Dissertations / Theses on the topic 'Blockchains (Databases)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 23 dissertations / theses for your research on the topic 'Blockchains (Databases).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bergman, Sara. "Permissioned Blockchains and Distributed Databases : A Performance Study." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-152230.
Full textTilton, Peter. "Benchmarking Public and Private Blockchains and Understanding the Development of Private Blockchain Networks." Scholarship @ Claremont, 2018. http://scholarship.claremont.edu/cmc_theses/1963.
Full textBlankenship, Joe. "Forging Blockchains: Spatial Production and Political Economy of Decentralized Cryptocurrency Code/Spaces." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6681.
Full textMoudoud, Hajar. "Intégration de la Blockchain à l’Internet des Objets." Electronic Thesis or Diss., Troyes, 2022. http://www.theses.fr/2022TROY0006.
Full textThe Internet of Things (IoT) is transforming traditional industry into a smart industry where decisions are made based on data. The IoT interconnects many objects that perform complex tasks. However, the intrinsic characteristics of the IoT lead to several problems, such as decentralization and privacy and security issues. Blockchain has emerged as a key technology to address the challenges of IoT. Due to its salient features such as decentralization, immutability, and security, blockchain has been proposed to establish trust in several applications, including IoT. The integration of blockchain with IoT opens the door to new possibilities that inherently improve trustworthiness, reputation, and transparency for all parties involved, while enabling security. However, conventional blockchains are computationally expensive, have limited scalability, and require high bandwidth, making them unsuitable for resource constrained IoT environments. The main objective of this thesis is to use blockchain as a key tool to improve IoT. To achieve our goal, we address the challenges of data reliability and security in IoT by using blockchain as well as new emerging technologies, including artificial intelligence
Hedman, Surlien Peter. "Economic advantages of Blockchain technology VS Relational database : An study focusing on economic advantages with Blockchain technology and relational databases." Thesis, Blekinge Tekniska Högskola, Institutionen för industriell ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17366.
Full textAbou, El Houda Zakaria. "Security Enforcement through Software Defined Networks (SDN)." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.
Full textThe original design of Internet did not take into consideration security aspects of the network; the priority was to facilitate the process of communication. Therefore, many of the protocols that are part of the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers to carry out a set of attacks. Distributed Denial-of-Service (DDoS) represents a big threat and one of the most devastating and destructive attacks plaguing network operators and Internet service providers (ISPs) in stealthy way. Software defined networks (SDN) is an emerging technology that promises to solve the limitations of the conventional network architecture by decoupling the control plane from the data plane. On one hand, the separation of the control plane from the data plane allows for more control over the network and brings new capabilities to deal with DDoS attacks. On the other hand, this separation introduces new challenges regarding the security of the control plane. This thesis aims to deal with DDoS attacks while protecting the resources of the control plane. In this thesis, we contribute to the mitigation of both intra-domain and inter-domain DDoS attacks, and we contribute to the reinforcement of security aspects in SDN
Huang, Shun, and Jacob Carlsson. "Blockchain Technology in the Swedish Fund Market : A Study on the Trust Relationships Between Actors in a Blockchain-Based Fund Market." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-195609.
Full textBlockkedje-teknologi är en ny typ av distribuerad databas som med hjälp av kryptologi tillåter ett system av självständiga och icke-tillitande aktörer att gemensamt dela en databas. Implikationerna för teknologin, tillåtandet av näratillitslösa transaktioner mellan marknadsdeltagare, är revolutionära, speciellt finansmarknaderna. Den svenska fondmarknaden, som karaktäriseras av fragmenterade och i vissa fall ineffektiva system, är ett potentiellt appliceringsområde för den nya teknologin. Den här rapporten går över och presenterar den underliggande tecknologin för blockkedjor, och dess potentiella applikation på den svenska fondmarknaden, med ett specifikt fokus på hur appliceringen skulle förändra tillits-förhållandena på marknaden. Det konstateras att blockkedjor skulle b.la. kunna avveckla vissa mellanliggande aktörer på marknaden, och därmed möjliggöra kostnadsbesparingar kopplade till fondadminstration och orderhantering.
