簡易檢索 / 詳目顯示

研究生: FACHREZA
FACHREZA
論文名稱: Secure Blockchain-Based Invoice Discounting
Secure Blockchain-Based Invoice Discounting
指導教授: 羅乃維
Nai-Wei Lo
口試委員: 楊傳凱
Chuan-Kai Yang
林伯慎
Bor-Shen Lin
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2021
畢業學年度: 109
語文別: 英文
論文頁數: 80
中文關鍵詞: BlockchainElliptic Curve CryptographyBayesian Reputation System
外文關鍵詞: Blockchain, Elliptic Curve Cryptography, Bayesian Reputation System
相關次數: 點閱:324下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • Many companies struggle to gain access to the capital that helps them sustain operations. One way to get funding is to use invoice discounting. Invoice discounting is a funding option provided to companies that are issued by finance companies or individual investors. It is a great way to get instant cash via unpaid invoices which can later be used to increase business growth. The traditional invoice discounting is built upon a centralized system architecture which are commonly costly and considered a solitary point of weakness. This system has several risks of cyber-attacks such as personal data breaches and data modification which makes them untrustworthy and unreliable. Moreover, a centralized system has a low transparency may causing some problems like invoice traceability. Other risk of this system is double financing. It happens when the company sells the same invoice to more than one investor. When the invoice is due, the company will just pay one investor, leaving the other unpaid. In addition, this system is also at risk of late payments.
    In order to solve this issue, we present a secure design invoice discounting using blockchain technology. Blockchain technology is used to ensures transparency, immutability, and trustworthiness. In addition, the proposed model used elliptic curve cryptosystem to encrypt, signature, and verify invoice so that ensure the integrity and confidentiality of data. Moreover, we utilize cryptocurrency to make a straightforward and secure transaction when transfer money with virtually zero down time. Hereafter, we propose Bayesian reputation system to collect and evaluate the quality of payments made by companies thereby reducing the risk of late payments. This proposed model ensures transparency and information security of blockchain on financial technology, and also avoid unwanted risks.
    A prototype is implemented to show the feasibility of the proposed model. Furthermore, the security strength of the proposed model and the performance of the prototype are evaluated in this study. Based on experiment result, the proposed blockchain-based invoice discounting system can be used to provides the following characteristics: prevent from double financing, effortless invoice tracing, protection against cyber-attacks such as personal data breach, and protection toward sensitive information from unauthorized user.


    Many companies struggle to gain access to the capital that helps them sustain operations. One way to get funding is to use invoice discounting. Invoice discounting is a funding option provided to companies that are issued by finance companies or individual investors. It is a great way to get instant cash via unpaid invoices which can later be used to increase business growth. The traditional invoice discounting is built upon a centralized system architecture which are commonly costly and considered a solitary point of weakness. This system has several risks of cyber-attacks such as personal data breaches and data modification which makes them untrustworthy and unreliable. Moreover, a centralized system has a low transparency may causing some problems like invoice traceability. Other risk of this system is double financing. It happens when the company sells the same invoice to more than one investor. When the invoice is due, the company will just pay one investor, leaving the other unpaid. In addition, this system is also at risk of late payments.
    In order to solve this issue, we present a secure design invoice discounting using blockchain technology. Blockchain technology is used to ensures transparency, immutability, and trustworthiness. In addition, the proposed model used elliptic curve cryptosystem to encrypt, signature, and verify invoice so that ensure the integrity and confidentiality of data. Moreover, we utilize cryptocurrency to make a straightforward and secure transaction when transfer money with virtually zero down time. Hereafter, we propose Bayesian reputation system to collect and evaluate the quality of payments made by companies thereby reducing the risk of late payments. This proposed model ensures transparency and information security of blockchain on financial technology, and also avoid unwanted risks.
    A prototype is implemented to show the feasibility of the proposed model. Furthermore, the security strength of the proposed model and the performance of the prototype are evaluated in this study. Based on experiment result, the proposed blockchain-based invoice discounting system can be used to provides the following characteristics: prevent from double financing, effortless invoice tracing, protection against cyber-attacks such as personal data breach, and protection toward sensitive information from unauthorized user.

