• Title/Summary/Keyword: private blockchain

Search Result 115, Processing Time 0.021 seconds

Private Blockchain-based Sensitive Sensing Data Sharing System in IoT Environment (사물인터넷 환경에서 허가형 블록체인 기반 민감한 센싱 데이터 공유 시스템)

  • Kang, Giluk;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.136-139
    • /
    • 2021
  • 사물인터넷 기기들의 빠른 발전과 보급으로 인해 다양한 센서들부터 센싱 데이터가 수집되고 있다. 이에 따라, 많은 센싱 데이터 중 헬스케어 데이터를 기반으로 맞춤형 건강 서비스를 제공하는 사물인터넷 기반 헬스케어 분야가 발전하고 있다. 하지만, 사물인터넷 기기를 통해 수집되는 헬스케어 데이터는 민감한 데이터를 포함하기 때문에 헬스케어 데이터의 공유가 이뤄질 경우, 적절한 사용자만이 헬스케어 데이터를 사용할 수 있도록 해야 한다. 따라서, 본 논문은 사물인터넷 환경에서 속성기반암호화를 통해 적절한 사용자만이 데이터를 사용할 수 있도록 하고, 블록체인의 분산원장을 통해 데이터의 무결성과 책임추적성을 보장하는 민감한 센싱 데이터 공유 시스템을 제안하고자 한다.

Implementation and Utilization of Decentralized Identity-Based Mobile Student ID (분산 ID 기반 모바일 학생증 구현과 활용)

  • Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1115-1126
    • /
    • 2021
  • In this paper, we developed a mobile student ID providing a self sovereignty identity (SSI) which replaces the conventional plastic-type student ID that includes private information of a student such as a name, a student number, a facial photo, etc. The implemented mobile student ID solves the problem of exposing student's identity due to a loss or a theft of a plastic-type student ID, and it has a structure and process of FRANCHISE model which is developed by a concept of a decentralized Identity(DID) of a Blockchain, in which specialized for convenience as an electronic student ID through an application on a smart phone device. In addition, it protects student's privacy by controlling personal information on oneself. By using a smartphone, not only it easily identifies the student but also it expands to several services such as participation in school events, online authentication, and a student's exchange program among colleges.

NBAS: NFT-based Bluetooth Device Authentication System (NBAS: NFT를 활용한 블루투스 장치 인증시스템)

  • Hwang, Seong-Uk;Son, Sung-Moo;Chung, Sung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.793-801
    • /
    • 2022
  • Most Bluetooth devices are commonly used in various ways these days, but they can be often lost due to small-size devices. However, most Bluetooth protocol do not provide authentication functions to legitimate owners, and thus someone who obtains the lost Bluetooth device can easily connect to their smart devices to use it. In this paper, we propose NBAS can authenticates legitimate owners using NFT on lossy Bluetooth devices.NBAS generates a digital wallet on the blockchain using the decentralized network Ethereum blockchain and facilitating the MAC address of the Bluetooth device in the digital wallet. The owner of the wallet uses a private key to certify the Bluetooth device using NFT. The initial pairing time of NBAS was 10.25 sec, but the reconnection time was 0.007 sec similar to the conventional method, and the pairing rejection time for unapproved users was 1.58 sec on average. Therefore, the proposed NBAS effectively shows the device authentication over the conventional Bluetooth.

Distributed Identity Authentication System based on DID Technology (DID 기술에 기반 한 분산 신원 인증 시스템)

  • Chai Ting;Seung-Soon Shin;Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.17-22
    • /
    • 2023
  • Traditional authentication systems typically involve users entering their username and password into a centralized identity management system. To address the inconvenience of such authentication methods, a decentralized identity authentication system based on Distributed Identifiers(DID) is proposed, utilizing decentralized identity technology. The proposed system employs QR code scanning for login, enhancing security through the use of blockchain technology to ensure the uniqueness and safety of user identities during the login process. This system utilizes DIDs and integrates the InterPlanetary File System(IPFS) to securely manage organizational members' identity information while keeping it private. Using the distributed identity authentication system proposed in this study, it is possible to effectively manage the security and personal identity of organization members. To improve the usability of the system proposed in this study, research is needed to expand it into a solution.

Identifying the Cause of Speculative Investment in Cryptocurrency Investment: Based on the Theory of Bounded Rationality (암호화폐 투자에서 투자자들의 투기적 행동을 야기하는 원인 규명: 제한된 합리성 이론을 기반으로)

  • Eunyoung Kim;Byungcho Kim
    • Information Systems Review
    • /
    • v.22 no.1
    • /
    • pp.33-57
    • /
    • 2020
  • Although cryptocurrency which can promote innovation in the blockchain ecosystem is published for many useful purposes, in Korea, cryptocurrency is recognized only as a means of investment for the profit. The fact emphasizes only the speculative nature of the cryptocurrency, so investor negates the fundamental purpose of cryptocurrency and hinders innovation in the blockchain ecosystem. The purpose of this study is to investigate the cause of cryptocurrency perception and speculative behavior of domestic cryptocurrency investors from an academic perspective. We use a model that reflects the traditional considerations and cryptocurrency's characteristics in investment. Using the model, we can explain the cause of misperception of cryptocurrency through the theory of bounded rationality. In building the research model, we use variables of venture and angel investor's consideration used in investment decisions and collect the keywords from indexes of whitepaper to reflect the properties of cryptocurrency. This study mentions that, due to the imitations presented by Simon, individuals are forced to perceive cryptocurrency as a means of speculation and to make irrational decisions that impair ecosystem health. We analyze whether there is a significant difference in rationality in decision made by the sample under limited knowledge and imperfect information constraints. As a result, imperfect information constraints led investors to consider only irrational criteria in decision making. From this result, this study suggests that information asymmetry needs to be relaxed so that investment can be pursued together with rational investment and development of blockchain ecosystem. In addition, the industry can capture strategic insights for successful financing through ICO by enabling better understanding of investor decision-making.

Development of an FTA origin information management system prototype utilizing private block chain (프라이빗 블록체인 활용 FTA원산지 정보관리 시스템 프로토타입 개발)

  • Cho, Hyung-Min;Kim, Jong-Hyun;Lee, Kyung-Hee
    • The Journal of Bigdata
    • /
    • v.4 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • As FTA is spreading, it is becoming more and more necessary to improve the accuracy and reliability of the country of origin information at the domestic trading stage in preparation for the actual surveys expected to surge in the near future. However, there are many problems in collecting and managing information related to origin. It is pointed out that the shortage of export-oriented profits and the incentive for issuance of FTA-related profits, as well as the lack of information on the distribution and management of origin information of domestic manufacturing companies are also pointed out as important causes. In this paper, we propose a method to improve the efficiency of management and circulation of smooth FTA origin (comprehensive) certificate of Korean companies and to improve reliability through manipulation prevention by building prototype of origin information management system based on private block chain Hyperledger. The block chain, called Distributed Ledger or Trusted Internet, provides a technical infrastructure that enables various related companies to distribute origin information with high reliability and immediate distribution in the supply chain, but research on its application is still in the beginning stage.

  • PDF

Design of Personal Career Records Management and Duistribution using Block Chain (블록체인을 활용한 개인 경력 관리 및 유통 시스템 설계)

  • Bae, Su-Hwan;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.235-242
    • /
    • 2020
  • This paper proposes a system that can manage and verify personal career information through a block chain to solve the problem of getting a job by forging an individual's career when hiring employees. Blockchain network uses private network, and inside the block, the user's academic and career information is kept. The functions of the block chain perform the functions of block creation, block internal data retrieval, career and academic verification, which works through chain code. As a result of the performance evaluation of the proposed system, the processing time per transaction was measured at approximately 110 ms and the search time was measured at 10 ms, and it was applied to the actual system to confirm that it was available.

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs

A Study on Light Weight Authentication Method of Distributed Cluster-based IoT Devices (분산 클러스터 기반 IoT 디바이스 경량 인증 방법에 대한 연구)

  • Kim, Sung-hwan;Kim, Young-gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.103-109
    • /
    • 2019
  • Due to the development of ICT technology, the IoT environment for connecting objects in the vicinity to networks and utilizing information about objects in various fields is getting attention, and security threats are also increasing. In order to solve the increasing security problem in IoT environment, we are studying methods that use certificate, encryption, hash calculation and block chain in the private sector. However, the security authentication method which overcomes the performance gap between devices and has compatibility with various devices It has not been proposed yet. In this paper, we propose an authentication method that can achieve wide compatibility by minimizing the influence of IoT device environment.

A Study on Solving Single Point of Failure Problem about Private Blockchain with high TPS using CMT (CMT를 활용한 프라이빗 블록체인 고속화로 인한 단일 장애 지점 문제 해결에 관한 연구)

  • Jo, Uk;Kim, Geum-Bo;Kim, Ho-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.252-255
    • /
    • 2022
  • 기존 블록체인 기술을 활용해 새로운 비즈니스 모델을 개발 및 투자하려는 기업들의 관심이 높아지고 있으나, 낮은 확장성으로 인해 기존 블록체인 기술만으로는 시장에서 활용되기 어렵다. 블록체인의 낮은 확장성을 해결하기 위해 검증된 참여자만 참여하는 프라이빗 블록체인과 프라이빗 블록체인 고속화를 위한 관련 연구가 같이 진행되고 있다. 삼성의 넥스레저는 하이퍼레저 패브릭의 다중 버전 동시성 제어(MVCC) 충돌로 인한 낮은 TPS 문제를 해결하기 위해 Accelerator를 추가하여 고속화를 진행하였다. 하지만 모든 트랜잭션을 수집하여 처리하는 방식인 Accelerator는 중앙화로 인해 악의적인 공격 타깃이 되어 단일 장애 지점 문제가 발생할 수 있으며, 공격으로 인해 위조되거나 분실된 데이터는 검증 없이 블록체인 블록에 반영되고, 한번 반영된 데이터는 수정이 어렵다. 본 논문에서는 이와 같이 프라이빗 블록체인 고속화 상황에서 발생할 수 있는 단일 장애 지점 문제를 해결하기 위해 CMT와 사기증명 기반의 고속화 하이퍼레저 패브릭 시스템을 제안했으며, 제안한 시스템을 구축하고 성능 테스트를 통해 CMT 하이퍼레저 패브릭 시스템 성능이 99.58% 유지됨과 사기증명이 가능함을 확인하였다.