Science Research

| Peer-Reviewed |

Blockchain Technology for Data Entirety

Received: 27 November 2018    Accepted: 17 December 2018    Published: 23 January 2019
Views:       Downloads:

Share This Article

Abstract

This paper studies blockchain technology - which is getting strong attention from the industry and also being applied in many fields. Based on the nature of blockchain's data security, the paper analyzes the application of blockchain technology to deal with the problem of data entirety and transparency for text documents. Firstly, the paper presents an overview of some technology components constituting to blockchain and its relevance and optimization to the data authentication/protection problem. Next, an experimental application of blockchain to form a network which stores documents and maintains the entirety of data stored in the network for external queries.

DOI 10.11648/j.sr.20180606.12
Published in Science Research (Volume 6, Issue 6, December 2018)
Page(s) 68-75
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Blockchain, Hash Table, Peer Networks, Game Theory, Digital Signatures, Cryptography, ECDSA, SHA-265, Documentation

References
[1] Riera A, Brown P. Bringing confidence to electronic voting. Electronic Journal of e-Government 2003; 1 (1):43-50.
[2] Kirkos E, Spathis C, Manolopoulos Y. Data mining techniques for the detection of fraudulent financial statements. Expert systems with applications 2007; 32 (4):995-1003.
[3] Server O. Corruption: A major problem for urban management: Some evidence from Indonesia. Habitat International 1996; 20 (1):23-41.
[4] Hofmann H, Schleper MC, Blome C. Conflict minerals and supply chain due diligence: an exploratory study of multi-tier supply chains. Journal of business ethics 2018; 147 (1):115-41.
[5] Crosby M, Pattanayak P, Verma S. Blockchain technology: Beyond Bitcoin. 2016.
[6] Davidson S, De Filippi P, Potts J. Economics of blockchain. 2016.
[7] Khan C, Lewis A, Rutland E, Wan C, Rutter K, Thompson C. A Distributed-Ledger Consortium Model for Collaborative Innovation. Computer 2017; 50 (9):29-37.
[8] Benchoufi M, Porcher R, Ravaud P. Blockchain protocols in clinical trials: Transparency and traceability of consent. F1000Research 2017; 6:66.
[9] Azaria A, Ekblaw A, Vieira T, Lippman A. MedRec: Using blockchain for medical data access and permission management. Open and Big Data (OBD), IEEE International Conference on; 2016.
[10] Dagher GG, Mohler J, Milojkovic M, Marella PB. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustainable Cities and Society 2018; 39:283-97.
[11] Diffie, Whitfield; Hellman, Martin (8 June 1976). "Multi-user cryptographic techniques".
[12] Menezes, A. J.; van Oorschot, P. C.; Vanstone, S. A. “Handbook of Applied Cryptography”.
[13] Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone (October 1996). "11: Digital Signatures". Handbook of Applied Cryptography.
[14] V. Miller, "Uses of elliptic curves in cryptography" in Advances in Cryptology Crypto 85, Springer Verlag, vol. 218, pp. 417-426, 1986.
[15] Stevens, Marc; Bursztein, Elie; Karpman, Pierre; Albertini, Ange; Markov, Yarik. "The first collision for full SHA-1" (PDF). Shattered IO. Retrieved 23 February 2017.
[16] An Illustrated Guide to Cryptographic Hashes. (2015, May 9). Retrieved from http://www.unixwiz.net/techtips/iguide-crypto-hashes.html.
[17] Veness, Chris. “SHA-256.” SHA-256 Cryptographic Hash Algorithm Implemented in JavaScript | Movable Type Scripts, 2015, www.movable-type.co.uk/scripts/sha256.html.
[18] O'Connor, J. J.; Robertson, E. F. (October 1998). "Karl Theodor Wilhelm Weierstrass". School of Mathematics and Statistics, University of St Andrews, Scotland. Retrieved 7 September 2014.
[19] W. Stallings, Cryptography and Network Security 5th Edition, Prentice Hall Pearson Education, Inc, 2011.
[20] Marling Engle. Vulnerabilities of P2P systems and a critical look at their solutions, May, 2006.
[21] Nakamoto, Satoshi. Bitcoin: A peer-to-peer electronic cash system. 2008. https://bitcoin.org/bitcoin.pdf.
Author Information
  • Institute of Information Technology, Vietnam Academy of Science and Technology, Ha Noi, Vietnam

  • Institute of Information Technology, Vietnam Academy of Science and Technology, Ha Noi, Vietnam

  • Institute of Information Technology, Vietnam Academy of Science and Technology, Ha Noi, Vietnam

  • University of Engineering and Technology, Vietnam National University, Ha Noi, Vietnam

Cite This Article
  • APA Style

    Khuat Thanh Son, Nguyen Truong Thang, Tran Manh Dong, Nguyen Ha Thanh. (2019). Blockchain Technology for Data Entirety. Science Research, 6(6), 68-75. https://doi.org/10.11648/j.sr.20180606.12

    Copy | Download

    ACS Style

    Khuat Thanh Son; Nguyen Truong Thang; Tran Manh Dong; Nguyen Ha Thanh. Blockchain Technology for Data Entirety. Sci. Res. 2019, 6(6), 68-75. doi: 10.11648/j.sr.20180606.12

    Copy | Download

    AMA Style

    Khuat Thanh Son, Nguyen Truong Thang, Tran Manh Dong, Nguyen Ha Thanh. Blockchain Technology for Data Entirety. Sci Res. 2019;6(6):68-75. doi: 10.11648/j.sr.20180606.12

    Copy | Download

  • @article{10.11648/j.sr.20180606.12,
      author = {Khuat Thanh Son and Nguyen Truong Thang and Tran Manh Dong and Nguyen Ha Thanh},
      title = {Blockchain Technology for Data Entirety},
      journal = {Science Research},
      volume = {6},
      number = {6},
      pages = {68-75},
      doi = {10.11648/j.sr.20180606.12},
      url = {https://doi.org/10.11648/j.sr.20180606.12},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.sr.20180606.12},
      abstract = {This paper studies blockchain technology - which is getting strong attention from the industry and also being applied in many fields. Based on the nature of blockchain's data security, the paper analyzes the application of blockchain technology to deal with the problem of data entirety and transparency for text documents. Firstly, the paper presents an overview of some technology components constituting to blockchain and its relevance and optimization to the data authentication/protection problem. Next, an experimental application of blockchain to form a network which stores documents and maintains the entirety of data stored in the network for external queries.},
     year = {2019}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Blockchain Technology for Data Entirety
    AU  - Khuat Thanh Son
    AU  - Nguyen Truong Thang
    AU  - Tran Manh Dong
    AU  - Nguyen Ha Thanh
    Y1  - 2019/01/23
    PY  - 2019
    N1  - https://doi.org/10.11648/j.sr.20180606.12
    DO  - 10.11648/j.sr.20180606.12
    T2  - Science Research
    JF  - Science Research
    JO  - Science Research
    SP  - 68
    EP  - 75
    PB  - Science Publishing Group
    SN  - 2329-0927
    UR  - https://doi.org/10.11648/j.sr.20180606.12
    AB  - This paper studies blockchain technology - which is getting strong attention from the industry and also being applied in many fields. Based on the nature of blockchain's data security, the paper analyzes the application of blockchain technology to deal with the problem of data entirety and transparency for text documents. Firstly, the paper presents an overview of some technology components constituting to blockchain and its relevance and optimization to the data authentication/protection problem. Next, an experimental application of blockchain to form a network which stores documents and maintains the entirety of data stored in the network for external queries.
    VL  - 6
    IS  - 6
    ER  - 

    Copy | Download

  • Sections