IJCNIS Vol. 16, No. 6, 8 Dec. 2024
Cover page and Table of Contents: PDF (size: 681KB)
PDF (681KB), PP.69-82
Views: 0 Downloads: 0
Blockchain, Interoperability, Decentralized Applications, Authentication Mechanism, Credit Bureau
Enterprises are adopting blockchain technology to build a server-less and trust-less system by assuring immutability and are contributing to blockchain research, innovation, and implementation. This led to the genesis of various decentralized blockchain platforms and applications that are unconnected with each other. Interoperability between these siloed blockchains is a must to reach its full potential. To facilitate mass adoption, technology should have the ability to transact between various decentralized applications (dapps) on the same chain, integrate with existing systems, and initiate transactions on other networks. In our research, we propose a secured authentication mechanism that enables various decentralized applications on the same chain to interact with each other using a global dapp authentication registry (GDAR). We carried out an in-depth performance evaluation and conclude that our proposed mechanism is an operative authentication solution for dapp interoperability.
Surekha Thota, Shantala Devi Patil, Gopal Krishna Shyam, Bhanu Prasad, "GDAR: A Secure Authentication for Dapp Interoperability in Blockchain", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.6, pp.69-82, 2024. DOI:10.5815/ijcnis.2024.06.06
[1]Alexandra Twin, Margaret James, and Pete Rathburn, “Outsourcing: How It Works in Business, With Examples,” Investopedia, Jun. 18, 2022. https://www.investopedia.com/terms/o/outsourcing.asp (accessed Feb. 12, 2023).
[2]Martin and L. Taylor, “Exclusion and inclusion in identification: regulation, displacement and data justice,” Inf Technol Dev, vol. 27, no. 1, pp. 50–66, 2021, doi: 10.1080/02681102.2020.1811943.
[3]Toby Tiala, “The Case for Outsourcing Your KYC,” EQ, Nov. 17, 2017. https://equiniti.com/uk/news-and-views/eq-views/the-case-for-outsourcing-your-kyc/ (accessed Feb. 12, 2023).
[4]N. Lalitha and D. Soujanya, “Financial sector Innovations: Empowering Microfinance through the application of KYC Blockchain technology,” in International Conference on Digitization (ICD), Sharjah, United Arab Emirates, 2019, pp. 237–243.
[5]Sterling, “Benefits of Outsourcing Background Checks to a Third-Party Provider,” Sterling, Sep. 05, 2018. https://www.sterlingcheck.co.uk/blog/2018/09/benefits-outsourcing-background-checks/ (accessed Feb. 12, 2023).
[6]K. AL-Dosari, N. Fetais, and M. Kucukvar, “Artificial Intelligence and Cyber Defense System for Banking Industry: A Qualitative Study of AI Applications and Challenges,” Cybern Syst, pp. 1–29, Aug. 2022, doi: 10.1080/01969722.2022.2112539.
[7]Bricata, “10 Statistics that Summarize the State of Cybersecurity in Financial Services,” security Boulevard, Nov. 12, 2019. https://securityboulevard.com/2019/11/10-statistics-that-summarize-the-state-of-cybersecurity-in-financial-services/ (accessed Feb. 12, 2023).
[8]Adabi Joseph and Markus Brunnermeier, “Blockchain Economics,” 2022. doi: 10.3386/w25407.
[9]A. N. Gohar, S. A. Abdelmawgoud, and M. S. Farhan, “A Patient-Centric Healthcare Framework Reference Architecture for Better Semantic Interoperability Based on Blockchain, Cloud, and IoT,” IEEE Access, vol. 10, pp. 92137–92157, 2022, doi: 10.1109/ACCESS.2022.3202902.
[10]W. Viriyasitavat, L. Da Xu, Z. Bi, and A. Sapsomboon, “Blockchain-based business process management (BPM) framework for service composition in industry 4.0,” J Intell Manuf, vol. 31, no. 7, pp. 1737–1748, 2020, doi: 10.1007/s10845-018-1422-y.
[11]Evan Tarver, Michael J Boyle, and Suzanne kvilhaug, “How Financial Markets Exhibit Asymmetric Information,” Investopedia, Jul. 28, 2022. https://www.investopedia.com/ask/answers/042915/how-do-financial-market-exhibit-asymmetric-information.asp (accessed Feb. 12, 2023).
