Author: |
張守群 Shou-Chun Chang |
---|---|
Thesis Title: |
基於聯盟區塊鏈之使用者導向電子訊息交換框架 A User-Oriented Electronic Message Exchange Framework Based on Consortium Blockchain |
Advisor: |
羅乃維
Nai-Wei Lo |
Committee: |
吳宗成
Tzong-Chen Wu 查士朝 Shi-Cho Cha |
Degree: |
碩士 Master |
Department: |
管理學院 - 資訊管理系 Department of Information Management |
Thesis Publication Year: | 2018 |
Graduation Academic Year: | 106 |
Language: | 中文 |
Pages: | 116 |
Keywords (in Chinese): | 區塊鏈 、聯盟鏈 、智能合約 、電子資料交換 、Quorum |
Keywords (in other languages): | Blockchain, Consortium Blockchain, Smart Contract, EDI, Quorum |
Reference times: | Clicks: 528 Downloads: 18 |
Share: |
School Collection Retrieve National Library Collection Retrieve Error Report |
近幾年區塊鏈的熱潮讓各式各樣的應用開始蓬勃發展,從初期加密貨幣(Cryptocurrency)領域的比特幣(Bitcoin)到其它加密貨幣開始湧現,讓社會大眾對於區塊鏈的技術開始慢慢了解,到了2014年以太坊(Ethereum)的出現替原本只專注在加密貨幣上的區塊鏈開創了另外一個領域,也就是「智能合約」。
藉由智能合約,我們能將更複雜的應用放到區塊鏈上,但隨之而來的就是資料隱私的問題,根據區塊鏈的特性:去中心化、資料不可竄改與分散式帳本,讓鏈上的資料是完全公開透明的,任何人都可以去查閱。而為了解決這個問題,如何在區塊鏈上實作資料隱私機制成為了大家研究的重點並發展出了私有鏈(Private blockchain)以及聯盟鏈(Consortium blockchain)的概念。
在傳統電子資料交換上由於都是中心化系統的架構,在系統穩定性以及資料安全性上會是很大的疑慮。本研究希望透過聯盟區塊鏈的技術來讓企業間或者是企業內的檔案交換機制更完善,藉由區塊鏈的特性解決以往中心化架構的缺點以及透過Quorum的資料隱私處理,確保只有相關的受文者可以收到交易資料,保障交換雙方的隱私,期望能藉由本論文提出的框架來解決上述的問題。
In recent years, blockchain technology reached its peak, lots of applications based on blockchain were emerged.
The pioneer in the field of Cryptocurrency was Bitcoin.
Alone with the field became more mature, more and more cryptocurrencies appear, which let the public begin to understand the technology of the blockchain.
In 2014, Ethereum showed up with completely new concept, Smart Contract, which lead blockchain application from cryptocurrency transferred to the new field.
With smart contract, we can build more complex applications based on the blockchain, but it brings data privacy issues.
According to the characteristics of the blockchain: decentralization, immutability and distributed ledger, which make data is public to everyone.
In order to solve this problem, how to implement privacy mechanism on the blockchain has become the aim of everyone's research.
Because of this, the concept of private blockchain and consortium blockchain emerged.
In the traditional electronic data exchange system, because they were based on centralized architecture.
On the system stability and data security would be a great concern.
I proposed a message exchange framework based on consortium blockchain, hoping to solve the above problems by this framework.
%My framework is based on Quorum, which make data privacy possible with blockchain architecture.
\noindent Keyword: Blockchain, Consortium Blockchain, Smart Contract, EDI, Quorum
[1] W3C. (2018) A registry for decentralized identifier methods. [Online]. Available: https://w3c-ccg.github.
io/did-method-registry/
[2] Z. Zheng, S. Xie, H.-N. Dai, and H. Wang, “Blockchain challenges and opportunities: A survey,” Work
Pap.–2016, 2016.
[3] J. P. Morgan. (2016) Quorum whitepaper, version 0.1. Last visited on 2018-06-03. [Online]. Available:
https://github.com/jpmorganchase/quorum-docs/blob/master/Quorum%20Whitepaper%20v0.1.pdf
[4] J. Morgan. (2018) Quorum: A permissioned implementation of ethereum supporting data privacy.
[Online]. Available: https://github.com/jpmorganchase/quorum
[5] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2009. [Online]. Available:
http://www.bitcoin.org/bitcoin.pdf
[6] Namecoin. (2011) Namecoin wiki. [Online]. Available: https://wiki.namecoin.org/index.php?title=
Welcome
[7] C. Lee. (2011) Litecoin github. [Online]. Available: https://github.com/litecoin-project/litecoin
[8] E. Foundation. (2018) Ethereum’s white paper. Last visited on 2018-05-21. [Online]. Available:
https://github.com/ethereum/wiki/wiki/White-Paper
[9] R3. (2014) R3 website. [Online]. Available: https://www.r3.com/
[10] R. G. Brown, J. Carlyle, I. Grigg, and M. Hearn, “Corda: An introduction,” 2016.
