Tutorial: Building Secure and Trustworthy Blockchain Applications

被引:9
|
作者
Cai, Chengjun [1 ]
Duan, Huayi [1 ]
Wang, Cong [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/SecDev.2018.00023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Beyond cryptocurrencies, blockchain technologies have shown great potential in enabling a wealth of decentralized applications (DApps), including but not limited to trustworthy auction, election, autonomous organization. While public blockchains are well recognized to allow participants mutually unbeknownst to achieve consensus, financial/business organizations also find great interest in consortium blockchains for better organizational collaborations. We will touch both types of blockchain and corresponding applications in this tutorial. In particular, we will summarize existing blockchain technologies and applications, elaborate the principles of designing and implementing secure DApps, and analyze the security concerns therein. Through concrete examples, we will discuss common practices and pitfalls, such as on-chain/off-chain interaction, randomness generation, and various corner cases. If time permits, we will also go through the implementation of the cloud-based blockchain backbone that powers this tutorial, possibly covering a layered architecture, and discuss deployment choices and security issues along the way. The tutorial will be interspersed with revisiting the security and implementation rules, so that participants are expected to readily apply the tutorial content into real-world practice. The design principles elaborated in this tutorial will be transferable to participants' development of secure and trustworthy blockchain applications and systems in their own workplaces.
引用
收藏
页码:120 / 121
页数:2
相关论文
共 50 条
  • [41] Trustworthy ICs for secure embedded computing
    Cheng, Tim
    IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 516 - 516
  • [42] Secure and trustworthy cyberspace: characteristics and contributions
    Li, Jiyuan
    Chen, Jiangping
    INFORMATION DISCOVERY AND DELIVERY, 2024,
  • [43] Future Internet - Secure, fast and trustworthy
    Federrath, Hannes
    Desel, Jörg
    Endres, Albert
    Stoll, Patrick
    Informatik-Spektrum, 2015, 38 (04) : 277 - 282
  • [44] Trustworthy computing for secure smart cities
    Mansoor, Wathiq
    Varadarajan, Vijayakumar
    JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2021, 13 (03) : 183 - 184
  • [45] From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain
    Ardagna, Claudio A.
    Asal, Rasool
    Damiani, Ernesto
    El Ioini, Nabil
    Elahi, Mehdi
    Pahl, Claus
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2021, 5 (01)
  • [46] Architecting Trustworthy Self-adaptive Systems (Tutorial)
    Calinescu, Radu
    Weyns, Danny
    Gerasimou, Simos
    Habli, Ibrahim
    2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2019), 2019, : 3 - 4
  • [47] An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications
    Rajasekaran, Arun Sekar
    Azees, M.
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [48] The Blockchain Technology for Secure and Smart Applications across Industry Verticals Preface
    Raj, Pethuru
    BLOCKCHAIN TECHNOLOGY FOR SECURE AND SMART APPLICATIONS ACROSS INDUSTRY VERTICALS, 2021, 121 : XV - XVI
  • [49] SCAB - IoTA: Secure communication and authentication for IoT applications using blockchain
    Vishwakarma, Lokendra
    Das, Debasis
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 154 : 94 - 105
  • [50] Secure data sharing with blockchain for remote health monitoring applications: a review
    Upadrista V.
    Nazir S.
    Tianfield H.
    Journal of Reliable Intelligent Environments, 2023, 9 (03) : 349 - 368