skip to main content
10.1145/3384943acmconferencesBook PagePublication Pagesasia-ccsConference Proceedingsconference-collections
BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security Taipei Taiwan 6 October 2020
ISBN:
978-1-4503-7610-5
Published:
06 October 2020
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is with great pleasure to welcome you to The 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2020). Under extenuating circumstances due to Covid-19, BSCI 2020 will be fully virtual, instead of the planned October 5th to 9th, 2020, in Taipei.

Despite the additional challenges due to the pandemic, this symposium still serve as a platform to share and discuss state-of-the-art research advances on blockchain and secure critical infrastructure, ranging from security and privacy issues in blockchain to attack methods on Blockchain to securing the smart grid, and so on. As part of the discussion, we hope to foster new, cutting-edge research collaboration between researchers and practitioners with complementary interests and background.

This is the second symposium organized as part of ACM AsiaCCS, which builds on success of the first edition in New Zealand. In this year, we attracted a total of 51 submissions from Asia, Australia, Europe, and the United States. All submissions were subject to rigorous reviews by subject matter experts, and eventually only 17 submissions were accepted to appear in the symposium as regular papers (i.e. acceptance rate is 33.3%). Five submissions were accepted as short papers and three submissions were accepted as poster papers.

Skip Table Of Content Section
SESSION: BSCI Session 1
research-article
Review of Techniques for Privacy-Preserving Blockchain Systems

Privacy plays a central role in many application domains that utilize blockchain technology. It is central in Personal Data Management, Electronic Health records, or systems that interact with any public institution. However, blockchains are subject to ...

research-article
DAMFA: Decentralized Anonymous Multi-Factor Authentication

Token-based authentication is usually applied to enable single-sign-on on the web. In current authentication schemes, users are required to interact with identity providers securely to set up authentication data during a registration phase and receive a ...

research-article
Mining the Characteristics of the Ethereum P2P Network

Ethereum is the typical representative of the second generation of Blockchain technology. To achieve anonymity and decentralization, Ethereum utilizes a structured P2P network for data broadcasting, replication, and synchronization. The Ethereum P2P ...

research-article
CloudArcade: A Blockchain Empowered Cloud Gaming System

By rendering game scenes on the remote cloud and delivering real-time video to end devices via the Internet, cloud gaming enables players to access game services anytime anywhere despite the hardware capacity of their terminals. However, as a commercial ...

SESSION: BSCI Session 2
research-article
A Proof-of-Majority Consensus Protocol for Blockchain-enabled Collaboration Infrastructure of 5G Network Slice Brokers

With network slicing technology, 5G changes the classical mobile network business model from a network-operator-oriented business to a more open system with multiple stakeholders. In this context, a network slice broker plays the role of agency between ...

research-article
DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter

The adoption of industrial internet of things (IIoT) greatly improves the efficiency of industrial facilities by providing more accurate and rich information and increasing automation. The benefits are further amplified when IIoT is integrated with ...

research-article
A Variable Bulk Arrival and Static Bulk Service Queueing Model for Blockchain

This paper proposes a novel embedded Markovian queueing model of the M(1,n)/Mn/1 type in order to establish a theoretical foundation to design a blockchain-based system with specific interest in Ethereum. The model assumes variable bulk arrivals of ...

research-article
Security Control Components for Epidemic Prevention Donation Management Blockchain

After the outbreak of the new coronavirus pneumonia, it has been broadcasting soon. Medical supplies are out of used. Chinese people have provided medical supplies and raised donations to help Hubei Province, China. While, Red Cross Society of Hubei ...

SESSION: BSCI Session 3
research-article
Incentive Mechanism for Social Network Data Pricing under Privacy Preservation

Online social networks have become very important sources of personal data that contain preferences, tastes, interests and friendships of their users. The potential that these data may be exploited poses a rising concern over how privacy is protected by ...

research-article
The Data Sharing Scheme based on Blockchain

Data sharing is a vital method for data intensive and cooperative work-based applications. A central database system, which collects and stores data generated from different parties and provides open access, can not only save costs on infrastructures, ...

research-article
Game Theory for Mobile Location Privacy

With the rapid growth of mobile network and infrastructures, location-related services accross multiple domains have received a great deal of attention. However, privacy is always an important problem that has a great influence on services. In order to ...

research-article
SmartWitness: A Proactive Software Transparency System using Smart Contracts

Package managers have become essential for software distribution and management. Their goal is to allow users to install programs, drivers, or updates in their systems in a secure, quick, and often, unattended way. However, in recent years, attackers ...