[11] S. Scala and R. McGrath, “Advantages and disadvantages of electronic data interchange an industry
perspective,” Information & Management, vol. 25, no. 2, pp. 85 – 91, 1993. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/0378720693900504
[12] 賴國旺, “公文電子交換系統之資訊安全改善建議,” 檔案季刊, 2014.
[13] C.-W. Wu, H.-L. Shan, W.-C. Wang, D.-M. Shieh, and M.-H. Chang, “E-government electronic certification
servicesin taiwan,” 2001.
[14] W. Foundation. (2018) Public key infrastructure. Last visited on 2018-05-21. [Online]. Available:
https://en.wikipedia.org/wiki/Public_key_infrastructure
[15] 賴國旺, “機關公文管理系統與全國共用公文電子交換系統整合介接技術,” 檔案季刊, 2017.
[16] 黃彥棻. (2013) 政府電子公文系統被駭,主管單位竟企圖遮掩. [Online]. Available: https:
//www.ithome.com.tw/node/80703
[17] N. I. of Standards and Technology. (1996) Electronic data interchange (edi) (fips pub 161-2). [Online].
Available: https://web.archive.org/web/20080511043940/https://www.itl.nist.gov/fipspubs/fip161-2.htm
[18] ISO, “Electronic data interchange for administration, commerce and transport (edifact) – application
level syntax rules,” Tech. Rep., 1988, iSO 9735:1988. [Online]. Available: https://www.iso.org/standard/
17592.html
[19] Microsoft. (2017) Edi standards support. [Online]. Available: https://docs.microsoft.com/en-US/biztalk/
core/edi-standards-support
[20] V. B. J. C. D. D.-C. L. P. K. J. N. D. R. M. S. G. S. N. T. H. T. W. Christopher Allen, Arthur Brock.
(2015) Decentralized public key infrastructure. [Online]. Available: https://github.com/WebOfTrustInfo/
rebooting-the-web-of-trust/blob/master/final-documents/dpki.pdf
[21] W3C. (2018) Data model and syntaxes for decentralized identifiers (dids). [Online]. Available:
https://w3c-ccg.github.io/did-spec/
[22] A. Bakre, N. Patil, and S. Gupta, “Implementing decentralized digital identity using blockchain,” International
Journal of Engineering Technology Science and Research, vol. 4, no. 10, pp. 379–385, 2017.
[23] Z. Diebold, “Self-sovereign identity using smart contracts on the ethereum blockchain,” 2017.
[24] J. Benet, “Ipfs-content addressed, versioned, p2p file system,” arXiv preprint arXiv:1407.3561, 2014.
[25] S.-H. C. J.-W. J. Moon-Yong Jung, Won-Suk Kim, “A blockchain-based id/ip mapping and user-friendly
fog computing for hyper-connected iot architecture,” International Journal of Information Communication
Technology and Digital Convergence, 2017.
[26] J. R. Douceur, “The sybil attack,” in International workshop on peer-to-peer systems. Springer, 2002,
pp. 251–260.
[27] J. M. Gonzalez, M. Anwar, and J. B. Joshi, “A trust-based approach against ip-spoofing attacks,” in
Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on. IEEE, 2011, pp.
63–70.
[28] CCN. (2018) Bitcoin gold hit by double spend attack, exchanges lose millions. [Online]. Available:
https://www.ccn.com/bitcoin-gold-hit-by-double-spend-attack-exchanges-lose-millions/
[29] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography
and privacy-preserving smart contracts,” in 2016 IEEE symposium on security and privacy (SP). IEEE,
2016, pp. 839–858.
[30] Microsoft. (2018) .net core. [Online]. Available: https://docs.microsoft.com/zh-tw/dotnet/core/
[31] Nethereum. (2018) Nethereum. [Online]. Available: https://github.com/Nethereum/Nethereum
[32] Ethereum. (2018) Web3.js. [Online]. Available: https://github.com/ethereum/web3.js/
[33] Microsoft. (2017) Standard date and time format strings. [Online]. Available: https://docs.microsoft.
com/en-US/dotnet/standard/base-types/standard-date-and-time-format-strings
[34] D. Identity. (2018) Universal resolver. [Online]. Available: https://github.com/decentralized-identity/
universal-resolver