Work place: Ghana Communication Technology University/Faculty of Engineering, Accra, PMB 100, Ghana
Research Interests: Application Security, Information Security, Network Security
Samuel A. Danso obtained his first degree in Computer Science in Ghana and Master’s degree in Telecom Technology at SMU-India in the year 2012. He is a full-time lecturer, Ghana Communication Technology University-Ghana and obtained the PhD degree from Southwest University of Science and Technology Mianyang-China in the year 2022. His area of research interests includes terahertz active imaging and security on-line and data communications.
DOI: https://doi.org/10.5815/ijcnis.2023.01.02, Pub. Date: 8 Feb. 2023
Blockchain technology unarguably has over a decade gained widespread attention owing to its often-tagged disruptive nature and remarkable features of decentralization, immutability and transparency among others. However, the technology comes bundled with challenges. At center-stage of these challenges is privacy-preservation which has massively been researched with diverse solutions proposed geared towards privacy protection for transaction initiators, recipients and transaction data. Dual-key stealth address protocol for IoT (DkSAP-IoT) is one of such solutions aimed at privacy protection for transaction recipients. Induced by the need to reuse locally stored data, the current implementation of DkSAP-IoT is deficient in the realms of data confidentiality, integrity and availability consequently defeating the core essence of the protocol in the event of unauthorized access, disclosure or data tampering emanating from a hack and theft or loss of the device. Data unavailability and other security-related data breaches in effect render the existing protocol inoperable. In this paper, we propose and implement solutions to augment data confidentiality, integrity and availability in DkSAP-IoT in accordance with the tenets of information security using symmetric encryption and data storage leveraging decentralized storage architecture consequently providing data integrity. Experimental results show that our solution provides content confidentiality consequently strengthening privacy owing to the encryption utilized. We make the full code of our solution publicly available on GitHub.[...] Read more.
Subscribe to receive issue release notifications and newsletters from MECS Press journals