Loading…
A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City
The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive in...
Saved in:
Published in: | Security and communication networks 2023, Vol.2023, p.1-13 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043 |
---|---|
cites | cdi_FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043 |
container_end_page | 13 |
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2023 |
creator | Kumar, Narendra Goel, Vikas Ranjan, Raju Altuwairiqi, Majid Alyami, Hashem Asakipaam, Simon Atuah |
description | The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive information about users. Phishing is still the first step of a multistage assault, despite the significant technological advancements that have been made to it in recent years. Phishing kits have evolved to become attack tools that are much simpler, more user-friendly, and more readily available as time has gone. Indicators of a successful phishing assault include using foreign characters in the URL, typosquatting of prominent domain names, reserved characters in redirections, and multichain phishing. When papers with these types of phishing URLs are uploaded to cloud storage, hackers get a helping push in the right direction. The use of cloud servers in the commission of these assaults is becoming more common. The currently available software to disallow list phishing URLs does not provide sufficient protection against multilevel phishing and instead places the onus of safety on the user to protect themselves. In addition, the immutability of blockchain data and the avalanche effect both demonstrate their effectiveness as crucial safety measures. In view of the recent advances in technology, we suggest an implementation of filtering that is based on blockchain technology to safeguard the cloud-based data of users. The Phish Block that has been presented is able to recognize homographic phishing URLs with an accuracy of 91 percent, thus ensuring the security of cloud storage. |
doi_str_mv | 10.1155/2023/8168075 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2807766144</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2807766144</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043</originalsourceid><addsrcrecordid>eNp9kEFPwjAUxxujiYje_ABNPOqk7dZ1O-ICakKCCdyXrnuTwrZiu4Xw7emEePT0b977te_1h9AjJa-Ucj5hhIWThMYJEfwKjWgapgGhjF3_nWl0i-6c2xIS00hEI3SY4rfaqJ3aSN0GS6uh7aDEcysbOBi7w5WxOKtNXwZT57QbmqujjwZ3Bmem97htQLreAv7aaLfR7ffvpZnrZFFfCitQA7BqpO1wprvjPbqpZO3g4ZJjtJ7P1tlHsFi-f2bTRaAYZzwQMSlZwSTnFEiiwpRzwSHicVoVIaUFo5wlvKoAUogSSBVVwlcUJ0ImJArH6On87N6anx5cl29Nb1s_MWfekoi9hoF6OVPKGucsVPnear_qMackH8zmg9n8Ytbjz2fcf62UB_0_fQIVHXgK</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2807766144</pqid></control><display><type>article</type><title>A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City</title><source>Publicly Available Content (ProQuest)</source><source>Wiley Open Access</source><creator>Kumar, Narendra ; Goel, Vikas ; Ranjan, Raju ; Altuwairiqi, Majid ; Alyami, Hashem ; Asakipaam, Simon Atuah</creator><contributor>Ramadan, Rabie ; Rabie Ramadan</contributor><creatorcontrib>Kumar, Narendra ; Goel, Vikas ; Ranjan, Raju ; Altuwairiqi, Majid ; Alyami, Hashem ; Asakipaam, Simon Atuah ; Ramadan, Rabie ; Rabie Ramadan</creatorcontrib><description>The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive information about users. Phishing is still the first step of a multistage assault, despite the significant technological advancements that have been made to it in recent years. Phishing kits have evolved to become attack tools that are much simpler, more user-friendly, and more readily available as time has gone. Indicators of a successful phishing assault include using foreign characters in the URL, typosquatting of prominent domain names, reserved characters in redirections, and multichain phishing. When papers with these types of phishing URLs are uploaded to cloud storage, hackers get a helping push in the right direction. The use of cloud servers in the commission of these assaults is becoming more common. The currently available software to disallow list phishing URLs does not provide sufficient protection against multilevel phishing and instead places the onus of safety on the user to protect themselves. In addition, the immutability of blockchain data and the avalanche effect both demonstrate their effectiveness as crucial safety measures. In view of the recent advances in technology, we suggest an implementation of filtering that is based on blockchain technology to safeguard the cloud-based data of users. The Phish Block that has been presented is able to recognize homographic phishing URLs with an accuracy of 91 percent, thus ensuring the security of cloud storage.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2023/8168075</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Assaults ; Blockchain ; Cloud computing ; Cybercrime ; Malware ; Social networks ; URLs</subject><ispartof>Security and communication networks, 2023, Vol.2023, p.1-13</ispartof><rights>Copyright © 2023 Narendra Kumar et al.</rights><rights>Copyright © 2023 Narendra Kumar et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043</citedby><cites>FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043</cites><orcidid>0000-0003-3257-6461</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2807766144?