Tutorial: Building Secure and Trustworthy Blockchain Applications

被引:9
|
作者
Cai, Chengjun [1 ]
Duan, Huayi [1 ]
Wang, Cong [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/SecDev.2018.00023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Beyond cryptocurrencies, blockchain technologies have shown great potential in enabling a wealth of decentralized applications (DApps), including but not limited to trustworthy auction, election, autonomous organization. While public blockchains are well recognized to allow participants mutually unbeknownst to achieve consensus, financial/business organizations also find great interest in consortium blockchains for better organizational collaborations. We will touch both types of blockchain and corresponding applications in this tutorial. In particular, we will summarize existing blockchain technologies and applications, elaborate the principles of designing and implementing secure DApps, and analyze the security concerns therein. Through concrete examples, we will discuss common practices and pitfalls, such as on-chain/off-chain interaction, randomness generation, and various corner cases. If time permits, we will also go through the implementation of the cloud-based blockchain backbone that powers this tutorial, possibly covering a layered architecture, and discuss deployment choices and security issues along the way. The tutorial will be interspersed with revisiting the security and implementation rules, so that participants are expected to readily apply the tutorial content into real-world practice. The design principles elaborated in this tutorial will be transferable to participants' development of secure and trustworthy blockchain applications and systems in their own workplaces.
引用
收藏
页码:120 / 121
页数:2
相关论文
共 50 条
  • [31] A Trustworthy Evaluation System Based on Blockchain
    Ji, Haokai
    Wang, Chundong
    Jiao, Xu
    Mo, Xiuliang
    Yang, Wenjun
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2020), PT III, 2020, 12114 : 755 - 759
  • [32] Building trustworthy software
    Hogan, Hank
    CONTROL ENGINEERING, 2007, 54 (07) : 78 - 81
  • [33] Trustworthy Federated Learning via Blockchain
    Yang, Zhanpeng
    Shi, Yuanming
    Zhou, Yong
    Wang, Zixin
    Yang, Kai
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 92 - 109
  • [34] A Secure Communication for Maritime IoT Applications Using Blockchain Technology
    Rahimi, Payam
    Khan, Nasir D.
    Chrysostomou, Chrysostomos
    Vassiliou, Vasos
    Nazir, Babar
    16TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2020), 2020, : 244 - 251
  • [35] Building Secure Web Applications with Automatic Partitioning
    Chong, Stephen
    Liu, Jed
    Myers, Andrew C.
    Qi, Xin
    Vikram, K.
    Zheng, Lantian
    Zheng, Xin
    COMMUNICATIONS OF THE ACM, 2009, 52 (02) : 79 - 87
  • [36] PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications
    Yan, Wei
    Zhang, Ning
    Njilla, Laurent L.
    Zhang, Xuan
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (10) : 2196 - 2209
  • [37] Tutorial: A Descriptive Introduction to the Blockchain
    Murray, Meg Coffin
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2019, 45 (01): : 464 - 487
  • [38] BUILDING TRUSTWORTHY SYSTEMS
    MENKUS, B
    JOURNAL OF SYSTEMS MANAGEMENT, 1990, 41 (01): : 5 - 5
  • [39] Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs
    Xie, Lixia
    Ding, Ying
    Yang, Hongyu
    Wang, Xinmu
    IEEE ACCESS, 2019, 7 : 56656 - 56666
  • [40] Special Issue on Secure and Trustworthy Computing
    Sinanoglu, Ozgur
    Karri, Ramesh
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2016, 13 (01)