{"title":"DevID: Blockchain-Based Portfolios for Software Developers","authors":"M. Vos, Mitchell Olsthoorn, J. Pouwelse","doi":"10.1109/DAPPCON.2019.00030","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00030","url":null,"abstract":"Decentralized applications, also known as dApps, are the new paradigm for writing business-critical software. Recruiting developers with appropriate qualifications and skills for this activity is key, yet challenging. The main problem is that the portfolio of developers is usually scattered across centralized platforms like GitHub and LinkedIn, and vendor locked. This can result in an incomplete impression of their capabilities. We address this problem and introduce DevID, a blockchain-based portfolio for developers. Over time, this portfolio enables developers to build up a trustworthy collection of records that showcase their capabilities and expertise. They can import data assets from third parties into a unified DevID portfolio, add projects and skills, and receive endorsements. All portfolio records are stored on a scalable distributed ledger and owned by developers themselves. The essential idea is to exploit the tamper-proof property of the blockchain while providing durable storage. To demonstrate the practical value of DevID, we build the competition-based platform, dAppCoder, for the development of decentralized applications. On dAppCoder clients are able to submit their ideas and developers can find work. dAppCoder utilizes DevID portfolios to match these clients and developers. We fully implement our ideas and conduct a deployment trial. Our trial demonstrates that DevID is efficient at storing portfolio records.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127219844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process Mining for Decentralized Applications","authors":"M. Müller, Peter Ruppel","doi":"10.1109/DAPPCON.2019.00031","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00031","url":null,"abstract":"Distributed Ledger Technologies and particularly Blockchain-based Decentralized Applications entail transaction data from various use cases and usage behaviors in a decentralized manner. In this context, we propose to apply Process Mining as a means to understand and quantify how a Distributed Ledger is de facto utilized. This paper introduces a heuristic Process Mining approach for extracting high level process structures from Distributed Ledgers and Decentralized Applications, which can also represent changes over time. The universal approach is demonstrated on the basis of the complete set of all transactions that happened on the Ethereum Blockchain during its first three years. Events, cases, and activities allow to compile an evolutionary time line, which shows the Blockchain evolving from its early stages to broader adoption. Furthermore, measures of activity significance, confidence, and process complexity are used to compile dependency graphs, which represent process transitions.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122305527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. S. D. Selvi, Arinjita Paul, C. Rangan, S. Dirisala, Saswata Basu
{"title":"Splitting and Aggregating Signatures in Cryptocurrency Protocols","authors":"S. S. D. Selvi, Arinjita Paul, C. Rangan, S. Dirisala, Saswata Basu","doi":"10.1109/DAPPCON.2019.00021","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00021","url":null,"abstract":"The blockchain technology and a vast amount of cryptocurrency related activities have generated an unprecedented level of interest among the public. However, even at the entry level, cryptocurrency users need to deal with the complex task of key management. In this paper, we propose a simple way to manage a user's private key, under a reasonable assumption that the user has two devices at his disposal (say a laptop and a mobile phone). We refer to our strategy as key splitting. Since these cryptographic keys are used for generating digital signatures, we should take a closer look at the signature schemes that would perform best under key splitting. At the operational level, scalability is one of the main challenges faced by the users and developers. While there are fundamental issues like consensus that challenge scalability, we focus on the computational efficiency in a block formation. Aggregation of signatures is one of the effective solutions to this problem. To this end, we observe that none of the existing signature schemes work well for BOTH key splitting and aggregation. The current popular schemes such as the ones used in Bitcoin or Schnorr's scheme implemented over Elliptic curves are neither suitable for aggregation nor can their keys be split in a convenient and meaningful way. A detailed theoretical and empirical analysis shows that the BLS short signature scheme is best suited for achieving both key splitting and aggregation.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Miehle, Dominic Henze, A. Seitz, André Luckow, B. Brügge
{"title":"PartChain: A Decentralized Traceability Application for Multi-Tier Supply Chain Networks in the Automotive Industry","authors":"Daniel Miehle, Dominic Henze, A. Seitz, André Luckow, B. Brügge","doi":"10.1109/DAPPCON.2019.00027","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00027","url":null,"abstract":"Supply chain networks in the automotive industry deal with numerous participants and parts on multiple tiers that are spread across several geographical locations. Due to their inherent complexity and high focus on data protection in a competitive original equipment manufacturer market, supply chains often lack transparency and responsiveness. However, legal authorities such as the Federal Motor Transport Authority of Germany or the National Highway Traffic Safety Administration of USA require end-to-end traceability of parts. This is particularly important for the identification of defective parts in recalls when multiple suppliers are involved. Affected parts must be promptly identified among several million vehicles. Manual investigation of the same results in high costs and risks. Another challenge is the detection of counterfeit parts, especially in after-sales markets. In this paper, we propose PartChain – a decentralized supply chain traceability application – that enables the creation, monitoring, and sharing of a unique digital representation of a physical part across a supply chain network using Blockchain technology. We conducted a case study with our industry partner to demonstrate the feasibility and potential of our concept. Here, physical parts were tokenized on a permissioned Blockchain using our PartChain mobile app, enabling the storage of process data and the ownership transfer of parts in a reliable and immutable manner.