It is with great pleasure to welcome you to The 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2020). Under extenuating circumstances due to Covid-19, BSCI 2020 will be fully virtual, instead of the planned October 5th to 9th, 2020, in Taipei.
Despite the additional challenges due to the pandemic, this symposium still serve as a platform to share and discuss state-of-the-art research advances on blockchain and secure critical infrastructure, ranging from security and privacy issues in blockchain to attack methods on Blockchain to securing the smart grid, and so on. As part of the discussion, we hope to foster new, cutting-edge research collaboration between researchers and practitioners with complementary interests and background.
This is the second symposium organized as part of ACM AsiaCCS, which builds on success of the first edition in New Zealand. In this year, we attracted a total of 51 submissions from Asia, Australia, Europe, and the United States. All submissions were subject to rigorous reviews by subject matter experts, and eventually only 17 submissions were accepted to appear in the symposium as regular papers (i.e. acceptance rate is 33.3%). Five submissions were accepted as short papers and three submissions were accepted as poster papers.
Proceeding Downloads
Review of Techniques for Privacy-Preserving Blockchain Systems
Privacy plays a central role in many application domains that utilize blockchain technology. It is central in Personal Data Management, Electronic Health records, or systems that interact with any public institution. However, blockchains are subject to ...
DAMFA: Decentralized Anonymous Multi-Factor Authentication
Token-based authentication is usually applied to enable single-sign-on on the web. In current authentication schemes, users are required to interact with identity providers securely to set up authentication data during a registration phase and receive a ...
Mining the Characteristics of the Ethereum P2P Network
Ethereum is the typical representative of the second generation of Blockchain technology. To achieve anonymity and decentralization, Ethereum utilizes a structured P2P network for data broadcasting, replication, and synchronization. The Ethereum P2P ...
CloudArcade: A Blockchain Empowered Cloud Gaming System
By rendering game scenes on the remote cloud and delivering real-time video to end devices via the Internet, cloud gaming enables players to access game services anytime anywhere despite the hardware capacity of their terminals. However, as a commercial ...
A Proof-of-Majority Consensus Protocol for Blockchain-enabled Collaboration Infrastructure of 5G Network Slice Brokers
With network slicing technology, 5G changes the classical mobile network business model from a network-operator-oriented business to a more open system with multiple stakeholders. In this context, a network slice broker plays the role of agency between ...
DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter
The adoption of industrial internet of things (IIoT) greatly improves the efficiency of industrial facilities by providing more accurate and rich information and increasing automation. The benefits are further amplified when IIoT is integrated with ...
A Variable Bulk Arrival and Static Bulk Service Queueing Model for Blockchain
This paper proposes a novel embedded Markovian queueing model of the M(1,n)/Mn/1 type in order to establish a theoretical foundation to design a blockchain-based system with specific interest in Ethereum. The model assumes variable bulk arrivals of ...
Security Control Components for Epidemic Prevention Donation Management Blockchain
After the outbreak of the new coronavirus pneumonia, it has been broadcasting soon. Medical supplies are out of used. Chinese people have provided medical supplies and raised donations to help Hubei Province, China. While, Red Cross Society of Hubei ...
Incentive Mechanism for Social Network Data Pricing under Privacy Preservation
Online social networks have become very important sources of personal data that contain preferences, tastes, interests and friendships of their users. The potential that these data may be exploited poses a rising concern over how privacy is protected by ...
The Data Sharing Scheme based on Blockchain
Data sharing is a vital method for data intensive and cooperative work-based applications. A central database system, which collects and stores data generated from different parties and provides open access, can not only save costs on infrastructures, ...
Game Theory for Mobile Location Privacy
With the rapid growth of mobile network and infrastructures, location-related services accross multiple domains have received a great deal of attention. However, privacy is always an important problem that has a great influence on services. In order to ...
SmartWitness: A Proactive Software Transparency System using Smart Contracts
Package managers have become essential for software distribution and management. Their goal is to allow users to install programs, drivers, or updates in their systems in a secure, quick, and often, unattended way. However, in recent years, attackers ...
DPODA: Differential Privacy-based Online Double Auction for Pervasive Edge Computing Resource Allocation
In recent years, edge computing transforms the network edge into an intelligent platform to provide better services for users by making storage, computing, control and network function closer to end-users, things, and sensors. However, due to the ...
A Blockchain-based Trading Matching Scheme in Energy Internet
With the advent of the Industry 4.0 era, the energy industry system revolution will also face new challenges. Against the backdrop of the global energy crisis, renewable energy has received great attention from countries around the world. Due to the ...
A Security and Privacy Focused KYC Data Sharing Platform
Banks in Europe must comply with new EU regulation and legislation. Recent legislation has focused on personal data, Know Your Customer (KYC), and anti-money laundering. As a result, the cost of KYC compliance is higher than ever, requiring time ...
An Assessment Framework for Distributed Ledger Technology in Financial Application
Distributed Ledger Technology (DLT) currently stands in the limelight. In many people's eyes, DLT has great potential to accelerate the digitalization process and substantially change the roles and services of central banks. On the other hands, as many ...
Whispers on Ethereum: Blockchain-based Covert Data Embedding Schemes
The Ethereum cryptocurrency system becomes prevalent with the increasing number of daily transactions. It is a high-quality channel to secretly transfer information because senders and recipients are pseudonymous and transactions are tamper-resistant. ...
Slim Chain and Dependability
The slim chain is proposed in this paper in an effort to address and resolve the scalability issue of blockchain-based crypto computing by managing the volume of the blockchain itself. An adequate balancing of computation across on/off-chain is expected ...
DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things
With the exorbitant growth in the number of connected devices, the lack of proper identity and access management (IAM) mechanisms has become a major concern. The traditional IAM systems, which focus solely on managing people's digital identities, fail ...
Simulating Difficulty Adjustment in Blockchain with SimBlock
A blockchain is a gradually increasing list of "blocks" containing information that are linked together using cryptographic hashes. It is a distributed, decentralized, and public digital ledger technology. Blockchains have caught not only the attention ...
Network Embedding Based On Structural Information Entropy: Network embedding
Blockchain is a complex network structure, which has the properties of members and the network relationship of their transactions with each other. If we can quantify its network structure, it will be of great help to our subsequent work. Network ...
Hybrid Chain And Dependability
The hybrid chain is proposed in this paper to investigate on a new blockchain network that is to be built across private and main nets, namely, a hybrid chain. Note that the hybrid chain is distinguished from the on/off-balanced chain such that the ...
Blockchain as a Dissipative System and Cognitive Space
This paper proposes a fundamental theory to understand and explain blockchain based on dissipative structure theory and cognitive science. Propose that blockchain is a dissipative system that is an ordered state far from equilibrium, constantly ...
Document Management System using Blockchain and Inter Planetary File System
Blockchain Technology has been evolving from being a secure and immutable ledger of transactions for cryptocurrencies to a programmable interactive environment for building distributed reliable applications. This system proposes a secure platform to ...
On Design of Blockchain-based Transport Scheme
Block chain is a revolutionary new technology proposed in recent years. It has the characteristics of decentralization, non-tampering with transactions, and extremely low transaction costs. These characteristics coincide with the decentralization and ...
- Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
BSCI '19 | 12 | 44 | 367% |
Overall | 12 | 44 | 367% |