• Title/Summary/Keyword: block chain system

Search Result 152, Processing Time 0.028 seconds

An Online Voting System based on Ethereum Block-Chain for Enhancing Reliability (신뢰성 향상을 위한 이더리움 블록체인 기반의 온라인 투표 시스템)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.563-570
    • /
    • 2018
  • Existing online voting is not being used for public elections due to uncertainty about security threats, and offline voting costs a lot of money. As an alternative, blockchain is emerging. Applying blockchain technology to online voting will ensure transparency and confidentiality, because voter information and aggregate information are distributed and managed. Since a blockchain distributes the voting information, it will be more secure than existing central server - based online voting systems. If blockchain technology is applied to public elections, and the transparency and confidentiality of the voting information is guaranteed, the cost of voting will be greatly reduced. This paper tries to apply to an online voting system the Ethereum platform from among the blockchain technologies. Ethereum is a highly scalable blockchain technology that provides a smart contract based on the Solidity language to develop an online voting contract and to distribute the contract to each voter. Each voter votes on the contract that has been distributed, and the votes are distributed to other voters. The experiment verifies the consistency of the stored voting information.

A Study on Linkage of Block Chain in Korea Real Estate Administration Intelligence System (부동산종합공부시스템에서의 블록체인 연계방안 연구)

  • Sun, Jong Cheol;Kim, Jin Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.113-116
    • /
    • 2018
  • 동일한 데이터를 여러 곳에 보관하는 분산원장을 특징으로 갖는 블록체인은 보안성과 안정성을 비롯한 여러 가지 기술적 특징을 가지며, 이로 인해 블록체인의 활용처에 대한 연구가 다양하게 이루어지고 있다. 본 논문에서는 공적장부의 하나인 부동산종합공부시스템에 블록체인을 적용하기 위해 고려할 사항들을 도출하고, 이를 바탕으로 블록체인 시스템 구성 방안과 합의 알고리즘 참조모형을 제시한다.

Framework of Stock Market Platform for Fine Wine Investment Using Consortium Blockchain (공유경제 체제로서 컨소시엄 블록체인을 활용한 와인투자 주식플랫폼 프레임워크)

  • Chung, Yunkyeong;Ha, Yeyoung;Lee, Hyein;Yang, Hee-Dong
    • Knowledge Management Research
    • /
    • v.21 no.3
    • /
    • pp.45-65
    • /
    • 2020
  • It is desirable to invest in wine that increases its value, but wine investment itself is unfamiliar in Korea. Also, the process itself is unreasonable, and information is often forged, because pricing in the wine market is done by a small number of people. With the right solution, however, the wine market can be a desirable investment destination in that the longer one invests, the higher one can expect. Also, it is expected that the domestic wine consumption market will expand through the steady increase in domestic wine imports. This study presents the consortium block chain framework for revitalizing the wine market and enhancing transparency as the "right solution" of the nation's wine investment market. Blockchain governance can compensate for the shortcomings of the wine market because it guarantees desirable decision-making rights and accountability. Because the data stored in the block chain can be checked by consumers, it reduces the likelihood of counterfeit wine appearing and complements the process of unreasonably priced. In addition, digitization of assets resolves low cash liquidity and saves money and time throughout the supply chain through smart contracts, lowering entry barriers to wine investment. In particular, if the governance of the block chain is composed of 'chateau-distributor-investor' through consortium blockchains, it can create a desirable wine market. The production process is stored in the block chain to secure production costs, set a reasonable launch price, and efficiently operate the distribution system by storing the distribution process in the block chain, and forecast the amount of orders for futures trading. Finally, investors make rational decisions by viewing all of these data. The study presented a new perspective on alternative investment in that ownership can be treated like a share. We also look forward to the simplification of food import procedures and the formation of trust within the wine industry by presenting a framework for wine-owned sales. In future studies, we would like to expand the framework to study the areas to be applied.

A Study on the Status and Prospects of Blockchain, the Core of Metaverse's Economic System (메타버스 경제 시스템의 핵심인 블록체인의 현황과 전망에 대한 연구)

  • Hwa-Seon Choi
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.229-231
    • /
    • 2023
  • 최근 대화형 AI와 생성형 AI의 폭발적인 성장과 현실화로 인해, 한 때 온세상을 떠들썩 하게 했던 메타버스와 블록체인 기술은 잊혀지고 있다. 하지만 메타버스는 필연적으로 Web 3.0 시대의 대표적인 플랫폼으로 흘러갈 것이며, 블록체인 기술은 디지털 경제 생태계의 핵심 기술임에 틀림이 없을 것이다. 언제가 될지는 모르지만 다시금 메타버스가 세상을 혁명적으로 변화 시키는 그 때를 염두에 두며, 메타버스 시스템에서 사용되는 블록체인 기술의 현황을 살펴보고 그리 멀지 않은 미래에서의 모습도 전망해 본다.

