-
Blockchain Synchronous Trust Consensus Model
Authors:
Christopher Gorog,
Terrance E. Boult
Abstract:
This work introduces a novel approach for the governance of a blockchain containing social constructs and technical viability for widescale applications for the next generation of distributed ledgers. Functional requirements for this new blockchain distributed ledger (BDL) were garnered from an analysis of the needs for large-scale applications. Applied research was employed as part of this endeav…
▽ More
This work introduces a novel approach for the governance of a blockchain containing social constructs and technical viability for widescale applications for the next generation of distributed ledgers. Functional requirements for this new blockchain distributed ledger (BDL) were garnered from an analysis of the needs for large-scale applications. Applied research was employed as part of this endeavor to test the practicality and scalability of the solution outline. Novel features in this application draw together controls and enforcement for cybersecurity, digital content management, licensing, and configuration management. The Synchronous Trust Consensus Model applied research project named Project Philos was sponsored by the BlockChain Development Community (BCDC) with support from the University of Colorado. Research has followed both theorized conceptual and theory-to-practice models to prove the scientific soundness and the viability of incentive for community engagement. Results show that this new model proves the feasibility of an indefinitely expandable blockchain distributed ledger capability, while also providing a new participant incentive that is highly effective in engaging a community of practitioners.
△ Less
Submitted 7 December, 2021;
originally announced December 2021.
-
A Synergistic Approach to Digital Privacy
Authors:
Christopher Gorog
Abstract:
This paper outlines an approach for IEEE to take leadership for digital privacy to align many existing IEEE Societies and efforts in the areas of computer systems & applications security, organizational & global architectures, policy-supporting legislation, originating new standards, integrating compliance into technologies, and helping design decision-board infrastructures for governance bodies.…
▽ More
This paper outlines an approach for IEEE to take leadership for digital privacy to align many existing IEEE Societies and efforts in the areas of computer systems & applications security, organizational & global architectures, policy-supporting legislation, originating new standards, integrating compliance into technologies, and helping design decision-board infrastructures for governance bodies. Much of the current emphasis on evolving privacy technologies centers on big corporate enterprises and institutions, causing the industry to support corporate assets protection mainly. Fostering technology to empower individual privacy-enabling tools has lagged, and personal privacy has diminished because corporate big data applications have made sizable investments into exploiting private data. As one of the largest individual-member-based organizations, IEEE is urged to develop a collaborative approach for digital privacy with privacy-enabling technologies to benefit its members. The recommendations outlined define a prospective course that could result in future global individualized privacy capabilities which employ a combination of synergistic technologies such as distributed ledgers, differential privacy, homomorphic encryption, secure distributed multi-party computation, zero-trust architectures, proof-of-origin of data, software, or other techniques. Such an effort would involve community engagement and outreach, academic peer-review events, the establishment of governance bodies, coordination & expansion of existing standards, and the development of publicly-accessible prototypes. Collaboration with other IEEE-sponsored efforts for transactive energy systems, confidentiality and security of healthcare records and devices, and other IEEE-funded projects will help magnify digital privacy investments already in progress in these applications of emerging technologies.
△ Less
Submitted 26 March, 2021;
originally announced March 2021.
-
Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform
Authors:
Shammya Shananda Saha,
Christopher Gorog,
Adam Moser,
Anna Scaglione,
Nathan G. Johnson
Abstract:
This applied research paper introduces a novel framework for integrating hardware security and blockchain functionality with grid-edge devices to establish a distributed cyber-security mechanism that verifies the provenance of messages to and from the devices. Expanding the idea of Two Factor Authentication and Hardware Root of Trust, this work describes the development of a Cryptographic Trust Ce…
▽ More
This applied research paper introduces a novel framework for integrating hardware security and blockchain functionality with grid-edge devices to establish a distributed cyber-security mechanism that verifies the provenance of messages to and from the devices. Expanding the idea of Two Factor Authentication and Hardware Root of Trust, this work describes the development of a Cryptographic Trust Center(TM) (CTC(TM)) chip integrated into grid-edge devices to create uniform cryptographic key management. Product managers, energy system designers, and security architects can utilize this modular framework as a unified approach to manage distributed devices of various vendors, vintages, and sizes. Results demonstrate the application of CTC(TM) to a blockchain-based Transactive Energy (TE) platform for provisioning of cryptographic keys and improved uniformity of the operational network and data management. This process of configuring, installing, and maintaining keys is described as Eco-Secure Provisioning(TM) (ESP(TM)). Laboratory test results show the approach can resolve several cyber-security gaps in common blockchain frameworks such as Hyperledger Fabric.
△ Less
Submitted 24 August, 2020;
originally announced August 2020.