Ковальчук, Б. В. "Можливості технології Blockchain." Thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66875.
Full textOngkasuwan, Patarawan. "Transaction synchronization and privacy aspect in blockchain decentralized applications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272134.
Full textIdéer och tekniker för kryptografi och decentraliserad lagring har haft en enorm tillväxt i många branscher, eftersom de har antagits för att förbättra verksamheten i organisationen. Den som kallas Blockchain-tekniken ger den en effektiv transparenslösning. Generellt har Blockchain använts för digital valuta eller cryptocurrency sedan starten. Ett av de mest kända Blockchainprotokollen är Ethereum, som har uppfunnit det smarta kontraktet för att möjliggöra Blockchains förmåga att utföra ett villkor, snarare än att bara fungera som lagring. Applikationer som använder denna teknik kallas 'Dapps' eller 'decentraliserade applikationer'. Det finns emellertid pågående argument om synkronisering associerad med systemet. Systemsynkronisering är för närvarande oerhört viktigt för applikationer, eftersom väntetiden för att en transaktion ska verifieras kan orsaka missnöje i användarupplevelsen. Flera studier har visat att sekretessläckage inträffar, även om Blockchain ger en viss säkerhet, till följd av den traditionella transaktionen, som kräver godkännande genom en mellaninstitution. Till exempel måste en bank bearbeta transaktioner via många konstitutionspartier innan den får den slutliga bekräftelsen, vilket kräver att användaren väntar en betydande tid. Den här avhandlingen beskriver utmaningen med transaktionssynkronisering mellan användaren och smart kontrakt, samt frågan om en sekretessstrategi för systemet och efterlevnad. För att närma sig dessa två utmaningar separerar den första uppgiften olika händelser och utvärderar resultaten jämfört med en alternativ lösning. Detta görs genom att testa det smarta kontraktet för att hitta det bästa gasprisresultatet, som varierar över tiden. I Ethereum-protokollet är gaspriset ett av de bästa sätten att minska transaktionstiden för att möta användarens förväntningar. Gaspriset påverkas av kodstrukturen och nätverket. I det smarta kontraktet körs test baserat på två fall och löser plattformsproblem som löpare och användarupplevelse och minskar kostnaderna. Det har också visat sig att insamlingen av avgiften innan du deltar i en auktion kan förhindra löparproblemet. Det andra fallet syftar till att bevisa att frysning av budbeloppet är det bästa sättet att öka användarens upplevelse och att uppnå en bättre upplevelse av en online auktion. Den andra utmaningen fokuserar huvudsakligen på sekretessstrategin och riskhanteringen för plattformen, som innebär att identifiera möjliga lösningar för alla risksituationer, samt att upptäcka, förutse och förhindra dem. Tillhandahållande av strategier, som att säkra den smarta kontraktsstrukturen, öka krypteringsmetoden i databasen, utforma ett termblad och avtal och godkännande, hjälper till att förhindra systemets sårbarheter. Därför syftar denna forskning till att förbättra och undersöka en online-auktionsplattform genom att använda ett smart avtal med Blockchain för att ge upplevande användarupplevelser.
Herraiz, Faixó Ferran. "Evolving to Digital and Programmable Value Based Economy: General Prospect and Specific Applications over Sustainability." Doctoral thesis, Universitat de Barcelona, 2019. http://hdl.handle.net/10803/668220.
Full textSolat, Siamak. "Novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture using innovative sharding to enable the use of BFT consensus mechanisms in very large-scale networks." Electronic Thesis or Diss., Université Paris Cité, 2023. http://www.theses.fr/2023UNIP7025.