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133609380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Irregular-Program-Based Hash Algorithms","authors":"Q. Zhou","doi":"10.1109/DAPPCON.2019.00024","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00024","url":null,"abstract":"Because of their energy efficiency over general-purpose central processing unit (CPU), application-specific integrated circuit (ASIC) and field-programmable gate array (FPGA) have been used to accelerate blockchain mining. These hardware accelerators create the concern of centralization because the ASIC devices are dominated by a few manufacturers. Several algorithms are proposed to lower the benefits of ASIC including memory-intensive hash algorithms, where the memory access patterns are random and depend on input data. To further lower the potential hardware acceleration, in this paper, we introduce irregular-program-based hash algorithms, where both the code path and memory access are random and depend on input data. We present an example of the hash algorithm based on dynamic search tree (DST), which exhibits both control-path and memory-access irregularities. We compare the performance of a CPU-based implementation of the DST to an existing FPGA-based implementation, which shows comparable performance. An instance of the proposed hash algorithm is elaborated, and the test inputs and outputs are given.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134422315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Modeling and Analysis of the Bitcoin Inventory Protocol","authors":"Yahya Shahsavari, Kaiwen Zhang, C. Talhi","doi":"10.1109/DAPPCON.2019.00019","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00019","url":null,"abstract":"Blockchains are currently gaining attention as a newly emerging technology in both academia and industry, capable of impacting a variety of domains beyond cryptocurrencies. Performance modeling can be used to provide us with a deeper understanding of the behavior and dynamics within blockchain peer-to-peer networks. Blockchain system architects can leverage network models to properly tune their system and to reduce design costs significantly. In this paper, we focus on the original and well-established Bitcoin blockchain network. In particular, we propose a random graph model for performance modeling and analysis of the inventory-based protocol for block dissemination. This model addresses the impact of key blockchain parameters on the overall performance of Bitcoin. We derive some explicit and closed-form equations for block propagation delay and traffic overhead. We implement our model using the popular network simulator OMNet++. We validate the accuracy of our theoretical model and its implementation with our dataset mined from the Bitcoin network. Our results show the trade-off between the default number of connections per node, network bandwidth, and block size in order to compute the optimal block propagation delay over the network.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127335635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Risk Redistribution Standard for Practical Cryptocurrency Payment","authors":"Yao-Chieh Hu, Ting-Ting Lee, Chungsang Lam","doi":"10.1109/DAPPCON.2019.00020","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00020","url":null,"abstract":"Cryptocurrencies are developed as a decentralized and trustless payment system, in which participants should be able to conduct payments across borders with acceptable latency. However, the fluctuation of the exchange rate between crypto and fiat currencies has raised significant concerns and thwarted the prevalence of cryptocurrency payment adoption. Existing solutions require merchants to liquidate the received cryptocurrency on an exchange platform. To compensate for the exchange rate risk, merchants tend to charge a higher price in cryptocurrencies compare to in fiat currency, which dampens the incentive of customers to choose cryptocurrencies as the means of payment. This paper proposes an architecture bolstered by smart contracts to transfer the risk from the merchants to the cryptocurrency issuer. This narrows the gap between prices denominated in cryptocurrencies and fiat currencies, and thus increases the adoption of cryptocurrencies as a payment method. The Ethereum blockchain is chosen as the experimental environment in this work, yet the architecture can be migrated to other decentralized systems without additional efforts. This work devises a novel ERC^1 standard to resolve the payment at a predetermined exchange rate that can be employed by any existing cryptocurrency. Immutable events on the blockchain will be generated upon the issuance and settlement of a payment, which are considered as the receipts for granting rights to the merchants to settle the payment at a regular basis. The architecture demonstrates a notable reduction on the exchange rate risk for the merchants, solving the primary problem of cryptocurrency payment adoptions nowadays.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"607 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Girish Showkatramani, Nidhi Khatri, Arlene Landicho, Darwin Layog