    Recommendation Form Approval Letter Abstract i Acknowledgement Table of Contents List of Figures List of Tables Chapter 1 Introduction 1.1. Background 1.2. Research Problem 1.3. Research Objectives 1.4. Research Outline Chapter 2 Preliminaries 2.1. Blockchain 2.1.1. Distributed Ledger 2.1.2. Consensus 2.1.3. Smart Contract 2.2. Elliptic Curve Cryptography 2.2.1 Elliptic Curve Diffie-Hellman (ECDH) 2.2.2 Elliptic Curve Digital Signature Algorithm (ECDSA) 2.2.3 Elliptic Curve Integrated Encryption Scheme (ECIES) 2.3. Bayesian Reputation System Chapter 3 Literature Review 3.1. Literatures using Centralized Technologies 3.2. Literatures using Decentralized Technologies Chapter 4 Proposed System Design 4.1. Assumptions 4.2. Proposed System Architecture 4.3. Protocol to Generate Invoice ID 4.4. Process Flow of Proposed System Chapter 5 Prototype Implementation 5.1. System Environment 5.2. Smart Contract Implementation 5.2.1. Register Invoice ID 5.2.2. Query Invoice ID 5.2.3. Bidding Process 5.2.4. Withdraw 5.2.5. End Auction 5.2.6. Payback Loan 5.3. Application Interface Implementation Chapter 6 System Analysis 6.1. Performance Analysis 6.2. Security Analysis Chapter 7 Conclusion References