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,777,781,4010,25734,27904,27905,27906,36993,44571</link.rule.ids></links><search><contributor>Ramadan, Rabie</contributor><contributor>Rabie Ramadan</contributor><creatorcontrib>Kumar, Narendra</creatorcontrib><creatorcontrib>Goel, Vikas</creatorcontrib><creatorcontrib>Ranjan, Raju</creatorcontrib><creatorcontrib>Altuwairiqi, Majid</creatorcontrib><creatorcontrib>Alyami, Hashem</creatorcontrib><creatorcontrib>Asakipaam, Simon Atuah</creatorcontrib><title>A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City</title><title>Security and communication networks</title><description>The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive information about users. Phishing is still the first step of a multistage assault, despite the significant technological advancements that have been made to it in recent years. Phishing kits have evolved to become attack tools that are much simpler, more user-friendly, and more readily available as time has gone. Indicators of a successful phishing assault include using foreign characters in the URL, typosquatting of prominent domain names, reserved characters in redirections, and multichain phishing. When papers with these types of phishing URLs are uploaded to cloud storage, hackers get a helping push in the right direction. The use of cloud servers in the commission of these assaults is becoming more common. The currently available software to disallow list phishing URLs does not provide sufficient protection against multilevel phishing and instead places the onus of safety on the user to protect themselves. In addition, the immutability of blockchain data and the avalanche effect both demonstrate their effectiveness as crucial safety measures. In view of the recent advances in technology, we suggest an implementation of filtering that is based on blockchain technology to safeguard the cloud-based data of users. The Phish Block that has been presented is able to recognize homographic phishing URLs with an accuracy of 91 percent, thus ensuring the security of cloud storage.</description><subject>Assaults</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Cybercrime</subject><subject>Malware</subject><subject>Social networks</subject><subject>URLs</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp9kEFPwjAUxxujiYje_ABNPOqk7dZ1O-ICakKCCdyXrnuTwrZiu4Xw7emEePT0b977te_1h9AjJa-Ucj5hhIWThMYJEfwKjWgapgGhjF3_nWl0i-6c2xIS00hEI3SY4rfaqJ3aSN0GS6uh7aDEcysbOBi7w5WxOKtNXwZT57QbmqujjwZ3Bmem97htQLreAv7aaLfR7ffvpZnrZFFfCitQA7BqpO1wprvjPbqpZO3g4ZJjtJ7P1tlHsFi-f2bTRaAYZzwQMSlZwSTnFEiiwpRzwSHicVoVIaUFo5wlvKoAUogSSBVVwlcUJ0ImJArH6On87N6anx5cl29Nb1s_MWfekoi9hoF6OVPKGucsVPnear_qMackH8zmg9n8Ytbjz2fcf62UB_0_fQIVHXgK</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Kumar, Narendra</creator><creator>Goel, Vikas</creator><creator>Ranjan, Raju</creator><creator>Altuwairiqi, Majid</creator><creator>Alyami, Hashem</creator><creator>Asakipaam, Simon Atuah</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0003-3257-6461</orcidid></search><sort><creationdate>2023</creationdate><title>A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City</title><author>Kumar, Narendra ; Goel, Vikas ; Ranjan, Raju ; Altuwairiqi, Majid ; Alyami, Hashem ; Asakipaam, Simon Atuah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Assaults</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Cybercrime</topic><topic>Malware</topic><topic>Social networks</topic><topic>URLs</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kumar, Narendra</creatorcontrib><creatorcontrib>Goel, Vikas</creatorcontrib><creatorcontrib>Ranjan, Raju</creatorcontrib><creatorcontrib>Altuwairiqi, Majid</creatorcontrib><creatorcontrib>Alyami, Hashem</creatorcontrib><creatorcontrib>Asakipaam, Simon Atuah</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumar, Narendra</au><au>Goel, Vikas</au><au>Ranjan, Raju</au><au>Altuwairiqi, Majid</au><au>Alyami, Hashem</au><au>Asakipaam, Simon Atuah</au><au>Ramadan, Rabie</au><au>Rabie Ramadan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City</atitle><jtitle>Security and communication networks</jtitle><date>2023</date><risdate>2023</risdate><volume>2023</volume><spage>1</spage><epage>13</epage><pages>1-13</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive information about users. Phishing is still the first step of a multistage assault, despite the significant technological advancements that have been made to it in recent years. Phishing kits have evolved to become attack tools that are much simpler, more user-friendly, and more readily available as time has gone. Indicators of a successful phishing assault include using foreign characters in the URL, typosquatting of prominent domain names, reserved characters in redirections, and multichain phishing. When papers with these types of phishing URLs are uploaded to cloud storage, hackers get a helping push in the right direction. The use of cloud servers in the commission of these assaults is becoming more common. The currently available software to disallow list phishing URLs does not provide sufficient protection against multilevel phishing and instead places the onus of safety on the user to protect themselves. In addition, the immutability of blockchain data and the avalanche effect both demonstrate their effectiveness as crucial safety measures. In view of the recent advances in technology, we suggest an implementation of filtering that is based on blockchain technology to safeguard the cloud-based data of users. The Phish Block that has been presented is able to recognize homographic phishing URLs with an accuracy of 91 percent, thus ensuring the security of cloud storage.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2023/8168075</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-3257-6461</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2023, Vol.2023, p.1-13 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2807766144 |
source | Publicly Available Content (ProQuest); Wiley Open Access |
subjects | Assaults Blockchain Cloud computing Cybercrime Malware Social networks URLs |
title | A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T09%3A49%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Blockchain-Oriented%20Framework%20for%20Cloud-Assisted%20System%20to%20Countermeasure%20Phishing%20for%20Establishing%20Secure%20Smart%20City&rft.jtitle=Security%20and%20communication%20networks&rft.au=Kumar,%20Narendra&rft.date=2023&rft.volume=2023&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2023/8168075&rft_dat=%3Cproquest_cross%3E2807766144%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2525-760d2b2a551e08c395575e4569fb311b215285ffee9e48e9c1c7528c507a8043%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2807766144&rft_id=info:pmid/&rfr_iscdi=true |