Decentralized Secure Online Digital Data Registrations

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    A potential challenge in the present secure transaction lies in illegitimate access to premium digital data available in various formats on various service-sectors for Government and Non-Government process models. This vulnerable scenario leads to identity attacks, man in the middle (MITM) attacks and denial of service (DoS) attacks. Our proposed model uses blockchain technology with machine learning classifiers to identify and detect possible attacks within a peer-to-peer network. Blockchain uses digital signatures, proof-of-work algorithm and consensus algorithms to protect system from possible integrity and denial of service attacks and machine learning classifiers deployed at every node offers confrontation to any intruder’s attack.

     



  • Keywords


    DoS attacks, MITM attacks, Blockchain, Machine learning, Intrusion, Data Registration

  • References


      [1] F.F. Wu, K. Moslehi and A. Bose, “Power system control centers: Past, present, and future,” Proc. IEEE, vol. 93, no. 11, pp. 1890–1908, 2005.

      [2] F. Luo, J. Zhao, Z.Y. Dong, Y. Chen, Y. Xu, X. Zhang and K.P. Wong “Cloud-based information infrastructure for next-generation power grid: conception, architecture, and applications,” IEEE Trans. Smart Grid, vol. 7, no. 4, pp. 1896–1912, Jul. 2016.

      [3] NCCIC/ICS-CERT, “Cyber-attack against Ukrainian critical infrastructure,” released 25 February 2016. [Online]. Available: https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01 [Accessed: 22 Jan. 2018].

      [4] E-ISAC and SANS, “Analysis of the cyber attack on the Ukrainian power grid: Defense use case,” released 18 March 2016. [Online]. Available: https://ics.sans.org/duc5 [Accessed: 22 Jan. 2018].

      [5] G. Liang, S.R. Weller, J. Zhao, F. Luo and Z. Dong, “The 2015 Ukraine blackout: Implications for false data injection attacks,” IEEE Trans. Power Syst., vol. 32, no. 4, pp. 3317–3318, Jul. 2017.

      [6] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Trans. Inf. and Syst. Security (TISSEC), vol. 14, no.1, May 2011.

      [7] G. Liang, J. Zhao, F. Luo, S.R. Weller, and Z. Dong. “A review of false data injection attacks against modern power systems,” IEEE Trans. Smart Grid, vol. 8, no. 4, pp. 1630 – 1638, Jul. 2017.

      [8] R. Deng, G. Xiao, R. Lu, H. Liang and A.V. Vasilakos, “False data injection attack on state estimation in power systems – attacks, impacts, and defense: A survey,” IEEE Trans. Industrial Informatics, vol. 13, no. 2, pp. 411–423, Apr. 2017.

      [9] O. Kosut, L. Jia, R.J. Thomas, and L. Tong, “Malicious data attacks on the smart grid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645–658, Oct. 2011.

      [10] Raman Dugyala,N Hanuman Reddy,N Chandra Shaker reddy,J Phani prasad “A Roadmap to Security in IoT” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 (2017) pp. 8270-8272

      [11] Raman Dugyala, Bruhadeshwar Bezawada, Rajini Kanth V. Thatiparthi, Sai Sathyanarayan “Static Program Behavior Tracing for Program Similarity Quantification” Proceedings of the First International Conference on Computational Intelligence and Informatics Volume 507 of the series Advances in Intelligent Systems and Computing pp 321-330 DOI 10.1007/978-981-10-2471-9_31 Print ISBN 978-981-10-2470-2 Online ISBN 978-981-10-2471-9,May 2016

      [12] Raman Dugyala, Prashanthi Muddam “Graphical Password Authentication for Secure Online Services” International Research Journal of Engineering and Technology ,Vol 3, Issue 8,Aug 2016

      [13] Shojafar, M.; Cordeschi, N.; Baccarelli, E. Energy-efficient adaptive resource management for real-time vehicular cloud services. IEEE Trans. Cloud Comput. 2016. [CrossRef]

      [14] Javanmardi, S.; Shojafar, M.; Shariatmadari, S.; Ahrabi, S.S. Fr Trust: A fuzzy reputation based model fortrust management in semantic P2P grids. Int. J. Grid Util. Comput. 2015, 6, 57–66. [CrossRef]

      [15] Du, Q.H.; Li, W.Y.; Song, H.B. Security enhancement via dynamic fountain code for wireless multicast. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Guilin, China, 27 May 2017; pp. 509–521

      [16] K Suma Rani, D Raman “A Study Of Cross Site Scripting Compulsion Against Web Applications” International Journal of Eminent Engineering Technologies”,Vol 2, Issue 3,Apr 2015


 

View

Download

Article ID: 20231
 
DOI: 10.14419/ijet.v7i4.6.20231




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.