    [1] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Working Paper, 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf (visited on 1/19/2021).
    [2] H. R. Hasan and K. Salah, “Blockchain-Based Proof of Delivery of Physical Assets with Single and Multiple Transporters.” IEEE Access 6, 2018, 46781ś46793. [Online]. Available: https://doi.org/10.1109/ (visited on 1/19/2021).
    [3] Zheng. Z, Dai. H, Tang. M, Chen. X, “Blockchain and trustworthy systems: First International Conference,” BlockSys, Guangzhou, China, December 7-8, 2019, proceedings. Singapore: Springer.
    [4] P. Patil and M. Sangeetha, "Blockchain based Double Spending Prevention for Invoice financing," Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2021, pp. 41-43, doi: 10.1109/WiSPNET51692.2021.9419394.
    [5] M. Guerar, A. Merlo, M. Migliardi, F. Palmieri and L. Verderame, "A Fraud-Resilient Blockchain-Based Solution for Invoice financing," in IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1086-1098, Nov. 2020, doi: 10.1109/TEM.2020.2971865.
    [6] P. Wozny, “Elliptic Curve Cryptography: Generating and Validation of Domain Parameters in Binary Galois Fields,” Master Thesis, Rochester Institute of Technology, 2008, p. 68.
    [7] C. A. Lara-Nino, A. Diaz-Perez and M. Morales-Sandoval, "Elliptic Curve Lightweight Cryptography: A Survey," in IEEE Access, vol. 6, pp. 72514-72550, 2018, doi: 10.1109/ACCESS.2018.2881444.
    [8] A. K. Yadav, "Significance of Elliptic Curve Cryptography in Blockchain IoT with Comparative Analysis of RSA Algorithm," International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2021, pp. 256-262, doi: 10.1109/ICCCIS51004.2021.9397166.
    [9] Jøsang. A, “Bayesian Reputation Systems in Subjective Logic. Artificial Intelligence: Foundations, Theory, and Algorithms.” Springer, 2016, Cham. https://doi.org/10.1007/978-3-319-42337-1_16
    [10] A. A. Monrat, O. Schelén, and K. Andersson, “A survey of blockchain from the perspectives of applications, challenges, and opportunities,” IEEE Access, vol. 7, pp. 117 134–117 151, 2019, ISSN: 2169-3536. DOI: 10. 1109 / ACCESS. 2021. 2936094.
    [11] B. Mohanta, D. Jena, S. Panda, and S. Sobhanayak, “Blockchain technology: A survey on applications and security privacy challenges,” vol. 8, p. 100 107, Sep. 2019. DOI: 10.1016/j.iot.2019.100107.
    [12] L. S. Sankar, M. Sindhu and M. Sethumadhavan, "Survey of consensus protocols on blockchain applications," 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 2017, pp. 1-5, doi: 10.1109/ICACCS.2017.8014672.
    [13] Diego Ongaro and John Ousterhout, “In search of an understandable consensus algorithm.” In Proceedings of the 2014 USENIX conference on USENIX Annual Technical Conference (USENIX ATC'14). USENIX Association, USA, 305–320.
    [14] Szabo. Nick, “Smart Contracts: Building Blocks for Digital Markets.” [Online]. Available: https://www.semanticscholar.org/paper/Smart-Contracts-%3A-Building-Blocks-for-Digital-Szabo/9b6cd3fe0bf5455dd44ea31422d015b003b5568f
    [15] N. Koblitz, A. Menezes, and S. Vanstone, “The State of Elliptic Curve Cryptography,” Designs, Codes and Cryptography, vol. 19, no. 2/3, pp. 173–193, 2000, ISSN: 09251022. DOI:10.1023/A:1008354106356. [Online]. Available: http://link.springer.com/10.1023/A:1008354106356
    [16] V. S. Miller, “Use of Elliptic Curves in Cryptography,” in Advances in Cryptology CRYPTO ’85 Proceedings, Berlin, Heidelberg: Springer Berlin Heidelberg, 1985, pp. 417–426. DOI: 10.1007/3-540-39799-X_31. [Online]. Available: http://link.springer.com/10.1007/3-540-39799-X_31
    [17] D. R. L. Brown, “SEC1: Elliptic Curve Cryptography,” Certicom Research, Tech. Rep., 2009, p. 144. [Online]. Available: http://www.secg.org/sec1-v2.pdf
    [18] X. Sun and Z. Ren, "A Multi-denomination Electronic Invoice Protocol," International Conference on Intelligence Science and Information Engineering, 2011, pp. 127-129, doi: 10.1109/ISIE.2011.73.
    [19] D. Španić, D. Ristić, B. Vrdoljak, "An electronic invoicing system," Proceedings of the 11th International Conference on Telecommunications, 2011, pp. 149-156.
    [20] L. Humski, B. Vrdoljak, Z. Skocir, "Concept, development and implementation of FER e-invoice system," SoftCOM 2012, 20th International Conference on Software, Telecommunications and Computer Networks, 2012, pp. 1-5.
    [21] H. Chu, Y. Chai, Y. Liu and H. Sun, "A novel E-Invoice Framework towards data-oriented taxation system," Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2014, pp. 242-246, doi: 10.1109/CSCWD.2014.6846849.
    [22] Pieper. S, “Invoice Financing for Small and Medium-sized Enterprises on an Online Platform: An Action Design Research using a Transaction Cost Perspective on Platform Theories applied in a Start-up.” 2015.
    [23] Hyvärinen. H, Risius. M, Friis. G, “A Blockchain-Based Approach Towards Overcoming Financial Fraud in Public Sector Services.” Bus Inf Syst Eng 59, 441–456 (2017).
    [24] J. Yang, H. Hou, H. Li and Q. Zhu, "One Method for Implementing Privacy Protection of Electronic Invoices Based on Blockchain," 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), 2021, pp. 99-104, doi: 10.1109/ICPECA51329.2021.9362671.
    [25] Chang. SE, Luo. HL, Chen. Y, “Blockchain-Enabled Trade Finance Innovation: A Potential Paradigm Shift on Using Letter of Credit.” Sustainability. 2020; 12(1):188. https://doi.org/10.3390/su12010188
    [26] H. L. Nijeholt, J. Oudejans, Z. Erkin, “Decreg: A framework for preventing double-financing using blockchain technology,” in Proc. ACM Workshop Blockchain, Cryptocurrencies Contracts, 2017, pp. 29–34. [Online]. Available: http://doi.acm.org/10.1145/3055518.3055529
    [27] Battaiola. E, Massacci. F, Ngo. C, Sterlini. P, “Blockchain-based Invoice Factoring: from business requirements to commitments.” DLT@ITASEC, 2019.
    [28] V. Buterin, “Ethereum white paper: A next generation smart contract & decentralized application platform,” White Paper, 2018. [Online]. Available: https:// whitepaper.io/document/5/ethereum-whitepaper (visited on 1/19/2021)
    [29] G. Wood, “Ethereum: a secure decentralized generalized transaction ledger,” Ethereum Proj. Yellow Pap., pp. 1–32, 2014.
    [30] N. Mohammadzadeh, S. D. Nogoorani, J. L. Muñoz-Tapia, "Invoice Factoring Registration Based on a Public Blockchain," in IEEE Access, vol. 9, pp. 24221-24233, 2021, doi: 10.1109/ACCESS.2021.3056626.
    [31] Baliga. Arati, Subhod. I, Kamat. Pandurang, Chatterjee. Siddhartha, “Performance Evaluation of the Quorum Blockchain Platform.” 2018.

    QR CODE