CHF106.95
Download est disponible immédiatement
AN ESSENTIAL GUIDE TO USING BLOCKCHAIN TO PROVIDE FLEXIBILITY, COST-SAVINGS, AND SECURITY TO DATA MANAGEMENT, DATA ANALYSIS, AND INFORMATION SHARING
Blockchain for Distributed Systems Security contains a description of the properties that underpin the formal foundations of Blockchain technologies and explores the practical issues for deployment in cloud and Internet of Things (IoT) platforms. The authors--noted experts in the field--present security and privacy issues that must be addressed for Blockchain technologies to be adopted for civilian and military domains. The book covers a range of topics including data provenance in cloud storage, secure IoT models, auditing architecture, and empirical validation of permissioned Blockchain platforms.
The book's security and privacy analysis helps with an understanding of the basics of Blockchain and it explores the quantifying impact of the new attack surfaces introduced by Blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. This important resource:
Provides an overview of Blockchain-based secure data management and storage for cloud and IoT
Covers cutting-edge research findings on topics including invariant-based supply chain protection, information sharing framework, and trust worthy information federation
Addresses security and privacy concerns in Blockchain in key areas, such as preventing digital currency miners from launching attacks against mining pools, empirical analysis of the attack surface of Blockchain, and more
Written for researchers and experts in computer science and engineering, Blockchain for Distributed Systems Security contains the most recent information and academic research to provide an understanding of the application of Blockchain technology.
Auteur
SACHIN S. SHETTY, PHD, is an Associate Professor in the Virginia Modeling, Analysis, and Simulation Center and Department of Modeling, Simulation and Visualization Engineering at Old Dominion University. CHARLES A. KAMHOUA, PHD, is a researcher at the US Army Research Laboratory's Network Security Branch. LAURENT L. NJILLA, PHD, is a research electronics engineer and the program manager of Disruptive Information Technology at the Information Directorate/Cyber Assurance Branch of the Air Force Research Laboratory.
Contenu
Foreword xiii
Preface xv
List of Contributors xix
Part I Introduction to Blockchain 1
1 Introduction 3
*Sachin S. Shetty, Laurent Njilla, and Charles A. Kamhoua*
1.1 Blockchain Overview 3
1.1.1 Blockchain Building Blocks 5
1.1.2 Blockchain Commercial Use Cases 6
1.1.3 Blockchain Military Cyber Operations Use Cases 11
1.1.4 Blockchain Challenges 13
1.2 Overview of the Book 16
1.2.1 Chapter 2: Distributed Consensus Protocols and Algorithms 16
1.2.2 Chapter 3: Overview of Attack Surfaces in Blockchain 17
1.2.3 Chapter 4: Data Provenance in Cloud Storage with Blockchain 17
1.2.4 Chapter 5: Blockchain-based Solution to Automotive Security and Privacy 18
1.2.5 Chapter 6: Blockchain-based Dynamic Key Management for IoT-Transportation Security Protection 19
1.2.6 Chapter 7: Blockchain-enabled Information Sharing Framework for Cybersecurity 19
1.2.7 Chapter 8: Blockcloud Security Analysis 20
1.2.8 Chapter 9: Security and Privacy of Permissioned and Permissionless Blockchain 20
1.2.9 Chapter 10: Shocking Public Blockchains' Memory with Unconfirmed TransactionsNew DDoS Attacks and Countermeasures 21
1.2.10 Chapter 11: Preventing Digital Currency Miners From Launching Attacks Against Mining Pools by a Reputation-Based Paradigm 21
1.2.11 Chapter 12: Private Blockchain Configurations for Improved IoT Security 22
1.2.12 Chapter 13: Blockchain Evaluation Platform 22
References 23
2 Distributed Consensus Protocols and Algorithms 25
*Yang Xiao, Ning Zhang, Jin Li, Wenjing Lou, and Y. Thomas Hou*
2.1 Introduction 25
2.2 Fault-tolerant Consensus in a Distributed System 26
2.2.1 The System Model 26
2.2.2 BFT Consensus 28
2.2.3 The OM Algorithm 29
2.2.4 Practical Consensus Protocols in Distributed Computing 30
2.3 The Nakamoto Consensus 37
2.3.1 The Consensus Problem 38
2.3.2 Network Model 38
2.3.3 The Consensus Protocol 39
2.4 Emerging Blockchain Consensus Algorithms 40
2.4.1 Proof of Stake 41
2.4.2 BFT-based Consensus 42
2.4.3 Proof of Elapsed Time (PoET) 44
2.4.4 Ripple 45
2.5 Evaluation and Comparison 47
2.6 Summary 47
Acknowledgment 49
References 49
3 Overview of Attack Surfaces in Blockchain 51
*Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang, and Aziz Mohaisen*
3.1 Introduction 51
3.2 Overview of Blockchain and its Operations 53
3.3 Blockchain Attacks 54
3.3.1 Blockchain Fork 54
3.3.2 Stale Blocks and Orphaned Blocks 54
3.3.3 Countering Blockchain Structure Attacks 55
3.4 Blockchain's Peer-to-Peer System 55
3.4.1 Selfish Mining 56
3.4.2 The 51% Attack 57
3.4.3 DNS Attacks 57
3.4.4 DDoS Attacks 58
3.4.5 Consensus Delay 59
3.4.6 Countering Peer-to-Peer Attacks 59
3.5 Application Oriented Attacks 60
3.5.1 Blockchain Ingestion 60
3.5.2 Double Spending 60
3.5.3 Wallet Theft 61
3.5.4 Countering Application Oriented Attacks 61
3.6 Related Work 61
3.7 Conclusion and Future Work 62
References 62
Part II Blockchain Solutions for Distributed System Security 67
4 ProvChain: Blockchain-based Cloud Data Provenance 69
*Xueping Liang, Sachin S. Shetty, Deepak Tosh, Laurent Njilla, Charles A. Kamhoua, and Kevin Kwiat*
4.1 Introduction 69
4.2 Background and Related Work 70
4.2.1 Data Provenance 70
4.2.2 Data Provenance in the Cloud 71
4.2.3 Blockchain 73
4.2.4 Blockchain and Data Provenance 74 4.3 P...