Loading…

A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City

The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive in...

Full description

Saved in:
Bibliographic Details
Published in:Security and communication networks 2023, Vol.2023, p.1-13
Main Authors: Kumar, Narendra, Goel, Vikas, Ranjan, Raju, Altuwairiqi, Majid, Alyami, Hashem, Asakipaam, Simon Atuah
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043
cites cdi_FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043
container_end_page 13
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2023
creator Kumar, Narendra
Goel, Vikas
Ranjan, Raju
Altuwairiqi, Majid
Alyami, Hashem
Asakipaam, Simon Atuah
description The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive information about users. Phishing is still the first step of a multistage assault, despite the significant technological advancements that have been made to it in recent years. Phishing kits have evolved to become attack tools that are much simpler, more user-friendly, and more readily available as time has gone. Indicators of a successful phishing assault include using foreign characters in the URL, typosquatting of prominent domain names, reserved characters in redirections, and multichain phishing. When papers with these types of phishing URLs are uploaded to cloud storage, hackers get a helping push in the right direction. The use of cloud servers in the commission of these assaults is becoming more common. The currently available software to disallow list phishing URLs does not provide sufficient protection against multilevel phishing and instead places the onus of safety on the user to protect themselves. In addition, the immutability of blockchain data and the avalanche effect both demonstrate their effectiveness as crucial safety measures. In view of the recent advances in technology, we suggest an implementation of filtering that is based on blockchain technology to safeguard the cloud-based data of users. The Phish Block that has been presented is able to recognize homographic phishing URLs with an accuracy of 91 percent, thus ensuring the security of cloud storage.
doi_str_mv 10.1155/2023/8168075
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2807766144</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2807766144</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043</originalsourceid><addsrcrecordid>eNp9kEFPwjAUxxujiYje_ABNPOqk7dZ1O-ICakKCCdyXrnuTwrZiu4Xw7emEePT0b977te_1h9AjJa-Ucj5hhIWThMYJEfwKjWgapgGhjF3_nWl0i-6c2xIS00hEI3SY4rfaqJ3aSN0GS6uh7aDEcysbOBi7w5WxOKtNXwZT57QbmqujjwZ3Bmem97htQLreAv7aaLfR7ffvpZnrZFFfCitQA7BqpO1wprvjPbqpZO3g4ZJjtJ7P1tlHsFi-f2bTRaAYZzwQMSlZwSTnFEiiwpRzwSHicVoVIaUFo5wlvKoAUogSSBVVwlcUJ0ImJArH6On87N6anx5cl29Nb1s_MWfekoi9hoF6OVPKGucsVPnear_qMackH8zmg9n8Ytbjz2fcf62UB_0_fQIVHXgK</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2807766144</pqid></control><display><type>article</type><title>A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City</title><source>Publicly Available Content (ProQuest)</source><source>Wiley Open Access</source><creator>Kumar, Narendra ; Goel, Vikas ; Ranjan, Raju ; Altuwairiqi, Majid ; Alyami, Hashem ; Asakipaam, Simon Atuah</creator><contributor>Ramadan, Rabie ; Rabie Ramadan</contributor><creatorcontrib>Kumar, Narendra ; Goel, Vikas ; Ranjan, Raju ; Altuwairiqi, Majid ; Alyami, Hashem ; Asakipaam, Simon Atuah ; Ramadan, Rabie ; Rabie Ramadan</creatorcontrib><description>The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive information about users. Phishing is still the first step of a multistage assault, despite the significant technological advancements that have been made to it in recent years. Phishing kits have evolved to become attack tools that are much simpler, more user-friendly, and more readily available as time has gone. Indicators of a successful phishing assault include using foreign characters in the URL, typosquatting of prominent domain names, reserved characters in redirections, and multichain phishing. When papers with these types of phishing URLs are uploaded to cloud storage, hackers get a helping push in the right direction. The use of cloud servers in the commission of these assaults is becoming more common. The currently available software to disallow list phishing URLs does not provide sufficient protection against multilevel phishing and instead places the onus of safety on the user to protect themselves. In addition, the immutability of blockchain data and the avalanche effect both demonstrate their effectiveness as crucial safety measures. In view of the recent advances in technology, we suggest an implementation of filtering that is based on blockchain technology to safeguard the cloud-based data of users. The Phish Block that has been presented is able to recognize homographic phishing URLs with an accuracy of 91 percent, thus ensuring the security of cloud storage.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2023/8168075</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Assaults ; Blockchain ; Cloud computing ; Cybercrime ; Malware ; Social networks ; URLs</subject><ispartof>Security and communication networks, 2023, Vol.2023, p.1-13</ispartof><rights>Copyright © 2023 Narendra Kumar et al.</rights><rights>Copyright © 2023 Narendra Kumar et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043</citedby><cites>FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043</cites><orcidid>0000-0003-3257-6461</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2807766144?