close menu
Bookswagon-24x7 online bookstore
close menu
My Account
Blockchain for Distributed Systems Security

Blockchain for Distributed Systems Security

          
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

AN ESSENTIAL GUIDE TO USING BLOCKCHAIN TO PROVIDE FLEXIBILITY, COST-SAVINGS, AND SECURITY TO DATA MANAGEMENT, DATA ANALYSIS, AND INFORMATION SHARING

Blockchain for Distributed Systems Security contains a description of the properties that underpin the formal foundations of Blockchain technologies and explores the practical issues for deployment in cloud and Internet of Things (IoT) platforms. The authors—noted experts in the field—present security and privacy issues that must be addressed for Blockchain technologies to be adopted for civilian and military domains. The book covers a range of topics including data provenance in cloud storage, secure IoT models, auditing architecture, and empirical validation of permissioned Blockchain platforms.

The book's security and privacy analysis helps with an understanding of the basics of Blockchain and it explores the quantifying impact of the new attack surfaces introduced by Blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. This important resource:

  • Provides an overview of Blockchain-based secure data management and storage for cloud and IoT
  • Covers cutting-edge research findings on topics including invariant-based supply chain protection, information sharing framework, and trust worthy information federation
  • Addresses security and privacy concerns in Blockchain in key areas, such as preventing digital currency miners from launching attacks against mining pools, empirical analysis of the attack surface of Blockchain, and more

Written for researchers and experts in computer science and engineering, Blockchain for Distributed Systems Security contains the most recent information and academic research to provide an understanding of the application of Blockchain technology.



Table of Contents:

Foreword xiii

Preface xv

List of Contributors xix

Part I Introduction to Blockchain 1

1 Introduction 3
Sachin S. Shetty, Laurent Njilla, and Charles A. Kamhoua

1.1 Blockchain Overview 3

1.1.1 Blockchain Building Blocks 5

1.1.2 Blockchain Commercial Use Cases 6

1.1.3 Blockchain Military Cyber Operations Use Cases 11

1.1.4 Blockchain Challenges 13

1.2 Overview of the Book 16

1.2.1 Chapter 2: Distributed Consensus Protocols and Algorithms 16

1.2.2 Chapter 3: Overview of Attack Surfaces in Blockchain 17

1.2.3 Chapter 4: Data Provenance in Cloud Storage with Blockchain 17

1.2.4 Chapter 5: Blockchain-based Solution to Automotive Security and Privacy 18

1.2.5 Chapter 6: Blockchain-based Dynamic Key Management for IoT-Transportation Security Protection 19

1.2.6 Chapter 7: Blockchain-enabled Information Sharing Framework for Cybersecurity 19

1.2.7 Chapter 8: Blockcloud Security Analysis 20

1.2.8 Chapter 9: Security and Privacy of Permissioned and Permissionless Blockchain 20

1.2.9 Chapter 10: Shocking Public Blockchains’ Memory with Unconfirmed Transactions—New DDoS Attacks and Countermeasures 21

1.2.10 Chapter 11: Preventing Digital Currency Miners From Launching Attacks Against Mining Pools by a Reputation-Based Paradigm 21

1.2.11 Chapter 12: Private Blockchain Configurations for Improved IoT Security 22

1.2.12 Chapter 13: Blockchain Evaluation Platform 22

References 23

2 Distributed Consensus Protocols and Algorithms 25
Yang Xiao, Ning Zhang, Jin Li, Wenjing Lou, and Y. Thomas Hou

2.1 Introduction 25

2.2 Fault-tolerant Consensus in a Distributed System 26

2.2.1 The System Model 26

2.2.2 BFT Consensus 28

2.2.3 The OM Algorithm 29

2.2.4 Practical Consensus Protocols in Distributed Computing 30

2.3 The Nakamoto Consensus 37

2.3.1 The Consensus Problem 38

2.3.2 Network Model 38

2.3.3 The Consensus Protocol 39

2.4 Emerging Blockchain Consensus Algorithms 40

2.4.1 Proof of Stake 41

2.4.2 BFT-based Consensus 42

2.4.3 Proof of Elapsed Time (PoET) 44

2.4.4 Ripple 45

2.5 Evaluation and Comparison 47

2.6 Summary 47

Acknowledgment 49

References 49

3 Overview of Attack Surfaces in Blockchain 51
Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang, and Aziz Mohaisen

3.1 Introduction 51

3.2 Overview of Blockchain and its Operations 53

3.3 Blockchain Attacks 54

3.3.1 Blockchain Fork 54

3.3.2 Stale Blocks and Orphaned Blocks 54

3.3.3 Countering Blockchain Structure Attacks 55

3.4 Blockchain’s Peer-to-Peer System 55

3.4.1 Selfish Mining 56

3.4.2 The 51% Attack 57

3.4.3 DNS Attacks 57

3.4.4 DDoS Attacks 58

3.4.5 Consensus Delay 59

3.4.6 Countering Peer-to-Peer Attacks 59

3.5 Application Oriented Attacks 60

3.5.1 Blockchain Ingestion 60

3.5.2 Double Spending 60

3.5.3 Wallet Theft 61

3.5.4 Countering Application Oriented Attacks 61

3.6 Related Work 61

3.7 Conclusion and Future Work 62

References 62

Part II Blockchain Solutions for Distributed System Security 67

4 ProvChain: Blockchain-based Cloud Data Provenance 69
Xueping Liang, Sachin S. Shetty, Deepak Tosh, Laurent Njilla, Charles A. Kamhoua, and Kevin Kwiat

