Blockchain
Blockchain has become a huge research area covering many topics related to distributed systems and new governance and trust paradigms. It opens new possibilities for scenarios where centralized solutions do not fit well, but it also poses new challenges that need to be overcome.
Trust-less data sharing
Replacing a central server by a decentralized blockchain network could solve or at least mitigate trust problems in several setups, one example being Proxy Re-Encryption [1]. Already in 2014 we proposed to integrate proxy re-encryption in Big Data infraesctructures [2]. Taking this work as the basis we started working with ZeroDB Inc. in the realization of this concept (Crypto@ZeroDB). As part of this collaboration we joinlty produced three patents, that were granted in 2020, for the resulting technolgy (US10581603B2, US20170323114A1 and US10574440B2)
In these scenarios, the proxy re-encryption server should behave honestly, which is sometimes difficult to implement. In order to overcome this limitations, NICS Lab has participated also in the definition and development of the NuCypher network (Crypto4BC), a decentralized Proxy Re-Encryption service that uses the Ethereum blockchain to enforce access control policies and implement network governance. In esencce, it provides a decentralized key management system based on Ethereum, that offers cryptographically-enforced access control services. This system operates in a decentralized way and uses advanced cryptographic techniques developed by NICS, such as proxy re-encryption, threshold cryptography and zero-knowledge proofs, that securely embed access control functionality at the encryption level. The ultimate goal of this project is to create a basic infrastructure for the development of secure DApps (decentralized applications), which in turn will lead to numerous applications in many fields, such as fintech, identity management, and DRM.
This work also triggered the creation of Decentralized Security, the first technology-based startup participated by the University of Malaga. The startup offers development and security consultancy services for blockchain projects and is currently working with both NuCypher and Ethereum Foundation.
Mobility
New mobility paradigms have appeared in recent years, and everything suggests that some more are coming. This fact makes apparent the necessity of modernizing the road infrastructure, the signalling elements and the traffic management systems. Many initiatives have emerged around the term Intelligent Transport System (ITS) in order to define new scenarios and requirements for this kind of applications. We even have two main competing technologies for implementing Vehicular communication protocols (V2X), C-V2X and 802.11p, but neither of them is widely deployed yet.
One of the main barriers for the massive adoption of those technologies is governance. Current solutions rely on the use of a public key infrastructure that enables secure collaboration between the different entities in the V2X ecosystem, but given its global scope, managing such infrastructure requires reaching agreements between many parties, with conflicts of interest between automakers and telecommunication operators. As a result, there are plenty of use cases available and two mature communication technologies, but the complexity at the business layer is stopping the drivers from taking advantage of ITS applications.
Blockchain technologies are defining a new decentralized paradigm for most traditional applications, where smart contracts provide a straightforward mechanism for decentralized governance. In [3], we propose an approach for decentralized V2X (D-V2X) that does not require any trusted authority and can be implemented on top of any communication protocol. We also define a proof-of-concept technical architecture on top of a cheap and highly secure System-on-Chip (SoC) that could allow for massive adoption of D-V2X. This effort is part of the SAVE project where we are pussing the limitis of the Internet of Vehicles.
Critical Infrastructure Protection and Industry 4.0
Although the benefits of blockchain technology are already well known, it is always recommendable to analyse its possible adaptation to critical operational environments. As part of the SealedGRID project, the work [4] analyses the level of coupling of blockchain technology in critical federated applications, such as Smart Grid systems, and explores which interconnection strategy is the most suitable for such an application. For the analysis, the study focuses on an interconnection architecture based on three layers and several interconnection strategies, all of them adapting traditional decision and policy enforcement approaches together with blockchain technology to manage reliable and secure connections between critical entities, processes and resources. However, these connections must be dynamic according to the contextual conditions of the application environment. Thus, the paper [5] highlights the capabilities of Blockchain technology that, together with other technologies, allows to dynamically manage access control by updating their policies. In this case, the combination of technologies is concentrated on the Digital Twin together with Artificial Intelligence to simulate and anticipate anomalies and cybersecurity issues in real time.
Blockchain is also useful for conflict resolution in the retail Supply Chain, and compliance and accountability in distributed manufacturing. In this sense, NICS Lab contributes in the CyberSec4Europe project to lead the Supply Chain Roadmap, and participates in its use cases where Blockchain technology is key to its demonstration. At this point, it is worth noting that one of the operational nodes is enabled in the research group's facilities, providing coverage for experimentation and testing. Last but not least, the technological deployment of Blockchain has also proven to be useful not only for managing the context of an operational environment, as indicated in [4] and [5], but also for detecting and predicting anomalies in Industry 4.0 and energy environments (SADECEI-4.0 and Smart and Secure EV Urban Lab II, respectively).
Therefore, the implications of Blockchain technology for the digital transformation of future critical infrastructures and Industry 4.0, and next generations, such as Industry 5.0, become evident.