[12]R. Wang, Z. Lin, and H. Luo, “Blockchain, bank credit and SME financing,” Qual Quant, vol. 53, no. 3, pp. 1127–1140, May 2019, doi: 10.1007/s11135-018-0806-6.
[13]“How blockchain could disrupt banking,” Research Brief, CBinsights, Oct. 18, 2022. https://www.cbinsights.com/research/blockchain-disrupting-banking/ (accessed Feb. 12, 2023).
[14]John McLean, “Banking on blockchain: charting the progress of distributed ledger technology in financial services,” A Finextra white paper produced in associate with IBM, Jan. 2016.
[15]Narayan Prusty, Blockchain for Enterprise, 1st ed. Packt Publishing, 2018. Accessed: Feb. 12, 2023. [Online]. Available: https://www.perlego.com/book/823710/blockchain-for-enterprise-build-scalable-blockchain-applications-with-privacy-interoperability-and-permissioned-features-pdf
[16]J. R. Varma, “Blockchain in Finance,” Vikalpa, vol. 44, no. 1, pp. 1–11, Mar. 2019, doi: 10.1177/0256090919839897.
[17]M. Javaid, A. Haleem, R. Pratap Singh, S. Khan, and R. Suman, “Blockchain technology applications for Industry 4.0: A literature-based review,” Blockchain: Research and Applications, vol. 2, no. 4. Elsevier Ltd, Dec. 01, 2021. doi: 10.1016/j.bcra.2021.100027
[18]Showkat, S., & Qureshi, S. (2023). Securing the Internet of Things Through Blockchain Approach: Security Architectures, Consensus Algorithms, Enabling Technologies, Open Issues, and Research Directions. International Journal of Computing and Digital Systems, 13(1), 97-129.
[19]C. Gomathi and K. Jayasri, “Rain Drop Service and Biometric Verification Based Blockchain Technology for Securing the Bank Transactions from Cyber Crimes Using Weighted Fair Blockchain (WFB) Algorithm,” Cybern Syst, 2022, doi: 10.1080/01969722.2022.2103229.
[20]S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System.” [Online]. Available: www.bitcoin.org
[21]Richard Brown, “The interoperability challenge will make or break enterprise blockchain platforms,” Medium, 2018. https://medium.com/corda/the-interoperability-challenge-will-make-or-break-enterprise-blockchain-platforms-4016518e333d (accessed Feb. 15, 2023).
[22]Daniel Davis Wood, “ETHEREUM: A Secure Decentralised Generalised Transaction Ledger,” 2014. Accessed: Feb. 12, 2023. [Online]. Available: https://ethereum.github.io/yellowpaper/paper.pdf
[23]Y. Pang, “A New Consensus Protocol for Blockchain Interoperability Architecture,” IEEE Access, vol. 8, pp. 153719–153730, 2020, doi: 10.1109/ACCESS.2020.3017549.
[24]Roberto Infante, Building Ethereum Dapps. Shelter Island, NY : Manning Publications, 2019.
[25]David Johnston, Sam Onat Yilmaz, Jeremy Kandah, and Nikos Bentenitis, “The General Theory of Decen- . tralized Applications, DApps,” 2014, Accessed: Feb. 12, 2023. [Online]. Available: http://cryptochainuni.com/wp-content/uploads/The-General-Theory-of-Decentralized-Applications-DApps.pdf
[26]Raihana Syahirah Abdullah, Faizal M.A., "Block Chain: Cryptographic Method in Fourth Industrial Revolution", International Journal of Computer Network and Information Security, Vol.10, No.11, pp.9-17, 2018.
[27]P. R. da Cunha, P. Soja, and M. Themistocleous, “Blockchain for development: a guiding framework,” Information Technology for Development, vol. 27, no. 3. Routledge, pp. 417–438, 2021. doi: 10.1080/02681102.2021.1935453.
[28]P. Gupta, M. Hudnurkar, and S. Ambekar, “Effectiveness of blockchain to solve the interoperability challenges in healthcare,” CARDIOMETRY, no. 20, pp. 80–88, Nov. 2021, doi: 10.18137/cardiometry.2021.20.7987.
[29]S. Biswas, K. Sharif, F. Li, Z. Latif, S. S. Kanhere, and S. P. Mohanty, “Interoperability and Synchronization Management of Blockchain-Based Decentralized e-Health Systems,” IEEE Trans Eng Manag, vol. 67, no. 4, pp. 1363–1376, Nov. 2020, doi: 10.1109/TEM.2020.2989779.
[30]W. Viriyasitavat, L. Da Xu, Z. Bi, and A. Sapsomboon, “New blockchain-based architecture for service interoperations in internet of things,” IEEE Trans Comput Soc Syst, vol. 6, no. 4, pp. 739–748, Aug. 2019, doi: 10.1109/TCSS.2019.2924442.
[31]Omi Akter, Arnisha Akther, Md Ashraf Uddin, Md Manowarul Islam, " Cloud Forensics: Challenges and Blockchain Based Solutions", International Journal of Wireless and Microwave Technologies, Vol.10, No.5, pp. 1-12, 2020.
[32]G. M. George and L. S. Jayashree, “Ethereum Blockchain-Based Authentication Approach for Data Sharing in Cloud Storage Model,” Cybern Syst, 2022, doi: 10.1080/01969722.2022.2112544.
[33]G. Vasukidevi and T.Sethukarasi, “Blockchain Based Key Exchange Mechanism for Cloud Storage,” Cybern Syst, pp. 1–17, Jan. 2023, doi: 10.1080/01969722.2022.2157597.
[34]Rafael Belchior, Andre Vasconelos, Sergio Guerreiro, and Miguel Correia, “A Survey on Blockchain Interoperability: Past, Present, and Future Trends,” ACM Computing Surveys (CSUR), vol. 54(8), pp. 1–41, 2021.
[35]S. Thota and G. K. Shyam, “Trends in building fungible blockchains for data and value exchange,” International Journal of Blockchains and Cryptocurrencies, vol. 2, no. 1, pp. 83–101, Jan. 2021, doi: 10.1504/IJBC.2021.117811.
[36]G. Wang, “SoK: Exploring Blockchains Interoperability,” Cryptology ePrint Archive, 2021, Accessed: Feb. 15, 2023. [Online]. Available: https://eprint.iacr.org/2021/537.pdf
[37]K. S. Alshudukhi, M. A. Khemakhem, F. E. Eassa, and K. M. Jambi, “An Interoperable Blockchain Security Frameworks Based on Microservices and Smart Contract in IoT Environment,” Electronics (Switzerland), vol. 12, no. 3, Feb. 2023, doi: 10.3390/electronics12030776.
[38]E. R. D. Villarreal, J. Garcia-Alonso, E. Moguel, and J. A. H. Alegria, “Blockchain for Healthcare Management Systems: A Survey on Interoperability and Security,” IEEE Access, vol. 11, pp. 5629–5652, Jan. 2023, doi: 10.1109/access.2023.3236505.
[39]R. Belen-Saglam, E. Altuncu, Y. Lu, and S. Li, “A systematic literature review of the tension between the GDPR and public blockchain systems,” Blockchain: Research and Applications, p. 100129, Jan. 2023, doi: 10.1016/j.bcra.2023.100129.
[40]Q. Feng, D. He, S. Zeadally, M. K. Khan, and N. Kumar, “A survey on privacy protection in blockchain system,” Journal of Network and Computer Applications, vol. 126. Academic Press, pp. 45–58, Jan. 15, 2019. doi: 10.1016/j.jnca.2018.10.020.
[41]Z. Wenhua, F. Qamar, T.-A. N. Abdali, R. Hassan, S. T. A. Jafri, and Q. N. Nguyen, “Blockchain Technology: Security Issues, Healthcare Applications, Challenges and Future Trends,” Electronics (Basel), vol. 12, no. 3, p. 546, Jan. 2023, doi: 10.3390/electronics12030546.
[42]V. Malamas, P. Kotzanikolaou, T. K. Dasaklis, and M. Burmester, “A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data,” IEEE Access, vol. 8, pp. 134393–134412, Jan. 2020, doi: 10.1109/ACCESS.2020.3011201.
[43]X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, “A Survey on the Security of Blockchain Systems,” Future Generation Computer Systems, vol. 107, pp. 841–853, Feb. 2020, [Online]. Available: http://arxiv.org/abs/1802.06993
[44]Moonbeam Docs, “How to List your Project on State of the DApps.” https://docs.moonbeam.network/learn/dapps-list/state-of-the-dapps/ (accessed Mar. 18, 2023).
