Access control in smart contracts using digital identity management and machine learning to facilitate IoT exchanges
Subject Areas :
Financial Knowledge of Securities Analysis
ali abizadeh
1
,
zadolah fathi
2
,
mehrzad minouei
3
1 - PhD Student, Department of Industrial Management, Central Tehran Branch, Islamic Azad University, Tehran, Iran
2 - Assistant Professor, Department of Financial Management, Central Tehran Branch, Islamic Azad University, Tehran, Iran. (Corresponding Author)
3 - Assistant Professor of Financial Management, Central Tehran Branch, Islamic Azad University, Tehran, Iran.
Received: 2022-07-16
Accepted : 2022-07-16
Published : 2022-05-22
Keywords:
Blockchain,
Atrium,
SVM,
KMEANS,
Identify healthy transactions ,
Abstract :
Access control in the blockchain network is one of the challenges we face with the growth of the blockchain network. In the blockchain network, the set of financial activities of users that require a digital signature is performed, this information is stored in the blockchain server. Manually signing digitally and verifying the authenticity of transactions is a time consuming and user-friendly process and is one of the reasons why blockchain technology is not fully accepted. In this paper, a new method is proposed based on a combination of clustering and classification methods. First, the data is labeled using the clustering method and then the labeled data is used to teach the SVM algorithm to determine healthy transactions. The proposed method is a machine learning method for access control that automatically blocks blockchain transactions and detects abnormal transactions. In order to evaluate the proposed method, atrium data have been tested and analyzed. And with the help of KMEANS clustering algorithm and machine vector support method, healthy transactions are detected from suspects, which shows the ability to identify with 89% accuracy
References:
Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: http://bitcoin.org/bitcoin.pdf (accessed on 10 November 2019).
Buterin, V. A next-generation smart contract and decentralized application platform.White Pap.2014,3, 37
Eskandari, S.; Clark, J.; Barrera, D.; Stobert, E. A first look at the usability of bitcoin key management.arXiv2018, arXiv: 1802.
Sheng, S.; Broderick, L.; Koranda, C.A.; Hyland, J.J. Why Johnny Still Can’t Encrypt: Evaluating the Usabilityof Email Encryption Software. Available online: https://cups.cs.cmu.edu/soups/2006/posters/sheng-poster_abstract.pdf (accessed on 25 December 2019).
Gaw, S.; Felten, E.W.; Fernandez-Kelly, P. Secrecy, flagging, and paranoia: Adoption criteria in encryptedemail. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Montréal, QC,Canada, 22–27 April 2006; pp. 591–600.
Schultz, E. E.; Proctor, R. W.; Lien, M. C.; Salvendy, G. Usability and security an appraisal of usability issues ininformation security methods.Comput. Secur.2001,20, 620–634. [CrossRef]
Garfinkel, S. L.; Margrave, D.; Schiller, J.I.; Nordlander, E.; Miller, R.C. How to make secure email easier touse. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Portland, OR,USA, 2–7 April 2005; pp. 701–710.
Ruoti, S.; Seamons, K. Johnny’s Journey Toward Usable Secure Email.IEEE Secur. Priv.2019,17, 72–76.[CrossRef]
Pham, T.; Lee, S. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv2016, arXiv: 1611. 03941.
Pham, T.; Lee, S. Anomaly detection in the bitcoin system-a network perspective. arXiv2016, arXiv: 1611. 03942.
Ostapowicz, M.; ̇Zbikowski, K. Detecting Fraudulent Accounts on Block chain: A Supervised Approach.arXiv2019, arXiv: 1908. 07886.
Monamo, P.; Marivate, V.; Twala, B. Unsupervised learning for robust Bitcoin fraud detection. In Proceedingsof the 2016 Information Security for South Africa (ISSA), Johannesburg, South Africa, 17–18 August 2016;pp. 129–134.
Shen, M.Developer Report H1 2019; Technical report; Electric Capital: Palo Alto, CA, USA, 2019. Availableonline: https://www.electriccapital.com/developer_report_H1_2019_pdf (accessed on 10 November 2019).
Turkanovi ́c, M.; Hölbl, M.; Košiˇc, K.; Heriˇcko, M.; Kamišali ́c, A. EduCTX: A blockchain-based highereducation credit platform.IEEE Access2018,6, 5112–5127. [CrossRef]
Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture,consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigDataCongress), Honolulu, HI, USA, 25–30 June 2017; pp. 557–564
Wood, G. Ethereum: A secure decentralised generalised transaction ledger.Ethereum Proj. Yellow Pap.2014, 151, 1–32.
Moubarak, J.; Filiol, E.; Chamoun, M. On blockchain security and relevant attacks. In Proceedings of the2018 IEEE Middle East and North
_||_