This paper studies blockchain technology - which is getting strong attention from the industry and also being applied in many fields. Based on the nature of blockchain's data security, the paper analyzes the application of blockchain technology to deal with the problem of data entirety and transparency for text documents. Firstly, the paper presents an overview of some technology components constituting to blockchain and its relevance and optimization to the data authentication/protection problem. Next, an experimental application of blockchain to form a network which stores documents and maintains the entirety of data stored in the network for external queries.
Published in | Science Research (Volume 6, Issue 6) |
DOI | 10.11648/j.sr.20180606.12 |
Page(s) | 68-75 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2019. Published by Science Publishing Group |
Blockchain, Hash Table, Peer Networks, Game Theory, Digital Signatures, Cryptography, ECDSA, SHA-265, Documentation
[1] | Riera A, Brown P. Bringing confidence to electronic voting. Electronic Journal of e-Government 2003; 1 (1):43-50. |
[2] | Kirkos E, Spathis C, Manolopoulos Y. Data mining techniques for the detection of fraudulent financial statements. Expert systems with applications 2007; 32 (4):995-1003. |
[3] | Server O. Corruption: A major problem for urban management: Some evidence from Indonesia. Habitat International 1996; 20 (1):23-41. |
[4] | Hofmann H, Schleper MC, Blome C. Conflict minerals and supply chain due diligence: an exploratory study of multi-tier supply chains. Journal of business ethics 2018; 147 (1):115-41. |
[5] | Crosby M, Pattanayak P, Verma S. Blockchain technology: Beyond Bitcoin. 2016. |
[6] | Davidson S, De Filippi P, Potts J. Economics of blockchain. 2016. |
[7] | Khan C, Lewis A, Rutland E, Wan C, Rutter K, Thompson C. A Distributed-Ledger Consortium Model for Collaborative Innovation. Computer 2017; 50 (9):29-37. |
[8] | Benchoufi M, Porcher R, Ravaud P. Blockchain protocols in clinical trials: Transparency and traceability of consent. F1000Research 2017; 6:66. |
[9] | Azaria A, Ekblaw A, Vieira T, Lippman A. MedRec: Using blockchain for medical data access and permission management. Open and Big Data (OBD), IEEE International Conference on; 2016. |
[10] | Dagher GG, Mohler J, Milojkovic M, Marella PB. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustainable Cities and Society 2018; 39:283-97. |
[11] | Diffie, Whitfield; Hellman, Martin (8 June 1976). "Multi-user cryptographic techniques". |
[12] | Menezes, A. J.; van Oorschot, P. C.; Vanstone, S. A. “Handbook of Applied Cryptography”. |
[13] | Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone (October 1996). "11: Digital Signatures". Handbook of Applied Cryptography. |
[14] | V. Miller, "Uses of elliptic curves in cryptography" in Advances in Cryptology Crypto 85, Springer Verlag, vol. 218, pp. 417-426, 1986. |
[15] | Stevens, Marc; Bursztein, Elie; Karpman, Pierre; Albertini, Ange; Markov, Yarik. "The first collision for full SHA-1" (PDF). Shattered IO. Retrieved 23 February 2017. |
[16] | An Illustrated Guide to Cryptographic Hashes. (2015, May 9). Retrieved from http://www.unixwiz.net/techtips/iguide-crypto-hashes.html. |
[17] | Veness, Chris. “SHA-256.” SHA-256 Cryptographic Hash Algorithm Implemented in JavaScript | Movable Type Scripts, 2015, www.movable-type.co.uk/scripts/sha256.html. |
[18] | O'Connor, J. J.; Robertson, E. F. (October 1998). "Karl Theodor Wilhelm Weierstrass". School of Mathematics and Statistics, University of St Andrews, Scotland. Retrieved 7 September 2014. |
[19] | W. Stallings, Cryptography and Network Security 5th Edition, Prentice Hall Pearson Education, Inc, 2011. |
[20] | Marling Engle. Vulnerabilities of P2P systems and a critical look at their solutions, May, 2006. |
[21] | Nakamoto, Satoshi. Bitcoin: A peer-to-peer electronic cash system. 2008. https://bitcoin.org/bitcoin.pdf. |
APA Style
Khuat Thanh Son, Nguyen Truong Thang, Tran Manh Dong, Nguyen Ha Thanh. (2019). Blockchain Technology for Data Entirety. Science Research, 6(6), 68-75. https://doi.org/10.11648/j.sr.20180606.12
ACS Style
Khuat Thanh Son; Nguyen Truong Thang; Tran Manh Dong; Nguyen Ha Thanh. Blockchain Technology for Data Entirety. Sci. Res. 2019, 6(6), 68-75. doi: 10.11648/j.sr.20180606.12
@article{10.11648/j.sr.20180606.12, author = {Khuat Thanh Son and Nguyen Truong Thang and Tran Manh Dong and Nguyen Ha Thanh}, title = {Blockchain Technology for Data Entirety}, journal = {Science Research}, volume = {6}, number = {6}, pages = {68-75}, doi = {10.11648/j.sr.20180606.12}, url = {https://doi.org/10.11648/j.sr.20180606.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.sr.20180606.12}, abstract = {This paper studies blockchain technology - which is getting strong attention from the industry and also being applied in many fields. Based on the nature of blockchain's data security, the paper analyzes the application of blockchain technology to deal with the problem of data entirety and transparency for text documents. Firstly, the paper presents an overview of some technology components constituting to blockchain and its relevance and optimization to the data authentication/protection problem. Next, an experimental application of blockchain to form a network which stores documents and maintains the entirety of data stored in the network for external queries.}, year = {2019} }
TY - JOUR T1 - Blockchain Technology for Data Entirety AU - Khuat Thanh Son AU - Nguyen Truong Thang AU - Tran Manh Dong AU - Nguyen Ha Thanh Y1 - 2019/01/23 PY - 2019 N1 - https://doi.org/10.11648/j.sr.20180606.12 DO - 10.11648/j.sr.20180606.12 T2 - Science Research JF - Science Research JO - Science Research SP - 68 EP - 75 PB - Science Publishing Group SN - 2329-0927 UR - https://doi.org/10.11648/j.sr.20180606.12 AB - This paper studies blockchain technology - which is getting strong attention from the industry and also being applied in many fields. Based on the nature of blockchain's data security, the paper analyzes the application of blockchain technology to deal with the problem of data entirety and transparency for text documents. Firstly, the paper presents an overview of some technology components constituting to blockchain and its relevance and optimization to the data authentication/protection problem. Next, an experimental application of blockchain to form a network which stores documents and maintains the entirety of data stored in the network for external queries. VL - 6 IS - 6 ER -