DOI QR코드

DOI QR Code

A study for system design that guarantees the integrity of computer files based on blockchain and checksum

  • Kim, Minyoung (Research Institute of ICT Fusion and Convergence, Dong-Eui Univ.)
  • Received : 2021.11.30
  • Accepted : 2021.12.07
  • Published : 2021.12.31

Abstract

When a data file is shared through various methods on the Internet, the data file may be damaged in various cases. To prevent this, some websites provide the checksum value of the download target file in text data type. The checksum value provided in this way is then compared with the checksum value of the downloaded file and the published checksum value. If they are the same, the file is regarded as the same. However, the checksum value provided in text form is easily tampered with by an attacker. Because of this, if the correct checksum cannot be verified, the reliability and integrity of the data file cannot be ensured. In this paper, a checksum value is generated to ensure the integrity and reliability of a data file, and this value and related file information are stored in the blockchain. After that, we will introduce the research contents for designing and implementing a system that provides a function to share the checksum value stored in the block chain and compare it with other people's files.

Keywords

References

  1. D. Artz, "Digital steganography: hiding data within data," IEEE Internet Computing, Vol. 5, No. 3, pp. 75-80, May 2001. DOI: https://doi.org/10.1109/4236.935180
  2. Ubuntu 20.04.03 iso SHA256 Checksum, Ubuntu Official website, https://releases.ubuntu.com/20.04.3/S HA256SUMS
  3. The MD5 Message-Digest Algorithm, RFC (Request for Comments) Editor, https://www.rfc-editor.org/info/rfc1321
  4. Hash Functions, NIST, https://csrc.nist.gov/projects/hash-functions
  5. Hash result size, Hashnet Wiki, http://wiki.hash.kr/
  6. A. MEYLAN, M. CHERUBINI, B. CHAPUIS, M. HUMBERT, I. BILOGREVIC, K. HUGUENIN, "A Study on the Use of Checksums for Integrity Verification of Web Downloads," ACM Trans. Priv. Secur., Vol. 24, No. 1, pp. 1-36, Jan. 2021. DOI: https://doi.org/10.1145/3410154
  7. Hyperledger Fabric, Read the Docs, https://hyperledger-fabric.readthedocs.io/en/release-2.2/whatis.html
  8. M.Y. Kim, H.S. Lee, J.D. Kim, "A Blockchain Copyright Information Registration System for Content Protection of Online Sharing Platforms," Journal of the Korea Institute of Information and Communication Engineering, Vol.24, No. 12, pp.1718-1721, Dec 2020. DOI: https://doi.org/10.6109/jkii ce.2020.24.12.1718
  9. M.Y. Kim, "A Study on the Design of LoRaWAN-based Public Blockchain Cryptocurrency Payment System," The Journal of the Convergence on Culture Technology (JCCT), Vol. 7, No. 1, pp.608-614, Jan 2021. DOI: https://doi.org/10.17703/JCCT.2021.7.1.608
  10. S. Han, S. Kim, S. Pack, "A GDPR based Approach to Enhancing Blockchain Privacy," The Journal of The Institute of Internet, Broadcasting and Communication (JIIBC), Vol. 19, No. 5, pp.33-38, Oct. 2019. DOI: https://doi.org/10.7236/JIIBC.2019.19.5.33
  11. CryptoJS, https://code.google.com/archive/p/crypto-js/
  12. How to read a binary file with FileReader in order to hash it with SHA-256 in CryptoJS?, Stackoverflow, https://stackoverflow.com/questions/33914764/how-to-read-a-binary-file-with-filereader-in-order-to-ha sh-it-with-sha-256-in-cr
  13. Y. Lee, "Analysis on Trends of Artworks Blockchain Platform," The International Journal of Advanced Culture Technology (IJACT), Vol.7, No.3, pp.149-157, Aug 2019. DOI: https://doi.org/10.17703/IJACT.2 019.7.3.149
  14. K. C. Kim, "The Impact of Blockchain Technology on the Music Industry," International journal of advanced smart convergence (IJASC), Vol. 8, No. 1, pp.196-203, Mar 2019. DOI: https://doi.org/10.7236/IJASC.2019.8.1.196
  15. Y. Lee, "Modeling of Artworks Blockchain Platform Using Colored Petri Net," The International Journal of Advanced Culture Technology (IJACT), Vol. 8, No. 4, pp.242-248, Nov. 2020. DOI: http://dx.doi.org/10.17703/IJACT.2020.8.4.242