• Title/Summary/Keyword: bitcoin

Search Result 155, Processing Time 0.027 seconds

A Review on Solution Plans for Preventing Environmental Contamination as the Trend Changes of Cryptocurrency (암호화폐의 트랜드 변화에 따른 환경오염 방지 해결방안에 대한 고찰)

  • Kim, Jeong-hun;Song, Sae-hee;Ko, Lim-hwan;Nam, Hak-hyun;Jang, Jae-hyuck;Jung, Hoi-yun;Choi, Hyuck-jae
    • Journal of Venture Innovation
    • /
    • v.5 no.1
    • /
    • pp.91-106
    • /
    • 2022
  • Cryptocurrency, stood out the sharp cost rising of Bitcoin has been spotlighted by means of the solution for stagflation because it is decentralized with an existing currency differently. Especially getting into 4th industrial revolution, technologies using block chain and internet of things have been used in the many fields, and the power of influence is also widespread. Nevertheless like a remark of Elon Musk of Tesla CEO, the problems of environmental contamination for cryptocurrency have been pointed out continuously and the most representative of them is an enormous electric usage as the use of fossil fuels. Also the amount generated of carbon dioxide result in the acceleration of global warming mainly based on the climate changes of earth if the existing mining method is continued. On the other hand, review researches have been conducted restrictively as the connection with environmental contamination as the mining of cryptocurrency. In this study, it intended to review problems for environmental contamination as the diversification of ecological system of cryptocurrency concretely. Upon investigation existing prior documents on the putting recent data first, the mining of cryptocurrency has affected on the environmental contamination conflicting with carbon neutrality as increasement of the electric usage and electronic wastes. And POS method without the mining process appeared, but it had a demerit collapsing a decentralization and then we met turning point on appearing various environmental-friendly cryptocurrency. Finally the appearance of cryptocurrency using new renewable energy acted on the opportunity of the usage maximization of energy storage apparatus and the birth of national government intervention. Based on these results, we mention clearly that hereafter cryptocurrency will regress if not go abreast the value of currency as well as environmental approach.

Prediction of Cryptocurrency Price Trend Using Gradient Boosting (그래디언트 부스팅을 활용한 암호화폐 가격동향 예측)

  • Heo, Joo-Seong;Kwon, Do-Hyung;Kim, Ju-Bong;Han, Youn-Hee;An, Chae-Hun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.10
    • /
    • pp.387-396
    • /
    • 2018
  • Stock price prediction has been a difficult problem to solve. There have been many studies to predict stock price scientifically, but it is still impossible to predict the exact price. Recently, a variety of types of cryptocurrency has been developed, beginning with Bitcoin, which is technically implemented as the concept of distributed ledger. Various approaches have been attempted to predict the price of cryptocurrency. Especially, it is various from attempts to stock prediction techniques in traditional stock market, to attempts to apply deep learning and reinforcement learning. Since the market for cryptocurrency has many new features that are not present in the existing traditional stock market, there is a growing demand for new analytical techniques suitable for the cryptocurrency market. In this study, we first collect and process seven cryptocurrency price data through Bithumb's API. Then, we use the gradient boosting model, which is a data-driven learning based machine learning model, and let the model learn the price data change of cryptocurrency. We also find the most optimal model parameters in the verification step, and finally evaluate the prediction performance of the cryptocurrency price trends.

A Study on the Analysis of the Potential FT(Financing of Terrorism) Threat Using Virtual Currencies and Its Response (가상통화를 활용한 테러자금조달 위협 분석과 국내 대응방안에 관한 연구)

  • Kang, Taeho;Cha, Jang-Hyeon;Kim, Gunin
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.9-33
    • /
    • 2020
  • This study presents aspects of the financing of terrorism using virtual-currencies. Fisrt of all, this introduces the conventional threat of the financing of terrorism and the analysis of current legal system regarding virtual-currency in South Korea. Next, the financing of terrorism cases are analyzed. With given analysis, the paper deals with its response and future extensions by technical and institutional aspects. The threats of the financing of terrorism are going higher after the appearance of virtual-currencies such as Bitcoin. There are two typical ways to use virtual-currencies by terrorist groups. One is to conduct public fund-raising in the social network system and the dark web. The other is to hack into virtual-currency exchange network in order to steal virtual currencies for developing the weapon of mass destruction. Specifically South Korea is top three country of trading virtual currencies and has been subject to virtual-currency hacking more than 10 cases. However, many countries including South Korea deal with virtual currencies as only innovative technology and means of investment, not the threats of the financing of terrorism. Under these circumstances, there a the legal contradiction. This article points this limit and absurdity. Also, it shows reasonable alternatives. All in all, given these aspects, the article proposes detailed policy directions.

