Computer Science ›› 2018, Vol. 45 ›› Issue (2): 1-7.doi: 10.11896/j.issn.1002-137X.2018.02.001

Special Issue: Block Chain Technology

    Next Articles

Survey of Applications Based on Blockchain in Government Department

REN Ming, TANG Hong-bo, SI Xue-ming and YOU Wei   

  • Online:2018-02-15 Published:2018-11-13

Abstract: As the value of Bitcoin continuously rises,the blockchain technology applied behind it has promptly drawn widespread attention throughout the world,and it has also attracted the attention of governments at the same time.In particular,some countries,represented by the United States,under the support of the governments and the power institutions,have begun to try to apply this technology in various aspects,including the construction of specific information platforms,the operation of equipment supplies,and the control of systems.They think that the features including distribution,traceability and difficult tampering,etc of this technology could give full play to advantages of many aspects such as anonymous data collection,data integrity verification,interconnected communication of intelligent equipments,etc.In the meantime,the government institutions of many countries still maintain a cautious attitude towards the application of blockchain technology and they think that this technology is still faced with lots of problems including security and the universality of application,etc.Through the introduction and analysis of applications of the blockchain technology of government departments,the challenges confronted by current blockchain technology in the applications of government departments were pointed out.Lastly,for these problems,corresponding solutions were brought forward through combing the existing work in the academic field.

Key words: Blockchain,Non-financial applications,Applications in government department,Security,Challenges

[1] ANTONOPOULOS A M.Mastering Bitcoin[M].USA:O’Reilly Media,2014.
[2] Wikipedia.Blockchain (database) [EB/OL].[2017-10-3].https://en.wikipedia.org/wiki/ Blockchain_(database).
[3] GERVAIS A,RITZDORF H,KARAME G O,et al.Tampering with the Delivery of Blocks and Transactions in Bitcoin[C]∥ACM Sigsac Conference on Computer and Communications Security.New York:ACM,2015:692-705.
[4] PORRU S,PINNA A,MARCHESI M,et al.Blockchain-Oriented Software Engineering:Challenges and New Directions [C]∥International Conference on Software Engineering Companion.Piscataway,NJ:IEEE Press,2017:169-171.
[5] CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303.
[6] KYPRIOTAKI K N,ZAMANI E D,GIAGLIS G M.From Bitcoin to Decentralized Autonomous Corporations:Extending the Application Scope of Decentralized Peer-to-Peer Networks and Blockchains [C]∥Proceedings of the 17th International Confe-rence on Enterprise Information Systems(ICEIS2015).Barcelona,2015:284-290.
[7] NEISSE R,STERI G,NAI-FOVINO I.A Blockchain-based Approach for Data Accountability and Provenance Tracking[EB/OL].[2017-6-14].https://arxiv.org/ abs/1706.04507.
[8] SZYDLO M.Merkle Tree Traversal in Log Space and Time[J].Lecture Notes in Computer Science,2004,7:541-554.
[9] WOLRICH G M,YAP K S,GUILFORD J D,et al.Instruction set for message scheduling of SHA256 algorithm:US8838997B2[P].2012-09-28.
[10] HABER S,STORNETTA W S.How to time-stamp a digital document [J].Journal of Cryptology,1991,3(2):99-111.
[11] BAYER D,HABER D,STORNETTA W S.Improving the Efficiency and Reliability of Digital Time-Stamping [M]∥Sequences II:Methods in Communication,Security,and Computer Science.New York:Springer.1993:329-334.
[12] 杨保华,陈昌.区块链原理、设计与应用[M].北京:机械工业出版社,2017:34-62.
[13] KRAFT D.Difficulty control for blockchain-based consensussystems[J].Peer-to-Peer Networking and Applications,2016,9(2):397-413.
[14] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash Sys-tem[EB/OL].[2008-11-1].https:// bitcoin.org/bitcoin.pdf.
[15] R3.About R3.http://www.r3cev.com/about.
[16] ZYSKIND G,NATHAN O,PENTLAND A S.DecentralizingPrivacy:Using Blockchain to Protect Personal Data[C]∥Pro-ceedings of the 2015 IEEE Security and Privacy Workshops (SPW 2015).San Jose,CA:IEEE,2015:180-184.
[17] SWAN M.Blockchain Thinking:The Brain as a DecentralizedAutonomous Corporation[J].IEEE Technology and Society Magazine,2015,4(4):41-52.
[18] BOGNER A,CHANSON M,MEEUW A.A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain[C]∥Proceeding of ACM International Conference on the Internet of Things.New York:ACM,2016:177-178.
[19] KIM K J,HONG S P.Study on Rule-based Data Protection System Using Blockchain in P2P Distributed Networks[J].International Journal of Security and Its Applications,2016,1(10):201-210.
[20] KOSBA A,MILLER A,SHI E,et al.Hawk:The blockchain model of cryptography and privacy-preserving smart contracts[C]∥Symposium on Security and Privacy.New York:IEEE Computer Society,2016:839-858.
[21] LAMPORT L.Time,Clocks,and the Ordering of Events in aDistributed System[J].Communications of the ACM,1978,21(7):558-565.
[22] MERKLE R C.Protocols for Public Key Cryptosystems[C]∥IEEE Symposium on Security and Privacy.New York:IEEE Computer Society,1980:122-133.
[23] MERKLE R C.A Digital Signature Based on a Conventional Encryption Function [C]∥Conference on Advances in Cryptology-crypto,1987:369-378.
[24] PEASE M,SHOSTAK R,LAMPORT L.Reaching Agreement in the Presence of Faults[J].Journal of the ACM,1980,27(2):228-234.
[25] FISCHER M J,LYNCH N A,PATERSON M S.Impossibility of Distributed Consensus with One Faulty Process[J].Journal of the ACM,1985,32(2):374-382.
[26] CASTRO M,LISKOV B.Practical Byzantine Fault Tolerance[C]∥Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation.Berkeley:USENIX Associa-tion,1999:173-186.
[27] VUKOLIC M.The Quest for Scalable Blockchain Fabric:Proof-of-Work vs.BFT Replication[C]∥International Federation for Information Processing.New York:Springer International Publishing,2016:112-125.
[28] BAILIS P,FEKETE A,FRANKLIN M J,et al.CoordinationAvoidance in Database Systems[J].Proceedings of the VLDB Endowment,2014,8(3):185-196.
[29] WILKINSON S,BOSHEVSKI T,BRANDOFF J,et al.Storj:A Peer-to-Peer Cloud Storage Network(V0.2)[EB/OL].[2016-11-15].https://storj.io/storj.pdf.
[30] HARI A,LAKSHMAN T V.The Internet Blockchain:A Distributed,Tamper-Resistant Transaction Framework for the Internet[C]∥ACM Workshop on Hot Topics in Networks.New York:ACM,2016:204-210.
[31] CORBETT J C,DEAN J,EPSTEIN M,et al.Spanner:Google’s globally-distributed database[C]∥Usenix Conference on Operating Systems Design and Implementation.Berkeley:USENIX Association,2012:251-264.
[32] HIGGINS S.$700 Billion Senate Defense Bill Calls for Blockchain Cybersecurity Study[EB/OL].[2017-9-19].https:// coindesk.com/700-billion-senate-defense-bill-calls-blockchain-cy-bersecurity-study.
[33] KOKORISKOGIAS E,JOVANOVIC P,GAILLY N,et al.Enhancing Bitcoin Security and Performance with Strong Consisten ain-messaging-app-under-development-for-the-us-military.
[35] RUUBEL M.Guardtime Federal and Galois Awarded DARPA Contract to Formally Verify Blockchain-Based Integrity Monitoring System[EB/OL].[2016-9-13].https://guardtime.com/blog/galois-and-guardtime-federal-awarded-1-8m-darpa-contract-to-formally-verify-blockchain-based-inte.
[36] Industry Relations.NCI Agency innovation challenge[EB/OL].[2016-4-25].https://www.ncia.nato.int/NewsRoom/Pages/160425_Innovation.aspx.
[37] NATOLI C,GRAMOLI V.The Balance Attack or Why Forka-ble Blockchains Are Ill-Suited for Consortium[C]∥47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).Denver:IEEE Press,2017:579-590.
[38] LI W T,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain.New York:ACM,2017:9-14.
[39] EYAL I,SIRER E G.Majority is not Enough:Bitcoin Mining is Vulnerable[C]∥Proceedings of 18th International Conference on Financial Cryptography and Data Security.Berlin:Springer,2014:436-454.
[40] LEWENBERG Y,SOMPOLINSKY Y,ZOHAR A.InclusveBlockchain Protocols [J].Financial Cryptography and Data Security,2015,5:528-547.
[41] EYAL I,GENCER A E,SIRER E G,et al.Bitcoin-NG:A Scalable Blockchain Protocol [C]∥Proceedings of the 13th USENIX Conference on Networked Systems Design and Implementation.Berkeley:USENIX Association,2016:45-59.
[42] KARAME G.On the Security and Scalability of Bitcoin’s Blockchain[C]∥2016 ACM Sigsac Conference on Computer and Communications Security.New York:ACM,2016:1861-1862.
[43] GERVAIS A,KALAME G O,WUST K,et al.On the Security and Performance of Proof of Work Blockchains[C]∥ ACM Sigsac Conference on Computer and Communications Security.New York:ACM,2016:3-16.
[44] YUAN C,XU M X,SI X M.Rese
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!