SESSION: BSCI Session 4
research-article
DPODA: Differential Privacy-based Online Double Auction for Pervasive Edge Computing Resource Allocation

In recent years, edge computing transforms the network edge into an intelligent platform to provide better services for users by making storage, computing, control and network function closer to end-users, things, and sensors. However, due to the ...

research-article
A Blockchain-based Trading Matching Scheme in Energy Internet

With the advent of the Industry 4.0 era, the energy industry system revolution will also face new challenges. Against the backdrop of the global energy crisis, renewable energy has received great attention from countries around the world. Due to the ...

research-article
A Security and Privacy Focused KYC Data Sharing Platform

Banks in Europe must comply with new EU regulation and legislation. Recent legislation has focused on personal data, Know Your Customer (KYC), and anti-money laundering. As a result, the cost of KYC compliance is higher than ever, requiring time ...

research-article
An Assessment Framework for Distributed Ledger Technology in Financial Application

Distributed Ledger Technology (DLT) currently stands in the limelight. In many people's eyes, DLT has great potential to accelerate the digitalization process and substantially change the roles and services of central banks. On the other hands, as many ...

research-article
Whispers on Ethereum: Blockchain-based Covert Data Embedding Schemes

The Ethereum cryptocurrency system becomes prevalent with the increasing number of daily transactions. It is a high-quality channel to secretly transfer information because senders and recipients are pseudonymous and transactions are tamper-resistant. ...

SESSION: BSCI Short Paper Session
short-paper
Slim Chain and Dependability

The slim chain is proposed in this paper in an effort to address and resolve the scalability issue of blockchain-based crypto computing by managing the volume of the blockchain itself. An adequate balancing of computation across on/off-chain is expected ...

short-paper
DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things

With the exorbitant growth in the number of connected devices, the lack of proper identity and access management (IAM) mechanisms has become a major concern. The traditional IAM systems, which focus solely on managing people's digital identities, fail ...

short-paper
Simulating Difficulty Adjustment in Blockchain with SimBlock

A blockchain is a gradually increasing list of "blocks" containing information that are linked together using cryptographic hashes. It is a distributed, decentralized, and public digital ledger technology. Blockchains have caught not only the attention ...

short-paper
Network Embedding Based On Structural Information Entropy: Network embedding

Blockchain is a complex network structure, which has the properties of members and the network relationship of their transactions with each other. If we can quantify its network structure, it will be of great help to our subsequent work. Network ...

short-paper
Hybrid Chain And Dependability

The hybrid chain is proposed in this paper to investigate on a new blockchain network that is to be built across private and main nets, namely, a hybrid chain. Note that the hybrid chain is distinguished from the on/off-balanced chain such that the ...

SESSION: BSCI Poster Session
poster
Blockchain as a Dissipative System and Cognitive Space

This paper proposes a fundamental theory to understand and explain blockchain based on dissipative structure theory and cognitive science. Propose that blockchain is a dissipative system that is an ordered state far from equilibrium, constantly ...

poster
Document Management System using Blockchain and Inter Planetary File System

Blockchain Technology has been evolving from being a secure and immutable ledger of transactions for cryptocurrencies to a programmable interactive environment for building distributed reliable applications. This system proposes a secure platform to ...

poster
On Design of Blockchain-based Transport Scheme

Block chain is a revolutionary new technology proposed in recent years. It has the characteristics of decentralization, non-tampering with transactions, and extremely low transaction costs. These characteristics coincide with the decentralization and ...

Contributors
  • Beijing Institute of Technology
  • The University of Texas at San Antonio
  1. Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate44of12submissions,367%
    YearSubmittedAcceptedRate
    BSCI '191244367%
    Overall1244367%