Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0167

Implementation of Search Engine to Minimize Traffic Using Blockchain-Based Web Usage History Management System  

Yu, Sunghyun (Dept. of Computer Science Engineering, Chungnam National University)
Yeom, Cheolmin (Dept. of Computer Science Engineering, Chungnam National University)
Won, Yoojae (Dept. of Computer Science Engineering, Chungnam National University)
Publication Information
Journal of Information Processing Systems / v.17, no.5, 2021 , pp. 989-1003 More about this Journal
Abstract
With the recent increase in the types of services provided by Internet companies, collection of various types of data has become a necessity. Data collectors corresponding to web services profit by collecting users' data indiscriminately and providing it to the associated services. However, the data provider remains unaware of the manner in which the data are collected and used. Furthermore, the data collector of a web service consumes web resources by generating a large amount of web traffic. This traffic can damage servers by causing service outages. In this study, we propose a website search engine that employs a system that controls user information using blockchains and builds its database based on the recorded information. The system is divided into three parts: a collection section that uses proxy, a management section that uses blockchains, and a search engine that uses a built-in database. This structure allows data sovereigns to manage their data more transparently. Search engines that use blockchains do not use internet bots, and instead use the data generated by user behavior. This avoids generation of traffic from internet bots and can, thereby, contribute to creating a better web ecosystem.
Keywords
Blockchain; Data Sovereignty; EOS; My Data; Proxy Server; Search Engine; Self-Sovereign Model; Smart Contract;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 M. S. Divya and S. K. Goyal, "ElasticSearch: an advanced and quick search technique to handle voluminous data," Compusoft, vol. 2, no. 6, pp. 171-175, 2013.
2 M. T. Gonzalez-Aparicio, A. Ogunyadeka, M. Younas, J. Tuya, and R. Casado, "Transaction processing in consistency-aware user's applications deployed on NoSQL databases," Human-centric Computing and Information Sciences, vol. 7, article no. 7, 2017. https://doi.org/10.1186/s13673-017-0088-3   DOI
3 P. Gupta, S. K. Singh, D. Yadav, and A. K. Sharma, "An improved approach to ranking web documents," Journal of Information Processing Systems, vol. 9, no. 2, pp. 217-236, 2013.   DOI
4 Z. N. Peterson, M. Gondree, and R. Beverly, "A position paper on data sovereignty: the importance of geolocating data in the cloud," in Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), Portland, OR, 2011.
5 EOSIO Developer Portal [Online]. Available: https://developers.eos.io.
6 M. Zineddine, "Search engines crawling process optimization: a webserver approach," Internet Research, vol. 26, no. 1, pp. 311-331, 2016.   DOI
7 R. Khan, S. U. Khan, R. Zaheer, and S. Khan, "Future internet: The internet of things architecture, possible applications and key challenges," in Proceedings of 2012 10th International Conference on Frontiers of Information Technology, Islamabad, Pakistan, 2012, pp. 257-260.
8 H. W. Kim and Y. S. Jeong, "Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain," Human-centric Computing and Information Sciences, vol. 8, article no. 11, 2018. https://doi.org/10.1186/s13673-018-0136-7   DOI
9 Sematext Blog, Elastic Search: Distributed, Lucene-based Search Engine, May 2010. https://sematext.com/blog/solr-vs-elasticsearch-differences/
10 F. Idelberger, G. Governatori, R. Riveret, and G. Sartor, "Evaluation of logic-based smart contracts for blockchain systems," in Rules and Rule Markup Languages for the Semantic Web. Cham, Switzerland: Springer, 2016, pp. 167-183.
11 Distil Networks, "The 2018 Bad Bot Report," https://resources.distilnetworks.com/white-paper-reports/2018-bad-bot-report.
12 K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the Internet of Things," IEEE Access, vol. 4, pp. 2292-2303, 2016.   DOI
13 Y. Li, P. Han, C. Liu, and B. Fang, "Automatically crawling dynamic web applications via proxy-based JavaScript injection and runtime analysis," in Proceedings of 2018 IEEE 3rd International Conference on Data Science in Cyberspace (DSC), Guangzhou, China, 2018, pp. 242-249.
14 A. Rangaswamy, C. L. Giles, and S. Seres, "A strategic perspective on search engines: thought candies for practitioners and researchers," Journal of Interactive Marketing, vol. 23, no. 1, pp. 49-60, 2009.   DOI
15 T. Bouma, "Self-Sovereign Identity, Shifting the Locus of Control," 2019 [Online]. Available: https://trbouma.medium.com/self-sovereign-identity-shifting-the-locus-of-control-10da1c8757ad.
16 P. Owezarski, "On the impact of DoS attacks on Internet traffic characteristics and QoS," in Proceedings of the 14th International Conference on Computer Communications and Networks, San Diego, CA, 2005, pp. 269-274.
17 A. Tobin and D. Reed, "The inevitable rise of self-sovereign identity," The Sovrin Foundation, Provo, UT, 2017.
18 S. Nakamoto, "Bitcoin: a peer-to-peer electronic cash system," 2008 [Online]. Available: https://bitcoin.org/en/bitcoin-paper.
19 G. T. Nguyen and K. Kim, "A survey about consensus algorithms used in blockchain," Journal of Information Processing Systems, vol. 14, no. 1, pp. 101-128, 2018.   DOI
20 N. Szabo, "The idea of smart contracts," 1997 [Online]. Available: https://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/idea.html.