Doktorarbeit / Dissertation, 2021
199 Seiten, Note: A
1 Introduction
1.1 Motivation of the Research Work
1.2 Contributions of the Thesis
1.2.1 Implementation of data provenance and access control policy framework to provide better privacy in a blockchain network
1.2.2 Design and development of transaction validation rules and applicability of the blockchain in different framework or applications
1.2.3 Design and development of distributed off-chain model and minimal hash approach for large size data storage and their privacy in blockchain network
1.2.4 Implementation of Reputation-based Trust Evaluation using Two-Level Privacy-Preservation of transactions in blockchain network
1.2.5 Organisation of the Thesis
2 Background Overview and Related Work
2.1 Architecture of Blockchain Network
2.1.1 Privacy-Preserving Techniques
2.1.2 Scalability Approaches and Management
2.2 Related Work
2.2.1 Secure Access Control Policy for Privacy-Preservation
2.2.2 Access Control Rules for privacy-preserving for Transaction and Peers Both
2.2.3 Scalable Blockchain Network
2.2.4 Secure, Privacy-Preserving, Trustworthy, and Scalable Blockchain Network
3 Data Provenance and Access Control Policy to provide better privacy in blockchain network
3.1 Introduction
3.2 Relationship Model for Provenance Security
3.2.1 Resource and Trader Mapping
3.2.2 Trader and Ledger Mapping
3.3 Access control matrix for Trader and Regulator
3.4 Provenance security and Privacy of data for ownership Transfer
3.5 Proposed Trading Framework for ownership Transfer
3.5.1 Rules for Trading Network
3.5.2 Rules for Business Model of Trading Framework
3.5.3 Historical rules for trading Framework
3.6 Implementation of Trading Framework and Result Discussion
3.6.1 Implementation of trading Framework
3.6.2 Result of Trading Framework (TF)
3.7 Experimental Analysis of Provenance Representation
3.7.1 XML and RDF execution time analysis
3.7.2 RDF and JSON execution time analysis
3.7.3 XML and JSON execution time analysis
3.7.4 Transaction execution time analysis of data provenance
3.8 Experimental Analysis of Provenance security and Data privacy
3.9 Conclusion and Future Work
4 Design and Development of Transaction validation Rules
4.1 Introduction
4.2 Access Control Model
4.2.1 Mandatory Access Control (MAC)
4.3 Working of Existing Bell-LaPadula Model
4.4 Proposed Model
4.4.1 The Enhanced BLP model and Blockchain Integration
4.4.2 Role-Hierarchy of Users in Heathcare Organization
4.4.3 Sequence Diagram of Enhanced Bell-LaPadula Model
4.5 Mathematical Proof of Access Control Policy using Enhanced Bell LaPadula Model
4.5.1 Mandatory Access Control using Enhanced BLP Model
4.5.2 Discretionary Access Control using Enhanced Bell-LaPadula Model
4.6 Technical Summary of Transaction, peers, and Access Control Mapping
4.6.1 Format for Transaction (Tx)
4.6.2 Transaction Format for Employee(Peer)
4.6.3 Access Control Mapping of Peer and Transaction
4.7 Technical Analysis of Access Control Using Smart Contracts
4.8 Implementation
4.8.1 Comparison of Proposed model with Existing Access Control Mechanism in Healthcare System
4.9 Result Analysis
4.10 Conclusion
5 Design and Development of Distributed off-chain model and minimal hash approach for large data size storage in blockchain network
5.1 Introduction
5.1.1 Existing IoMT model Design and It’s Challenges
5.2 Proposed Framework for IoMT Healthcare
5.2.1 Architecture of Framework
5.2.2 Communications Types in Proposed Framework
5.3 Security and Privacy Majors in IoMT Enabled Healthcare
5.3.1 IoMT devices Authentication
5.3.2 Security for IoMT devices
5.3.3 Generation of Keys for Patients and Medical Devices
5.3.4 Functioning of IoMT devices
5.4 Secure Transmission of Data in IoMT Blockchain Network
5.4.1 Consensus deployment
5.4.2 Smart Contracts Algorithms for Preserving Privacy in IoMT blockchain Network
5.5 Implementation
5.5.1 Evaluation of proposed Framework with the attacks and security
5.6 Result Analysis
5.6.1 Advantages and challenges of proposed framework
5.7 Comparison Analysis of the Proposed Model
5.8 Conclusion
6 Implementation of Reputation-based Trust Evaluation
6.1 Introduction
6.2 Proposed Deep Blockchain Trustworthy Privacy-Preserving Secured Framework (DBTP2SF)
6.2.1 Trust Management Module
6.2.2 Privacy-preserving Module
6.2.3 Anomaly detection Module based on DNN
6.3 Proposed Deployment architecture for DBTP2SF in IIoT
6.4 Datasets and Evaluation Metrics
6.4.1 Description of Datasets used to evaluate the performance of DBTP2SF Framework:
6.4.2 Description of Evaluation metrics:
6.5 Experimental Results and Discussion
6.5.1 Trust Management process
6.5.2 The Two-level Privacy-Preserving process
6.5.3 Anomaly Detection Process
6.5.4 Results Comparisons and Discussions with existing Approaches
6.5.5 Advantages and challenges of DBTP2SF framework
6.6 Conclusion
7 Conclusions and Future Work
7.1 Future Work
This thesis aims to address critical challenges in blockchain technology, specifically regarding privacy, security, and scalability in extended applications such as healthcare and industrial IoT (IIoT). The research focuses on developing robust frameworks that maintain decentralization while ensuring efficient data management, authorized access control, and trustworthy transaction validation.
