signatures, and public key infrastructure (PKI). Additionally, quantum-resistant cryptography can contribute specifically to preventing phishing attacks by providing secure key generation, robust authentication, resilient encryption, etc. Blockchain is a decentralized, immutable, and transparent technology, while the properties of quantum computing are quantum entanglement, quantum superposition, and quantum parallelism. Blockchain and quantum computing, both technologies, have the potential to bring significant advancements in securing against phishing attacks, irrespective of challenges and opportunities. Implementing quantum-resistant cryptography in blockchain networks would help mitigate the potential risks of quantum computing. Hence, the quantum-resistant cryptography method is proposed in this chapter to prevent phishing attacks that may exploit blockchain wallets.
Divya Rishi Sahu, Harsh Tiwari, Deepak Singh Tomar, R. K. Pateriya
Chapter 10. Revolutionizing Military Technology: How the Fusion of BlockChain and Quantum Computing is Driving in Defense Application
Abstract
Blockchain is a cutting-edge innovation that has reformed the manner in which society connects and exchanges. It very well may be characterized as a chain of blocks that stores data with computerized marks in a circulated and decentralized network. Many years of hacking and taking advantage of digital protection frameworks have more than once demonstrated how a decided digital assailant might think twice and regular citizen organizations. The danger of refined weapon frameworks being hurt or debilitated by non-dynamic effects has constrained militaries to foster a long haul and unmistakably savvy safeguard for military frameworks. Blockchain, and it’s at this point untested military purposes, can move the security weaknesses of some digital frameworks from a weak link weakness model, in which an aggressor just has to think twice about hub to disregard the framework, to a greater part compromised weakness model, in which a noxious entertainer can’t take advantage of a weak link. Quantum innovation interprets the standards of quantum physical science into mechanical applications. As a general rule, quantum innovation has not yet arrived at development; be that as it may, it could hold critical ramifications for the fate of military detecting, encryption, and correspondences, as well as concerning legislative oversight, approvals, and assignments.
Vinay Aseri, Harish Chowdhary, Naveen Kumar Chaudhary, Shivam Kumar Pandey, Viveka Kumar
Chapter 11. Building Resilient Digital Forensic Frameworks for NoSQL Database: Harnessing the Blockchain and Quantum Technology
Abstract
Digital forensics is the process of gathering, examining, and presenting digital evidence from devices like computers, smart phones, and cameras with supporting documentation. Investigating cybercrimes, retrieving deleted data, confirming the veracity of documents and photos, and locating the source and location of digital information are just a few of the many uses for digital forensics. The process of investigating logs of database systems and metadata to search for clues and signs of criminal activity or security breaches is called database forensics. Forensic experts could recover lost or damaged data with tools of database forensics and determine the origin, nature, and scope of an attack. Two cutting-edge technologies that can be employed in digital forensics are blockchain and quantum computing. While quantum computing can be used to find patterns and encrypt data, blockchain can be used to guarantee the accuracy of logs and monitor data flow. These technologies offer verifiable audit trails, an unbreakable chain of custody, and secure storage of forensic artifacts for forensic investigators. Digital forensic professionals must develop quantum-safe digital evidence preservation techniques and deal with other issues brought on by quantum computing. However, with careful planning and preparation, these difficulties are surmountable. For the wide-column store NoSQL database, we provide a six-phase forensic investigation framework in this chapter. Our system includes the full process of forensic examination, from preparation to reporting, in contrast to other studies that concentrated on particular parts of NoSQL forensics, such as transaction log analysis or deleted data recovery. We also discuss the difficulties associated with finding and evaluating distributed evidence in a NoSQL setting, which is distinct from a relational DBMS. Our system may be used with a variety of documents and wide-column NoSQL DBMSs including MongoDB, CouchDB, and Cassandra. We do a case study using Cassandra as an illustration to show its efficacy.
