• 제목/요약/키워드: BlockChain

검색결과 413건 처리시간 0.022초

블록체인 기반 시스템의 구조적 분석과 취약점 도출 (Structural Analysis and Derivation of Vulnerability for BlockChain based System)

  • 김장환
    • 한국소프트웨어감정평가학회 논문지
    • /
    • 제15권1호
    • /
    • pp.115-121
    • /
    • 2019
  • 지속적으로 확산되어져 가고 있는 블록체인 시스템과 블록체인 기반의 서비스 시스템의 구조를 분석하였다. 거래 쌍방 간의 신뢰 확보를 위한 제 3 자를 필요로 하지 않는, 분산화된 장부 암호화 시스템 소프트웨어 기술이다. 블록체인은 자료 구조적으로는 링크드 리스트 구조로 되어 있다. 블록체인은 거래 정보를 블록화 하여 다른 블록들과 연결해서 거래 정보를 관리한다. 해시 함수를 사용하여 블록화와 연결을 하게 된다. 결과적으로, 현재의 블록체인 시스템과 블록체인 기반의 서비스 시스템의 구조적 취약성을 발견하였다. 본 논문에서 제시한 블록체인 시스템과 블록체인 기반의 서비스 시스템의 구조적인 문제점 등이 해결되어지게 되면, 다양한 산업적 기여가 예상된다.

이더리움 기반 이메일 시스템 모델 (E-mail System Model based on Ethereum)

  • 김태경
    • 디지털산업정보학회논문지
    • /
    • 제13권4호
    • /
    • pp.99-106
    • /
    • 2017
  • With the advent of virtual money such as bit coins, interest in the block chain is increasing. Block Chain is a technology that supports Distributed Ledger and is a versatile technology applicable to various fields. Currently, the block chain is conducting research for various applications such as virtual money, trade finance, marketplace, power market, image contents service, and IoT. The technologies that make up the block chain are smart contract, digital signature/hash function and consensus algorithm. And these technologies operate on P2P networks. In this paper, we have studied e-mail system based on the ethereum which is one of the block chain based technologies. Most legacy mail systems use SMTP and the POP3/IMAP protocol to send and receive e-mail, and e-mail use S/MIME to protect the e-mail. However, S/MIME is vulnerable to DDoS attacks because it is configured centrally. And it also does not provide non-repudiation of mail reception. To overcome these weaknesses, we proposed an e-mail system model based on ethereum. The proposed model is able to cope with DDoS attack and forgery prevention by using block chain based technology, and reliable recording and management among block chain participants are provided, so that it is possible to provide a non-repudiation function of e-mail transmission and reception.

국제 무역거래에서 블록체인의 활용 가능성에 관한 연구 (A Study on Possibility of International Trade by using of Block Chain)

  • 김재성;임성철
    • 무역상무연구
    • /
    • 제75권
    • /
    • pp.137-158
    • /
    • 2017
  • Traditional banking systems of transactions are being replaced by FfinTech. Block Chain System can be a key point in Fourth Industrial Revolution such as AI, Big Data, IOT and also can be used as a tools of smart contract or smart payment systems in International Trade. If banking regulation is to be liberalized FinTech would be more activated in Korea and various attempts would be available especially smart payment in business. There are so many levels to be achieved from the time of contract to the time of clearance. We cannot expect speed and range of IT advancement and international trade, Block Chain system will challenge the traditional banking process. First, Block Chain Payment system can be used in P2P, B2B transaction and also T/T in small business. Second, Bit Coin transaction can be available within the parties without the Trusted Third Party. Third, By using of Block Chain system Traditional International Trade process can be altered.

  • PDF

블록체인을 적용한 사설 클라우드 기반 침입시도탐지 (A Probe Detection based on Private Cloud using BlockChain)

  • 이세열
    • 디지털산업정보학회논문지
    • /
    • 제14권2호
    • /
    • pp.11-17
    • /
    • 2018
  • IDS/IPS and networked computer systems are playing an increasingly important role in our society. They have been the targets of a malicious attacks that actually turn into intrusions. That is why computer security has become an important concern for network administrators. Recently, various Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems is useful for existing intrusion patterns on standard-only systems. Therefore, probe detection of private clouds using BlockChain has become a major security protection technology to detection potential attacks. In addition, BlockChain and Probe detection need to take into account the relationship between the various factors. We should develop a new probe detection technology that uses BlockChain to fine new pattern detection probes in cloud service security in the end. In this paper, we propose a probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) based on service security using BlockChain technology.

