• 제목/요약/키워드: decentralized data processing

검색결과 42건 처리시간 0.045초

Blockchain for the Trustworthy Decentralized Web Architecture

  • Kim, Geun-Hyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.26-36
    • /
    • 2021
  • The Internet was created as a decentralized and autonomous system of interconnected computer networks used for data exchange across mutually trusted participants. The element technologies on the Internet, such as inter-domain and intra-domain routing and DNS, operated in a distributed manner. With the development of the Web, the Web has become indispensable in daily life. The existing web applications allow us to form online communities, generate private information, access big data, shop online, pay bills, post photos or videos, and even order groceries. This is what has led to centralization of the Web. This centralization is now controlled by the giant social media platforms that provide it as a service, but the original Internet was not like this. These giant companies realized that the decentralized network's huge value involves gathering, organizing, and monetizing information through centralized web applications. The centralized Web applications have heralded some major issues, which will likely worsen shortly. This study focuses on these problems and investigates blockchain's potentials for decentralized web architecture capable of improving conventional web services' critical features, including autonomous, robust, and secure decentralized processing and traceable trustworthiness in tamper-proof transactions. Finally, we review the decentralized web architecture that circumvents the main Internet gatekeepers and controls our data back from the giant social media companies.

Role Based Smart Contract For Data sharing

  • Joachim, Kweka Bruno;Rhee, Kyung-Hyune
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2018년도 추계학술발표대회
    • /
    • pp.235-237
    • /
    • 2018
  • The Internet has allowed many things to move fast, including sharing of data, files and others within a second. Many domains use applications range from IoT, smart cities, healthcare, and organizations to share the data when necessary. However, there are some challenges faced by existing systems that works on centralized nature. Such challenges are data breach, trustiness issue, unauthorized access and data fraud. Therefore in this work, we focus on using a smart contract which is used by blockchain platform and works on decentralized form. Furthermore, in this work our contract provides an access to the file uploaded onto the decentralized storage such as IPFS. By leveraging smart contract-role based which consist of a contract owner who can manage the users when access the certain resources such as a file and as well as use of decentralized storage to avoid single point of failure and censorship over secure communication channel. We checked the gas cost of the smart contract since most of contracts tends to be a high cost.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

연합학습의 인센티브 플랫폼으로써 이더리움 스마트 컨트랙트를 시행하는 경우의 실무적 고려사항 (Practical Concerns in Enforcing Ethereum Smart Contracts as a Rewarding Platform in Decentralized Learning)

  • ;;장설아;이경현
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제9권12호
    • /
    • pp.321-332
    • /
    • 2020
  • 탈중앙화 접근법은 기존 시스템의 데이터 프라이버시 결함을 보완하기 위해 산·학계에서 폭넓게 연구되고 있다. 블록체인은 기록된 데이터는 위조할 수 없으며 합의를 기반으로 의사결정을 이루고 전반적인 거래의 비용은 저렴한 특징을 가지고 있다. 연합학습은 데이터 집합을 공개적으로 노출하지 않고 다수의 장치를 집합적으로 사용 함으로서 딥러닝 모델을 개선할 수 있게 한다. 모델 구축을 위해서는 자원을 사용하도록 참여자들의 동기 부여를 위한 적절하고 참여 비율에 합당한 인센티브 제도가 필수적이다. 그러나 중앙집중화된 인센티브 메커니즘은 중간 계층에 의존하고 여전히 병목현상을 유발하기 때문에 연합학습에 적용하기에는 어려움이 있다. 따라서, 우리는 이더리움 스마트컨트랙트를 활용하여 연합학습 어플리케이션을 위한 인센티브 모델을 제안한다. 구현 결과는 설계 목표를 충족하였고, 마지막 절에서 연합학습에서 프라이버시 및 데이터 유출과 관련된 민감 데이터에 대한 본 구현을 실행할 때 발생할 수 있는 사항들을 설명한다.

Wireless sensor network for decentralized damage detection of building structures

  • Park, Jong-Woong;Sim, Sung-Han;Jung, Hyung-Jo
    • Smart Structures and Systems
    • /
    • 제12권3_4호
    • /
    • pp.399-414
    • /
    • 2013
  • The smart sensor technology has opened new horizons for assessing and monitoring structural health of civil infrastructure. Smart sensor's unique features such as onboard computation, wireless communication, and cost effectiveness can enable a dense network of sensors that is essential for accurate assessment of structural health in large-scale civil structures. While most research efforts to date have been focused on realizing wireless smart sensor networks (WSSN) on bridge structures, relatively less attention is paid to applying this technology to buildings. This paper presents a decentralized damage detection using the WSSN for building structures. An existing flexibility-based damage detection method is extended to be used in the decentralized computing environment offered by the WSSN and implemented on MEMSIC's Imote2 smart sensor platform. Numerical simulation and laboratory experiment are conducted to validate the WSSN for decentralized damage detection of building structures.

