跳到主要內容

臺灣博碩士論文加值系統

(44.192.48.196) 您好!臺灣時間:2024/06/16 10:48
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:許文聰
研究生(外文):Hsu, Wen-Chong
論文名稱:基於 Hyperledger Indy 實現漫遊身份管理之研究
論文名稱(外文):Hyperledger Indy-base Implementation Roaming Identity Management Research
指導教授:蘇怡仁蘇怡仁引用關係
指導教授(外文):SU, YI-JEN
口試委員:蘇怡仁陳昭和胡武誌
口試委員(外文):SU, YI-JENCHEN, CHAO-HOHU, WU-CHIH
口試日期:2021-07-23
學位類別:碩士
校院名稱:樹德科技大學
系所名稱:資訊工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2021
畢業學年度:109
語文別:中文
論文頁數:66
中文關鍵詞:區塊鏈身份管理漫遊
外文關鍵詞:BlockchainHyperledger IndyRoamingIdentity management
相關次數:
  • 被引用被引用:0
  • 點閱點閱:161
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在傳統的國際漫遊服務架構中,因服務數據交換管理的過程效率低,容易發生時間延遲的現象,用戶透過此問題來獲取漫遊服務,使得移動服務提供商(Mobile Service Providers, MSPs)容易受到漫遊詐欺的侵害,進而導致每年數十億美元的經濟損失。
本研究提出基於Hyperledger Indy之區塊鏈應用技術結合去中心化ID(Decentralized Identifiers, DIDs),以DID提出的基於可驗證的憑證模組(Verifiable Credentials Model, VCM),設計出一套漫遊身份管理框架之機制,解決漫遊服務數據交換管理和用戶欺詐的問題。在提出的機制中用戶可對任何角色,創建自身身份傳遞信息,可對自己的身份進行控管和信息披露多寡給對方,無須透過第三方機構的認證或管理,實現自我主權認同(Self -Sovereign Identity, SSI)的自主控制權,在與區塊鏈之密碼學和零知識證明等技術,使身份信息具有公開透明且高隱私之安全特性,以確保身份和資料不外洩。
本研究在實驗中,對漫遊身份管理機制之使用案例,結合Hyperledger Caliper效能測試工具,搭建出模擬漫遊之區塊鏈網路環境進行測試,與現今基於以太坊區塊鏈技術,解決漫遊之使用案例相比,本研究在處理交易效能提升約三倍之多。

In the traditional international roaming service architecture, due to the low efficiency of service data exchange management process, it is prone to time delay. Users get roaming services through this problem, which makes Mobile Service Providers (MSPs) vulnerable to roaming fraud, and then leads to billions of dollars of economic losses every year.
This study proposes a mechanism of roaming identity management framework Hyperledger-based Indy blockchain application technology combined with Decentralized Identifiers (DIDS) and Verifiable Credentials Model (VCM) proposed by did to solve the problems of roaming service data exchange management and user fraud. In the proposed mechanism, users can create their own identity for any role, transmit information, control Their Own Identity and disclose the amount of information to each other, and realize the independent control of Self-Sovereign Identity (SSI) without the authentication or management of a third-party organization, The identity information has the security features of openness, transparency and high privacy, so as to ensure that the identity and data are not leaked.
In the experiment, we build a simulated roaming blockchain network environment to test the roaming identity management mechanism using the Hyperledger Caliper performance testing tool. Compared with the current roaming case based on Ethereum blockchain technology, the transaction processing performance of this study is improved by about three times.

目錄
摘要
ABSTRACT
誌謝
目錄
表目錄
圖目錄
一、緒論
1.1 前言
1.2 研究動機
1.3 論文架構
二、文獻探討與相關技術
2.1區塊鏈(Blockchain)
2.2以太坊(Ethereum)
2.3 Hyperledger
2.4 Hyperledger Fabric
2.5 Hyperledger Indy
2.6 Hyperledger Ursa
2.7 Decentralized ID
2.8 Docker
2.9 Node.js
三、 研究方法
3.1系統架構介紹
3.2可驗證的憑證模式
3.3漫遊身份管理流程
四、 研究結果
4.1實驗環境
4.2環境測試
4.3效能評估
五、 結論與未來研究目標
5.1結論
5.2未來研究目標
參考文獻