An Intramural Electronic Voting System Based on Blockchain (블록체인 기반 교내 전자투표 시스템)

  • Sung, Ki-jeong;Jeong, Chae-rin;Cho, Eun-a;Lee, Jong-ho;Kim, Hee-young;Kim, Young-woo;Rhee, Kyung-hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.779-787
    • /
    • 2018
  • As security problems of the paper ballot have been emerged on and on, electronic voting with enhanced security and convenience has been introduced in several countries. However, it has not been adopted most of countries because of the problems that come from interdependence and security flaws. Meanwhile, the blockchain technology has high reliability due to the mechanism of mining that miners verify and preserve blocks independently by using P2P formation which does not have a central authority. Furthermore, because each block refers to the hash of the previous block. if any one block is changed, it is very difficult to forge and modify the blockchain because all blocks must be changed. If this technology is applied to the E-voting, integrity, and transparency about the result of the ballot is guaranteed. In this paper, we propose and implement an electronic voting system based on blockchain that improves interdependence, the reliability of excessive TTP and single point of failure come from original electronic voting. Also, we analyze the security and advantage of the proposal system compared with the existing bitcoin-based electronic voting system.

Evaluating Blockchain Research Trend using Bibliometrics-based Network Analysis (블록체인 분야의 학술연구 동향분석: 계량정보학적 네트워크분석을 중심으로)

  • Zhu, Yu-Peng;Park, Han-Woo
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.219-227
    • /
    • 2019
  • This study aims to examine Blockchain research trend using bibliometrics-based network analysis. The data were collected from WoS, Scopus, Korea Citation Index and National science & Technology Information Service, from 2009 to 2018. As results, the number of publications has started increasing rapidly from 2017 and it showed the initial stage of formation of coauthor network. Words often used in the title of the publications were related to application development, controversy and technology development. In addition, the majority of domestic papers are in the subject of social science, while international papers tend to focus on engineering issues. The results of the temporal analysis show that Korean researchers' block chain 3.0 started in 2017 and are rapidly increasing in 2018. The number of citations was associated with publication year in a statistically signifiant way. By examining these research trends, we hope that this paper can be a useful basis for the development of blockchain. Future research is expected to reveal more clearly the knowledge structure and characteristics of blockchain around the world.

A Guideline for Identifying Blockchain Applications in Organizations (기업에서 요구되는 블록체인 애플리케이션 탐색을 위한 가이드라인)

  • Namn, Su Hyeon
    • Management & Information Systems Review
    • /
    • v.38 no.1
    • /
    • pp.83-101
    • /
    • 2019
  • Blockchain is considered as an innovative technology along with Artificial Intelligence, Big Data, and Internet of Things. However, since the inception of the genesis of blockchain technology, the cryptocurrency Bitcoin, the technology is not utilized widely, not let alone disruptive applications. Most of the blockchain research deals with the cryptocurrency, general descriptions of the technology such as trend, outlook of the technology, explanation of component technology, and so on. There are no killer applications like Facebook or Google, of course. Reflecting on the slow adoption by businesses, we wanted know about the current status of the research on blockchain in Korea. The main purpose of this paper is to help business practitioners to identify the application of blockchain to enhance the competitiveness of their organization. To do that, we first use the framework by Iansiti et al (2017) and categorize the blockchain related articles published in Korea according to the framework. This is to provide a benchmark or cases of other organizations' adoption of blockchain technology. Second, based on the value proposition of blockchain applications, we suggest evolutionary paths for adopting them. Third, from the demand pull perspective of technology adoption for innovation, we propose applicable areas where blockchain applications can be introduced. Fourth, we use the value chain model to find out the appropriate domains of blockchain applications in the corporate value chains. And the five competitive forces models is adopted to find ways of lowering the power of forces by incorporating blockchain technology.

