Professional Documents
Culture Documents
نص كامل
نص كامل
Blockchain has been Linked to bitcoin and cryptocurrency. new method with dealing
with information and make it hard to crack or hack system , it has the opportunity
to evolve with many aspects.
it has Many features it can save a lot of information and preserve it’s integrity,
traceable , tamper proof .
Introduction /
In past years many application based blackchin has been implemented specially in
the internet of thing iot combining it with blockchain has many features where it
can save the identities and analysis the behaviour of it .
Example of application : implementing DNS AND PKI systems - implementing and
control voting system to prevent manipulation.
Example of framework to generate and store identities , it focus on VANET, Iov and
iot in general.
Usually at the process of register autonomous vehicle (V2V), (V2I) privacy
preserving and key interchange are necessary for communication.
Examples of this include specific developments , system have third trusted party
ID-based cryptography with RSA , or multi certificate PKI , these developments
allow certain portability and privacy .
Wireless Sensors Networks (WSN) is the main use of iot both domestic and industrial
.
However, if these systems don’t have suitable registration system, they are open to
attacks. suggests a framework to solve this issue by isolating the network
part that has been compromised without restricting access to information.To manage
decentralisation, the author suggest framework where information preserved on other
storage scheme , specially peer-to-peer network , The network itself defines these
schemes dynamically, and the essential data is kept in a self-management framework.
This framework work also on centralised , focus on minimizing communication and
registration related to battery use. Example To maintain self-certification without
having an excessive energy consumption in registered devices, work with normal
cryptography techniques and optimization algorithms.
The framework application paradigms mentioned for management are close of identity
but not too close it can’t manage and store credentials. Because it’s more
complicated, therefor all of these framework can not be used to generate and save
credentials, and most of decentralized frameworks rely on the participate of third
part which is against the idea of self- generation identities.
Fig. 1 explains the main structure of 3BI-ECC frame- work, where relations and main
interaction of all parties in system . Each blockchain has its own function to
improve security of searching and storage of identities in system and main features
for every Blockchain.
Fig. 2 describes the primary architecture, which includes the three blockchains as
a distinctive Certificate Management System, and offers key pair creation and
storage for EPN's students, professors, and employees. And the main reason for
choose EPN network is to tes capacity of the design , EPN network system has two
main applications that depend on the user’s identity: E-Mail Server and Document
Storage Server. And these two System communities through certificate manager.
This architecture's major idea is to use the core blockchain to verify each self-
generated user certificate.
As we mention the core will generate and store set of certificates to handle as PKI
for services on institution. Through the identity manger it will initiate
identities for every person on system based on National Identity Service’s
information. The user must verify his own identity using the institutional email
that the Identity Manager of the EPN has provided.
Framework Initialization:
1- blockchain Initialization: Any identity management system requires some form of
primary external validation. The purpose of developing 3BI-ECC is to eliminate the
requirement for this outside validation. We use a prime blockchain as cornerstone
to validate network by itself, to contain core will choose random nodes , each node
generate key pair This core ledger uses random data and stores the self-signed
public key as a "super" certificate. These public keys are the strongest in system
and it will be used to verify other blockchain , the purpose is to make the network
independent and all validate identities internally.
To prevent possible violation of Core blockchain will contain:
• The ‘super’ certificate that will sign all the user’s keys.
• A hash of the block in the core blockchain where the certificate is stored.
• A hash of all core blockchain.
Every now and then it will check the hashes and check if it match the original
information and make sure the network is secure and unchanged .
Identity Generation and Storage: each user has the choice of choosing which
features to be represented in his identity as many as he like and as many he is
willing to share , each identity should have one to define the user , instead of
centralized authority to validate identity , each identity should be verify by its
owner, validation must be from user and independent network .
Combining Blockchain and its improvements, and ECC They might enhance the
significance of information storage and validation. Author mention using ECC Many
systems employ ECC because of how little compute, memory, and network resources are
used in its computations and storage. And mentioned that blockchain need some
improvement by changing some of main feature self-generated , modification must
come from validation of the storage of information, which is originally in
blockchain called proof of work(POW). We will modify it and implement it as
personal identity information in the form of a specific certificate.
