计算机科学 ›› 2018, Vol. 45 ›› Issue (2): 1-7.doi: 10.11896/j.issn.1002-137X.2018.02.001

所属专题: 区块链技术

• 区块链技术 •    下一篇

区块链技术在政府部门的应用综述

任明,汤红波,斯雪明,游伟   

  1. 国家数字交换系统工程技术研究中心 郑州450001,国家数字交换系统工程技术研究中心 郑州450001,数学工程与先进计算国家重点实验室 郑州450001,国家数字交换系统工程技术研究中心 郑州450001
  • 出版日期:2018-02-15 发布日期:2018-11-13
  • 基金资助:
    本文受东南大学移动国家重点实验室开放研究基金资助

Survey of Applications Based on Blockchain in Government Department

REN Ming, TANG Hong-bo, SI Xue-ming and YOU Wei   

  • Online:2018-02-15 Published:2018-11-13

摘要: 随着比特币价值的不断攀升,其背后使用的区块链技术在全球范围内迅速引起了各个行业的广泛关注,同时也引起了各国政府的高度重视。特别是以美国为代表的一些国家在政府和权力机构的支持下,已经开始尝试将此项技术应用于专用信息平台建设、装备物资运转和系统控制等多个方面,认为此项技术的分布式、可追溯、不易篡改等特性能够在匿名数据的收集、数据的完整性校验、智能设备的互联通信等多个方面发挥重要作用。同时,目前也有不少国家政府机构对区块链技术的应用仍然保持谨慎的态度,认为此项技术仍然面临着安全保密、应用的通用性等诸多问题。通过 介绍和分析 政府部门中区块链技术的应用情况,指出目前该项技术在政府部门应用的过程中面临的挑战。最后,针对这些问题,并结合现在学术界已有的工作提出相应的解决方案。

关键词: 区块链,非金融应用,政府应用,安全,挑战

Abstract: As the value of Bitcoin continuously rises,the blockchain technology applied behind it has promptly drawn widespread attention throughout the world,and it has also attracted the attention of governments at the same time.In particular,some countries,represented by the United States,under the support of the governments and the power institutions,have begun to try to apply this technology in various aspects,including the construction of specific information platforms,the operation of equipment supplies,and the control of systems.They think that the features including distribution,traceability and difficult tampering,etc of this technology could give full play to advantages of many aspects such as anonymous data collection,data integrity verification,interconnected communication of intelligent equipments,etc.In the meantime,the government institutions of many countries still maintain a cautious attitude towards the application of blockchain technology and they think that this technology is still faced with lots of problems including security and the universality of application,etc.Through the introduction and analysis of applications of the blockchain technology of government departments,the challenges confronted by current blockchain technology in the applications of government departments were pointed out.Lastly,for these problems,corresponding solutions were brought forward through combing the existing work in the academic field.

Key words: Blockchain,Non-financial applications,Applications in government department,Security,Challenges

