Work place: Southwest University of Science and Technology/Department of Computer Science and Technology, Mianyang, 621010, China
E-mail: odoom.justice@ieee.org
Website: https://orcid.org/0000-0003-2765-6977
Research Interests: Computer Science & Information Technology, Information Security, Network Security, Information Systems, Information Theory
Biography
Justice Odoom obtained his BSc and MSE degrees in Computer Science from Data Link University, Tema, Ghana and Southwest University of Science and Technology, Mianyang, China, in 2015 and 2020 respectively. He is currently pursuing his Doctoral degree with the School of Computer Science and Technology, Southwest University of Science and Technology, China and is a certified Elsevier and Publons academy peer reviewer. His research interests include information security, blockchain technology, ring signatures and privacy-preservation in the sharing of Electronic Health Records (EHRs). He is a member of IEEE and IEEE Computer Society.
By Justice Odoom Huang Xiaofang Samuel Akwasi Danso Richlove Samuel Soglo Benedicta Nana Esi Nyarko
DOI: https://doi.org/10.5815/ijcnis.2023.01.02, Pub. Date: 8 Feb. 2023
Blockchain technology unarguably has over a decade gained widespread attention owing to its often-tagged disruptive nature and remarkable features of decentralization, immutability and transparency among others. However, the technology comes bundled with challenges. At center-stage of these challenges is privacy-preservation which has massively been researched with diverse solutions proposed geared towards privacy protection for transaction initiators, recipients and transaction data. Dual-key stealth address protocol for IoT (DkSAP-IoT) is one of such solutions aimed at privacy protection for transaction recipients. Induced by the need to reuse locally stored data, the current implementation of DkSAP-IoT is deficient in the realms of data confidentiality, integrity and availability consequently defeating the core essence of the protocol in the event of unauthorized access, disclosure or data tampering emanating from a hack and theft or loss of the device. Data unavailability and other security-related data breaches in effect render the existing protocol inoperable. In this paper, we propose and implement solutions to augment data confidentiality, integrity and availability in DkSAP-IoT in accordance with the tenets of information security using symmetric encryption and data storage leveraging decentralized storage architecture consequently providing data integrity. Experimental results show that our solution provides content confidentiality consequently strengthening privacy owing to the encryption utilized. We make the full code of our solution publicly available on GitHub.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals