• Title/Summary/Keyword: block chain

Search Result 418, Processing Time 0.022 seconds

The Blockchain-Based Decentralized Approaches for Cloud Computing to Offer Enhanced Quality of Service in terms of Privacy Preservation and Security: A Review.

  • Arun Kumar, B.R.;Komala, R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.115-122
    • /
    • 2021
  • In the recent past enormous enterprise applications have migrated into the cloud computing (CC). The researchers have contributed to this ever growing technology and as a result several innovations strengthened to offer the quality of service (QoS) as per the demand of the customer. It was treated that management of resources as the major challenge to offer the QoS while focusing on the trade-offs among the performance, availability, reliability and the cost. Apart from these regular key focuses to meet the QoS other key issues in CC are data integrity, privacy, transparency, security and legal aspects (DIPTSL). This paper aims to carry out the literature survey by reflecting on the prior art of the work with regard to QoS in CC and possible implementation of block chain to implement decentralised CC solutions governing DIPTSL as an integral part of QoS.

A Study on Digital Content Copyright Management and Verification Platform using Blockchain (블록체인을 활용한 디지털 콘텐츠 저작권 관리 및 검증 플랫폼 연구)

  • Sim, Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.1
    • /
    • pp.193-200
    • /
    • 2022
  • In this study, the intellectual property rights of digital contents (creations) are protected by using block chain technology that cannot be damaged or forged. So, we build a blockchain-based content sales revenue tracking system and platform that activates the transaction and distribution of digital content (creation). We developed an API server that can be used for content registration and revision history management smart contract, license management smart contract according to content purchase, content inquiry function through files and hashes, and web and APP services. Through this, it is possible to prove the relationship between the rights of the creators of digital content creations and protect the rights of the creators.

Study of Application of Block Chain for Vehicle-To-Grid System (Vehicle-To-Grid 시스템에서 블록체인 활용에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.759-764
    • /
    • 2021
  • Because sensitive and private information should be exchanged between electric vehicles and a V2G service provider, reliable communication channel is essential to operate Vehicle-to-Grid (V2G) system which considers battery of electric vehicles as a factor of smart grid. The block chain is a platform for cryptocurrency transaction and fully distributed database system running by only equivalent node in the network without help of any central management or 3rd party. In this paper, the structure and operation method of the blockchain are investigated, and the application of the blockchain for the V2G system was also explained and analyzed.

Reliable blockchain-based ring signature protocol for online financial transactions

  • Jinqi Su;Lin He;Runtao Ren;Qilei Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2083-2100
    • /
    • 2023
  • The rise of Industry 5.0 has led to a smarter and more digital way of doing business, but with it comes the issue of user privacy and security. Only when privacy and security issues are addressed, will users be able to transact online with greater peace of mind. Thus, to address the security and privacy problems associated with industry blockchain technology, we propose a privacy protection scheme for online financial transactions based on verifiable ring signatures and blockchain by comparing and combining the unconditional anonymity provided by ring signatures with the high integrity provided by blockchain technology. Firstly, we present an algorithm for verifying ring signature based on distributed key generation, which can ensure the integrity of transaction data. Secondly, by using the block chain technique, we choose the proxy node to send the plaintext message into the block chain, and guarantee the security of the asset transaction. On this basis, the designed scheme is subjected to a security analysis to verify that it is completely anonymous, verifiable and unerasable. The protection of user privacy can be achieved while enabling online transactions. Finally, it is shown that the proposed method is more effective and practical than other similar solutions in performance assessment and simulation. It is proved that the scheme is a safe and efficient online financial transaction ring signature scheme.

A Design of Hadoop Security Protocol using One Time Key based on Hash-chain (해시 체인 기반 일회용 키를 이용한 하둡 보안 프로토콜 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.4
    • /
    • pp.340-349
    • /
    • 2017
  • This paper is proposed Hadoop security protocol to protect a reply attack and impersonation attack. The proposed hadoop security protocol is consists of user authentication module, public key based data node authentication module, name node authentication module, and data node authentication module. The user authentication module is issued the temporary access ID from TGS after verifing user's identification on Authentication Server. The public key based data node authentication module generates secret key between name node and data node, and generates OTKL(One-Time Key List) using Hash-chain. The name node authentication module verifies user's identification using user's temporary access ID, and issues DT(Delegation Token) and BAT(Block Access Token) to user. The data node authentication module sends the encrypted data block to user after verifing user's identification using OwerID of BAT. Therefore the proposed hadoop security protocol dose not only prepare the exposure of data node's secret key by using OTKL, timestamp, owerID but also detect the reply attack and impersonation attack. Also, it enhances the data access of data node, and enforces data security by sending the encrypted data.