4.1 Introduction 69

4.2 Background and Related Work 70

4.2.1 Data Provenance 70

4.2.2 Data Provenance in the Cloud 71

4.2.3 Blockchain 73

4.2.4 Blockchain and Data Provenance 74

4.3 ProvChain Architecture 75

4.3.1 Architecture Overview 76

4.3.2 Preliminaries and Concepts 77

4.3.3 Threat Model 78

4.3.4 Key Establishment 78

4.4 ProvChain Implementation 79

4.4.1 Provenance Data Collection and Storage 80

4.4.2 Provenance Data Validation 83

4.5 Evaluation 85

4.5.1 Summary of ProvChain’s Capabilities 85

4.5.2 Performance and Overhead 86

4.6 Conclusions and Future Work 90

Acknowledgment 91

References 92

5 A Blockchain-based Solution to Automotive Security and Privacy 95
Ali Dorri, Marco Steger, Salil S. Kanhere, and Raja Jurdak

5.1 Introduction 95

5.2 An Introduction to Blockchain 98

5.3 The Proposed Framework 101

5.4 Applications 103

5.4.1 Remote Software Updates 103

5.4.2 Insurance 105

5.4.3 Electric Vehicles and Smart Charging Services 105

5.4.4 Car-sharing Services 106

5.4.5 Supply Chain 106

5.4.6 Liability 107

5.5 Evaluation and Discussion 108

5.5.1 Security and Privacy Analysis 108

5.5.2 Performance Evaluation 109

5.6 Related Works 112

5.7 Conclusion 113

References 114

6 Blockchain-based Dynamic Key Management for IoT-Transportation Security Protection 117
Ao Lei, Yue Cao, Shihan Bao, Philip Asuquom, Haitham Cruickshank, and Zhili Sun

6.1 Introduction 117

6.2 Use Case 119

6.2.1 Message Handover in VCS 120

6.3 Blockchain-based Dynamic Key Management Scheme 124

6.4 Dynamic Transaction Collection Algorithm 125

6.4.1 Transaction Format 125

6.4.2 Block Format 127

6.5 Time Composition 128

6.5.1 Dynamic Transaction Collection Algorithm 129

6.6 Performance Evaluation 130

6.6.1 Experimental Assumptions and Setup 130

6.6.2 Processing Time of Cryptographic Schemes 132

6.6.3 Handover Time 133

6.6.4 Performance of the Dynamic Transaction Collection Algorithm 135

6.7 Conclusion and Future Work 138

References 140

7 Blockchain-enabled Information Sharing Framework for Cybersecurity 143
Abdulhamid Adebayo, Danda B. Rawat, Laurent Njilla, and Charles A. Kamhoua

7.1 Introduction 143

7.2 The BIS Framework 145

7.3 Transactions on BIS 146

7.4 Cyberattack Detection and Information Sharing 147

7.5 Cross-group Attack Game in Blockchain-based BIS Framework: One-way Attack 149

7.6 Cross-group Attack Game in Blockchain-based BIS Framework: Two-way Attack 151

7.7 Stackelberg Game for Cyberattack and Defense Analysis 152

7.8 Conclusion 156

References 157

Part III Blockchain Security 159

8 Blockcloud Security Analysis 161
Deepak Tosh, Sachin S. Shetty, Xueping Liang, Laurent Njilla, Charles A. Kamhoua, and Kevin Kwiat

8.1 Introduction 161

8.2 Blockchain Consensus Mechanisms 163

8.2.1 Proof-of-Work (PoW) Consensus 164

8.2.2 Proof-of-Stake (PoS) Consensus 165

8.2.3 Proof-of-Activity (PoA) Consensus 167

8.2.4 Practical Byzantine Fault Tolerance (PBFT) Consensus 168

8.2.5 Proof-of-Elapsed-Time (PoET) Consensus 169

8.2.6 Proof-of-Luck (PoL) Consensus 170

8.2.7 Proof-of-Space (PoSpace) Consensus 170

8.3 Blockchain Cloud and Associated Vulnerabilities 171

8.3.1 Blockchain and Cloud Security 171

8.3.2 Blockchain Cloud Vulnerabilities 174

8.4 System Model 179

8.5 Augmenting with Extra Hash Power 180

8.6 Disruptive Attack Strategy Analysis 181

8.6.1 Proportional Reward 181

8.6.2 Pay-per-last N-shares (PPLNS) Reward 184

8.7 Simulation Results and Discussion 187

8.8 Conclusions and Future Directions 188

Acknowledgment 190

References 190

9 Permissioned and Permissionless Blockchains 193
Andrew Miller

9.1 Introduction 193

9.2 On Choosing Your Peers Wisely 194

9.3 Committee Election Mechanisms 196

9.4 Privacy in Permissioned and Permissionless Blockchains 199

9.5 Conclusion 201

References 202

10 Shocking Blockchain’s Memory with Unconfirmed Transactions: New DDoS Attacks and Countermeasures 205
Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Kevin Kwiat, and Aziz Mohaisen

