簡易檢索 / 詳目顯示

研究生: 張守群
Shou-Chun Chang
論文名稱: 基於聯盟區塊鏈之使用者導向電子訊息交換框架
A User-Oriented Electronic Message Exchange Framework Based on Consortium Blockchain
指導教授: 羅乃維
Nai-Wei Lo
口試委員: 吳宗成
Tzong-Chen Wu
查士朝
Shi-Cho Cha
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2018
畢業學年度: 106
語文別: 中文
論文頁數: 116
中文關鍵詞: 區塊鏈聯盟鏈智能合約電子資料交換Quorum
外文關鍵詞: Blockchain, Consortium Blockchain, Smart Contract, EDI, Quorum
相關次數: 點閱:310下載:18
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近幾年區塊鏈的熱潮讓各式各樣的應用開始蓬勃發展,從初期加密貨幣(Cryptocurrency)領域的比特幣(Bitcoin)到其它加密貨幣開始湧現,讓社會大眾對於區塊鏈的技術開始慢慢了解,到了2014年以太坊(Ethereum)的出現替原本只專注在加密貨幣上的區塊鏈開創了另外一個領域,也就是「智能合約」。

    藉由智能合約,我們能將更複雜的應用放到區塊鏈上,但隨之而來的就是資料隱私的問題,根據區塊鏈的特性:去中心化、資料不可竄改與分散式帳本,讓鏈上的資料是完全公開透明的,任何人都可以去查閱。而為了解決這個問題,如何在區塊鏈上實作資料隱私機制成為了大家研究的重點並發展出了私有鏈(Private blockchain)以及聯盟鏈(Consortium blockchain)的概念。

    在傳統電子資料交換上由於都是中心化系統的架構,在系統穩定性以及資料安全性上會是很大的疑慮。本研究希望透過聯盟區塊鏈的技術來讓企業間或者是企業內的檔案交換機制更完善,藉由區塊鏈的特性解決以往中心化架構的缺點以及透過Quorum的資料隱私處理,確保只有相關的受文者可以收到交易資料,保障交換雙方的隱私,期望能藉由本論文提出的框架來解決上述的問題。


    In recent years, blockchain technology reached its peak, lots of applications based on blockchain were emerged.
    The pioneer in the field of Cryptocurrency was Bitcoin.
    Alone with the field became more mature, more and more cryptocurrencies appear, which let the public begin to understand the technology of the blockchain.
    In 2014, Ethereum showed up with completely new concept, Smart Contract, which lead blockchain application from cryptocurrency transferred to the new field.

    With smart contract, we can build more complex applications based on the blockchain, but it brings data privacy issues.
    According to the characteristics of the blockchain: decentralization, immutability and distributed ledger, which make data is public to everyone.
    In order to solve this problem, how to implement privacy mechanism on the blockchain has become the aim of everyone's research.
    Because of this, the concept of private blockchain and consortium blockchain emerged.

    In the traditional electronic data exchange system, because they were based on centralized architecture.
    On the system stability and data security would be a great concern.
    I proposed a message exchange framework based on consortium blockchain, hoping to solve the above problems by this framework.

    %My framework is based on Quorum, which make data privacy possible with blockchain architecture.

    \noindent Keyword: Blockchain, Consortium Blockchain, Smart Contract, EDI, Quorum

