PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Using blockchain to access cloud services: a case of financial service application

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
Federated Conference on Computer Science and Information Systems (14 ; 01-04.09.2019 ; Leipzig, Germany)
Języki publikacji
EN
Abstrakty
EN
Most cloud providers use centralized servers to manage data. However, centralized servers still suffer the risks of single point of failure and data theft. We add a blockchain to the cloud service and propose a new architecture to manage data. Using blockchain as a connector to utilize the tamperproof, traceable, and data-sharing features of the blockchain to ensure that the transaction data are properly stored in each node. We use the stock simulation trading service to extend and divide the research design into two levels, namely, system and application services. First, we directly write the data into the blockchain. Second, we alternatively store the data in the cloud and then write it into the blockchain. Finally, the two versions are compared and analyzed to investigate their feasibility and performance. At the application service, we implement the smart contract for the existing stock transaction process to achieve real-time settlement.
Rocznik
Tom
Strony
565--568
Opis fizyczny
Bibliogr. 16 poz., il., tab.
Twórcy
  • Graduate Institute of Technology Management National Chung Hsing University Taichung City, Taiwan
  • Graduate Institute of Technology Management National Chung Hsing University Taichung City, Taiwan
autor
  • Taipei Fubon Commercial Bank Co., Ltd. Taipei City, Taiwan
Bibliografia
  • 1. J. Gibson and R. Rondeau and D. Eveleigh and Q. Tan , “Benefits and challenges of three cloud computing service models,” in 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN) IEEE, 2012, pp. 198–205. http://dx.doi.org/10.1109/CA-SoN.2012.6412402
  • 2. H. Tianfield , “Security issues in cloud computing,” in 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) IEEE 2012, pp. 1082–1089. http://dx.doi.org/10.1109/ICSMC.2012.6377874
  • 3. W.A. Jansen , “Cloud hooks: Security and privacy issues in cloud computing,” in 2011 44th Hawaii International Conference on System Sciences IEEE 2011, pp. 1–10. http://dx.doi.org/10.1109/HICSS.2011.103
  • 4. A. Kirar and A.K. Yadav and S. Maheswari, “An efficient architecture and algorithm to prevent data leakage in Cloud Computing using multi-tier security approach,” in 2016 International Conference System Modeling & Advancement in Research Trends (SMART) IEEE 2016, pp. 271–279. http://dx.doi.org/10.1109/SYSMART.2016.7894534
  • 5. M. Dai and S. Zhang and H. Wang and S. Jin, “A low storage room requirement framework for distributed ledger in blockchain,” IEEE Access, vol. 6, 2018, pp. 22970–22975. http://dx.doi.org/10.1109/ACCESS.2018.2814624
  • 6. C.-W. Wang and S.E. Chang, “Cloud service in stock trading game: Service virtualization, integration and financial application,” in 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN) IEEE, 2016, pp. 857–862. http://dx.doi.org/10.1109/ICUFN.2016.7537158
  • 7. S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008, Retrieved Nov 20, 2018 from https://bitcoin.org/bitcoin.pdf
  • 8. M. Swan, Blockchain: Blueprint for a new economy, 2015, " O’Reilly Media, Inc."
  • 9. N. Szabo, Smart contracts, 1994, unpublished. Retrieved Dec 15, 2018 from http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html
  • 10. V. Buterin, “A next-generation smart contract and decentralized application platform,” white paper, 2014.
  • 11. F. B. Schneider, “Implementing fault-tolerant services using the state machine approach: A tutorial,” ACM Computing Surveys (CSUR), vol. 22, no. 4, 1990, pp. 299–319. http://dx.doi.org/10.1145/98163.98167
  • 12. L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 4, no. 3, 1982, pp. 382–401. http://dx.doi.org/10.1145/357172.357176
  • 13. X. Xu et al., “The blockchain as a software connector,” in 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), IEEE 2016, pp. 182–191. http://dx.doi.org/10.1109/WICSA.2016.21
  • 14. D. Drescher, “Blockchain Basics: A Non-technical Introduction in 25 Steps,” 1st edn, Apress, Frankfurt am Main, 2017
  • 15. K.-H. Huang, Application of blockchain in the field of securities trading: settlement delivery, 2017, Retrieved March 3, 2019 from http://www1.cof.nkfust.edu.tw/ezfiles/12/1012/img/1938/729871942.pdf
  • 16. N. Herbaut and N. Negru, “A model for collaborative blockchain-based video delivery relying on advanced network services chains,” IEEE Communications Magazine, vol. 55, no. 9, 2018, pp. 70–76. http://dx.doi.org/10.1109/MCOM.2017.1700117
Uwagi
1. Track 4: Information Systems and Technologies
2. Technical Session: 17th Conference on Advanced Information Technologies for Management
3. Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-0968ed2d-bebd-4ecc-89d7-e09545ba3e53
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.