3.4 Provenance security and Privacy of data for ownership Transfer
In this section, we have introduced the working structure of the TF which includes participants (trader, regulator), asset and trade transactions. The asset and trader must have the relation of 1:1 and N:1 in a trading network. As shown in Figure.3.1, we have considered the rules for an asset i.e., it should not be added to the ledger if it does not have a mapping with the owner. Furthermore, the trade transaction is initiated by a trader for the ownership transfer of an asset. The trade transaction must be verified by the regulator while ownership transfer as shown in Figure.3.2.
1 Introduction: Provides an overview of blockchain technology and defines the research challenges regarding privacy, security, and scalability in non-cryptocurrency applications.
2 Background Overview and Related Work: Summarizes existing architectures, privacy-preserving techniques, and scalability approaches within blockchain networks, establishing the research gap.
3 Data Provenance and Access Control Policy to provide better privacy in blockchain network: Introduces a trading framework with set-theory-based access control to ensure secure ownership transfer and data provenance.
4 Design and Development of Transaction validation Rules: Describes the integration of an enhanced Bell-LaPadula (BLP) model with blockchain to achieve dynamic, level-based access control in healthcare settings.
5 Design and Development of Distributed off-chain model and minimal hash approach for large data size storage in blockchain network: Proposes an IPFS-based distributed storage layer to support scalability in IoMT-enabled healthcare systems.
6 Implementation of Reputation-based Trust Evaluation: Details the DBTP2SF framework, which uses deep learning and two-level privacy preservation to evaluate peer trustworthiness in IIoT-CPS environments.
7 Conclusions and Future Work: Summarizes the dissertation's contributions and suggests future research directions, including sharding for enhanced scalability.
Blockchain, Privacy-Preserving, Data Provenance, Access Control, Scalability, IoMT, Healthcare Systems, IIoT, Cyber-Physical Systems, Deep Learning, Anomaly Detection, Trust Management, Off-chain Storage, IPFS, Consensus Mechanisms
The research focuses on enhancing blockchain-based frameworks to solve critical security, privacy, and scalability challenges in domains beyond traditional financial applications, specifically in healthcare and Industrial IoT (IIoT).
The thesis focuses primarily on healthcare (Internet of Medical Things, IoMT) and Cyber-Physical Systems (CPS) enabled by Industrial IoT.
The primary goal is to ensure that authorized peers can securely access resources while maintaining data privacy and achieving network scalability through off-chain storage and advanced access control policies.
The work employs set-theory for provenance mapping, the Bell-LaPadula (BLP) model for multi-level security, IPFS for off-chain storage, and Deep Neural Networks (DNN) for anomaly detection and reputation evaluation.
It covers blockchain architecture, data provenance, smart contract-based access control, consensus mechanisms, and reputation systems for trust evaluation.
The core keywords include Blockchain, IoMT, Access Control (ACL), Data Provenance, Scalability, IPFS, Reputation Systems, and Security frameworks.
By implementing a two-level privacy-preserving framework combined with IPFS off-chain storage, the model ensures that only registered, authenticated medical devices can interact with patient data, mitigating single points of failure found in centralized cloud systems.
The AutoEncoder is used to transform raw sensor data into a new dimensional format, which effectively mitigates inference and poisoning attacks, thereby enhancing the utility and privacy of the observational data.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