[45]Nimit Jain, Tarushi Agrawal, Pranav Goyal, and Vikas Hassija, “A Blockchain-Based distributed network for Secure Credit Scoring,” in 5th IEEE International Conference on Signal Processing, Computing and Control, 5th IEEE International Conference on Signal Processing,Computing and Control, Oct. 2019.
[46]Margaret Reiter and Amy Loftsgordon, “The Nationwide Credit Reporting Agencies: Experian, Equifax, and TransUnion,” Nolo. https://www.nolo.com/legal-encyclopedia/the-nationwide-credit-reporting-agencies-experian-equifax-transunion.html (accessed Feb. 14, 2023).
[47]Dilip N, “The Risks of Blockchain on Credit Bureaus,” Supply Wisdom. https://www.supplywisdom.com/resources/the-risks-of-blockchain-on-credit-bureaus/ (accessed Feb. 14, 2023).
[48]Sruti Bhagavatula, Lujo Bauer, and Apu Kapadia, “What breach? Measuring online awareness of security incidents by studying real-world browsing behavior,” European Symposium on Usable Security, pp. 180–199, Oct. 2021, Accessed: Feb. 14, 2023. [Online]. Available: https://dl.acm.org/doi/fullHtml/10.1145/3481357.3481517
[49]“Experian.” https://www.experian.com/ (accessed Feb. 14, 2023).
[50]“Transunion credit bureau.” https://www.transunion.com/ (accessed Feb. 14, 2023).
[51]“5 Benefits of Colendi,” Colendi, 2018. https://medium.com/colendi/5-benefits-of-colendi-6a9a58fa3dd5 (accessed Feb. 14, 2023).
[52]Eray Eren, “Colendi Mobile ÐApp is live!,” Colendi, 2019. https://medium.com/colendi/colendi-mobile-%C3%B0app-is-live-e46591e398a1 (accessed Feb. 14, 2023).
[53]Pratik Bhakta & Ashwin Manikandan, “RBI restricts access to credit data of consumers,” The Economic Times, 2019. https://economictimes.indiatimes.com/small-biz/startups/newsbuzz/apex-bank-restricts-access-to-credit-data-of-consumers/articleshow/71194383.cms (accessed Feb. 15, 2023).
[54]“Government Gazette Republic of South Africa -No. 4 of 2013: Protection of Personal Information Act, 2013.,” Cape Town, 2013. Accessed: Feb. 14, 2023. [Online]. Available: https://www.gov.za/sites/default/files/gcis_document/201409/3706726-11act4of2013popi.pdf
[55]“The next generation credit bureau.” https://guppy.ai/about (accessed Feb. 15, 2023).
[56]Nick Galov, “40 Worrisome Hacking Statistics that Concern Us All in 2022,” webtribunal, Apr. 06, 2022. https://webtribunal.net/blog/hacking-statistics/#gref (accessed Feb. 15, 2023).
[57]Denys, “How the Consortium Blockchain Works,” intellectsoft - Blockchain lab, Sep. 25, 2019. https://blockchain.intellectsoft.net/blog/how-the-consortium-blockchain-works/ (accessed Feb. 15, 2023).
[58]W. Warren and A. Bandeali, “0x: An open protocol for decentralized exchange on the Ethereum blockchain,” 2017. Accessed: Feb. 14, 2023. [Online]. Available: https://github. com/0xProject/whitepaper
[59]“Regulatory compliance,” Wikipedia. https://en.wikipedia.org/wiki/Regulatory_compliance (accessed Feb. 14, 2023).
[60]T. C. W. Lin and T. C. Lin, “Compliance, Technology, and Modern Finance, 11 Brook,” 2016.
[61]P. Zhang, J. White, D. C. Schmidt, G. Lenz, and S. T. Rosenbloom, “FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data,” Comput Struct Biotechnol J, vol. 16, pp. 267–278, Jan. 2018, doi: 10.1016/j.csbj.2018.07.004.
[62]A. Leff and J. T. Rayfield, “Web-Application Development Using the Model/View/Controller Design Pattern,” in Fifth IEEE International Enterprise Distributed Object Computing Conference, 2001, pp. 118–127.