Designing Blockchain-based Applications a Case Study for Imported

Slides:



Advertisements
Similar presentations
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
Advertisements

南台科技大學 資訊工程系 Posture Monitoring System for Context Awareness in Mobile Computing Authors: Jonghun Baek and Byoung-Ju Yun Adviser: Yu-Chiang Li Speaker:
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
Design of Multi-RAT Virtualization Architectures in LTE-Advanced Wireless Network Location: 國立暨南國際大學電機系 Source: ICIC Express Letters, vol. 8, no. 5, May.
南台科技大學 資訊工程系 A web page usage prediction scheme using sequence indexing and clustering techniques Adviser: Yu-Chiang Li Speaker: Gung-Shian Lin Date:2010/10/15.
1 Optimal Resource Placement in Structured Peer-to-Peer Networks Authors: W. Rao, L. Chen, A.W.-C. Fu, G. Wang Source: IEEE Transactions on Parallel and.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology A self-organizing neural network using ideas from the immune.
1 Teaching-Material Design Center An ontology-based system for customizing reusable Source: Computers and Education, Vol.46, Issue: 4, May, 2006, pp
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
Intelligent Database Systems Lab Advisor : Dr. Hsu Graduate : Yu Cheng Chen Author : Yongqiang Cao Jianhong Wu 國立雲林科技大學 National Yunlin University of Science.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
When BPM meets Blockchain
The Revolutionary Benefits Of Blockchain
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
A secure and traceable E-DRM system based on mobile device
Der-Chyuan Lou and Jiang-Lung Liu,
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
BLOCKCHAIN SUPPLY CHAIN DISRUPTIONS.
Breaking through with Blockchain
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies
BLOCKCHAIN BASICS & LEGAL ISSUES
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
IBM Blockchain An Enterprise Deployment of a Distributed Consensus-based Transaction Log Ben Smith & Kostantinos Christidis 1 ©2016 IBM Corporation.
Centrality Bias Measure for High Density QR Code Module Recognition
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
The Recent Developments in Visual Secret Sharing
Distributed Ledger Technology (DLT) and Blockchain
2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Source: arXiv preprint arXiv:  (2018)
Improved Visual Secret Sharing Scheme for QR Code Applications
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
A Novel Latin Square-based Secret Sharing for M2M Communications
Lightweight IoT-based authentication scheme in cloud computing circumstance Source: Future Generation Computer Systems Volume 91, February 2019, Pages.
Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains Source: IEEE Transactions on Industrial.
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Lightweight IoT-based authentication scheme in cloud computing circumstance Source: Future Generation Computer Systems Volume 91, February 2019, Pages.
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
From lab to lab with blockchain
RBAC-SC: Role-Based Access Control Using Smart Contract
Decentralized Energy Demand Regulation in Smart Homes
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: IEEE Access, Vol. 5, pp –14767, July 2017.
SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone
Source: Energies, vol. 10, no. 12, pp. 1-22, November 2017
SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone
Source: Energies, Vol. 10, No. 12, November 2017
TrustChain: A Sybil-resistant scalable blockchain
Dynamic embedding strategy of VQ-based information hiding approach
Source: IEEE Signal Processing Letters, Vol. 14, No. 3, Mar. 2007, pp
Source: Pattern Recognition Letters 29 (2008)
Title Introduction: Discussion & Conclusion: Methods & Results:
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEEE Transactions on Circuits and Systems,
Source: Journal of Systems and Software, Vol. 140, pp , June 2018
Source:Journal of Systems and Software, vol. 140, pp , June 2018
Using Association Rules as Texture features
An imperceptible spatial domain color image watermarking scheme
Source: Sensors, Volume 19, Issue 9 (May )
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Renovating Blockchain with Distributed Database: An Open Source System
Privacy Protection for E-Health Systems by
LSB matching revisited
Rich QR Codes With Three-Layer Information Using Hamming Code
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Presentation transcript:

Designing Blockchain-based Applications a Case Study for Imported Product Traceability Source: Future generation computer systems, Vol. 92, pp. 339-406, Mar. 2019 Authors: Xiwei Xu, Qinghua Lu, Yue Liu c, Liming Zhu, Haonan Yao, and Athanasios V. Vasilakos Speaker: Chit-Jie Chew Date: 4/18/2019 1,2,4: 澳洲 新南威爾斯大學 3,5: 中國 石油大學 6: 瑞典 呂勒奧理工大學

Outline 01 Introduction 02 Related works 03 Proposed scheme 04 Experimental results 05 Conclusions

Introduction - (1/2) Supply chain

Correctness? Introduction - (2/2) Product Product information Supplier Retailer Product information Correctness? Database Certificate Photo

Blockchain layer (On-chain) Related works - (1/2) Blockchain Transparent Non-tampering Traceable Blockchain layer (On-chain) Data layer (Off-chain) Blockchain Alice Participants h(data) h( ) = ( ) ?

Related works - (2/2) Smart contract Alice Blockchain Smart contract function selectItem(uint dollar, string item){ if (item == cola) if(dollar == 10) /output cola/ } Alice Blockchain Smart contract Address Value State Functions output cola selectItem(10,cola) Bob Cola Smart contract

Traceability provider Proposed scheme - (1/5) Architecture of originChain Supplier Traceability provider Blockchain admin Management layer Data layer (Off-chain) Blockchain layer (On-chain)

Proposed scheme - (2/5) Structural design of smart contracts Blockchain layer (On-chain) Data layer (Off-chain) Supplier Factory contract source code Factory contract Contract definition Blockchain admin Deploy once Cola Instantiate Registry contract Condition # legal contract Authorities [] Threshold Traceability provider Legal contract Addr smart contract Condition Binding

Proposed scheme - (3/5) Architecture of originChain Blockchain admin Smart contract management Permission control Blockchain management Deploy smart contracts Smart contracts code Smart contracts & blockchain permission control info. Management layer System permission control info.. Smart contract repository Permission control Blockchain network info. Smart contract address, smart contract ability Data layer (Off-chain) Blockchain layer (On-chain)

Proposed scheme - (4/5) Architecture of originChain Supplier Product & enterprise management Management layer Product & enterprise Data layer (Off-chain) Blockchain layer (On-chain)

Proposed scheme - (5/5) Architecture of originChain Traceability provider Sample test management Traceability management Test results H(Certificates), H(Photos) Test results Certificates, Photos Management layer Sample test result Traceability Transaction address Transaction address Data layer (Off-chain) Blockchain layer (On-chain)

multiSignature contract Experimental results - (1/2) Upgradability multiSignature contract dyanamicBiding

Experimental results - (2/2) Quantitative analysis Writing latency (ms) Reading latency (ms)

Conclusions Adaptability Traceability