  • PDF

Performance Analysis of Joint Call Admission Control(JCAC) According to Resource Reservation Rate Changes in LTE-WLAN Heterogeneous Network Environment (LTE-WLAN 이종 네트워크 환경에서 자원예약률 변화에 따른 통합 호 수락 제어의 성능분석)

  • Kim, Yi-Kang;Kim, Seung-Yeon;Ryu, Seung-Wan;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5A
    • /
    • pp.473-484
    • /
    • 2011
  • In this paper, we analyze and propose the Joint Call Admission Control(JCAC) scheme to combine network selection scheme and radio resource reservation based Call Admission Control(CAC) in LTE-WLAN heterogeneous networks. First, We propose the JCAC system that uses network decision rate to select a network for terminal and radio resource reservation scheme in overlaying LTE-WLAN network environment. And we analyze the performance of a proposed system using markov chain model. The performance is presented in terms of the new call blocking probability, handoff call dropping probability, and channel utilization of each network. As a performance result of the our research, the system using JCAC is better than the system using non-JCAC. We found a suitable resource reservation rate that is 10% in the system using JCAC. Our work may be useful as a guideline of resource reservation rate to introduce JCAC system using resource reservation scheme in overlaying LTE-WLAN network environment.

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.

Investigation on Chain Transfer Reaction of Benzene Sulfonyl Chloride in Styrene Radical Polymerization

  • Li, Cuiping;Fu, Zhifeng;Shi, Yan
    • Macromolecular Research
    • /
    • v.17 no.8
    • /
    • pp.557-562
    • /
    • 2009
  • The free radical polymerization of styrene was initiated with azobis(isobutyronitrile) in the presence of benzene sulfonyl chloride. Analysis of the terminal structures of the obtained polystyrene with $^1H$ NMR spectroscopy revealed the presence of a phenyl sulfonyl group at the ${\alpha}$-end and a chlorine atom at the ${\omega}$-end of each polystyrene chain. The terminal chlorine atom in the polystyrene chains was further confirmed through atom transfer radical polymerization (ATRP) of styrene and methyl acrylate using the obtained polystyrenes as macroinitiators and CuCl/2,2'-bipyridine as the catalyst system. GPC traces of the products obtained in ATRP at different reaction times were clearly shifted to higher molecular weight direction, indicating that nearly all the macroinitiator chains initiated ATRP of the second monomers. In addition, the number-average molecular weights of the polystyrenes increased directly proportional to the monomer conversions, and agreed well with the theoretical ones.

IoT Multi-Phase Authentication System Using Token Based Blockchain (블록체인 기반의 토큰을 이용한 IoT 다단계 인증 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.139-150
    • /
    • 2019
  • IoT(Internet of Things) security is becoming increasingly important because IoT potentially has a variety of security threats, including limited hardware specifications and physical attacks. This paper is a study on the certification technology suitable for the lightened IoT environment, and we propose a system in which many gateways share authentication information and issue authentication tokens for mutual authentication using blockchain. The IoT node can be issued an authentication token from one gateway to continuously perform authentication with a gateway in the block-chain network using an existing issued token without performing re-authentication from another gateway participating in the block-chain network. Since we do not perform re-authentication for other devices in a blockchain network with only one authentication, we proposed multi phase authentication consisting of device authentication and message authentication in order to enhance the authentication function. By sharing the authentication information on the blockchain network, it is possible to guarantee the integrity and reliability of the authentication token.

The Effect on the Switching Intention to the Blockchain-based Supply Chain Management Information System (블록체인 기반 공급망관리 정보시스템으로의 전환의도에 영향을 미치는 요인)

  • Kyoung Sang Oh;Dong Myung Lee
    • Journal of Industrial Convergence
    • /
    • v.20 no.12
    • /
    • pp.11-25
    • /
    • 2022
  • In this study, we want to verify the factors that affect the intention to switch to a supply chain management information system applied with blockchain. To this end, variable selection and research model were constructed through the review of previous studies, and empirical analysis was conducted using the TOE framework and PPM model. The effects of Push and Pull factors on the intention to switch to the block chain system and the moderating effect through the switching cost which is a Mooring factor, were verified. The hypothesis was verified using a structural equation model using a sample of 320 response data by conducting a questionnaire survey on small and medium-sized enterprises located in Korea. As a result of the study, social influence, which is a push factor, and management's will to innovate, which is a Pull factor, had a significant effect on switching intention. And the moderating effect between the groups with high and low switching cost recognition was confirmed. This study is significant in that it presents the concept and research direction of SCBM (supply chain & blockchain management) that can enhance the competitiveness of a company through the implementation of a blockchain-based supply chain management information system.

Secure Authentication Protocol in Hadoop Distributed File System based on Hash Chain (해쉬 체인 기반의 안전한 하둡 분산 파일 시스템 인증 프로토콜)

  • Jeong, So Won;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.831-847
    • /
    • 2013
  • The various types of data are being created in large quantities resulting from the spread of social media and the mobile popularization. Many companies want to obtain valuable business information through the analysis of these large data. As a result, it is a trend to integrate the big data technologies into the company work. Especially, Hadoop is regarded as the most representative big data technology due to its terabytes of storage capacity, inexpensive construction cost, and fast data processing speed. However, the authentication token system of Hadoop Distributed File System(HDFS) for the user authentication is currently vulnerable to the replay attack and the datanode hacking attack. This can cause that the company secrets or the personal information of customers on HDFS are exposed. In this paper, we analyze the possible security threats to HDFS when tokens or datanodes are exposed to the attackers. Finally, we propose the secure authentication protocol in HDFS based on hash chain.