Rizwan Ur Rahman, Kuldeep Singh, Deepak Singh Tomar, Rabia Musheer
Chapter 12. Revolutionizing Gait Analysis with Blockchain Technology: Enhancing the Privacy and Security
Abstract
Gait analysis is essential for evaluating the gait patterns of individuals and for diagnosing and treating conditions such as multiple sclerosis and Parkinson’s disease. However, traditional gait analysis techniques have their own limitations. They can be time-consuming, costly, and detrimental to patient data security. Blockchain technology therefore offers a probable solution. It provides stakeholders with an efficient and transparent system for storing and exchanging patient information. Blockchain promotes the collection of patient data from wearable devices such as sensors, smartwatches, and smartphones by utilizing a decentralized framework. This data is encrypted and securely stored on the blockchain to ensure its immutability and prevent any manipulation attempts. The integration of blockchain technology with gait analysis provides many advantages including enhanced efficiency, traceability, and a reduction in the risks associated with human errors and expenditures. Additionally, the transparent nature of the blockchain ledger system provides healthcare professionals with comprehensive and accurate records of each patient’s gait analysis over time. However, there are challenges such as substantial investment for required infrastructure, complex integration, and ethical concerns surrounding data ownership and patient privacy. The rest of the chapter is organized as follows. It provides a comprehensive discussion on gait, covering the different phases and the integration of blockchain technology. Additionally, the chapter explores the limitations and advantages of incorporating blockchain technology in gait analysis. Furthermore, some case studies are presented. Later, the framework for the Decentralized Gait Analysis and Rehabilitation Platform is presented and finally, the conclusion is followed by references.
Pratibha Tokas, Vijay Bhaskar Semwal, Sweta Jain, Deepak Singh Tomar
Chapter 13. A Blockchain-Enabled Framework to Implement Supply Chains in Digital Land Registry in the Kingdom of Saudi Arabia
Abstract
With the introduction of the Land Administration Domain Model (LADM), countries started adapting this new standard into their real estate systems. This research describes a sustainable supply chain framework model to implement a digital land registry in the Kingdom of Saudi Arabia. The proposed research evaluates and analyzes the existing land registries and their digital aspects. It also conforms to capture the best practices for designing new processes and procedures by inheriting and satisfying current laws and regulations of the country. It discussed how blockchain can be a useful asset in the supply chain digital land registry model. The work also aims to design a framework for such implantation and fitting it to the model such as the Software Development Life Cycle (SDLC). The research followed an exploratory research approach, which is more suitable for qualitative-based researches. The data used in the research was collected through interviews with key individuals in organizations that are related to real estate. The results discussed the viability of the framework, its advantages, and shortcomings with the detailed discussion of the future directions.
Omar Alsukaiti, Mohammed Alojail
Chapter 14. Blockchain for Secure Payments: A Bibliometric Review
Abstract
Blockchain has gained the attention of stakeholders as a potential technology for peer-to-peer transactions. Traditional online financial transactions are susceptible to cyberattacks. The poor adoption of online payments has been a concern due to security issues. Blockchain offers a secure alternative for banks and non-bank entities engaged in the payment sector. The chapter explores the literature on blockchain for secure transactions. A bibliometric analysis was done on the Scopus database. 311 documents were used for the analysis. The VOS viewer software version 1.6.19 was used for the analysis. 187 documents were published in the Computer Science domain, 94 documents were published in the business and management domain, 86 documents in engineering, 58 in economics, econometrics, and finance, and 51 documents were published in the social science domain. The findings have implications for researchers as they explore major themes for research in secure payments using blockchain.
Vibhuti Jain, Ruchi Mehrotra, Jose Arturo Garza-Reyes, Rajesh Tiwari, Khem Chand
Chapter 15. Formalized Overview of ZX-Calculus, the Notion of Completeness Clifford Computation-Based and One Representative Application Case
Abstract
This paper aims to consider the importance and use of ZX-calculus taking into account the solid structure of this branch to give a representation of quantum algorithms by finding the function’s properties pictorially using logic and category theory. It’s desired to show this topic formally, establishing axioms and definitions that support which foundations will be operating, explaining the processes and steps followed. Will start with the notion of what a ZX-diagram is, what spiders are, symmetries, and transposes. After that, get into ZX-calculus regarding spider fusion, \(\pi \)-commutation, color changing, and algebraic structures; it will show reasoning about the influence of connectivity. After this, their advantages in simplification, and, finally, how a ZX-diagram is translated into a quantum circuit.
Luis Gerardo Ayala Bertel
Metadaten
Titel
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications
herausgegeben von
Adarsh Kumar
Neelu Jyothi Ahuja
Keshav Kaushik
Deepak Singh Tomar
Surbhi Bhatia Khan
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
Electronic ISBN
978-981-9700-88-2
Print ISBN
978-981-9700-87-5
DOI
https://doi.org/10.1007/978-981-97-0088-2