블록체인을 이용한 부동산종합공부시스템 참조모델 (A Reference Model for Korea Real Estate Administration Intelligence System Using Block Chain)

  • 선종철;김진욱
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제7권11호
    • /
    • pp.281-288
    • /
    • 2018
  • 동일한 데이터를 여러 곳에 보관하는 분산원장을 특징으로 갖는 블록체인은 보안성과 안정성을 비롯한 여러 가지 기술적 특징을 가지며, 이로 인해 블록체인의 활용처에 관한 연구가 다양하게 이루어지고 있다. 본 논문에서는 공적장부의 하나인 부동산종합공부시스템에 블록체인을 적용하기 위해 고려할 사항들을 도출하고, 이를 바탕으로 블록체인 시스템 구성 방안과 합의 알고리즘을 포함하는 블록체인 참조 모델을 제시한다.

A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

  • Min, Youn-A
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.65-71
    • /
    • 2019
  • IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.

블록체인 기반 결제시스템에 대한 관광 소비자 수용의도 (Consumer Acceptance Intention on Block Chain Consensus Mechanismbased Payment System)

  • 곽재현
    • 경영정보학연구
    • /
    • 제21권3호
    • /
    • pp.27-47
    • /
    • 2019
  • 본 연구의 목적은 방한 외국인을 위한 블록체인 기반 결제시스템에 대한 소비자 수용의도를 규명하여 거래 편의성을 높이는 결제플랫폼 개발의 방향성을 제시하는 것이다. 이를 위해 블록체인의 특성으로 보안성, 신뢰성, 기능성을 도출 했다. 도출된 특성을 토대로 제안된 모델의 구조적 검증을 통해 소비자들의 측면에서 블록체인 기술수용에 영향을 미치는 요인을 확인하였다. 통합기술수용이론을 적용하여 성과기대, 노력기대, 사회적 영향, 촉진 조건, 인지된 혜택과 수용의도 간의 인과관계, 개인의 혁신성과 블록체인 인지수준에 따른 조절효과를 검증하였다. 개인의 혁신성과 블록체인 기술 인지수준에 따른 수용의도 차이에서도 혁신성향이 강하고 전반적인 기술에 대한 인지상태가 높은 집단이 블록체인 시스템을 기반으로 제시된 블록체인 수용의도에 더 많은 인과관계를 보여주었다. 또한, 블록체인 수용의도에 직접적인 영향을 미치는 요인은 기대되는 편익(성과기대), 이 서비스를 사용하기 위해 필요한 기술적 기반구조(촉진조건), 소비자 입장에서의 인지된 혜택(보안 및 신뢰, 기능성) 등 4가지 기제이다. 새로운 기술의 용이성(노력기대)과 기술을 도입할 때 주변 환경의 영향(사회적 영향)은 수용의도에 유의미한 영향을 미치지 못했다.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권6호
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

M2M 환경의 혼잡 네트워크 개선을 위한 블록체인 경량화에 대한 연구 (A Study on the Lightening of the Block Chain for Improving Congestion Network in M2M Environment)

  • 김상근
    • 디지털산업정보학회논문지
    • /
    • 제14권3호
    • /
    • pp.69-75
    • /
    • 2018
  • Recently, various convergence technologies are attracting attention due to the block chain innovation technology in the M2M environment. Although the block-chain-based technology is known to be secure in its own right, there are various problems such as security and weight reduction in various M2M environments connected with this. In this paper, we propose a new lightweight method for the hash tree generation of block chains to solve the lightweight problem. It is designed considering extensibility without affecting the existing block chain. Performance analysis shows that the computation performance increases with decreasing the existing hash length.

블록체인 기술 및 보안 위협 분석 (Analysis of Technology and Security Threats on Blockchain)

  • 전은아;이철희
    • 디지털산업정보학회논문지
    • /
    • 제14권4호
    • /
    • pp.47-56
    • /
    • 2018
  • We analyzed security threats and suggested countermeasures about the block chain technologies which has emerged as a core technology of the fourth industrial revolution. We know that increasing the security leads to slow down program processing rate in the block chain systems. The block chain system which is currently an early stage of technological development, to become an economic and social infrastructure, development of technology and active policy implementation will be necessary. We studied on the security threats and countermeasures of the Bit Coin based on block chain. Further research should be undertaken on the possibility that future studies could have a real adverse effect on the integrity of the data.