帳號:guest(3.236.24.215)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者姓名(中文):FACHREZA
作者姓名(英文):FACHREZA
論文名稱(中文):Secure Blockchain-Based Invoice Discounting
論文名稱(外文):Secure Blockchain-Based Invoice Discounting
指導教授姓名(中文):羅乃維
指導教授姓名(英文):Nai-Wei Lo
口試委員姓名(中文):楊傳凱
林伯慎
口試委員姓名(英文):Chuan-Kai Yang
Bor-Shen Lin
學位類別:碩士
校院名稱:國立臺灣科技大學
系所名稱:資訊管理系
學號:m10909812
出版年(民國):110
畢業學年度:109
學期:2
語文別:英文
論文頁數:80
中文關鍵詞:BlockchainElliptic Curve CryptographyBayesian Reputation System
外文關鍵詞:BlockchainElliptic Curve CryptographyBayesian Reputation System
相關次數:
  • 推薦推薦:0
  • 點閱點閱:35
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏收藏:0
Many companies struggle to gain access to the capital that helps them sustain operations. One way to get funding is to use invoice discounting. Invoice discounting is a funding option provided to companies that are issued by finance companies or individual investors. It is a great way to get instant cash via unpaid invoices which can later be used to increase business growth. The traditional invoice discounting is built upon a centralized system architecture which are commonly costly and considered a solitary point of weakness. This system has several risks of cyber-attacks such as personal data breaches and data modification which makes them untrustworthy and unreliable. Moreover, a centralized system has a low transparency may causing some problems like invoice traceability. Other risk of this system is double financing. It happens when the company sells the same invoice to more than one investor. When the invoice is due, the company will just pay one investor, leaving the other unpaid. In addition, this system is also at risk of late payments.
In order to solve this issue, we present a secure design invoice discounting using blockchain technology. Blockchain technology is used to ensures transparency, immutability, and trustworthiness. In addition, the proposed model used elliptic curve cryptosystem to encrypt, signature, and verify invoice so that ensure the integrity and confidentiality of data. Moreover, we utilize cryptocurrency to make a straightforward and secure transaction when transfer money with virtually zero down time. Hereafter, we propose Bayesian reputation system to collect and evaluate the quality of payments made by companies thereby reducing the risk of late payments. This proposed model ensures transparency and information security of blockchain on financial technology, and also avoid unwanted risks.
A prototype is implemented to show the feasibility of the proposed model. Furthermore, the security strength of the proposed model and the performance of the prototype are evaluated in this study. Based on experiment result, the proposed blockchain-based invoice discounting system can be used to provides the following characteristics: prevent from double financing, effortless invoice tracing, protection against cyber-attacks such as personal data breach, and protection toward sensitive information from unauthorized user.
Many companies struggle to gain access to the capital that helps them sustain operations. One way to get funding is to use invoice discounting. Invoice discounting is a funding option provided to companies that are issued by finance companies or individual investors. It is a great way to get instant cash via unpaid invoices which can later be used to increase business growth. The traditional invoice discounting is built upon a centralized system architecture which are commonly costly and considered a solitary point of weakness. This system has several risks of cyber-attacks such as personal data breaches and data modification which makes them untrustworthy and unreliable. Moreover, a centralized system has a low transparency may causing some problems like invoice traceability. Other risk of this system is double financing. It happens when the company sells the same invoice to more than one investor. When the invoice is due, the company will just pay one investor, leaving the other unpaid. In addition, this system is also at risk of late payments.
In order to solve this issue, we present a secure design invoice discounting using blockchain technology. Blockchain technology is used to ensures transparency, immutability, and trustworthiness. In addition, the proposed model used elliptic curve cryptosystem to encrypt, signature, and verify invoice so that ensure the integrity and confidentiality of data. Moreover, we utilize cryptocurrency to make a straightforward and secure transaction when transfer money with virtually zero down time. Hereafter, we propose Bayesian reputation system to collect and evaluate the quality of payments made by companies thereby reducing the risk of late payments. This proposed model ensures transparency and information security of blockchain on financial technology, and also avoid unwanted risks.
A prototype is implemented to show the feasibility of the proposed model. Furthermore, the security strength of the proposed model and the performance of the prototype are evaluated in this study. Based on experiment result, the proposed blockchain-based invoice discounting system can be used to provides the following characteristics: prevent from double financing, effortless invoice tracing, protection against cyber-attacks such as personal data breach, and protection toward sensitive information from unauthorized user.
