Open Access Open Access  Restricted Access Subscription Access

APPLICATION OF BLOCKCHAIN TECHNOLOGY FOR SECURE SIGNAL PROCESSING

Elliot Kizzy N, Damingo Levi A.S

Abstract


Blockchain technology is the modern-day solution for trust issues and eliminating or minimizing the role of the third party. In the context of signal processing with the attendant risk of intrusion and distortion of signal and data transmitted in the cloud computing environment, it expedient for the implementation of a more proactive, robust and secure framework to ensure integrity of the data transmitted irrespective of the domain. Using a systematic review methodology, the paper reviewed the efficiency of the application of blockchain technology for secure signal processing in a cloud-computing environment. The study further revealed that the basic features of immutability, transparency, anonymity, minting, decentralization and reliability of blockchain technology ensures for the strict adherence to data security concerns as no one node on the network can alter and change data on each block on the network without the consensus of other nodes, this guarantees transparency and trust in the network.


Full Text:

PDF

References


Aithal, P.K., Saavedra, P.S., Aithal, S & Ghoash, S. (2021). Blockchain Technology and its Types-A Short Review. International Journal of Applied Science and Engineering, 2, 189-200.

Amanat A, Rizwan M, Maple C, Zikria YB, Almadhor AS & Kim SW. (2022). Blockchain and cloud computing-based secure electronic healthcare records storage and sharing. Frontier in Public Health, 10(6), 1-11.

Anish, A., Selshiya, M.A & Shyla, S.I. (2021). A Review on the Types and Components of Blockchain Technology. International Journal of Advanced Research in Science, Communication and Technology (IJARSCT, 2(1), 39-44.

Bai, L., Hu, M., Liu, M & Wang, J. (2019). BPIIoT: A Light-Weighted Blockchain-Based Platform for Industrial IoT. IEEE Access, 7(1), 58381–58393.

Bhowmik, P., Starke, M., Dean, B & Chinthavali, M. (2020). Vulnerability Detection Methodology for a Digital Signal Processor MicroController at Edge Level Distributed Energy Resource Controller. 2020 IEEE CyberPELS (CyberPELS) (pp. 1-5). IEEE.

Chelladurai, U., & Pandian, S. (2022). A novel blockchain based electronic health record automation system for healthcare. Journal of Ambient Intelligence and Humanized Computing, 13(1), 693–703.

Chen, H., Du, X & Liu, Z. (2016). Optical hyperspectral data encryption in spectrum domain by using 3D Arnold and gyrator transforms. An International Journal for Rapid Communication, 49(2), 103–107.

Chen, H., Liu, Z., Zhu, L., Tanougast, C & Blondel, W. (2019). Asymmetric color cryptosystem using chaotic Ushiki map and equal modulus decomposition in fractional Fourier transform domains. Optics and Lasers in Engineering, 112(1), 7–15.

Chen, Y., Ding, S., Xu, Z., Zheng, H & Yang, S. (2018). “Blockchain-Based Medical Records Secure Storage and Medical Service Framework. Journal of Medical Systems, 43(1).

Delve, M. (2023). Recent Trends & Challenges in Digital Signal Processing along with 10 Problem Statements. Retrieved from Medium: https://medium.com/@mayurd0303/recent-trends-challenges-in-digital-signal-processing-along-with-50-problem-statements-e78549c0401f

Gamage, H.T.M., Weerasinghe, H.D & Dias, N.G.J. (2020). A survey on blockchain technology concepts,applications and issues. SN Computer Science, 1(2), 1-15.

Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: A critical review. Intenational Journal of Compute Network Information and Security, 6(20), 25-38.

Haleem, A., Javaid, M., Singh, R.P., Suman, R & Rab, S. (2021). Blockchain technology applications in healthcare: An overview. International Journal of Intelligent Networks, 2(1), 130-139.

He, D., Qiao, Y., Chan, S & Guizani, N. (2020). Flight security and safety of drones in airborne fog computing systems. IEEE Communications Magazine, 56(5), 66-71.

He, X., Tao, H., Liu, C & Zhu, J. (2018). Single-shot color image encryption based on mixed state diffractive imaging. Optics and Lasers in Engineering, 107, 112–118.

Hedabou, M & Abdulsalam, Y.S. . (2020). Efficient and Secure Implementation of BLS Multisignature Scheme on TPM. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), (pp. 1–6). IEEE.

Islam, R., Patamsetti, V.V., Gadhi, A., Gondu, R,M., Bandaru, C.M., Kesani, S.C & Abiona, O. (2023). The Future of Cloud Computing: Benefits and challenges. International Journal of Communications, Network and System Sciences, 16(1), 53-65.

ITU-T Focus Group. (2017). Application of Distributed Ledger Technology (FG DLT),. Retrieved from Terms of Reference: (http://www.itu.int:80/en/ITUT/focusgroups/dlt/Pages/ToR.aspx).

Jacobsen, D & Ott, P. (2017). Cloud architecture for industrial image processing: platform for realtime inline quality assurance. 15th International Conference on Industrial Informatics (INDIN) (pp. 72–74). IEEE.

Jamil, F., Hang, L., Kim, K & Kim, D. (2019). A Novel Medical Blockchain Model for Drug Supply Chain Integrity Management in a Smart Hospital. Electronics, 8(1), 505-512.

Jensen, M., Schwenk, J.O., Gruschka, N & Iacono, L.L. (2009). On technical security issues in Cloud Computing. IEEE International Conference on Cloud Computing, (pp. 109–116).

Khamse-Ashari, J., Lambadaris, I., Kesidis, G., Urgaonkar, B & Zhao, Y. (2018). An efficient and fair multi-resource allocation mechanism for heterogeneous servers. IEEE Transactions on Parallel and Distributed Systems, 29(12), 2686–2699.