[1] ANTONOPOULOS A M.Mastering Bitcoin[M].USA:O’Reilly Media,2014.
[2] Wikipedia.Blockchain (database) [EB/OL].[2017-10-3].https://en.wikipedia.org/wiki/ Blockchain_(database).
[3] GERVAIS A,RITZDORF H,KARAME G O,et al.Tampering with the Delivery of Blocks and Transactions in Bitcoin[C]∥ACM Sigsac Conference on Computer and Communications Security.New York:ACM,2015:692-705.
[4] PORRU S,PINNA A,MARCHESI M,et al.Blockchain-Oriented Software Engineering:Challenges and New Directions [C]∥International Conference on Software Engineering Companion.Piscataway,NJ:IEEE Press,2017:169-171.
[5] CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303.
[6] KYPRIOTAKI K N,ZAMANI E D,GIAGLIS G M.From Bitcoin to Decentralized Autonomous Corporations:Extending the Application Scope of Decentralized Peer-to-Peer Networks and Blockchains [C]∥Proceedings of the 17th International Confe-rence on Enterprise Information Systems(ICEIS2015).Barcelona,2015:284-290.
[7] NEISSE R,STERI G,NAI-FOVINO I.A Blockchain-based Approach for Data Accountability and Provenance Tracking[EB/OL].[2017-6-14].https://arxiv.org/ abs/1706.04507.
[8] SZYDLO M.Merkle Tree Traversal in Log Space and Time[J].Lecture Notes in Computer Science,2004,7:541-554.
[9] WOLRICH G M,YAP K S,GUILFORD J D,et al.Instruction set for message scheduling of SHA256 algorithm:US8838997B2[P].2012-09-28.
[10] HABER S,STORNETTA W S.How to time-stamp a digital document [J].Journal of Cryptology,1991,3(2):99-111.
[11] BAYER D,HABER D,STORNETTA W S.Improving the Efficiency and Reliability of Digital Time-Stamping [M]∥Sequences II:Methods in Communication,Security,and Computer Science.New York:Springer.1993:329-334.
[12] 杨保华,陈昌.区块链原理、设计与应用[M].北京:机械工业出版社,2017:34-62.
[13] KRAFT D.Difficulty control for blockchain-based consensussystems[J].Peer-to-Peer Networking and Applications,2016,9(2):397-413.
[14] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash Sys-tem[EB/OL].[2008-11-1].https:// bitcoin.org/bitcoin.pdf.
[15] R3.About R3.http://www.r3cev.com/about.
[16] ZYSKIND G,NATHAN O,PENTLAND A S.DecentralizingPrivacy:Using Blockchain to Protect Personal Data[C]∥Pro-ceedings of the 2015 IEEE Security and Privacy Workshops (SPW 2015).San Jose,CA:IEEE,2015:180-184.
[17] SWAN M.Blockchain Thinking:The Brain as a DecentralizedAutonomous Corporation[J].IEEE Technology and Society Magazine,2015,4(4):41-52.
[18] BOGNER A,CHANSON M,MEEUW A.A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain[C]∥Proceeding of ACM International Conference on the Internet of Things.New York:ACM,2016:177-178.
[19] KIM K J,HONG S P.Study on Rule-based Data Protection System Using Blockchain in P2P Distributed Networks[J].International Journal of Security and Its Applications,2016,1(10):201-210.
[20] KOSBA A,MILLER A,SHI E,et al.Hawk:The blockchain model of cryptography and privacy-preserving smart contracts[C]∥Symposium on Security and Privacy.New York:IEEE Computer Society,2016:839-858.
[21] LAMPORT L.Time,Clocks,and the Ordering of Events in aDistributed System[J].Communications of the ACM,1978,21(7):558-565.
[22] MERKLE R C.Protocols for Public Key Cryptosystems[C]∥IEEE Symposium on Security and Privacy.New York:IEEE Computer Society,1980:122-133.
[23] MERKLE R C.A Digital Signature Based on a Conventional Encryption Function [C]∥Conference on Advances in Cryptology-crypto,1987:369-378.
[24] PEASE M,SHOSTAK R,LAMPORT L.Reaching Agreement in the Presence of Faults[J].Journal of the ACM,1980,27(2):228-234.
[25] FISCHER M J,LYNCH N A,PATERSON M S.Impossibility of Distributed Consensus with One Faulty Process[J].Journal of the ACM,1985,32(2):374-382.
[26] CASTRO M,LISKOV B.Practical Byzantine Fault Tolerance[C]∥Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation.Berkeley:USENIX Associa-tion,1999:173-186.
[27] VUKOLIC M.The Quest for Scalable Blockchain Fabric:Proof-of-Work vs.BFT Replication[C]∥International Federation for Information Processing.New York:Springer International Publishing,2016:112-125.
[28] BAILIS P,FEKETE A,FRANKLIN M J,et al.CoordinationAvoidance in Database Systems[J].Proceedings of the VLDB Endowment,2014,8(3):185-196.
[29] WILKINSON S,BOSHEVSKI T,BRANDOFF J,et al.Storj:A Peer-to-Peer Cloud Storage Network(V0.2)[EB/OL].[2016-11-15].https://storj.io/storj.pdf.
[30] HARI A,LAKSHMAN T V.The Internet Blockchain:A Distributed,Tamper-Resistant Transaction Framework for the Internet[C]∥ACM Workshop on Hot Topics in Networks.New York:ACM,2016:204-210.
[31] CORBETT J C,DEAN J,EPSTEIN M,et al.Spanner:Google’s globally-distributed database[C]∥Usenix Conference on Operating Systems Design and Implementation.Berkeley:USENIX Association,2012:251-264.
[32] HIGGINS S.$700 Billion Senate Defense Bill Calls for Blockchain Cybersecurity Study[EB/OL].[2017-9-19].https:// coindesk.com/700-billion-senate-defense-bill-calls-blockchain-cy-bersecurity-study.
[33] KOKORISKOGIAS E,JOVANOVIC P,GAILLY N,et al.Enhancing Bitcoin Security and Performance with Strong Consisten ain-messaging-app-under-development-for-the-us-military.
[35] RUUBEL M.Guardtime Federal and Galois Awarded DARPA Contract to Formally Verify Blockchain-Based Integrity Monitoring System[EB/OL].[2016-9-13].https://guardtime.com/blog/galois-and-guardtime-federal-awarded-1-8m-darpa-contract-to-formally-verify-blockchain-based-inte.
[36] Industry Relations.NCI Agency innovation challenge[EB/OL].[2016-4-25].https://www.ncia.nato.int/NewsRoom/Pages/160425_Innovation.aspx.
[37] NATOLI C,GRAMOLI V.The Balance Attack or Why Forka-ble Blockchains Are Ill-Suited for Consortium[C]∥47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).Denver:IEEE Press,2017:579-590.
[38] LI W T,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain.New York:ACM,2017:9-14.
[39] EYAL I,SIRER E G.Majority is not Enough:Bitcoin Mining is Vulnerable[C]∥Proceedings of 18th International Conference on Financial Cryptography and Data Security.Berlin:Springer,2014:436-454.
[40] LEWENBERG Y,SOMPOLINSKY Y,ZOHAR A.InclusveBlockchain Protocols [J].Financial Cryptography and Data Security,2015,5:528-547.
[41] EYAL I,GENCER A E,SIRER E G,et al.Bitcoin-NG:A Scalable Blockchain Protocol [C]∥Proceedings of the 13th USENIX Conference on Networked Systems Design and Implementation.Berkeley:USENIX Association,2016:45-59.
[42] KARAME G.On the Security and Scalability of Bitcoin’s Blockchain[C]∥2016 ACM Sigsac Conference on Computer and Communications Security.New York:ACM,2016:1861-1862.
[43] GERVAIS A,KALAME G O,WUST K,et al.On the Security and Performance of Proof of Work Blockchains[C]∥ ACM Sigsac Conference on Computer and Communications Security.New York:ACM,2016:3-16.
[44] YUAN C,XU M X,SI X M.Rese
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!