A Study on Development of Teaching & Learning Materials related to Coding for Convergence Education Integrating Mathematics and Information (수학·정보 융합교육을 위한 코딩과 연계한 교수학습 자료 개발 연구)

  • Shin, Gicheol;Suh, Boeuk
    • Journal of Science Education
    • /
    • v.43 no.1
    • /
    • pp.17-42
    • /
    • 2019
  • This study, as an attempt to integrate mathematics and information for convergence education, was conducted to develop teaching-learning materials on mathematics education combined with coding education, which has recently been emphasized. We chose the subject of digital signature for coding education, and used SageMath as a coding program. In this study, we overview mathematics used in the elliptic curve digital signature algorithm, one of the many methods for digital signature, and developed the teaching-learning materials on the algorithm for mathematics education integrated with information education based on coding. The elliptic curve digital signature algorithm utilized in transactions of Bitcoin, which many people recently are interested in, is a good example, showing students that mathematics is applied to problem-solving in the real world and provides an optimal environment for implementation by coding. Accordingly, we expect that a class on algorithm will provide a specific teaching-learning program to achieve the goal of integrated mathematics education. By comprehensively considering the opinions of mathematicians, mathematics teachers and mathematics education experts, we expect that the teaching-learning program will be realized as a meaningful class in science high schools, high school's math clubs, and 'number theory' class in colleges.

The Prediction of Cryptocurrency on Using Text Mining and Deep Learning Techniques : Comparison of Korean and USA Market (텍스트 마이닝과 딥러닝을 활용한 암호화폐 가격 예측 : 한국과 미국시장 비교)

  • Won, Jonggwan;Hong, Taeho
    • Knowledge Management Research
    • /
    • v.22 no.2
    • /
    • pp.1-17
    • /
    • 2021
  • In this study, we predicted the bitcoin prices of Bithum and Coinbase, a leading exchange in Korea and USA, using ARIMA and Recurrent Neural Networks(RNNs). And we used news articles from each country to suggest a separated RNN model. The suggested model identifies the datasets based on the changing trend of prices in the training data, and then applies time series prediction technique(RNNs) to create multiple models. Then we used daily news data to create a term-based dictionary for each trend change point. We explored trend change points in the test data using the daily news keyword data of testset and term-based dictionary, and apply a matching model to produce prediction results. With this approach we obtained higher accuracy than the model which predicted price by applying just time series prediction technique. This study presents that the limitations of the time series prediction techniques could be overcome by exploring trend change points using news data and various time series prediction techniques with text mining techniques could be applied to improve the performance of the model in the further research.

Redactable Blockchain Based Authority Alteration and Accessn Control System (수정 가능한 블록체인 기반 권한 변경 및 접근 제어시스템)

  • Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.513-525
    • /
    • 2022
  • The immutability of blockchain is core elements of security of blockchain and guarantee data integrity. However, the characteristic that the data recoreded once in the blockchain cannot be modified has place for abuse by a specific user. In fact improper contents that is inappropriate to be recorded on the blockchain, such as harmful data and user personal data, is exposed on Bitcoin. As a way to manage improper content existing in the blockchain, there is a redactable blockchain using chameleon hash proposed for the first time by Ateniese. The redactable blockchain meet the right to be forgotten of GDPR by allowing data modification and deletion. Recently, Research on personal data management is being conducted in a redactable blockchain. Research by Jia et al. proposed a model that enables users to manage their personal data in the redactable blockchain. However, semi trusted regulators, which are blockchain participation nodes, have powerful authority in the blockchain, such as modification rights and deprivation of transaction rights for all blocks, which may cause side effects. In this paper, to weaken the authority of regulators in Y. Jia et al., we propose a method of authority subject altering and authority sharing, and propose a redactable blockchain-based authority change and access control system model based on applicable scenarios.

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.