Recommendation Form
Approval Letter
Abstract i
Acknowledgement
Table of Contents
List of Figures
List of Tables
Chapter 1 Introduction
1.1. Background
1.2. Research Problem
1.3. Research Objectives
1.4. Research Outline
Chapter 2 Preliminaries
2.1. Blockchain
2.1.1. Distributed Ledger
2.1.2. Consensus
2.1.3. Smart Contract
2.2. Elliptic Curve Cryptography
2.2.1 Elliptic Curve Diffie-Hellman (ECDH)
2.2.2 Elliptic Curve Digital Signature Algorithm (ECDSA)
2.2.3 Elliptic Curve Integrated Encryption Scheme (ECIES)
2.3. Bayesian Reputation System
Chapter 3 Literature Review
3.1. Literatures using Centralized Technologies
3.2. Literatures using Decentralized Technologies
Chapter 4 Proposed System Design
4.1. Assumptions
4.2. Proposed System Architecture
4.3. Protocol to Generate Invoice ID
4.4. Process Flow of Proposed System
Chapter 5 Prototype Implementation
5.1. System Environment
5.2. Smart Contract Implementation
5.2.1. Register Invoice ID
5.2.2. Query Invoice ID
5.2.3. Bidding Process
5.2.4. Withdraw
5.2.5. End Auction
5.2.6. Payback Loan
5.3. Application Interface Implementation
Chapter 6 System Analysis
6.1. Performance Analysis
6.2. Security Analysis
Chapter 7 Conclusion
References

[1] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Working Paper, 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf (visited on 1/19/2021).
[2] H. R. Hasan and K. Salah, “Blockchain-Based Proof of Delivery of Physical Assets with Single and Multiple Transporters.” IEEE Access 6, 2018, 46781ś46793. [Online]. Available: https://doi.org/10.1109/ (visited on 1/19/2021).
[3] Zheng. Z, Dai. H, Tang. M, Chen. X, “Blockchain and trustworthy systems: First International Conference,” BlockSys, Guangzhou, China, December 7-8, 2019, proceedings. Singapore: Springer.
[4] P. Patil and M. Sangeetha, "Blockchain based Double Spending Prevention for Invoice financing," Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2021, pp. 41-43, doi: 10.1109/WiSPNET51692.2021.9419394.
[5] M. Guerar, A. Merlo, M. Migliardi, F. Palmieri and L. Verderame, "A Fraud-Resilient Blockchain-Based Solution for Invoice financing," in IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1086-1098, Nov. 2020, doi: 10.1109/TEM.2020.2971865.
[6] P. Wozny, “Elliptic Curve Cryptography: Generating and Validation of Domain Parameters in Binary Galois Fields,” Master Thesis, Rochester Institute of Technology, 2008, p. 68.
[7] C. A. Lara-Nino, A. Diaz-Perez and M. Morales-Sandoval, "Elliptic Curve Lightweight Cryptography: A Survey," in IEEE Access, vol. 6, pp. 72514-72550, 2018, doi: 10.1109/ACCESS.2018.2881444.
[8] A. K. Yadav, "Significance of Elliptic Curve Cryptography in Blockchain IoT with Comparative Analysis of RSA Algorithm," International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2021, pp. 256-262, doi: 10.1109/ICCCIS51004.2021.9397166.
[9] Jøsang. A, “Bayesian Reputation Systems in Subjective Logic. Artificial Intelligence: Foundations, Theory, and Algorithms.” Springer, 2016, Cham. https://doi.org/10.1007/978-3-319-42337-1_16
[10] A. A. Monrat, O. Schelén, and K. Andersson, “A survey of blockchain from the perspectives of applications, challenges, and opportunities,” IEEE Access, vol. 7, pp. 117 134–117 151, 2019, ISSN: 2169-3536. DOI: 10. 1109 / ACCESS. 2021. 2936094.
[11] B. Mohanta, D. Jena, S. Panda, and S. Sobhanayak, “Blockchain technology: A survey on applications and security privacy challenges,” vol. 8, p. 100 107, Sep. 2019. DOI: 10.1016/j.iot.2019.100107.
[12] L. S. Sankar, M. Sindhu and M. Sethumadhavan, "Survey of consensus protocols on blockchain applications," 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 2017, pp. 1-5, doi: 10.1109/ICACCS.2017.8014672.
[13] Diego Ongaro and John Ousterhout, “In search of an understandable consensus algorithm.” In Proceedings of the 2014 USENIX conference on USENIX Annual Technical Conference (USENIX ATC'14). USENIX Association, USA, 305–320.
