• Title/Summary/Keyword: Blockchain technology

Search Result 606, Processing Time 0.023 seconds

Topic Analysis Using Big Data Related to 'Blockchain usage': Focused on Newspaper Articles ('블록체인 활용' 관련 빅데이터를 활용한 토픽 분석: 신문기사를 중심으로)

  • Kim, Sungae;Jun, Soojin
    • Journal of Industrial Convergence
    • /
    • v.18 no.1
    • /
    • pp.73-78
    • /
    • 2020
  • To analyze the main topics related to the use of blockchain technology, the Topic Modeling Technique was applied to the 'Blockchain Technology Utilization' big data shown in newspaper articles. To this end, from 2013 to 2019, when newspaper articles on the use of blockchain technology first appeared, the topics were extracted from 21 newspapers and analyzed by time to 15,537 articles. As a result of the analysis, articles related to the utilization of blockchain technology have increased exponentially since 2015 and focused on IT_science and economics. Key words related to cryptocurrency, bitcoin and virtual currency were weighted high, although they differed depending on time. Blockchain technology, which had focused on financial transactions, gradually expanded to big data, Internet of Things and artificial intelligence. As a result, changes in corporate topics were also made together to expand into various fields at banks for financial transactions, focusing on large and global companies. The study showed how these topics were changing, along with the main topics in newspaper articles related to the use of blockchain technology.

An Evaluation of Determinants to User Acceptance of Blockchain Technology for the Implementation of Public Rental Housing Management System: Approached by the Unified Theory of Acceptance and Use of Technology (공공임대주택 관리시스템 구축을 위한 블록체인 기술 수용의도의 선행요인 평가: 통합기술수용모형을 기반으로)

  • Kim, YongHa;Kim, YoungJun
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.17-43
    • /
    • 2021
  • Currently, various discussions are underway to establish a more advanced management system for public rental housing. Also, it calls for improvement methods for problems arising in management of the current rental housing system. In this regard, this study aims to evaluate determinants that affect user acceptance intention of blockchain technology to implement a new system that complements drawbacks of the current public rental housing system. The study uses the Unified Theory of Acceptance and Use of Technology (UTAUT) as a theoretical model; the study model utilizes three UTAUT variables -performance expectancy, social influence, and Facilitating conditions-, applies security, availability, and reliability that are perceived from blockchain technology as external parameters to facilitate understanding of user acceptance intention of blockchain technology, and evaluates whether innovativeness can regulate the influence of performance expectancy, social influence, and Facilitating conditions on user acceptance intention of blockchain technology. Based on the significant survey result where 274 IT technicians participated, the study applies structural equation modeling to explore structure of user acceptance intention in the blockchain-based management system for public rental housing. As a result, security-reliability and availability are found to factors as determinants for user acceptance intention, affecting implementation of the public rental housing management system, while innovativeness shows no significant statistical results related to regulation effect. This study has implications in that it understands characteristics of blockchain and empirically analyzes the relationship between the characteristics and acceptance intention to enable blockchain's contribution to activate the public rental housing management system in the future.

Performance Analysis of Blockchain Consensus Protocols-A Review

  • Amina Yaqoob;Alma Shamas;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.181-192
    • /
    • 2023
  • Blockchain system brought innovation in the area of accounting, credit monitoring and trade secrets. Consensus algorithm that considered the central component of blockchain, significantly influences performance and security of blockchain system. In this paper we presented four consensus protocols specifically as Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS) and Practical Byzantine Fault-Tolerance (PBFT), we also reviewed different security threats that affect the performance of Consensus Protocols and precisely enlist their counter measures. Further we evaluated the performance of these Consensus Protocols in tabular form based on different parameters. At the end we discussed a comprehensive comparison of Consensus protocols in terms of Throughput, Latency and Scalability. We presume that our results can be beneficial to blockchain system and token economists, practitioners and researchers.

A Proposed Model for Supply Chain using Blockchain Framework

  • Zenab AlSadeq;Haya Alubaidan;Alanoud Aldweesh;Atta-ur-Rahman ;Tahir Iqbal
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.91-98
    • /
    • 2023
  • The rapid increase in the use of new technology known as 'blockchain technologies' has addressed many challenges in different areas and provided benefits to users, in this paper we discuss the field of supply chains, improve confidence and transparency between participants and stakeholders significantly also in this paper we Compare between different blockchain frameworks focusing on most popular frameworks. Moreover, we proposed a model in the supply chain using a blockchain framework, the proposed supply chain model included many different resources that help to exchange information over the network. The proposed model also includes smart contracts that maintain all rules for transactions. using blockchain technology information such as transaction details, time and money are recorded and stored within the system from the beginning of the transaction entry.

