Blockchain Based User Management System

被引:0
作者
Temiz, Mustafa [1 ]
Soran, Ahmet [2 ]
Arslan, Halil [3 ]
Erel, Hilal [4 ]
机构
[1] Sivas Cumhuriyet Univ, Yonetim Bilisim Sistemleri, Iktisadi & Idari Bilimler Fak, Sivas, Turkey
[2] Abdullah Gul Univ, Elekt & Bilgisayar Muhendisligi Muhendislik Fak, Kayseri, Turkey
[3] Sivas Cumhuriyet Univ, Bilgisayar Muhendisligi Muhendislik Fak, Sivas, Turkey
[4] Detay Danismanlik, Istanbul, Turkey
来源
2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU) | 2020年
关键词
Blokchain; Keycloak; Kubernetes; Elasticsearch;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Blockchain is a reliable and transparent structure formed by distributing the data in blocks connected to each other using various cryptography techniques to other points on the network. The difference from the existing database operations is that the authorities and responsibilities do not exist in a single central authority, and that these powers and responsibilities are distributed to the other nodes in the network and the assignment is shared. To provide this, peer to peer network infrastructure is used. However, at this stage, authentication in terms of security is one of the basic security mechanisms. In this study, a user management system which can be integrated with more reliable and current technologies, which is thought to be the solution to speed problems in blockchain, is proposed.
引用
收藏
页数:4
相关论文
共 16 条
[1]   MedRec: Using Blockchain for Medical Data Access and Permission Management [J].
Azaria, Asaph ;
Ekblaw, Ariel ;
Vieira, Thiago ;
Lippman, Andrew .
PROCEEDINGS 2016 2ND INTERNATIONAL CONFERENCE ON OPEN AND BIG DATA - OBD 2016, 2016, :25-30
[2]  
Baysal O., 2014, P 11 WORKING C MININ, P328, DOI DOI 10.1145/2597073.2597091
[3]   Containers and Cloud: From LXC to Docker to Kubernetes [J].
Bernstein, David .
IEEE CLOUD COMPUTING, 2014, 1 (03) :81-84
[4]   Introduction to Security and Privacy on the Blockchain [J].
Halpin, Harry ;
Piekarska, Marta .
2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, :1-3
[5]  
Huh S, 2017, INT CONF ADV COMMUN, P464, DOI 10.23919/ICACT.2017.7890132
[6]  
Hussein M. E. H., REPRODUCIBLE EXAMPLE, P14
[7]  
Karas I. R., 2006, COGRAFYA BILGI SISTE, V4
[8]  
Karatas E., 2018, BILISIM TEKNOLOJILER, V11, P399, DOI [10.17671/gazibtd.452686, DOI 10.17671/GAZIBTD.452686]
[9]  
Murathan T., 2019, GAZIANTEP UNIVERSITE, V4, P64
[10]  
Nakamoto Satoshi, 2008, Technical report, P15