Volume 6, Issue 6, December 2018, Page: 68-75
Blockchain Technology for Data Entirety
Khuat Thanh Son, Institute of Information Technology, Vietnam Academy of Science and Technology, Ha Noi, Vietnam
Nguyen Truong Thang, Institute of Information Technology, Vietnam Academy of Science and Technology, Ha Noi, Vietnam
Tran Manh Dong, Institute of Information Technology, Vietnam Academy of Science and Technology, Ha Noi, Vietnam
Nguyen Ha Thanh, University of Engineering and Technology, Vietnam National University, Ha Noi, Vietnam
Received: Nov. 27, 2018;       Accepted: Dec. 17, 2018;       Published: Jan. 23, 2019
DOI: 10.11648/j.sr.20180606.12      View  180      Downloads  34
Abstract
This paper studies blockchain technology - which is getting strong attention from the industry and also being applied in many fields. Based on the nature of blockchain's data security, the paper analyzes the application of blockchain technology to deal with the problem of data entirety and transparency for text documents. Firstly, the paper presents an overview of some technology components constituting to blockchain and its relevance and optimization to the data authentication/protection problem. Next, an experimental application of blockchain to form a network which stores documents and maintains the entirety of data stored in the network for external queries.
Keywords
Blockchain, Hash Table, Peer Networks, Game Theory, Digital Signatures, Cryptography, ECDSA, SHA-265, Documentation
To cite this article
Khuat Thanh Son, Nguyen Truong Thang, Tran Manh Dong, Nguyen Ha Thanh, Blockchain Technology for Data Entirety, Science Research. Vol. 6, No. 6, 2018, pp. 68-75. doi: 10.11648/j.sr.20180606.12
Copyright
Copyright © 2018 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reference
[1]
Riera A, Brown P. Bringing confidence to electronic voting. Electronic Journal of e-Government 2003; 1 (1):43-50.
[2]
Kirkos E, Spathis C, Manolopoulos Y. Data mining techniques for the detection of fraudulent financial statements. Expert systems with applications 2007; 32 (4):995-1003.
[3]
Server O. Corruption: A major problem for urban management: Some evidence from Indonesia. Habitat International 1996; 20 (1):23-41.
[4]
Hofmann H, Schleper MC, Blome C. Conflict minerals and supply chain due diligence: an exploratory study of multi-tier supply chains. Journal of business ethics 2018; 147 (1):115-41.
[5]
Crosby M, Pattanayak P, Verma S. Blockchain technology: Beyond Bitcoin. 2016.
[6]
Davidson S, De Filippi P, Potts J. Economics of blockchain. 2016.
[7]
Khan C, Lewis A, Rutland E, Wan C, Rutter K, Thompson C. A Distributed-Ledger Consortium Model for Collaborative Innovation. Computer 2017; 50 (9):29-37.
[8]
Benchoufi M, Porcher R, Ravaud P. Blockchain protocols in clinical trials: Transparency and traceability of consent. F1000Research 2017; 6:66.
[9]
Azaria A, Ekblaw A, Vieira T, Lippman A. MedRec: Using blockchain for medical data access and permission management. Open and Big Data (OBD), IEEE International Conference on; 2016.
[10]
Dagher GG, Mohler J, Milojkovic M, Marella PB. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustainable Cities and Society 2018; 39:283-97.
[11]
Diffie, Whitfield; Hellman, Martin (8 June 1976). "Multi-user cryptographic techniques".
[12]
Menezes, A. J.; van Oorschot, P. C.; Vanstone, S. A. “Handbook of Applied Cryptography”.
[13]
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone (October 1996). "11: Digital Signatures". Handbook of Applied Cryptography.
[14]
V. Miller, "Uses of elliptic curves in cryptography" in Advances in Cryptology Crypto 85, Springer Verlag, vol. 218, pp. 417-426, 1986.
[15]
Stevens, Marc; Bursztein, Elie; Karpman, Pierre; Albertini, Ange; Markov, Yarik. "The first collision for full SHA-1" (PDF). Shattered IO. Retrieved 23 February 2017.
[16]
An Illustrated Guide to Cryptographic Hashes. (2015, May 9). Retrieved from http://www.unixwiz.net/techtips/iguide-crypto-hashes.html.
[17]
Veness, Chris. “SHA-256.” SHA-256 Cryptographic Hash Algorithm Implemented in JavaScript | Movable Type Scripts, 2015, www.movable-type.co.uk/scripts/sha256.html.
[18]
O'Connor, J. J.; Robertson, E. F. (October 1998). "Karl Theodor Wilhelm Weierstrass". School of Mathematics and Statistics, University of St Andrews, Scotland. Retrieved 7 September 2014.
[19]
W. Stallings, Cryptography and Network Security 5th Edition, Prentice Hall Pearson Education, Inc, 2011.
[20]
Marling Engle. Vulnerabilities of P2P systems and a critical look at their solutions, May, 2006.
[21]
Nakamoto, Satoshi. Bitcoin: A peer-to-peer electronic cash system. 2008. https://bitcoin.org/bitcoin.pdf.
Browse journals by subject