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,777,781,4010,25734,27904,27905,27906,36993,44571</link.rule.ids></links><search><contributor>Ramadan, Rabie</contributor><contributor>Rabie Ramadan</contributor><creatorcontrib>Kumar, Narendra</creatorcontrib><creatorcontrib>Goel, Vikas</creatorcontrib><creatorcontrib>Ranjan, Raju</creatorcontrib><creatorcontrib>Altuwairiqi, Majid</creatorcontrib><creatorcontrib>Alyami, Hashem</creatorcontrib><creatorcontrib>Asakipaam, Simon Atuah</creatorcontrib><title>A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City</title><title>Security and communication networks</title><description>The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive information about users. Phishing is still the first step of a multistage assault, despite the significant technological advancements that have been made to it in recent years. Phishing kits have evolved to become attack tools that are much simpler, more user-friendly, and more readily available as time has gone. Indicators of a successful phishing assault include using foreign characters in the URL, typosquatting of prominent domain names, reserved characters in redirections, and multichain phishing. When papers with these types of phishing URLs are uploaded to cloud storage, hackers get a helping push in the right direction. The use of cloud servers in the commission of these assaults is becoming more common. The currently available software to disallow list phishing URLs does not provide sufficient protection against multilevel phishing and instead places the onus of safety on the user to protect themselves. In addition, the immutability of blockchain data and the avalanche effect both demonstrate their effectiveness as crucial safety measures. In view of the recent advances in technology, we suggest an implementation of filtering that is based on blockchain technology to safeguard the cloud-based data of users. The Phish Block that has been presented is able to recognize homographic phishing URLs with an accuracy of 91 percent, thus ensuring the security of cloud storage.</description><subject>Assaults</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Cybercrime</subject><subject>Malware</subject><subject>Social networks</subject><subject>URLs</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp9kEFPwjAUxxujiYje_ABNPOqk7dZ1O-ICakKCCdyXrnuTwrZiu4Xw7emEePT0b977te_1h9AjJa-Ucj5hhIWThMYJEfwKjWgapgGhjF3_nWl0i-6c2xIS00hEI3SY4rfaqJ3aSN0GS6uh7aDEcysbOBi7w5WxOKtNXwZT57QbmqujjwZ3Bmem97htQLreAv7aaLfR7ffvpZnrZFFfCitQA7BqpO1wprvjPbqpZO3g4ZJjtJ7P1tlHsFi-f2bTRaAYZzwQMSlZwSTnFEiiwpRzwSHicVoVIaUFo5wlvKoAUogSSBVVwlcUJ0ImJArH6On87N6anx5cl29Nb1s_MWfekoi9hoF6OVPKGucsVPnear_qMackH8zmg9n8Ytbjz2fcf62UB_0_fQIVHXgK</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Kumar, Narendra</creator><creator>Goel, Vikas</creator><creator>Ranjan, Raju</creator><creator>Altuwairiqi, Majid</creator><creator>Alyami, Hashem</creator><creator>Asakipaam, Simon Atuah</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0003-3257-6461</orcidid></search><sort><creationdate>2023</creationdate><title>A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City</title><author>Kumar, Narendra ; Goel, Vikas ; Ranjan, Raju ; Altuwairiqi, Majid ; Alyami, Hashem ; Asakipaam, Simon Atuah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Assaults</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Cybercrime</topic><topic>Malware</topic><topic>Social networks</topic><topic>URLs</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kumar, Narendra</creatorcontrib><creatorcontrib>Goel, Vikas</creatorcontrib><creatorcontrib>Ranjan, Raju</creatorcontrib><creatorcontrib>Altuwairiqi, Majid</creatorcontrib><creatorcontrib>Alyami, Hashem</creatorcontrib><creatorcontrib>Asakipaam, Simon Atuah</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumar, Narendra</au><au>Goel, Vikas</au><au>Ranjan, Raju</au><au>Altuwairiqi, Majid</au><au>Alyami, Hashem</au><au>Asakipaam, Simon Atuah</au><au>Ramadan, Rabie</au><au>Rabie Ramadan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City</atitle><jtitle>Security and communication networks</jtitle><date>2023</date><risdate>2023</risdate><volume>2023</volume><spage>1</spage><epage>13</epage><pages>1-13</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive information about users. Phishing is still the first step of a multistage assault, despite the significant technological advancements that have been made to it in recent years. Phishing kits have evolved to become attack tools that are much simpler, more user-friendly, and more readily available as time has gone. Indicators of a successful phishing assault include using foreign characters in the URL, typosquatting of prominent domain names, reserved characters in redirections, and multichain phishing. When papers with these types of phishing URLs are uploaded to cloud storage, hackers get a helping push in the right direction. The use of cloud servers in the commission of these assaults is becoming more common. The currently available software to disallow list phishing URLs does not provide sufficient protection against multilevel phishing and instead places the onus of safety on the user to protect themselves. In addition, the immutability of blockchain data and the avalanche effect both demonstrate their effectiveness as crucial safety measures. In view of the recent advances in technology, we suggest an implementation of filtering that is based on blockchain technology to safeguard the cloud-based data of users. The Phish Block that has been presented is able to recognize homographic phishing URLs with an accuracy of 91 percent, thus ensuring the security of cloud storage.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2023/8168075</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-3257-6461</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2023, Vol.2023, p.1-13
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2807766144
source Publicly Available Content (ProQuest); Wiley Open Access
subjects Assaults
Blockchain
Cloud computing
Cybercrime
Malware
Social networks
URLs
title A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T09%3A49%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Blockchain-Oriented%20Framework%20for%20Cloud-Assisted%20System%20to%20Countermeasure%20Phishing%20for%20Establishing%20Secure%20Smart%20City&rft.jtitle=Security%20and%20communication%20networks&rft.au=Kumar,%20Narendra&rft.date=2023&rft.volume=2023&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2023/8168075&rft_dat=%3Cproquest_cross%3E2807766144%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2807766144&rft_id=info:pmid/&rfr_iscdi=true