scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes a blockchain (BC)-based consensus protocol in SDIIoT, along with detailed consensus steps and theoretical analysis, where BC works as a trusted third party to collect and synchronize network-wide views between different SDN controllers.
Abstract: With the developments of communication technologies and smart manufacturing, Industrial Internet of Things (IIoT) has emerged. Software-defined networking (SDN), a promising paradigm shift, has provided a viable way to manage IIoT dynamically, called software-defined IIoT (SDIIoT). In SDIIoT, lots of data and flows are generated by industrial devices, where a physically distributed but logically centralized control plane is necessary. However, one of the most intractable problems is how to reach consensus among multiple controllers under complex industrial environments. In this paper, we propose a blockchain (BC)-based consensus protocol in SDIIoT, along with detailed consensus steps and theoretical analysis, where BC works as a trusted third party to collect and synchronize network-wide views between different SDN controllers. Specially, it is a permissioned BC. In order to improve the throughput of this BC-based SDIIoT, we jointly consider the trust features of BC nodes and controllers, as well as the computational capability of the BC system. Accordingly, we formulate view change, access selection, and computational resources allocation as a joint optimization problem. We describe this problem as a Markov decision process by defining state space, action space, and reward function. Due to the fact that it is difficult to solve this joint problem by traditional methods, we propose a novel dueling deep ${Q}$ -learning approach. Simulation results are presented to show the effectiveness of our proposed scheme.

161 citations

Patent
15 Mar 2000
TL;DR: In this article, the authors present a trust-based funds transfer system for facilitating electronic funds transfer between a payor and a payee by means of an intermediate trusted third party.
Abstract: A funds transfer system for facilitating electronic funds transfer between a payor and a payee by means of an intermediate trusted third party comprises: a payor station including a device for electronic communication of a payment order, the payment order comprising the payee's name, address and an amount owed by the payor to the payee; a home banking system including a computer structured to communicate electronically at least with the payor station, to receive the payment order, and with the trusted third party; a trusted third party system associated with the trusted third party, the trusted third party system comprising a computer structured to communicate electronically with both the home banking system and a bank of the payee. The home banking system computer is operable, upon receipt of the payment order from the payor station, to generate a universal identifier number uniquely identifying the payee and to transmit electronically the universal identifier number to the trusted third party via a communication with the trusted third party system. The trusted third party system computer also being operable, in response to receipt of the universal identifier number from the home banking system, to identify the payee as a party to receive payment, to generate a routing/transit number of the bank of the payee and the payee's account number from the universal identifier number, and to communicate electronically with the bank of the payee to facilitate transfer of the amount owed to the payee's account to the bank of the payee.

159 citations

Proceedings ArticleDOI
15 Jun 2005
TL;DR: Wormminator reports on the experience developing and deploying a decentralized system for efficiently distributing alerts to collaborating peers that extracts relevant information from alert streams and encodes it in bloom filters, which forms the basis of a distributed watchlist.
Abstract: The increasing array of Internet-scale threats is a pressing problem for every organization that utilizes the network. Organizations have limited resources to detect and respond to these threats. The end-to-end (E2E) sharing of information related to probes and attacks is a facet of an emerging trend toward "collaborative security". The key benefit of a collaborative approach to intrusion detection is a better view of global network attack activity. Augmenting the information obtained at a single site with information gathered from across the network can provide a more precise model of an attacker's behavior and intent. While many organizations see value in adopting such a collaborative approach, some challenges must be addressed before intrusion detection can be performed on an inter-organizational scale. We report on our experience developing and deploying a decentralized system for efficiently distributing alerts to collaborating peers. Our system, worminator, extracts relevant information from alert streams and encodes it in bloom filters. This information forms the basis of a distributed watchlist. The watchlist can be distributed via a choice of mechanisms ranging from a centralized trusted third party to a decentralized P2P-style overlay network.

157 citations

Journal ArticleDOI
TL;DR: A theoretical approach is introduced for a system called Alambic, which achieves the above privacy-protection objectives in a hybrid recommender system that combines content-based, demographic and collaborative filtering techniques.
Abstract: Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy-protection vulnerabilities. Customers should be able to keep private their personal information, including their buying preferences, and they should not be tracked against their will. The commercial interests of merchants should also be protected by allowing them to make accurate recommendations without revealing legitimately compiled valuable information to third parties. We introduce a theoretical approach for a system called Alambic, which achieves the above privacy-protection objectives in a hybrid recommender system that combines content-based, demographic and collaborative filtering techniques. Our system splits customer data between the merchant and a semi-trusted third party, so that neither can derive sensitive information from their share alone. Therefore, the system could only be subverted by a coalition between these two parties.

157 citations

Journal ArticleDOI
TL;DR: This paper proposes a decentralized PoD solution for PoD of digital assets that leverages key features of blockchain and Ethereum smart contracts to provide immutable and tamper-proof logs, accountability, and traceability and leverages the benefits of interplanetary file system.
Abstract: There is an immense need of a proof of delivery (PoD) of today’s digital media and content, especially those that are subject to payment. Current PoD systems are mostly centralized and heavily dependent on a trusted third party (TTP) especially for payment. Such existing PoD systems often lack security, transparency, and visibility, and are not highly credible, as the TTP can be subject to failure, manipulation, corruption, compromise, and hacking. In this paper, we propose a decentralized PoD solution for PoD of digital assets. Our solution leverages key features of blockchain and Ethereum smart contracts to provide immutable and tamper-proof logs, accountability, and traceability. Ethereum smart contracts are used to orchestrate and govern all interactions and transactions including automatic payments in Ether cryptocurrency between customers, digital-content provider, and the file server hosting the digital content. All entities are incentivized to act honestly, and our solution has a mechanism to handle dispute if arisen among participants. The solution has an off-chain secure download phase involving the file server and customers. Moreover, our solution leverages the benefits of interplanetary file system to store the agreed upon terms and conditions between the smart contract actors. A security analysis of our proposed system has been provided. The full code of the smart contract has been publicly made available on Github.

157 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177