    教授推薦書........................................................................................................................ i 論文口試委員審定書........................................................................................................ ii 中文摘要............................................................................................................................ iii 英文摘要............................................................................................................................ iv 誌謝.................................................................................................................................... v 目錄.................................................................................................................................... vi 表目錄................................................................................................................................ x 圖目錄................................................................................................................................ xi 第一章緒論...................................................................................................................... 1 1.1 研究背景與動機. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 研究目的與貢獻. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 應用情境. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.4 章節介紹. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 第二章背景知識與文獻探討.......................................................................................... 6 2.1 電子資料交換. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 去中心化公開金鑰基礎建設. . . . . . . . . . . . . . . . . . . . . . . . 7 2.3 區塊鏈技術與特性. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3.1 以太坊(Ethereum) . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.4 區塊鏈資料隱私保護機制. . . . . . . . . . . . . . . . . . . . . . . . . . 11 第三章系統架構與元件.................................................................................................. 16 3.1 系統架構. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.1.1 組織內交換系統架構. . . . . . . . . . . . . . . . . . . . . . . . 18 3.1.2 組織間交換系統架構. . . . . . . . . . . . . . . . . . . . . . . . 19 3.1.3 混合交換架構. . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.2 智能合約. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 3.2.1 電子資料交換合約(Electronic Data eXchange, EDX) . . . . . . . 22 3.2.2 檔案管理合約(File Manager, FM) . . . . . . . . . . . . . . . . . 23 3.2.3 交易管理合約(eXchange Manager, XM) . . . . . . . . . . . . . . 24 3.3 XAgent 代理服務(eXchange Agent) . . . . . . . . . . . . . . . . . . . . 25 3.4 身分確認機制. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 第四章系統流程.............................................................................................................. 27 4.1 組織內交換初始化. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 4.2 組織內發文. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 4.3 組織內收文. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 4.4 組織間交換初始化. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 4.5 組織間發文. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 4.6 組織間收文. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 4.7 混合架構初始化. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 4.8 混合架構發文. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 4.9 混合架構收文. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 第五章系統實作.............................................................................................................. 66 5.1 區塊鏈服務. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 5.2 智能合約. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 5.2.1 File Manager 檔案管理員. . . . . . . . . . . . . . . . . . . . . . 66 5.2.2 eXchange Manager 交換管理員. . . . . . . . . . . . . . . . . . . 66 5.2.3 Electronic Data eXchange 電子資料交換合約. . . . . . . . . . . 67 5.3 X-Template 樣板引擎. . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 5.3.1 單筆套印範例. . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 5.3.2 多筆套印範例. . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 5.4 XAgent 代理服務. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 5.4.1 API 列表. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 5.4.2 設定檔. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 5.4.3 實際畫面. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 5.5 金鑰產生工具. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 5.6 身分管理機制. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 第六章系統實驗結果分析與討論.................................................................................. 78 6.1 系統實驗. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 6.1.1 Quorum 壓力測試. . . . . . . . . . . . . . . . . . . . . . . . . . 79 6.1.2 組織內交換流程測試. . . . . . . . . . . . . . . . . . . . . . . . 79 6.2 實驗結果分析. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 6.2.1 Quorum 壓力測試. . . . . . . . . . . . . . . . . . . . . . . . . . 83 6.2.2 組織內交換流程測試. . . . . . . . . . . . . . . . . . . . . . . . 83 6.3 討論. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 6.3.1 交換檔案處理方式. . . . . . . . . . . . . . . . . . . . . . . . . 83 6.3.2 交換速度取捨. . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 6.3.3 簡化混合架構的可能性. . . . . . . . . . . . . . . . . . . . . . . 86 6.3.4 交換層級支援個人的可能性. . . . . . . . . . . . . . . . . . . . 86 6.3.5 收文後的不可否認性. . . . . . . . . . . . . . . . . . . . . . . . 87 第七章結論與未來發展.................................................................................................. 88 參考文獻............................................................................................................................ 90 附錄A 系統完整流程圖.................................................................................................. 93