Full textThis PhD thesis consists of 6 Chapters. In the first Chapter, as an introduction, we provide an overview of the general goals and motives of decentralized and permissionless networks, as well as the obstacles they face. In the introduction, we also refer to the irrational and illogical solution, known as "permissioned blockchain" that has been proposed to improve the performance of networks similar to Bitcoin. This matter has been detailed in Chapter 5. In Chapter 2, we make clear and intelligible the systems that the proposed idea, Parallel Committees, is based on such networks. We detail the indispensable features and essential challenges in replication systems. Then in Chapter 3, we discuss in detail the low performance and scalability limitations of replication systems that use consensus mechanisms to process transactions, and how these issues can be improved using the sharding technique. We describe the most important challenges in the sharding of distributed replication systems, an approach that has already been implemented in several blockchain-based replication systems and although it has shown remarkable potential to improve performance and scalability, yet current sharding techniques have several significant scalability and security issues. We explain why most current sharding protocols use a random assignment approach for allocating and distributing nodes between shards due to security reasons. We also detail how a transaction is processed in a sharded replication system, based on current sharding protocols. We describe how a shared-ledger across shards imposes additional scalability limitations and security issues on the network and explain why cross-shard or inter-shard transactions are undesirable and more costly, due to the problems they cause, including atomicity failure and state transition challenges, along with a review of proposed solutions. We also review some of the most considerable recent works that utilize sharding techniques for replication systems. This part of the work has been published as a peer-reviewed book chapter in "Building Cybersecurity Applications with Blockchain Technology and Smart Contracts" (Springer, 2023). In Chapter 4, we propose a novel sharding technique, Parallel Committees, supporting both processing and storage/state sharding, to improve the scalability and performance of distributed replication systems that use a consensus to process clients' requests. We introduce an innovative and novel approach of distributing nodes between shards, using a public key generation process that simultaneously mitigates Sybil attack and serves as a proof-of-work mechanism. Our approach effectively reduces undesirable cross-shard transactions that are more complex and costly to process than intra-shard transactions. The proposed idea has been published as peer-reviewed conference proceedings in the IEEE BCCA 2023. We then explain why we do not make use of a blockchain structure in the proposed idea, an issue that is discussed in great detail in Chapter 5. This clarification has been published in the Journal of Software (JSW), Volume 16, Number 3, May 2021. And, in the final Chapter of this thesis, Chapter 6, we summarize the important points and conclusions of this research
Johansson, Tom, and Viktor Charpentier. "Blockchain database; technical background and a reconnaissance on an implementation within the banking industry." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211075.
Full textAntonelli, Claudia. "La Blockchain: aspetti crittografici e applicazioni." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/12016/.
Full textSharma, Ankur [Verfasser], and Jens [Akademischer Betreuer] Dittrich. "Snapshot : friend or foe of data management - on optimizing transaction processing in database and blockchain systems / Ankur Sharma ; Betreuer: Jens Dittrich." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1212853245/34.
Full textMelin, Karin. "The GDPR Compliance of Blockchain : A qualitative study on regulating innovative technology." Thesis, Uppsala universitet, Datorteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-397163.
Full textDanko, Michael. "Návrh informačního systému." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444689.
Full textGray, Jared. "The effect of blockchain technology on the South African banking environment." Thesis, 2018. https://hdl.handle.net/10539/28495.
Full textBlockchain technology is a foundational technology with various use cases that can significantly impact the manner in which banking is carried out in South Africa. The following paper seeks to put together a framework for understanding the potential effect of blockchain technology on the South African banking environment, with a specific focus on how blockchain technology will impact the South African banking environment (i.e. the applications and use cases) and when this impact will take place. A qualitative approach to addressing the problem statement was adopted, specifically in the form of focus interviews and strategic discussions with subject matter experts in both the blockchain and South African banking environment. Findings indicate that there are number of blockchain applications that can impact the South African banking environment namely, Private Digital Ledgers, Smart Contracts and Tokens/ Cryptocurrencies. Further to this, research indicates that the former is most likely in the short term, while the latter two applications are subject to a high-level stakeholder coordination, a high level of effort in educating the end customer and a high level of friction from existing systems and process, and will therefore only realise mass adoption in the long-term. As a result, this research contributes to providing an initial view of which applications are most likely to be adopted by South African banks and can form the foundation for further research in this area.