Privacy Information Protection Applying Digital Holography to Blockchain

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.6 no.5
    • /
    • pp.453-462
    • /
    • 2022
  • Blockchain technology provides a decentralized and peer-to-peer network, which has the advantages of transparency and immutability. In this paper, a novel secure authentication scheme applying digital holography to blockchain technology is proposed to protect privacy information in network nodes. The transactional information of the node is chained permanently and immutably in the blockchain to ensure network security. By designing a novel two-dimensional (2D) array data structure of the block, a proof of work (PoW) in the blockchain is executed through digital holography technology to verify true authentication and legal block linkage. A hash generated from the proposed algorithm reveals a random number of 2D array data. The real identity of each node in the network cannot be forged by a hacker's tampering because the privacy information of the node is encrypted using digital holography and stored in the blockchain. The reliability and feasibility of the proposed scheme are analyzed with the help of the research results, which evaluate the effectiveness of the proposed method. Forgery by a malicious node is impossible with the proposed method by rejecting a tampered transaction. The principal application is a secure anonymity system guaranteeing privacy information protection for handling of large information.

Research on Security Threats Emerging from Blockchain-based Services

  • Yoo, Soonduck
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

Prospect Analysis for Utilization of Virtual Assets using Blockchain Technology

  • Jeongkyu Hong
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.64-69
    • /
    • 2024
  • Blockchain is a decentralized network in which data blocks are linked. Through a decentralized peer-to-peer network, users can create shared databases, resulting in a trustworthy and aggregated database known as a blockchain that enhances reliability and security. The distributed nature of the blockchain enables data to be stored on multiple nodes, eliminating the need for a central server or platform. This disintermediation significantly reduces the transaction and administrative costs. The blockchain is particularly valuable in applications where reliability and stability are critical because it establishes an open database that ensures data integrity, making it virtually impossible to tamper with or falsify data. This study explores the diverse applications of the blockchain technology in virtual assets, such as cryptocurrency, decentralized finance, central bank digital currency, nonfungible tokens, and metaverses. In addition, it analyzes the potential prospects and developments driven by these innovative technologies.

A Study on Uncle Block Analysis of Blockchain Using Machine Learning Techniques (머신러닝 기법을 활용한 블록체인의 엉클블록 분석 연구)

  • Han-Min Kim
    • Information Systems Review
    • /
    • v.22 no.1
    • /
    • pp.1-16
    • /
    • 2020
  • Blockchain is emerging as a technology that can build trust between users participating in the system. As interest of Blockchain has increased, previous studies have mainly focused on cryptocurrency and application methods related to Blockchain technology. On the other hand, the studies on the stable implementation of Blockchain were rarely conducted. Typically, uncle block in the Blockchain plays an important role in the stable implementation of the Blockhain system, but no study was conducted on this. Drawing on this recognition, this study attempts to predict the uncle block of Blockchain using machine learning method, Blockchain information, and macro-economic factors. The results of artificial neural network and support vector machine analysis, Blockchain information and macro-economic factors contributed to the prediction of uncle block of Blockchain. In addition, artificial neural network using only Blockchain information provided the best performance for predicting the occurrence of uncle block. This study suggests ways to lead and contribute to Blockchain research in information systems filed.

A Study on Electronic Voting System Using Private Blockchain

  • Roh, Chang-Hyun;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.421-434
    • /
    • 2020
  • The development of digital technology has changed the lives of many people in terms of the velocity and convenience of completing tasks. This technology has also been applied to the process of voting, yet electronic voting is seldom used. The existing electronic voting scheme operates by applying various encryption algorithms. This type of electronic voting can be problematic since the administrator is given full authority. The administrator cannot always be trusted, and the contents of the ballot could be forged or tampered by a single point of failure. To resolve these problems, researchers continue to apply blockchain technology to electronic voting. Blockchain technology provides reliability and data integrity because all untrusted network participants have the same data. In this paper, we propose an electronic voting system that secures reliability by applying blockchain technology to electronic voting and ensures secret voting.

Healthcare Security based on Blockchain

  • Almalki, Taghreed;Alzahrani, Shahad;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.149-160
    • /
    • 2021
  • One of the most important inventions and developments in the digital world today is the healthcare system based on blockchain technology. Healthcare is an important field that requires the application of security mechanisms due to the sensitivity of patient data. The association of blockchain with healthcare contributed to achieving better security mechanisms than the traditional approach. The new approach operates in a decentralized system, which in turn, improves security in the healthcare environment. Consequently, blockchain technology has emerged as one of the most crucial solutions to security violations and challenges in the healthcare industry. This paper provides a comprehensive review of several experts' recent protection and detection approaches in this domain. It is also imperative to note that the paper focuses only on the recent techniques that have been published during 2017-2020. The sophisticated procedures have been investigated and discussed in terms of similarities and differences to highlight the significance of the protection needed to secure the healthcare environment.