{"title":"A Secure Permissioned Blockchain Based System for Trademarks","authors":"Girish Showkatramani, Nidhi Khatri, Arlene Landicho, Darwin Layog","doi":"10.1109/DAPPCON.2019.00026","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00026","url":null,"abstract":"A trademark may be a word, phrase, symbol, sound, color, scent or design, or combination of these, that identifies and distinguishes the products or services of a particular source from those of others. Obtaining a trademark is a complex, time intensive and costly process that involves varied steps before the trademark can be registered including searching prior trademarks, filing of the trademark application, review of the trademark application and final publication for opposition by the public. Currently, the process of trademark registration, renewal and validation faces numerous challenges such as the requirement for registration in different jurisdictions, maintenance of centralized databases in different jurisdictions, proving the authenticity of the physical trademark documents, identifying the violation and abuse of the intellectual property etc. to name a few. Recently, blockchain technology has shown great potential in a variety of industries such as finance, education, energy and resource management, healthcare, due to its decentralization and non-tampering features. Furthermore, in the recent years, smart contracts have attracted increased attention due to the popularity of blockchains. In this study, we have utilized Hyperledger fabric as the permissioned blockchain framework along with smart contracts to provide solution to the financial, procedural, enforcement and protection related challenges of the current trademark system. Our blockchain based application seeks to provide a secure, decentralized, immutable trademark system that can be utilized by the intellectual property organizations across different jurisdictions for easily and effectively registering, renewing, validating and distributing digital trademark certificates.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donghang Lu, Pedro A. Moreno-Sánchez, Amanuel Zeryihun, Shivam Bajpayi, Sihao Yin, Ken Feldman, Jason Kosofsky, Pramita Mitra, Aniket Kate
{"title":"Reducing Automotive Counterfeiting Using Blockchain: Benefits and Challenges","authors":"Donghang Lu, Pedro A. Moreno-Sánchez, Amanuel Zeryihun, Shivam Bajpayi, Sihao Yin, Ken Feldman, Jason Kosofsky, Pramita Mitra, Aniket Kate","doi":"10.1109/DAPPCON.2019.00015","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00015","url":null,"abstract":"Counterfeiting constitutes a major challenge in current supply chains leading to millions of dollars of lost revenue for the involved parties every year. Hardware-based authentication solutions built upon Physically Unclonable Functions (PUF) and RFID tags prevent counterfeiting in a multiparty supply chain context. Unfortunately, these solutions cannot prevent counterfeiting and duplication attacks by supply chain parties themselves, as they can simply equivocate by duplicating products in their local and unique activity ledger. In this work, we study the benefits and challenges of using distributed ledger technology (or blockchain) to prevent counterfeiting even in the presence of malicious supply chain parties. In particular, we show that the provision of a distributed and append-only ledger jointly governed by supply chain parties themselves, by means of a distributed consensus algorithm, makes permissioned blockchains such as Hyperledger Fabric a promising approach towards mitigating counterfeiting. At the same time, the distributed nature of the ledger also possesses a privacy challenge as competing supply chain parties strive to protect their businesses from the prying eyes of competitors. Additionally, we show our efforts to build a blockchain-based counterfeiting prevention system for automotive supply chains, albeit the lessons learned are seamlessly applied to other supply chains. From our experience, we highlight two lessons: (i) the requirement of adding identities other than supply chain entities themselves to facilitate the tracking of goods; and (ii) the challenges derived from privacy enforcement in such a permissioned scenario. We thus finalize this work with a set of challenges that need to be overcome to achieve the best of both worlds: a solution to the counterfeiting problem using distributed ledger technology while providing the privacy notions of interest for supply chain parties.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125911122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tawki: Towards Self-Sovereign Social Communication","authors":"Martin Westerkamp, Sebastian Göndör, Axel Küpper","doi":"10.1109/DAPPCON.2019.00014","DOIUrl":"https://doi.org/10.1109/DAPPCON.2019.00014","url":null,"abstract":"As of today, web-based social communication platforms, such as WhatsApp, Twitter, or Facebook, are almost exclusively realized via centralized platforms, based on proprietary interfaces, protocols, and data formats. In consequence, even though social communication being a decentralized, peer-to-peer phenomenon, web-based communication today is implemented via closed, proprietary data silos, which not only lock-in users into their service platforms, but also control and own exchange information and data, including personal and sensitive data such as photos, messages, or contact information. In this paper we present Tawki, a decentralized service architecture for social communication. Using Tawki, users remain in full control of their personal data, which is stored and managed by personal data storages. Each data storage is accessible via a unified Tawki API, which allows users to send and request data to and from other users' personal data storages. Following this approach, social communication is again peer-to-peer without involving a third party controlling and monitoring the process. Tawki uses the Ethereum Name Service (ENS) for both the management of user identities and resolving identifiers to the respective user's personal storage location. Leveraging the immutability of the Ethereum Blockchain, identity management and discovery of personal data storages is secured against censorship and control through any third party.","PeriodicalId":434018,"journal":{"name":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132096407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}