• Title/Summary/Keyword: block chain system

Search Result 152, Processing Time 0.025 seconds

Design of Blockchain Model for Ransomware Prevention (랜섬웨어 방지를 위한 블록체인 활용 모델에 대한 설계)

  • An, Jung-hyun;Kim, Ki-chun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.314-316
    • /
    • 2017
  • Ransomware, a malicious program that requires money and then locks computers and files on network users for financial harvesting, will continue to evolve. Ransomware is a threat in mail systems that send and receive business information. By using Block Chain, Distributed Ledger technology, it is designed to be a safe mail system in which the automatically generated Ramsomware symptom data is directly linked to the security policy in the enterprise.

  • PDF

Electronic voting system using block chain (블록체인을 이용한 전자투표 시스템)

  • Roh, Chang-Hyun;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.159-160
    • /
    • 2018
  • 블록체인은 분산 원장 기술 중 하나로 여러 개의 노드들이 참여하며, 이 노드들 간의 합의 알고리즘을 통하여 데이터의 위 변조를 막고, 이미 기록된 데이터를 바꿀 수 없는 구조를 장점으로 가진다. 이러한 특성 때문에 블록체인은 신뢰성이 중요시되는 플랫폼에 많이 적용이 되며 많은 플랫폼 중 전자투표의 중요한 기술로서 인식되고 있다. 전자투표는 선거의 모든 과정을 전자화 하여 선거를 관리하는 사람이나 투표자 모두에게 편리함을 제공하는 시스템으로 기술적인 보안성이나 시스템의 안정성이 완벽하게 보장되지 않아 유권자들에게 신뢰를 주지 못해 현실에서 쉽게 적용하지 못하고 있다. 이러한 문제를 해결하기 위해 본 논문에서는 블록체인을 적용하여 투표의 변조를 막고 유권자들의 신뢰와 시스템의 안정성을 제공하는 전자투표 시스템을 제안한다.

A Study On Electronic Document Management System Using Block Chain (블록체인을 활용한 전자 문서 관리 시스템에 관한 연구)

  • Lee, Ah-Reum;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.141-144
    • /
    • 2019
  • 21세기 산업 전반에 걸쳐 IT기술의 접목은 해당 산업의 부가가치와 편의성을 증가시키고 있다. 몇 가지 예로 전자 문서 관리 시스템, 디지털 자산 관리 시스템은 사용자에게 편리함과 편의성을 더해줬지만 이와 함께 정보의 위·변조, 유출과 같은 위험요소 역시 야기되었다. 그 해결 방안으로 블록체인 네트워크를 이용해 문서를 관리하는 시스템을 소개한다. 본 논문의 제안 시스템은 문서에 대한 모든 접근을 기록하여 추적을 가능하게 함으로써 문서 이동 경로의 투명성을 보장하는 기능을 제시한다. 또한 기존 시스템에서 소요되던 유지 비용을 줄이고 데이터의 무결성을 유지하여 중요 데이터의 유출 위험을 감소시키는 데 기여한다.

Blockchain-based DID Problem Analysis Research (블록체인 기반의 DID 문제점 분석 연구)

  • Lee, Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • DID(Decentralized Identity Identification) is a system in which users voluntarily manage their identity, etc., and control the scope and subject of submission of identity information based on a block chain. In the era of the 4th industrial revolution, where the importance of protecting personal information is increasing day by day, DID will surely be positioned as the industrial center of the Internet and e-business. However, when managing personal information, DID is highly likely to cause a large amount of personal information leakage due to electronic infringement, such as hacking and invasion of privacy caused by the concentration of user's identity information on global service users. Therefore, there are a number of challenges to be solved before DID settles into a stable standardization. Therefore, in this paper, we try to examine what problems exist in order to positively apply the development of DID technology, and analyze the improvement plan to become a stable service in the future.

Blockchain based Learning Management Platform for Efficient Learning Authority Management

  • Youn-A Min
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.231-238
    • /
    • 2023
  • As the demand for distance education increases, interest in the management of learners' rights is increasing. Blockchain technology is a technology that guarantees the integrity of the learner's learning history, and enables learner-led learning control, data security, and sharing of learning resources. In this paper, we proposed a blockchain technology-based learning management system based on Hyperledger Fabric that can be verified through permission between nodes among blockchain platforms. Learning resources can be shared differentially according to the learning progress. Also the percentage of individual learners that can be managed. As a result of the study, the superiority of the platform in terms of convenience compared to the existing platform was demonstrated. As a result of the performance evaluation for the research in this paper, it was confirmed that the convenience was improved by more than 5%, and the performance was 4-5% superior to the existing platform in terms of learner satisfaction.

