skip to main content
10.1145/3581971.3581989acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbtaConference Proceedingsconference-collections
research-article

AmIOnline: Blockchain-based Availability Testing Service

Published:06 April 2023Publication History

ABSTRACT

Information technology has penetrated into all spheres of activity, and the business sphere is not an exception. The uninterrupted and efficient operation of these technologies guarantees the efficiency of business processes and the entire work of the company. The most significant way to improve the business is by impressing customers and keeping them satisfied. If customers cannot get the service, they turn to the competitors. The first step to their satisfaction is the fulfillment of the promises made by the business. The customers come to the service with certain expectations. And one of the most crucial expectations is getting the service when they need it. Any compromise with availability has serious effects on business. Therefore, it is important to control and ensure the availability of the company’s service from necessary places on the planet. For checking the availability of the service, the organization can implement the approach of using special internet services, but they do not look reliable. To increase trust between the parties, it is necessary to implement blockchain technology. The paper presents the blockchain-based availability testing service. The service allows organizations not only to verify the accuracy of the work done but also allows checking the availability from the special places.

References

  1. Saqlain Abbas, Mehwish Naz, Zaeem Anwaar, Muhammad Usman Farooq, and Farasat Ullah Khan. 2021. Availability Testing of IoT-Based Health Care Devices: A Survey. In 4th International Conference on Innovative Computing, ICIC 2021. https://doi.org/10.1109/ICIC53490.2021.9693011Google ScholarGoogle ScholarCross RefCross Ref
  2. ACINQ. [n.d.]. Lightning Network Explorer. https://explorer.acinq.co/Google ScholarGoogle Scholar
  3. Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, and Jason Yellick. 2018. Hyperledger fabric. In Proceedings of the Thirteenth EuroSys Conference. ACM, New York, NY, USA, 1–15. https://doi.org/10.1145/3190508.3190538Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza, Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Practical Decentralized Anonymous E-Cash from Bitcoin. In Proceedings of the 2014 IEEE Symposium on Security and Privacy. IEEE, 459–474. https://doi.org/10.1109/SP.2014.36Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bitfury Group. 2016. On Blockchain Auditability. bitfury.com (2016), 1–40. https://bitfury.com/content/downloads/bitfury-white-pape r-on-blockchain-auditability.pdfGoogle ScholarGoogle Scholar
  6. Bitnodes. [n.d.]. Global Bitcoin Nodes Distribution. https://bitnodes.io/Google ScholarGoogle Scholar
  7. Vitalik Buterin. 2014. Ethereum White Paper: A Next Generation Smart Contract & Decentralized Application Platform. EthereumJanuary(2014), 1–36. https://github.com/ethereum/wiki/wiki/White-PaperGoogle ScholarGoogle Scholar
  8. Vitalik Buterin. 2015. On Public and Private Blockchains - Ethereum Blog. https://blog.ethereum.org/2015/08/07/on-public-and-private-blockchains/Google ScholarGoogle Scholar
  9. Yatipa Chaleenutthawut, Vyacheslav Davydov, Aleksandr Kuzmin, and Yury Yanovich. 2022. Practical Blockchain-Based Financial Assets Tokenization. In 2021 4th International Conference on Blockchain Technology and Applications (Xi’an, China) (ICBTA 2021). Association for Computing Machinery, New York, NY, USA, 51–57. https://doi.org/10.1145/3510487.3510495Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Vyacheslav Davydov, Alexander Gazaryan, Yash Madhwal, and Yury Yanovich. 2019. Token Standard for Heterogeneous Assets Digitization into Commodity. In Proceedings of the 2019 2nd International Conference on Blockchain Technology and Applications. ACM, New York, NY, USA, 43–47. https://doi.org/10.1145/3376044.3376053Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. Dierks and E. Rescorla. 2008. The transport layer security (TLS) protocol - Version 1.2. In Network Working Group, IETF.Google ScholarGoogle Scholar
  12. Patricia T. Endo, Moisés Rodrigues, Glauco E. Gonçalves, Judith Kelner, Djamel H. Sadok, and Calin Curescu. 2016. High availability in clouds: systematic review and research challenges. https://doi.org/10.1186/s13677-016-0066-8Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Dmitry Ermilov, Maxim Panov, and Yury Yanovich. 2017. Automatic Bitcoin Address Clustering. In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 461–466. https://doi.org/10.1109/ICMLA.2017.0-118Google ScholarGoogle Scholar
  14. Ethereum. [n.d.]. Solidity documentation. Soliditylang.org([n. d.]). https://docs.soliditylang.org/en/stable/#Google ScholarGoogle Scholar
  15. Amos Fiat and Adi Shamir. 1987. How To Prove Yourself: Practical Solutions to Identification and Signature Problems. In Advances in Cryptology — CRYPTO’ 86. Vol. 263 LNCS. Springer Berlin Heidelberg, Berlin, Heidelberg, 186–194. https://doi.org/10.1007/3-540-47721-7_12Google ScholarGoogle Scholar
  16. FilFox Project. [n.d.]. Filfox - Filecoin explorer. https://filfox.info/enGoogle ScholarGoogle Scholar
