Cilt:61 Sayı:01 (2019)
Permanent URI for this collection
Browse
Browsing Cilt:61 Sayı:01 (2019) by Author "Osmanoğlu, Murat"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Desıgning a Secure Blockchain-Based Trading Platform for Internet of Things(Ankara Üniversitesi Fen Fakültesi, 2019-06-30) Osmanoğlu, Murat; Elbuz, Aydın; Tanrıöver, Ömer Özgür; Bilgisayar Mühendisliği; Mühendislik FakültesiBlockchain, a distributed database technology attracts intensive attention recently. It was first described in 1991 by Stuart Haber and W. Scott Stornetta, in order to prevent tampering for document timestamps. After that, Satoshi Nakamoto conceptualized this technology with his work, a peer-to-peer electronic cash system named as Bitcoin. Due to its authenticity, user anonymity and data immutability; this technology has also been applied to different areas ranging from finance, supply-chain managements to social services. In this paper, we propose a blockchain based application for trading data, collected from IoT devices. Our application enables the sellers to commercialize their data in exchange of the currency produced by the application. The application also utilizes smart contracts to establish trust between both sides of the exchange. Furthermore, we discuss the security and reliability of the system componentsItem Prıvacy-Preservıng K-Nearest Neıghbour Interpolatıon Method ın an Outsourced Envıronment(Ankara Üniversitesi Mühendislik Fakültesi, 2019-06-30) KALIDEEN, Muhammad Rifthy; Osmanoğlu, Murat; Tuğrul, Bülent; Bilgisayar Mühendisliği; Mühendislik FakültesiOne of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud promises significant benefits, it possesses substantial security and privacy concerns, especially when data stored in the cloud is sensitive and confidential, like a business plan. Encrypting the data before outsourcing can ensure privacy. However, it will be very difficult to process the cipher text created by the traditional encryption method. Considering this fact, we propose an efficient protocol that allows a query owner to retrieve the interpolation of the top k records from two different databases that are closest to a query point. Note that the databases are stored in two different cloud service providers in encrypted form. We also show that the proposed protocol ensures the privacy and the security of the data and the query point.