A Study on Deep learning Configuration Management System using Block chain (블록체인을 활용한 딥러닝 형상관리 시스템에 대한 연구)

  • Baeg, Su-Hwan;Lee, Jace;Shin, Young-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.234-237
    • /
    • 2021
  • 최근 인공지능에대한 관심과 COVID-19의 영향으로 인공지능을 적용하려는 연구가 계속되고 있다. 인공지능 학습 방식 중 딥러닝에서는 학습 결과에 따라 가중치를 두며 지속적인 학습을 수행한다. 이때 사용하는 가중치에 따라 학습 능력이 향상되게 되지만, 과다 학습으로 인한 퇴화 현상과 잘못된 결과 도출이 되는 경우가 발생한다. 이를 해결하기 위해 본 논문에서는 문제를 해결하기 위해 비연속적 PoW 합의방식을 사용한 블록체인에 가중치와 학습 결과를 지속적으로 보관하여 형상관리를 할 수 있는 시스템을 설계하였다.

Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology (반응표면분석을 이용한 PoN 블록체인 시스템 합의품질 개선)

  • Choi, Jin Young;Kim, Young Chang;Oh, Jintae;Kim, Kiyoung
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.4
    • /
    • pp.527-537
    • /
    • 2021
  • Purpose: The purpose of this study was to suggest an improved version of Proof-of-Nonce (PoN) algorithm, which is a distributed consensus algorithm used for block chain system. Methods: First, we used response surface method for design of experiment that is to generate experimental points considering non-linear relationship among variables. Then, we employed overlapped contour plots for visualizing the impact of control variables to performance target. Results: First, we modified the consensus procedure of the existing PoN algorithm by diminishing the content of the exchanged message. Then, we verified the performance improvement of the new PoN algorithm by performing a numerical experiment and paired t-test. Finally, we established new regression models for consensus time and Transactions per second (TPS) and proposed a method for optimizing control variables for obtaining performance target. Conclusion: We could improve the performance of the previous version of PoN algorithm by modifying the content of the exchanged message during 4-steps of consensus procedure, which might be a stepping stone for designing an efficient and effective consensus algorithm for blockchain system with dynamic operation environment.

Proposal of AI-based Digital Forensic Evidence Collecting System

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.124-129
    • /
    • 2021
  • As the 4th industrial era is in full swing, the public's interest in related technologies such as artificial intelligence, big data, and block chain is increasing. As artificial intelligence technology is used in various industrial fields, the need for research methods incorporating artificial intelligence technology in related fields is also increasing. Evidence collection among digital forensic investigation techniques is a very important procedure in the investigation process that needs to prove a specific person's suspicions. However, there may be cases in which evidence is damaged due to intentional damage to evidence or other physical reasons, and there is a limit to the collection of evidence in this situation. Therefore, this paper we intends to propose an artificial intelligence-based evidence collection system that analyzes numerous image files reported by citizens in real time to visually check the location, user information, and shooting time of the image files. When this system is applied, it is expected that the evidence expected data collected in real time can be actually used as evidence, and it is also expected that the risk area analysis will be possible through big data analysis.

Design of Driving Record System using Block Chain (블록체인을 이용한 주행 기록 시스템 설계)

  • Seo, Eui-Seong;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.205-206
    • /
    • 2018
  • Recently, interest in unmanned vehicles, autonomous vehicles and connected cars has increased, and autonomous driving capability is also increasing. Depending on the autonomous driving ability, the maximum number of steps is divided into 6 steps. The higher the step, the less the involvement of the person in the running, and the person does not need to be involved at the highest stage. Today's autonomous vehicles have been developed in stages 4 to 5, but solutions are not clearly defined in case of an accident, so only the test run is possible. Such an accident occurring during traveling is almost inevitable, and it is judged who has made a mistake in case of an accident, which increases the punishment for the accident. Although a black box is used to clarify such a part, it is easy to delete a photographed image, and it is difficult to solve an accident such as a hit-and-run. In this paper, we design a driving record system using black chain to solve such an accident.

  • PDF

A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment (IoT 환경에 적용 가능한 경량화 블록 암호알고리즘에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.1-7
    • /
    • 2018
  • The IoT environment provides an infinite variety of services using many different devices and networks. The development of the IoT environment is directly proportional to the level of security that can be provided. In some ways, lightweight cryptography is suitable for IoT environments, because it provides security, higher throughput, low power consumption and compactness. However, it has the limitation that it must form a new cryptosystem and be used within a limited resource range. Therefore, it is not the best solution for the IoT environment that requires diversification. Therefore, in order to overcome these disadvantages, this paper proposes a method suitable for the IoT environment, while using the existing block cipher algorithm, viz. the lightweight cipher algorithm, and keeping the existing system (viz. the sensing part and the server) almost unchanged. The proposed BCL architecture can perform encryption for various sensor devices in existing wire/wireless USNs (using) lightweight encryption. The proposed BCL architecture includes a pre/post-processing part in the existing block cipher algorithm, which allows various scattered devices to operate in a daisy chain network environment. This characteristic is optimal for the information security of distributed sensor systems and does not affect the neighboring network environment, even if hacking and cracking occur. Therefore, the BCL architecture proposed in the IoT environment can provide an optimal solution for the diversified IoT environment, because the existing block cryptographic algorithm, viz. the lightweight cryptographic algorithm, can be used.