    [1] W3C. (2018) A registry for decentralized identifier methods. [Online]. Available: https://w3c-ccg.github.
    io/did-method-registry/
    [2] Z. Zheng, S. Xie, H.-N. Dai, and H. Wang, “Blockchain challenges and opportunities: A survey,” Work
    Pap.–2016, 2016.
    [3] J. P. Morgan. (2016) Quorum whitepaper, version 0.1. Last visited on 2018-06-03. [Online]. Available:
    https://github.com/jpmorganchase/quorum-docs/blob/master/Quorum%20Whitepaper%20v0.1.pdf
    [4] J. Morgan. (2018) Quorum: A permissioned implementation of ethereum supporting data privacy.
    [Online]. Available: https://github.com/jpmorganchase/quorum
    [5] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2009. [Online]. Available:
    http://www.bitcoin.org/bitcoin.pdf
    [6] Namecoin. (2011) Namecoin wiki. [Online]. Available: https://wiki.namecoin.org/index.php?title=
    Welcome
    [7] C. Lee. (2011) Litecoin github. [Online]. Available: https://github.com/litecoin-project/litecoin
    [8] E. Foundation. (2018) Ethereum’s white paper. Last visited on 2018-05-21. [Online]. Available:
    https://github.com/ethereum/wiki/wiki/White-Paper
    [9] R3. (2014) R3 website. [Online]. Available: https://www.r3.com/
    [10] R. G. Brown, J. Carlyle, I. Grigg, and M. Hearn, “Corda: An introduction,” 2016.
    [11] S. Scala and R. McGrath, “Advantages and disadvantages of electronic data interchange an industry
    perspective,” Information & Management, vol. 25, no. 2, pp. 85 – 91, 1993. [Online]. Available:
    http://www.sciencedirect.com/science/article/pii/0378720693900504
    [12] 賴國旺, “公文電子交換系統之資訊安全改善建議,” 檔案季刊, 2014.
    [13] C.-W. Wu, H.-L. Shan, W.-C. Wang, D.-M. Shieh, and M.-H. Chang, “E-government electronic certification
    servicesin taiwan,” 2001.
    [14] W. Foundation. (2018) Public key infrastructure. Last visited on 2018-05-21. [Online]. Available:
    https://en.wikipedia.org/wiki/Public_key_infrastructure
    [15] 賴國旺, “機關公文管理系統與全國共用公文電子交換系統整合介接技術,” 檔案季刊, 2017.
    [16] 黃彥棻. (2013) 政府電子公文系統被駭,主管單位竟企圖遮掩. [Online]. Available: https:
    //www.ithome.com.tw/node/80703
    [17] N. I. of Standards and Technology. (1996) Electronic data interchange (edi) (fips pub 161-2). [Online].
    Available: https://web.archive.org/web/20080511043940/https://www.itl.nist.gov/fipspubs/fip161-2.htm
    [18] ISO, “Electronic data interchange for administration, commerce and transport (edifact) – application
    level syntax rules,” Tech. Rep., 1988, iSO 9735:1988. [Online]. Available: https://www.iso.org/standard/
    17592.html
    [19] Microsoft. (2017) Edi standards support. [Online]. Available: https://docs.microsoft.com/en-US/biztalk/
    core/edi-standards-support
    [20] V. B. J. C. D. D.-C. L. P. K. J. N. D. R. M. S. G. S. N. T. H. T. W. Christopher Allen, Arthur Brock.
    (2015) Decentralized public key infrastructure. [Online]. Available: https://github.com/WebOfTrustInfo/
    rebooting-the-web-of-trust/blob/master/final-documents/dpki.pdf
    [21] W3C. (2018) Data model and syntaxes for decentralized identifiers (dids). [Online]. Available:
    https://w3c-ccg.github.io/did-spec/
    [22] A. Bakre, N. Patil, and S. Gupta, “Implementing decentralized digital identity using blockchain,” International
    Journal of Engineering Technology Science and Research, vol. 4, no. 10, pp. 379–385, 2017.
    [23] Z. Diebold, “Self-sovereign identity using smart contracts on the ethereum blockchain,” 2017.
    [24] J. Benet, “Ipfs-content addressed, versioned, p2p file system,” arXiv preprint arXiv:1407.3561, 2014.
    [25] S.-H. C. J.-W. J. Moon-Yong Jung, Won-Suk Kim, “A blockchain-based id/ip mapping and user-friendly
    fog computing for hyper-connected iot architecture,” International Journal of Information Communication
    Technology and Digital Convergence, 2017.
    [26] J. R. Douceur, “The sybil attack,” in International workshop on peer-to-peer systems. Springer, 2002,
    pp. 251–260.
    [27] J. M. Gonzalez, M. Anwar, and J. B. Joshi, “A trust-based approach against ip-spoofing attacks,” in
    Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on. IEEE, 2011, pp.
    63–70.
    [28] CCN. (2018) Bitcoin gold hit by double spend attack, exchanges lose millions. [Online]. Available:
    https://www.ccn.com/bitcoin-gold-hit-by-double-spend-attack-exchanges-lose-millions/
    [29] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography
    and privacy-preserving smart contracts,” in 2016 IEEE symposium on security and privacy (SP). IEEE,
    2016, pp. 839–858.
    [30] Microsoft. (2018) .net core. [Online]. Available: https://docs.microsoft.com/zh-tw/dotnet/core/
    [31] Nethereum. (2018) Nethereum. [Online]. Available: https://github.com/Nethereum/Nethereum
    [32] Ethereum. (2018) Web3.js. [Online]. Available: https://github.com/ethereum/web3.js/
    [33] Microsoft. (2017) Standard date and time format strings. [Online]. Available: https://docs.microsoft.
    com/en-US/dotnet/standard/base-types/standard-date-and-time-format-strings
    [34] D. Identity. (2018) Universal resolver. [Online]. Available: https://github.com/decentralized-identity/
    universal-resolver

    QR CODE