Khezr, S., Moniruzzaman, M., Yassine, A & Benlamri, R. (2019). Blockchain technology in healthcare: a comprehensive review and directions for future research. Applied Sciences, 9(9), 1736.

Kitchenham, B & Charters S. (2007). Guidelines for performing Systematic Literature Reviews in Software Engineering,. Keele University and Durham University Joint report.

Kumar, N.M & Mallick, P.K. (2018). Blockchain technology for security issues and challenges in IoT. Procedia Computer Science, 132(1), 1815-1823.

Lagendijk, L.R., Erkin, Z & Barni, M. (2013). Encrypted Signal Processing for Privacy Protection. IEEE Signal Processing Magazine, pp. 82-105.

Lastovetska, A. (2021). Blockchain Architecture Basics: Components, Structure, Benefits & Creation. Retrieved from MLSDev: https://mlsdev.com/blog/156-how-to-build-your-own-blockchain-architecture

Omar, I.A., Jayaraman, R., Salah, K., Yaqoob, I. & Ellahham, S. (2021). Applications of blockchaintechnology in clinical trials: Review and open challenges. Arabian Journal for Science and Engineering, 46(4), 3001-3015.

Onyegbula, F., Dawson, M & Stevens, J. (2011). Understanding the Need and Importance of the Cloud Computing Environment within the National Institute of Food and Agriculture, an Agency of the United States Department of Agriculture. Journal of information system technology & planning, 4(8), 17-42.

Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes (Vol. 99). Eurocrypt.

Pedrouzo-Ulloa, A., Troncoso-Pastoriza, J.R & Perez-Gonzalez, F. (2018). Number Theoretic Transforms for Secure Signal Processing. University of Vigo, Vigo Spain, Department of Signal Theory and Communication. University of Vigo.

Qiu, C., Shen, H & Chen, K. (2018). An energy-efficient and distributed cooperation mechanism for k-coverage hole detection and healing in WSNs. IEEE Transaction on Mobile Computing, 2(32), 1–9.

Rahman, M.A., Hossain, M,S., Hassanain, E & Muhammad, G. (2020). Semantic multimedia fog computing and IoT environment: sustainability perspective. IEEE Communications Magazine, 56(5), 80-87.

Rajeswari, N. (2019). Overview of Cloud Computing and ite types. Journal of Emerging Technologies and Innovative Research (JETIR), 6(3), 61-67.

Ren, J., Guo, Y., Zhang, D., Liu, Q & Zhang, Y. (2018). Distributed and efficient object detection in edge computing: Challenges and solutions. IEEE Network, 32(6), 137–143.

Sakhipov, A.A. & Baygozhanova, D.S. (2020). Blockchain Technology in Education. Scientific Evolution, 1(1), 36-39.

Shackleford, D. (2022). Key factors to achieve data security in cloud computing. Retrieved from Tecg target: https://www.techtarget.com/searchsecurity/tip/Key-factors-to-achieve-data-security-in-cloud-computing

Shashanka, M.V & Smaragdis, P. (2006). Secure sound classification: Gaussian mixture models. IEEE International Conference on Acoustics, Speech and Signal Processing, 2006 (ICASSP 2006),, 3, pp. 33-49.

Sheng, H & Qi, X. (2022). Application of new digital signal processing technology based on distributed cloud computing in electronic information engineering. Future Generation Computer Systems, 128(2), 443–450.

Shi, J. (2019). The Application of Blockchain-as-a-Service (BaaS) and its Providers in China. Fourth International Conference on Economic and Business Management (FEBM 2019) (pp. 127-130). Atlantis Press.

Shortell, T & Shokoufandeh, A. (2020). Secure signal processing using fully homomorphic encryption. IET Information Security, 14(3), 51-59.

Singh, J & Michel, J.D. (2018). Blockchain as a Service (BaaS): Providers and Trust. 2018 IEEE European Symposium on Security and Privacy Workshops (pp. 67-74). IEEE Computer Society.

Singh, S & Singh, N. (2016). Blockchain: Future of financial and cyber security. 2nd International Conference on Contemporary Computing and Informatics (IC3I) (pp. 463–467). IEEE.

Singh, S., Jeong, Y.S & Park, J.H. (2916). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75(1), 200–222.

Tamplin, T. (2023). Blockchain Architecture. Retrieved from Finance Strategist: https://www.financestrategists.com/wealth-management/blockchain/blockchain-architecture/

Tang, F., Zhang, H., Fu, L & Li, X. (2019). Distributed stable routing with adaptive power control for multi-flow and multi-hop mobile cognitive networks. IEEE Transactions on Mobile Computing, 18(12), 2829-2841.

Troncoso-Pastoriza, J.R & Perez-Gonz, F. (2013). CryptoDSPs for Cloud Privacy. IEEE Signal Processing Magazine, 30(2), 29 - 41.

Wang, X., Teng, L & Qin, X. (2012). A novel colour image encryption algorithm based on chaos. Signal Processing, 92(1), 1101–1108.

Waqas, P K & Byun, Y. (2020). A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things. Enthropy, 22(2), 175-186.

Yang, X.M., Li, X., Wu, H.Q & Zhao, K.Y. (2017). The application model and challenges of blockchaintechnology in education. Modern Distance Education Research, 2(1), 34-45.

Zafar, D. (2022). Blockchain as a Service (BaaS). Retrieved from AT & T Business: https://cybersecurity.att.com/blogs/security-essentials/blockchain-as-a-service-baas


Refbacks

  • There are currently no refbacks.