izpis_h1_title_alt

Uporaba verige blokov za zagotavljanje zaupnosti in integritete podatkov v obstoječih sistemih
ID Kostanjšek, Blaž (Author), ID Ciglarič, Mojca (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (1,16 MB)
MD5: 8382257957D799D2D848EB07E8EC6C03
PID: 20.500.12556/rul/3982cace-4bf5-420d-848d-d35be096b1ed

Abstract
Ko govorimo o zaupnosti in integriteti podatkov, smo uporabniki v tradicionalnih sistemih vedno primorani zaupati centralni avtoriteti. S prihodom prvih kripto-valut in hitrim porastom uporabe verig blokov tudi na ostalih področjih se pojavi možnost novega pristopa k reševanju te problematike. V delu tako predlagamo nov način reševanja zaupanja in integritete podatkov, ki temelji na uporabi verige blokov in za svoje delovanje ne potrebuje zaupanja vredne centralne avtoritete. Tekom naloge postopoma razvijemo načrt rešitve, z implementacijo predlagane rešitve izvedemo študijo izvedljivosti takšnega sistema ter glede na omejitve implementirane rešitve ocenimo smiselnost uporabe v obstoječih sistemih.

Language:Slovenian
Keywords:veriga blokov, pametne pogodbe, zaupnost, integriteta podatkov, omrežja vsak z vsakim
Work type:Master's thesis/paper
Organization:FRI - Faculty of Computer and Information Science
Year:2017
PID:20.500.12556/RUL-94255 This link opens in a new window
Publication date in RUL:21.07.2017
Views:1898
Downloads:2502
Metadata:XML DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Using Blockchain to Provide Confidentiality and Data Integrity in Existing Systems
Abstract:
When it comes to confidentiality and data integrity, in traditional systems users always need to trust central authorities. The arrival of first crypto-currencies and the rapid increase in use of blockchains on non-financial areas opens the possibility of a new approach to solving this problem. In this work, we propose a new way of providing confidentiality and data integrity based on blockchain, which does not require a trusted central authority. We gradually develop an idea of solution and then make a proof of concept by implementing the proposed solution. Considering the limitations of the implemented solution we also evaluate where the integration of implemented solution might be reasonable.

Keywords:blockchain, smart contracts, confidentiality, data integrity, peer to peer networks

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back