Hardware implementation of a pulse-type neuron chain with a synapse function for hodgkin-huxley model (호지킨-헉슬리 모델을 위한 시냅스 기능을 지닌 신경세포 체인의 하드웨어 구현)

  • Jung, Jin-Woo;Kwon, Bo-Min;Park, Ju-Hong;Kim, Jin-Su;Lee, Je-Won;Park, Yong-Su;Song, Han-Jung
    • Journal of Sensor Science and Technology
    • /
    • v.18 no.2
    • /
    • pp.128-134
    • /
    • 2009
  • Integrated circuit of a new neuron chain with a synapse function for Hodgkin-Huxley model which is a good electrical model about a real biological neuron is implemented in a $0.5{\mu}m$ 1 poly 2 metal CMOS technology. Pulse type neuron chain consist of series connected current controlled single neurons through synapses. For the realization of the single neuron, a pair of voltage mode oscillators using operational transconductance amplifiers and capacitors is used. The synapse block which is a connection element between neurons consist of a voltage-current conversion circuit using current mirror. SPICE simulation results of the proposed circuit show 160 mV amplitude pulse output and propagation of the signal through synapses. Measurements of the fabricated pulse type neuron chip in condition of ${\pm}2.5\;V$ power supply are shown and compared with the simulated results.

Highly Tunable Block Copolymer Self-assembly for Nanopatterning

  • Jeong, Yeon-Sik;Jeong, Jae-Won
    • Proceedings of the Materials Research Society of Korea Conference
    • /
    • 2011.05a
    • /
    • pp.6.1-6.1
    • /
    • 2011
  • Nanoscale block copolymer (BCP) patterns have been pursued for applications in sub-30 nm nanolithography. BCP self-assembly processing is scalable and low cost, and is well-suited for integration with existing semiconductor fabrication techniques. However, one of the major technical challenges for BCP self-assembly is limited tunability in pattern geometry, dimension, and functionality. We suggest methods for extending the degree of tunability by choosing highly incompatible polymer blocks and utilizing solvent vapor treatment techniques. Siloxane BCPs have been developed as self-assembling resists due to many advantages such as high etch-selectivity, good etch-resistance, long-range ordering, and reduced line-edge roughness. The large incompatibility leads to extensive degree of pattern tunability since the effective volume fraction can be easily manipulated by solvent-based treatment techniques. Thus, control of the microdomain size, periodicity, and morphology is possible by changing the vapor pressure and the mixing ratio of selective solvents. This allows a range of different pattern geometry such as dots, lines and holes and critical dimension simply by changing the processing conditions of a given block copolymer without changing a polymer chain length. We demonstrate highly extensive tunability (critical dimension ~6~30 nm) of self-assembled patterns prepared by a siloxane BCP with extreme incompatibility.

  • PDF

Synthesis and Characterization of Polyurethanes Based on Macromers (Macromer를 기초로 한 폴리우레탄의 합성 및 특성)

  • Chun, Y.C.;Kim, K.S.;Shin, J.S.;Kang, S.H.
    • Elastomers and Composites
    • /
    • v.27 no.3
    • /
    • pp.161-173
    • /
    • 1992
  • A series of polyurethane block copolymers based on hydroxyterminated poly(dimethyl siloxane), poly(propylene glycol) and poly(tetramethylene glycol) soft segments of molecular weights 1,809, 2,000 and 2,000, respectively, were synthesized. The hard segments consisted of 4,4'-diphenylmethane diisocyanate and 1,4-butanediol as the chain extender. Samples with different molar ratios were prepared. We tried to synthesize poly(dimethyl siloxane)-based polyurethane(PDMS-PU) containing a hard block as major fraction and a soft block as minor fraction for preparing toughened rigid systems. After a study of the pure PDMS-PU, poly(propylene glycol)-based polyurethane(PPG-PU) and poly(tetramethylene glycol)-based polyurethane(PTMG-PU), (mixed polyol)-based block copolymers and blends between PDMS-PU, PPG-PU and PTMG-PU were prepared, and characterized by means of differential scanning calorimetry, tensile testing and scanning electron microscopy. In (mixed polyol)-based PU and in lower hard segment content blends, macro-phase separation was shown, but blends with higher hard segment contents showed significant reduction in amounts of phase separation.

  • PDF

User Privacy management model using multiple group factor based on Block chain (블록 체인 기반의 다중 그룹 요소를 이용한 사용자 프라이버시 관리 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.107-113
    • /
    • 2018
  • With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.

Design of Driving Record System using Block Chain (블록체인을 이용한 주행 기록 시스템 설계)

  • Seo, Eui-seong;Jang, Jong-wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.916-921
    • /
    • 2018
  • Recently, interest in autonomous vehicle has increased, and autonomous driving capability is also increasing. Depending on the autonomous driving ability, the maximum number of steps is divided into 6 steps. The higher the step, the less the involvement of the person in the running, and the person does not need to be involved at the highest stage. Today's autonomous vehicles have been developed high level, but solutions are not clearly defined in case of an accident, so only the test run is possible. Such an accident occurring during traveling is almost inevitable, and it is judged who has made a mistake in case of an accident, which increases the punishment for the accident. Although a black box is used to clarify such a part, it is easy to delete a record, and it is difficult to solve an accident such as a hit-and-run. In this paper, i design a driving record system using black chain to solve accidents.