[1]Sutherland, E. “International roaming charges: over-charging and competition law.” Telecommunications Policy, 25(1-2), 5-20. (2001)
[2]GSMA Intelligence, “The Mobile Economy 2019,” GSM Association, 2019. [Online].Available:https://www.gsmaintelligence.com/research/?file=b9a6e6202ee1d5f787cfebb95d3639c5& download, (2019, August)
[3]Papachristou, L. “Report: US$32.7 Billion Lost in Telecom Fraud Annually,” Organized Crime and Corruption Reporting Project. [Online]. Available:https://www.occrp.org/en/daily/9436-report-us-32-7-billion-lost-in-telecomfraud-annually, (2019, August)
[4]Nguyen, C. T., Nguyen, D. N., Hoang, D. T., Pham, H. A., Tuong, N. H., Xiao, Y., & Dutkiewicz, E. (2020). “BlockRoam: Blockchain-based Roaming Management System for Future Mobile Networks”. 2005.
[5]Shawe-Taylor, J., Howker, K., & Burge, P. Detection of fraud in mobile telecommunications. Information Security Technical Report, 4(1), 16-28, (1999).
[6]Rouhani, S., & Deters, R. “Performance analysis of Ethereum transactions in private blockchain.” In 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS) (pp. 70-74), (2017, November).
[7]Atzei, N., Bartoletti, M., & Cimoli, T. “A survey of attacks on ethereum smart contracts (sok).” In International conference on principles of security and trust (pp. 164-186). Springer, Berlin, Heidelberg, (2017, April).
[8]Valenta, M., & Sandner, P. “Comparison of ethereum, hyperledger fabric and corda.” ebook] Frankfurt School, Blockchain Center, (2017).
[9]Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 2008, 21260.
[10]Zhu, Q., Loke, S. W., Trujillo-Rasua, R., Jiang, F., & Xiang, Y. “Applications of distributed ledger technologies to the internet of things: A survey.” ACM computing surveys (CSUR), 52(6), 1-34, (2019).
[11]Zheng, Z., Xie, S., Dai, H. N., Chen, X., & Wang, H. “Blockchain challenges and opportunities: A survey.” International Journal of Web and Grid Services, 14(4), 352-375, (2018).
[12]Al-Riyami, S. S., & Paterson, K. G. “Certificateless public key cryptography.” In International conference on the theory and application of cryptology and information security (pp. 452-473). Springer, Berlin, Heidelberg, (2003, November).
[13]Raikwar, M., Gligoroski, D., & Kralevska, K. “SoK of used cryptography in blockchain.” IEEE Access, 7, 148550-148575, (2019).
[14]Suma, V. “Security and privacy mechanism using blockchain.” Journal of Ubiquitous Computing and Communication Technologies (UCCT), 1(01), 45-54, (2019).
[15]Zhu, Q., Loke, S. W., Trujillo-Rasua, R., Jiang, F., & Xiang, Y. “Applications of distributed ledger technologies to the internet of things: A survey.” ACM computing surveys (CSUR), 52(6), 1-34, (2019).
[16]Vujičić, D., Jagodić, D., & Ranđić, S. “Blockchain technology, bitcoin, and Ethereum: A brief overview.” In 2018 17th international symposium infoteh-jahorina (infoteh) (pp. 1-6), (2018, March).
[17]Buterin, Vitalik. "Ethereum: A next-generation cryptocurrency and decentralized application platform." Bitcoin Magazine 23, (2014).
[18]Lee, W. M. “Using the metamask chrome extension.” In Beginning Ethereum Smart Contracts Programming (pp. 93-126). Apress, Berkeley, CA, (2019).
[19]Luu, L., Chu, D. H., Olickel, H., Saxena, P., & Hobor, A. “Making smart contracts smarter.” In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 254-269), (2016, October).
[20]Cachin, C. “Architecture of the hyperledger blockchain fabric.” In Workshop on distributed cryptocurrencies and consensus ledgers (Vol. 310, No. 4), (2016, July).
[21]Elrom, E. “Hyperledger.” In The Blockchain Developer (pp. 299-348). Apress, Berkeley, CA, (2019).
[22]Dhillon, V., Metcalf, D., & Hooper, M. “The hyperledger project.” In Blockchain enabled applications (pp. 139-149). Apress, Berkeley, CA, (2017).
[23]Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., ... & Yellick, J. “Hyperledger fabric: a distributed operating system for permissioned blockchains.” In Proceedings of the thirteenth EuroSys conference (pp. 1-15), (2018, April).
[24]Baliga, A., Solanki, N., Verekar, S., Pednekar, A., Kamat, P., & Chatterjee, S. “Performance characterization of hyperledger fabric.” In 2018 Crypto Valley conference on blockchain technology (CVCBT) (pp. 65-74), (2018, June).
[25]Sajana, P., Sindhu, M., & Sethumadhavan, M. “On blockchain applications: hyperledger fabric and ethereum.” International Journal of Pure and Applied Mathematics, 118(18), 2965-2970, (2018).
[26]Bhattacharya, M. P., Zavarsky, P., & Butakov, S. “Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain.” In 2020 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-7), (2020, October).
[27]Ghandour, A. G., Elhoseny, M., & Hassanien, A. E. “Blockchains for smart cities: a survey.” In Security in Smart Cities: Models, Applications, and Challenges (pp. 193-210). Springer, Cham, (2019).
[28]Lim, S. Y., Fotsing, P. T., Almasri, A., Musa, O., Kiah, M. L. M., Ang, T. F., & Ismail, R. “Blockchain technology the identity management and authentication service disruptor: a survey.” International Journal on Advanced Science, Engineering and Information Technology, 8(4-2), 1735-1745, (2018).
[29]Tobin, A., & Reed, D. “The inevitable rise of self-sovereign identity.” The Sovrin Foundation, 29, (2016).
[30]Mühle, A., Grüner, A., Gayvoronskaya, T., & Meinel, C. “A survey on essential components of a self-sovereign identity.” Computer Science Review, 30, 80-86, (2018).
[31]Saraf, C., & Sabadra, S. “Blockchain platforms: A compendium.” In 2018 IEEE International Conference on Innovative Research and Development (ICIRD) (pp. 1-6), (2018, May).
[32]Hyperledger Ursa, https://www.hyperledger.org/projects/ursa.
[33]D. Reed, “Decentralized Identifiers (DIDs) v0.11–data model and syntaxes for decentralized identifiers (DIDs),” W3C Community Group Draft Report, 2018, https://w3c-ccg. github.io/did-spec/.
[34]M. Sporny, D. C. Burnett, D. Longley, and G. Kellogg, “Verifiable Credentials Data Model 1.0 - Expressing verifiable information on the Web,” W3C Editor’s Draft, 7 December 2018. Available at: https://w3c.github.io/vc-data-model, (Accessed December 7th 2018).
[35]Boettiger, C. “An introduction to Docker for reproducible research.” ACM SIGOPS Operating Systems Review, 49(1), 71-79, (2015).
[36]Tilkov, S., & Vinoski, S. “Node. js: Using JavaScript to build high-performance network programs.” IEEE Internet Computing, 14(6), 80-83, (2010).
[37]Gosset, P., & Hyland, M. “Classification, detection and prosecution of fraud in mobile networks.” In Proceedings of ACTS mobile summit (No. 1, pp. 2-4), (1999, June).
[38]Macia-Fernandez, G., Garcia-Teodoro, P., & Diaz-Verdejo, J. “Fraud in roaming scenarios: an overview.” IEEE Wireless Communications, 16(6), 88-94, (2009).
[39]Lux, Z. A., Thatmann, D., Zickau, S., & Beierle, F. “Distributed-Ledger-based authentication with decentralized identifiers and verifiable credentials.” In 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) (pp. 71-78), (2020, September).
[40]Sukhwani, H., Wang, N., Trivedi, K. S., & Rindos, A. “Performance modeling of hyperledger fabric (permissioned blockchain network).” In 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) (pp. 1-8), (2018, November).
[41]Ho, Y. H., Cheng, Z., Ho, P. M. F., & Chan, H. C. “Mobile intercloud 61 system with blockchain." In Proceedings of the International MultiConference of Engineers and Computer Scientists (Vol. 1), (2018, March).

電子全文 電子全文(網際網路公開日期:20260803)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top