10.1 Introduction 205

10.2 Related Work 207

10.3 An Overview of Blockchain and Lifecycle 208

10.3.1 DDoS Attack on Mempools 210

10.3.2 Data Collection for Evaluation 210

10.4 Threat Model 211

10.5 Attack Procedure 212

10.5.1 The Distribution Phase 214

10.5.2 The Attack Phase 214

10.5.3 Attack Cost 214

10.6 Countering the Mempool Attack 215

10.6.1 Fee-based Mempool Design 216

10.6.2 Age-based Countermeasures 221

10.7 Experiment and Results 224

10.8 Conclusion 227

References 227

11 Preventing Digital Currency Miners from Launching Attacks Against Mining Pools Using a Reputation-based Paradigm 233
Mehrdad Nojoumian, Arash Golchubian, Laurent Njilla, Kevin Kwiat, and Charles A. Kamhoua

11.1 Introduction 233

11.2 Preliminaries 234

11.2.1 Digital Currencies: Terminologies and Mechanics 234

11.2.2 Game Theory: Basic Notions and Definitions 235

11.3 Literature Review 236

11.4 Reputation-based Mining Model and Setting 238

11.5 Mining in a Reputation-based Model 240

11.5.1 Prevention of the Re-entry Attack 240

11.5.2 Technical Discussion on Detection Mechanisms 241

11.5.3 Colluding Miner’s Dilemma 243

11.5.4 Repeated Mining Game 244

11.5.5 Colluding Miners’ Preferences 245

11.5.6 Colluding Miners’ Utilities 245

11.6 Evaluation of Our Model Using Game-theoretical Analyses 246

11.7 Concluding Remarks 248

Acknowledgment 249

References 249

Part IV Blockchain Implementation 253

12 Private Blockchain Configurations for Improved IoT Security 255
Adriaan Larmuseau and Devu Manikantan Shila

12.1 Introduction 255

12.2 Blockchain-enabled Gateway 257

12.2.1 Advantages 257

12.2.2 Limitations 258

12.2.3 Private Ethereum Gateways for Access Control 259

12.2.4 Evaluation 262

12.3 Blockchain-enabled Smart End Devices 263

12.3.1 Advantages 263

12.3.2 Limitations 264

12.3.3 Private Hyperledger Blockchain-enabled Smart Sensor Devices 264

12.3.4 Evaluation 269

12.4 Related Work 270

12.5 Conclusion 271

References 271

13 Blockchain Evaluation Platform 275
Peter Foytik and Sachin S. Shetty

13.1 Introduction 275

13.1.1 Architecture 276

13.1.2 Distributed Ledger 276

13.1.3 Participating Nodes 277

13.1.4 Communication 277

13.1.5 Consensus 278

13.2 Hyperledger Fabric 279

13.2.1 Node Types 279

13.2.2 Docker 280

13.2.3 Hyperledger Fabric Example Exercise 281

13.2.4 Running the First Network 281

13.2.5 Running the Kafka Network 286

13.3 Measures of Performance 291

13.3.1 Performance Metrics With the Proof-of-Stake Simulation 293

13.3.2 Performance Measures With the Hyperledger Fabric Example 296

13.4 Simple Blockchain Simulation 300

13.5 Blockchain Simulation Introduction 303

13.5.1 Methodology 304

13.5.2 Simulation Integration With Live Blockchain 304

13.5.3 Simulation Integration With Simulated Blockchain 306

13.5.4 Verification and Validation 306

13.5.5 Example 307

13.6 Conclusion and Future Work 309

References 310

14 Summary and Future Work 311
Sachin S. Shetty, Laurent Njilla, and Charles A. Kamhoua

14.1 Introduction 311

14.2 Blockchain and Cloud Security 312

14.3 Blockchain and IoT Security 312

14.4 Blockchain Security and Privacy 314

14.5 Experimental Testbed and Performance Evaluation 316

14.6 The Future 316

Index 319


Best Seller

| | See All

Product Details
  • ISBN-13: 9781119519607
  • Publisher: John Wiley and Sons Ltd
  • Publisher Imprint: Wiley-Blackwell
  • Height: 231 mm
  • No of Pages: 352
  • Spine Width: 20 mm
  • Width: 158 mm
  • ISBN-10: 1119519608
  • Publisher Date: 21 May 2019
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Weight: 680 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Be The First to Review
Blockchain for Distributed Systems Security
John Wiley and Sons Ltd -
Blockchain for Distributed Systems Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Blockchain for Distributed Systems Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA