Richlove Samuel Soglo

Work place: Southwest University of Science and Technology/Department of Computer Science and Technology, Mianyang, 621010, China

E-mail: richlovesoglo@gmail.com

Website: https://orcid.org/0000-0001-9988-4106

Research Interests: Analysis of Algorithms, Mathematics of Computing, Theory of Computation, Models of Computation

Biography

Richlove S. Soglo obtained his BSc in Information Technology from Ghana Technology University College, Accra, Ghana in 2018 and holds MSE in Computer Science and Technology from Southwest University of Science and Technology, China. His research interests include blockchain technology, supply chain management and Internet of Things (IoT).

Author Articles
Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage

By Justice Odoom Huang Xiaofang Samuel Akwasi Danso Richlove Samuel Soglo Benedicta Nana Esi Nyarko

DOI: https://doi.org/10.5815/ijcnis.2023.01.02, Pub. Date: 8 Feb. 2023

Blockchain technology unarguably has over a decade gained widespread attention owing to its often-tagged disruptive nature and remarkable features of decentralization, immutability and transparency among others. However, the technology comes bundled with challenges. At center-stage of these challenges is privacy-preservation which has massively been researched with diverse solutions proposed geared towards privacy protection for transaction initiators, recipients and transaction data. Dual-key stealth address protocol for IoT (DkSAP-IoT) is one of such solutions aimed at privacy protection for transaction recipients. Induced by the need to reuse locally stored data, the current implementation of DkSAP-IoT is deficient in the realms of data confidentiality, integrity and availability consequently defeating the core essence of the protocol in the event of unauthorized access, disclosure or data tampering emanating from a hack and theft or loss of the device. Data unavailability and other security-related data breaches in effect render the existing protocol inoperable. In this paper, we propose and implement solutions to augment data confidentiality, integrity and availability in DkSAP-IoT in accordance with the tenets of information security using symmetric encryption and data storage leveraging decentralized storage architecture consequently providing data integrity. Experimental results show that our solution provides content confidentiality consequently strengthening privacy owing to the encryption utilized. We make the full code of our solution publicly available on GitHub.

[...] Read more.
Other Articles