[14] Szabo. Nick, “Smart Contracts: Building Blocks for Digital Markets.” [Online]. Available: https://www.semanticscholar.org/paper/Smart-Contracts-%3A-Building-Blocks-for-Digital-Szabo/9b6cd3fe0bf5455dd44ea31422d015b003b5568f
[15] N. Koblitz, A. Menezes, and S. Vanstone, “The State of Elliptic Curve Cryptography,” Designs, Codes and Cryptography, vol. 19, no. 2/3, pp. 173–193, 2000, ISSN: 09251022. DOI:10.1023/A:1008354106356. [Online]. Available: http://link.springer.com/10.1023/A:1008354106356
[16] V. S. Miller, “Use of Elliptic Curves in Cryptography,” in Advances in Cryptology CRYPTO ’85 Proceedings, Berlin, Heidelberg: Springer Berlin Heidelberg, 1985, pp. 417–426. DOI: 10.1007/3-540-39799-X_31. [Online]. Available: http://link.springer.com/10.1007/3-540-39799-X_31
[17] D. R. L. Brown, “SEC1: Elliptic Curve Cryptography,” Certicom Research, Tech. Rep., 2009, p. 144. [Online]. Available: http://www.secg.org/sec1-v2.pdf
[18] X. Sun and Z. Ren, "A Multi-denomination Electronic Invoice Protocol," International Conference on Intelligence Science and Information Engineering, 2011, pp. 127-129, doi: 10.1109/ISIE.2011.73.
[19] D. Španić, D. Ristić, B. Vrdoljak, "An electronic invoicing system," Proceedings of the 11th International Conference on Telecommunications, 2011, pp. 149-156.
[20] L. Humski, B. Vrdoljak, Z. Skocir, "Concept, development and implementation of FER e-invoice system," SoftCOM 2012, 20th International Conference on Software, Telecommunications and Computer Networks, 2012, pp. 1-5.
[21] H. Chu, Y. Chai, Y. Liu and H. Sun, "A novel E-Invoice Framework towards data-oriented taxation system," Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2014, pp. 242-246, doi: 10.1109/CSCWD.2014.6846849.
[22] Pieper. S, “Invoice Financing for Small and Medium-sized Enterprises on an Online Platform: An Action Design Research using a Transaction Cost Perspective on Platform Theories applied in a Start-up.” 2015.
[23] Hyvärinen. H, Risius. M, Friis. G, “A Blockchain-Based Approach Towards Overcoming Financial Fraud in Public Sector Services.” Bus Inf Syst Eng 59, 441–456 (2017).
[24] J. Yang, H. Hou, H. Li and Q. Zhu, "One Method for Implementing Privacy Protection of Electronic Invoices Based on Blockchain," 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), 2021, pp. 99-104, doi: 10.1109/ICPECA51329.2021.9362671.
[25] Chang. SE, Luo. HL, Chen. Y, “Blockchain-Enabled Trade Finance Innovation: A Potential Paradigm Shift on Using Letter of Credit.” Sustainability. 2020; 12(1):188. https://doi.org/10.3390/su12010188
[26] H. L. Nijeholt, J. Oudejans, Z. Erkin, “Decreg: A framework for preventing double-financing using blockchain technology,” in Proc. ACM Workshop Blockchain, Cryptocurrencies Contracts, 2017, pp. 29–34. [Online]. Available: http://doi.acm.org/10.1145/3055518.3055529
[27] Battaiola. E, Massacci. F, Ngo. C, Sterlini. P, “Blockchain-based Invoice Factoring: from business requirements to commitments.” DLT@ITASEC, 2019.
[28] V. Buterin, “Ethereum white paper: A next generation smart contract & decentralized application platform,” White Paper, 2018. [Online]. Available: https:// whitepaper.io/document/5/ethereum-whitepaper (visited on 1/19/2021)
[29] G. Wood, “Ethereum: a secure decentralized generalized transaction ledger,” Ethereum Proj. Yellow Pap., pp. 1–32, 2014.
[30] N. Mohammadzadeh, S. D. Nogoorani, J. L. Muñoz-Tapia, "Invoice Factoring Registration Based on a Public Blockchain," in IEEE Access, vol. 9, pp. 24221-24233, 2021, doi: 10.1109/ACCESS.2021.3056626.
[31] Baliga. Arati, Subhod. I, Kamat. Pandurang, Chatterjee. Siddhartha, “Performance Evaluation of the Quorum Blockchain Platform.” 2018.
全文檔公開日期:2023/07/07 (本校及校內區域網路)
全文檔公開日期:2023/07/07 (校外網際網路)
全文檔公開日期:2023/07/07 (國家圖書館:臺灣博碩士論文系統)
Full Text
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *