DOI QR코드

DOI QR Code

Design of E-Mail Group Authentication API using Blockchain and Rotten Tomato Method

블록체인과 Rotten Tomato 방식을 활용한 이메일 집단 인증 API 설계

  • Kim, Semin (Department of Computer Education, Jeonju National University of Education) ;
  • Hong, Sunghyuk (Department of Information and Communication Engineering, Baekseok University)
  • 김세민 (전주교육대학교 컴퓨터교육과) ;
  • 홍성혁 (백석대학교 정보통신학부)
  • Received : 2020.07.23
  • Accepted : 2020.11.20
  • Published : 2020.11.28

Abstract

The one of the biggest challenges in using e-mail is that it is difficult to filter out unconfirmed senders. Therefore, in this study, an email group authentication API was designed using blockchain technology, which has been widely used as an authentication method. As the proposed model, the node-node weighting index was obtained through the relationship association network, and after designing the email reliability model, the reliability calculation model of the Rotten Tomato method was obtained. Based on this, the system structure was designed, chain code methods were defined, and API was developed. Through this study, it is expected that it will be used in various fields requiring authentication as well as email user authentication, and it is expected that the relationship of group authentication can be proved by allowing a large number of users to use the API in the future.

이메일을 사용하는데 있어서 가장 큰 애로사항으로 확인되지 않은 발신자를 걸러내기 힘들다는 것이다. 이에 본 연구에서는 최근 인증 수단으로 많이 활용되고 있는 블록체인 기술을 활용하여 이메일 집단 인증 API를 설계하였다. 제안한 모델로는 관계 연관성 네트워크를 통하여 노드-노드 가중치 지수를 구하였고, 이메일 신뢰도 모형을 설계한 후 Rotten Tomato 방식의 신뢰도 계산 모델을 구하였다. 이를 바탕으로 시스템 구조를 설계하고, 체인 코드 메소드를 정의한 후 API를 개발하였다. 본 연구를 통하여 이메일 사용자 인증 뿐만 아니라 인증이 필요한 다양한 분야에서 활용할 것으로 기대할 수 있으며, 향후 많은 수의 사용자를 대상으로 API를 사용하게 하여 집단 인증의 관계성을 증명할 수 있을 것으로 기대된다.

Keywords

References

  1. S. H. Hong. (2019). Research on a new approach to enhance IoT security using blockchain technology. Journal of Digital Convergence, 17(12), 235-241. https://doi.org/10.14400/JDC.2019.17.12.235
  2. J. C. Park. (2017), "A Secure Single Sign-On Scheme across Multiple Allied Websites using Smartphones". Journal of Security Engineering, 14(3), 189-204. DOI: dx.doi.org/10.14257/jse.2017.06.01
  3. Y. Choi & H. Kwon. (2018), "A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information", Journal of the Korea Institute of Information Security & Cryptology, 28(6), 1607-1621. DOI: doi.org/10.13089/JKIISC.2018.28.6.1607
  4. S. J. Han, S. T. Kim and S. Y. Park. (2019), "A GDPR based Approach to Enhancing Blockchain Privacy", The Journal of The Institute of Internet, Broadcasting and Communication, 19(5), 33-38, DOI: doi.org/10.7236/JIIBC.2019.19.5.33
  5. M. S. Yim. (2013), Moral Disengagement in Information Security Context, A Study of Antecedents and Outcomes, 11(11), 1-13. https://doi.org/10.14400/JDPM.2013.11.11.1
  6. Kitterman, S. (2017), "Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1", RFC 7208, DOI 10.17487/RFC7208,
  7. D. H. Lim(2013), A Study on International Standardization of Certified Email Address(#mail), Master's Thesis, Graduate School of Soongsil University, Seoul.
  8. H. B. Ahn and S. Y. Lee. (2016), The Study on Secure Mail Platform and Mutual Authentication Using Mail Proxy, Journal of Digital Convergence, 14(12), 201-208. https://doi.org/10.14400/JDC.2016.14.12.201
  9. Satoshi Nakamoto. (2009), Bitcoin: A Peer-to-Peer Electronic Cash System, Bitcoin.org.
  10. S. Y. Son and Y. T. Shin. (2018), "A Study on the Agreement Algorithm for Securing IoT Data Integrity Using Blockchain," Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, 1136-1137.
  11. A. Dorri, S. S. Kanhere, and R. Jurdak. (2016), "Blockchain in Internet of Things: Challenges and Solutions," arXiv Preprint arXiv: 1608.05187,
  12. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram(2017), Blockchain for IoT Security and Privacy: The Case Study of a Smart Home, In IEEE Percom Workshop on Security Privacy and Trust in the Internet of Thing.
  13. A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman. (2017), FairAccess: a New Blockchain-based Access Control Framework for the Internet of Things, Security and Communication Networks, 5943-5964.
  14. J. Y. Yoon. (2014), Organic Media, Pressbooks, Seoul, Korea.
  15. S. G. Noh. (2016), Organic business : Network is eating the world, Pressbooks, Seoul, Korea.
  16. Johan Ugander, Brian Karrer, Lars Backstrom & Cameron Marlow. (2011), The Anatomy of the Facebook Social Graph, arXiv Preprint arXiv.org:1111.4503.