Blockchain-based Automatic Indemnification Mechanism Based on Proof of Violation for Cloud Storage Services

Gwan Hwan Hwang, Pei Chun Tien, Yi Hsiang Tang

研究成果: 書貢獻/報告類型會議貢獻

摘要

In this paper we propose a blockchain-based automatic indemnification mechanism. Clients and service providers (SPs) exchange signed messages according to a predefined protocol that enables clients to utilize service-provider services with simultaneous cryptographic proof of service. When a client has discovered an SP to have violated a service level agreement based on cryptographic proof, then they can obtain cryptocurrency as a compensation by raising objections to a smart contract on a public blockchain. When an objection has been judged successful by programs located in the smart contract, a portion of the deposit (cryptocurrency in the smart contract) will be transferred to the account of the objection-raiser. In this way, the need to establish and run a customer service center with employees for processing such claims and refunds is obviated. Moreover, the traditional third-party trust is no longer needed. Focusing on services for cloud-storage service, we propose protocols and implementation of an indemnification system in the Ethereum. The feasibility of the proposed application has been demonstrated through pilot implementation and testing.

原文英語
主出版物標題Proceedings of the 2020 2nd International Conference on Blockchain Technology, ICBCT 2020
發行者Association for Computing Machinery
頁面90-94
頁數5
ISBN(電子)9781450377676
DOIs
出版狀態已發佈 - 2020 三月 12
事件2nd International Conference on Blockchain Technology, ICBCT 2020 - Hilo, 美国
持續時間: 2020 三月 122020 三月 14

出版系列

名字ACM International Conference Proceeding Series

會議

會議2nd International Conference on Blockchain Technology, ICBCT 2020
國家美国
城市Hilo
期間20/3/1220/3/14

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

指紋 深入研究「Blockchain-based Automatic Indemnification Mechanism Based on Proof of Violation for Cloud Storage Services」主題。共同形成了獨特的指紋。

引用此