Framework Functions:
Identity Storage: user can creat key pair through email, email’s password is the
seed of key pairs with ecc :
⁃ When Direccion de Gestion de Información y Pro- cesos (DGIP) creates a
new account, a default password is generated .
⁃ User must change when he receive his credentials.
⁃ To this password we use hash to get private key for user and allows the
association with a 4 characters PIN .
⁃ This pin will not be part of hash calculation , with ecc public key is
created from private key and stored in the decentralized blockchain created only
for public keys as customized certificates.
Identity Revocation: public key and email of user are stored as main identity, when
user lose password or it’s been compromised, the process of recovering its like
creating new key pairs from Identity Management System (DGIP) , and there is been
space for revoked keys so the old password will not be valid and will be private so
no one calculate hash. The only system that checks both blockchains to determine
which certificate is legitimate is the middleware (the one that is only stored in
the Full Blockchain).
Security Analysis
The following factors are taken into account when evaluating the proposed
framework's security: identity privacy, node identification, attacks and key
agreement.
Identify privacy : preserving security from any internal and external malicious
party is so important, as we mentioned only the public key will be saved on
blockchain , when user need private key the system will calculate it . The creation
of the key is based on the user's uniqueness, maintaining the system's overall
anonymity.
Node identification: every nod store two or three blockchain, and they identify and
communications, and through unified network name will be used as one entity. Making
transparency of framework .
Attacks : decentralization blockchain and it’s features is important to maintain
framework security , framework having its own Proof of Work it will decline any
third part of trying to creat new branch and impersonating, private key will not be
stored in system . Because it calculate on-the-fly.
Type of Certificates: based on framework following X.509 doesn’t add much value to
the proposal , creating new type of certificate where actual identity is
managed ,it should identify features to make identity unique .
Efficiency analysis
Author’s new framework and architecture enable suggested solution to guarantee the
following aspects related to network identities:
Decentralization of identity management, self-validation of users and the
improvements of blockchain as a concept, allow users in the network to use their
uniqueness to generate their own personal credentials. It could be email , features
or biomedical features to avoid impersonations over the network.. The purpose is
self-validation, decentralization all identities .
CONCLUSION
part of the security of this research is with the user’s uniqueness, but not with
the user intervention. Improving blockchain mechanisms, in both public and private
distributions, is part of the evolution of independent decentralized technologies
and of the way Internet is understood nowadays. In this paper, we described a
solution to enhance the networking applications by taking into account blockchain-
based identity management while managing the lifecycle of these identities for
Authentication and Access Control procedures.
REFERENCES
[1] D. Maldonado-Ruiz, J. Torres, and N. El Madhoun, “3BI-ECC: a Decentralized
Identity Framework Based on Blockchain Tech- nology and Elliptic Curve
Cryptography,” 2020 2nd Conference on Blockchain Research & Applications for
Innovative Networks and Services (BRAINS), pp. 45–46, sep 2020.
[2] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
[3] D.DiFrancescoMaesaandP.Mori,“Blockchain3.0applications survey,” Journal of
Parallel and Distributed Computing, vol. 138, pp. 99–114, apr 2020.
[4] N. El Madhoun, J. Hatin, and E. Bertin, “A decision tree for building it
applications,” Annals of Telecommunications, pp. 1– 14, 2020.
[5] D. Maldonado-Ruiz, M. Badra, N. El Madhoun, and J. Torres, “Secure and
internet-less connectivity to a blockchain network for limited connectivity bank
users,” MSPN 2020: International Conference on Mobile, Secure and Programmable
Networking, 2020.
[6] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT
security and privacy: The case study of a smart home,” 2017 IEEE International
Conference on Per- vasive Computing and Communications Workshops (PerCom
Workshops), pp. 618–623, mar 2017.
[7] D.W.KravitzandJ.Cooper,“Securinguseridentityandtransac- tions symbiotically:
IoT meets blockchain,” 2017 Global Internet of Things Summit (GIoTS), pp. 1–6, jun
2017.