Blockchain infrastructures
Regarding blockchain infrastructure support, we are contributing a node to the Alastria network in partnership with the Malaga Tech Park (PTA). Alastria is a national initiative that offers two permissioned blockchain networks to its partners: Network T (based on Quorum) and Network B (based on Hyperledger Besu). We are also contributing a node to the NuCypher network, through the NuCypher University Staking Program, a Hyperledger Fabric node for experimentation in supply chain scenarios for the CyberSec4Europe project and a Hyperledger Besu network for digital twin scenarios (SADECEI-4.0) and monitoring of electric vehicle charging points (Urban Lab II)
As part of our active involvement in Blockchain, we also organize an advanced Course on Blockchain Technologies with the collaboration of different companies from the Malaga Tech Park (PTA) and startups of the Blockchain ecosystem.
References
- "Proxy Re-Encryption: Analysis of Constructions and its Application to Secure Access Delegation",
Journal of Network and Computer Applications, vol. 87, Elsevier, pp. 193-209, 06/2017. DOI (I.F.: 3.991)More..Abstract
This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functional and efficiency perspectives. Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about the original message. Thus, it serves as a means for delegating decryption rights, opening up many possible applications that require of delegated access to encrypted data. In particular, sharing information in the cloud is a prime example. In this paper, we review the main proxy re-encryption schemes so far, and provide a detailed analysis of their characteristics. Additionally, we also study the efficiency of selected schemes, both theoretically and empirically, based on our own implementation. Finally, we discuss some applications of proxy re-encryption, with a focus on secure access delegation in the cloud.
Impact Factor: 3.991Journal Citation Reports® Science Edition (Thomson Reuters, 2017) - "Delegated Access for Hadoop Clusters in the Cloud",
IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2014), IEEE, pp. 374-379, 12/2014. DOI More..Abstract
Among Big Data technologies, Hadoop stands out for its capacity to store and process large-scale datasets. However, although Hadoop was not designed with security in mind, it is widely used by plenty of organizations, some of which have strong data protection requirements. Traditional access control solutions are not enough, and cryptographic solutions must be put in place to protect sensitive information. In this paper, we describe a cryptographically-enforced access control system for Hadoop, based on proxy re-encryption. Our proposed solution fits in well with the outsourcing of Big Data processing to the cloud, since information can be stored in encrypted form in external servers in the cloud and processed only if access has been delegated. Experimental results show that the overhead produced by our solution is manageable, which makes it suitable for some applications.
- "A Blockchain Approach for Decentralized V2X (D-V2X)",
IEEE Transactions on Vehicular Technology, vol. 70, no. 5, IEEE, pp. 4001 - 4010, 05/2021. DOI (I.F.: 6.239)More..Abstract
New mobility paradigms have appeared in recent years, and everything suggests that some more are coming. This fact makes apparent the necessity of modernizing the road infrastructure, the signalling elements and the traffic management systems. Many initiatives have emerged around the term Intelligent Transport System (ITS) in order to define new scenarios and requirements for this kind of applications. We even have two main competing technologies for implementing Vehicular communication protocols (V2X), C-V2X and 802.11p, but neither of them is widely deployed yet.
One of the main barriers for the massive adoption of those technologies is governance. Current solutions rely on the use of a public key infrastructure that enables secure collaboration between the different entities in the V2X ecosystem, but given its global scope, managing such infrastructure requires reaching agreements between many parties, with conflicts of interest between automakers and telecommunication operators. As a result, there are plenty of use cases available and two mature communication technologies, but the complexity at the business layer is stopping the drivers from taking advantage of ITS applications.
Blockchain technologies are defining a new decentralized paradigm for most traditional applications, where smart contracts provide a straightforward mechanism for decentralized governance. In this work, we propose an approach for decentralized V2X (D-V2X) that does not require any trusted authority and can be implemented on top of any communication protocol. We also define a proof-of-concept technical architecture on top of a cheap and highly secure System-on-Chip (SoC) that could allow for massive adoption of D-V2X.
Impact Factor: 6.239Journal Citation Reports® Science Edition (Thomson Reuters, 2021) - "Blockchain-Assisted Access for Federated Smart Grid Domains: Coupling and Features",
Journal of Parallel and Distributed Computing, vol. 144, Elsevier, pp. 124-135, 06/2020. (I.F.: 3.734)More.. - "Digital Twins for Intelligent Authorization in the B5G-enabled Smart Grid",
IEEE Wireless Communications, vol. 28, issue 2, IEEE, pp. 48-55, 04/2021. DOI (I.F.: 12.777)More..Abstract
Beyond fifth generation (B5G) communication networks and computation paradigms in the edge are expected to be integrated into power grid infrastructures over the coming years. In this sense, AI technologies will play a fundamental role to efficiently manage dynamic information flows of future applications, which impacts the authorization policies applied in such a complex scenario. This article studies how digital twins can evolve their context awareness capabilities and simulation technologies to anticipate faults or to detect cyber-security issues in real time, and update access control policies accordingly. Our study analyzes the evolution of monitoring platforms and architecture decentralization, including the application of machine learning and blockchain technologies in the smart grid, toward the goal of implementing autonomous and self-learning agents in the medium and long term. We conclude this study with future challenges on applying digital twins to B5G-based smart grid deployments.
Impact Factor: 12.777Journal Citation Reports® Science Edition (Thomson Reuters, 2021)