无信任环境中安全消息传递的去中心化应用

M. Abdulaziz, Davut Çulha, A. Yazici
{"title":"无信任环境中安全消息传递的去中心化应用","authors":"M. Abdulaziz, Davut Çulha, A. Yazici","doi":"10.1109/IBIGDELFT.2018.8625362","DOIUrl":null,"url":null,"abstract":"Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A Decentralized Application for Secure Messaging in a Trustless Environment\",\"authors\":\"M. Abdulaziz, Davut Çulha, A. Yazici\",\"doi\":\"10.1109/IBIGDELFT.2018.8625362\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.\",\"PeriodicalId\":290302,\"journal\":{\"name\":\"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)\",\"volume\":\"172 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IBIGDELFT.2018.8625362\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBIGDELFT.2018.8625362","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

区块链技术作为一种在无信任环境中确保数据完整性、保密性和可用性的手段,受到了广泛关注。它们旨在通过利用网络的聚合能力来抵御恶意攻击,从而保护数据免受内部和外部网络攻击。在本文中,我们将利用以太坊耳语协议创建我们自己的去中心化消息传递应用程序。我们的应用程序将能够以安全和匿名的方式发送加密消息。我们将利用以太坊平台部署我们的区块链网络。由于其分布式特性和通信协议的适应性,该应用程序可以抵抗大多数抑制策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Decentralized Application for Secure Messaging in a Trustless Environment
Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信