  17. Infrascale. 2020. Infrascale Survey Highlights the Heavy Costs of Business Downtime. Infrascale (2020). https://www.infrascale.com/press-release/infrascale-survey-highlights-the-heavy-costs-of-business-downtime/Google ScholarGoogle Scholar
  18. Eugene Kaspersky. 2016. A Brief History of DDoS Attacks. https://eugene.kaspersky.com/2016/12/06/a-brief-history-of-ddos-attacks/Google ScholarGoogle Scholar
  19. Darya Korepanova, Maria Nosyk, Alex Ostrovsky, and Yury Yanovich. 2019. Building a Private Currency Service Using Exonum. In 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 1–3. https://doi.org/10.1109/BlackSeaCom.2019.8812875Google ScholarGoogle ScholarCross RefCross Ref
  20. Alexandra Kugusheva and Yury Yanovich. 2019. Ring Signature-Based Voting on Blockchain. In Proceedings of the 2019 2nd International Conference on Blockchain Technology and Applications. ACM, New York, NY, USA, 70–75. https://doi.org/10.1145/3376044.3376054Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Mohamad I. Ladan. 2010. Web Services Testing Approaches: A Survey and a Classification. In Communications in Computer and Information Science. Vol. 88 CCIS. 70–79. https://doi.org/10.1007/978-3-642-14306-9_8Google ScholarGoogle Scholar
  22. Xiao Fan Liu, Xin Jian Jiang, Si Hao Liu, and Chi Kong Tse. 2021. Knowledge Discovery in Cryptocurrency Transactions: A Survey. IEEE Access 9(2021), 37229–37254. https://doi.org/10.1109/ACCESS.2021.3062652Google ScholarGoogle ScholarCross RefCross Ref
  23. Andrew Lloyd. 2018. The Effects of DDoS Attacks on Essential Services. https://www.corero.com/blog/887-the-effects-of-ddos-attacks-on-essential-services.htmlGoogle ScholarGoogle Scholar
  24. Ralph C. Merkle. 1988. A Digital Signature Based on a Conventional Encryption Function. In Conference on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg, 369–378. https://doi.org/10.1007/3-540-48184-2_32Google ScholarGoogle ScholarCross RefCross Ref
  25. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. www.bitcoin.org (2008), 1–9. https://bitcoin.org/bitcoin.pdfGoogle ScholarGoogle Scholar
  26. Shen Noether, Adam Mackenzie, and The Monero Research Lab. 2016. Ring Confidential Transactions. Ledger 1, 0 (12 2016), 1–18. https://doi.org/10.5195/LEDGER.2016.34Google ScholarGoogle Scholar
  27. Luis Oliveira, Ingrid Bauer, Liudmila Zavolokina, and Gerhard Schwabe. 2018. To token or not to token: Tools for understanding blockchain tokens. In International Conference on Information Systems 2018, ICIS 2018. 1–17.Google ScholarGoogle Scholar
  28. Ponemon Institute. 2021. Data Center Downtime at the Core and the Edge: A Survey of Frequency, Duration and Attitudes. Vertiv.com (2021). https://www.vertiv.com/490a6d/globalassets/documents/reports/ponemon/vertiv-ponemon-datacenterdowntimesurveyreport_321796_0.pdfGoogle ScholarGoogle Scholar
  29. Partha Pratim Ray, Neeraj Kumar, and Dinesh Dash. 2021. BLWN: Blockchain-Based Lightweight Simplified Payment Verification in IoT-Assisted e-Healthcare. IEEE Systems Journal 15, 1 (2021). https://doi.org/10.1109/JSYST.2020.2968614Google ScholarGoogle ScholarCross RefCross Ref
  30. E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3.Google ScholarGoogle Scholar
  31. Bruno Rodrigues, Spasen Trendafilov, Eder Scheid, and Burkhard Stiller. 2020. SC-FLARE: Cooperative DDoS Signaling based on Smart Contracts. In IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020. Institute of Electrical and Electronics Engineers Inc.https://doi.org/10.1109/ICBC48266.2020.9169750Google ScholarGoogle ScholarCross RefCross Ref
  32. Maria Toeroe and Francis Tam. 2012. Service Availability. Wiley. https://doi.org/10.1002/9781119941378Google ScholarGoogle Scholar
  33. Fabian Vogelsteller and Vitalik Buterin. 2015. EIP-20: ERC-20 Token Standard. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-20.mdGoogle ScholarGoogle Scholar
  34. Arthur Sandor Voundi Koe, Shan Ai, Pengfei Huang, Anli Yan, Juan Tang, Qi Chen, Kanghua Mo, Wanqing Jie, and Shiwen Zhang. 2022. Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough. Information Sciences 606 (8 2022), 60–71. https://doi.org/10.1016/J.INS.2022.05.054Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Sharyar Wani, Mohammed Imthiyas, Hamad Almohamedh, Khalid M Alhamed, Sultan Almotairi, and Yonis Gulzar. 2021. Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight. Symmetry 13, 2 (1 2021), 227. https://doi.org/10.3390/sym13020227Google ScholarGoogle Scholar
  36. Yury Yanovich, Ivan Ivashchenko, Alex Ostrovsky, Aleksandr Shevchenko, and Aleksei Sidorov. 2018. Exonum: Byzantine fault tolerant protocol for blockchains. bitfury.com (2018), 1–36. https://bitfury.com/content/downloads/wp-consensus-181227.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. AmIOnline: Blockchain-based Availability Testing Service

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICBTA '22: Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications
        December 2022
        192 pages
        ISBN:9781450397575
        DOI:10.1145/3581971

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 April 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)40
        • Downloads (Last 6 weeks)6

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format