마이데이터 서비스 활성화를 위한 분산 ID(Decentralized Identification, DID) 수용의도에 영향을 미치는 요인에 관한 연구 (A Study on Factors Affecting Intention to Accept Decentralized Identification(DID) for Activation of MyData Service)

  • 김지영;신용태
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2020년도 춘계학술발표대회
    • /
    • pp.417-419
    • /
    • 2020
  • 데이터 3법 시대에 접어들면서 기업들에는 가명화된 개인정보를 활용할 수 있는 길이 열렸다. 하지만 현 데이터 3법은 데이터를 생성하고 유통하며 활용할 기업들의 책임과 혜택에 내용이 맞춰져 있어 아쉬운 감이 있다. 개인의 기본권을 보장하면서도 마이데이터 유통 및 활용을 도울 방법은 없을까? 본 논문에서는 데이터의 주체인 개인이 데이터 주권을 행사하고 실질적인 혜택을 받는 마이데이터 서비스의 활성화를 위한 ID 관리 기술로 블록체인 기반 분산 ID(Decentralized Identification, DID)를 제안하고, DID 수용의도에 영향을 마치는 요인을 연구함으로써 마이데이터 서비스 개발 활성화를 위한 정책적, 실무적 시사점을 도출하고자 한다.

The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network

  • Rahmadika, Sandi;Noh, Siwan;Lee, Kyeongmo;Kweka, Bruno Joachim;Rhee, Kyung-Hyune
    • Journal of Information Processing Systems
    • /
    • 제16권3호
    • /
    • pp.699-717
    • /
    • 2020
  • Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The propagation delay opens up opportunities for attackers to apply their protocol. Either by accelerating or decelerating the propagation time directly without proper calculation, it brings numerous negative impacts to the entire blockchain system. In this paper, we thoroughly review and elaborate on several parameters related to the propagation time in such a system. We describe our findings in terms of data communication, transaction propagation, and the possibility of an interference attack that caused an extra propagation time. Furthermore, we present the influence of block size, consensus, and blockchain scalability, including the relation of parameters. In the last session, we remark several points associated with the propagation time and use cases to avoid dilemmas in the light of the experiments and literary works.

Empowering Blockchain For Secure Data Storing in Industrial IoT

  • Firdaus, Muhammad;Rhee, Kyung-Hyune
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2020년도 춘계학술발표대회
    • /
    • pp.231-234
    • /
    • 2020
  • In the past few years, the industrial internet of things (IIoT) has received great attention in various industrial sectors which have potentially increased a high level of integrity, availability, and scalability. The increasing of IIoT is expected to create new smart industrial enterprises and build the next generation smart system. However existing IIoT systems rely on centralized servers that are vulnerable to a single point of failure and malicious attack, which exposes the data to security risks and storage. To address the above issues, blockchain is widely considered as a promising solution, which can build a secure and efficient environment for data storing, processing and sharing in IIoT. In this paper, we propose a decentralized, peer-to-peer platform for secure data storing in industrial IoT base on the ethereum blockchain. We exploit ethereum to ensure data security and reliability when smart devices store the data.

GDPR 준수 가능한 블록체인 기반 접근제어 시스템 (GDPR Compliant Blockchain Based Access Control(GCBAC))

  • 임준호;천지영;노건태;정익래
    • 정보보호학회논문지
    • /
    • 제30권6호
    • /
    • pp.981-997
    • /
    • 2020
  • 블록체인 기술은 탈중앙화된(decentralized) 분산원장(distributed ledger)과 합의 기반 구조를 바탕으로 높은 보안 수준을 제공할 수 있다는 장점이 있다. 이와 같은 블록체인 기술의 활용도 증진을 위해서는 헬스 케어, 전자상거래 등 개인정보 처리가 필요한 분야에서의 활용 방안 모색이 필요하다. 이를 위해서는, 블록체인 기반 시스템에서도 유럽 연합(EU) 개인정보보호 규정(GDPR, General Data Protection Regulation)으로 대표되는 개인정보보호 관련 법규 및 규정을 준수할 수 있어야 한다. 그러나, 블록체인의 자체 특성상 기록된 자료에 대한 불변성과 탈중앙성 때문에 기존 개인정보보호 규정의 요구사항을 블록체인상에서 기술적으로 구현함에 어려움이 있다. 본 논문에서 우리는 카멜레온 해시(chameleon hash)와 속성 기반 암호화(Attribute Based Encryption, 이하 ABE)를 활용하여 GDPR에서 요구하는 개인정보 주체의 권리를 보장 가능한 다중 체인(multi-chain)기반 접근제어 시스템을 제시한다. 끝으로 우리의 시스템에서는 기밀성과 무결성을 유지한 가운데, 개인정보 처리가 가능함을 보안 분석을 통해 보인다.

Blockchain-Enabled Decentralized Clustering for Enhanced Decision Support in the Coffee Supply Chain

  • Keo Ratanak;Muhammad Firdaus;Kyung-Hyune Rhee
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.260-263
    • /
    • 2023
  • Considering the growth of blockchain technology, the research aims to transform the efficiency of recommending optimal coffee suppliers within the complex supply chain network. This transformation relies on the extraction of vital transactional data and insights from stakeholders, facilitated by the dynamic interaction between the application interface (e.g., Rest API) and the blockchain network. These extracted data are then subjected to advanced data processing techniques and harnessed through machine learning methodologies to establish a robust recommendation system. This innovative approach seeks to empower users with informed decision-making abilities, thereby enhancing operational efficiency in identifying the most suitable coffee supplier for each customer. Furthermore, the research employs data visualization techniques to illustrate intricate clustering patterns generated by the K-Means algorithm, providing a visual dimension to the study's evaluation.