E.K. 2019
Parkin, Jack. "Money/code/space : Bitcoin, blockchain, and geographies of algorithmic decentralisation." Thesis, 2018. http://hdl.handle.net/1959.7/uws:48761.
Full textKumar, Hemant. "Enhancing Blockchain Implementations." Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5169.
Full text(11191410), Duc Viet Le. "Efficient Cryptographic Constructions For Resource-Constrained Blockchain Clients." Thesis, 2021.
Find full textОниськів, Петро Петрович, and Petro Oniskiv. "Система забезпечення справжності документів (на основі технології Blockchain)." Bachelor's thesis, 2021. http://elartu.tntu.edu.ua/handle/lib/35725.
Full textThesis deals with the creation of a prototype of a system for ensuring the authenticity of documents with a long shelf life in an electronic archive, which uses Blockchain technology. Features of the electronic archive are described, the analysis of ways of storage of documents in archive is carried out and the technologies which are used for realization of the chosen way are substantiated. Existing methods of ensuring the authenticity of documents and existing implementations of electronic archives based on Blockchain technology are also investigated. The choice of technologies is substantiated, the description of API of the system is given. A prototype of an electronic archive system using Blockchain technology has been implemented to solve the problem of authenticity of long-term storage documents.
Вступ ...7 1 Аналіз досліджуваної області ...8 1.1 Зберігання документів в архіві в паперовому вигляді ...8 1.2 ЕА .... 8 1.2.1 Види ЕА ...9 1.2.2 Основні проблеми ЕА ...9 1.3 Способи забезпечення достовірності документів ...10 1.3.1 ЕП ...10 1.3.2 Blockchain...12 2 Проектна частина ...16 2.1 Існуючі реалізації ЕА на основі технології Blockchain ...16 2.1.1 BlockSign ...16 2.1.2 Ethereum ...17 2.2 Загальний опис розроблюваної системи ...19 2.3 Обґрунтування вибору технологій ...22 2.4 Опис API системи...25 3 Програмна реалізація системи ...28 3.1 API додатка основної бізнес-логіки ...28 3.2 API додатка для зберігання документів з підвищеною захищеністю ... 33 3.3 API додатка для кожного вузла в мережі Blockchain ...37 4 Безпека життєдіяльності, основи охорони праці ...45 4.1 Навчання працюючих і інструктажі з охорони праці ...45 4.2 Заходи захисту від випромінювань оптичного діапазону ...47 Висновки ... 50 Перелік використаних джерел ...51
(8635641), Servio Ernesto Palacios Interiano. "Auditable Computations on (Un)Encrypted Graph-Structured Data." Thesis, 2020.
Find full text(6620474), Denis A. Ulybyshev. "Data Protection in Transit and at Rest with Leakage Detection." Thesis, 2019.
Find full textIn service-oriented architecture, services can communicate and share data among themselves. This thesis presents a solution that allows detecting several types of data leakages made by authorized insiders to unauthorized services. My solution provides role-based and attribute-based access control for data so that each service can access only those data subsets for which the service is authorized, considering a context and service’s attributes such as security level of the web browser and trust level of service. My approach provides data protection in transit and at rest for both centralized and peer-to-peer service architectures. The methodology ensures confidentiality and integrity of data, including data stored in untrusted cloud. In addition to protecting data against malicious or curious cloud or database administrators, the capability of running a search through encrypted data, using SQL queries, and building analytics over encrypted data is supported. My solution is implemented in the “WAXEDPRUNE” (Web-based Access to Encrypted Data Processing in Untrusted Environments) project, funded by Northrop Grumman Cybersecurity Research Consortium. WAXEDPRUNE methodology is illustrated in this thesis for two use cases, including a Hospital Information System with secure storage and exchange of Electronic Health Records and a Vehicle-to-Everything communication system with secure exchange of vehicle’s and drivers’ data, as well as data on road events and road hazards.
To help with investigating data leakage incidents in service-oriented architecture, integrity of provenance data needs to be guaranteed. For that purpose, I integrate WAXEDPRUNE with IBM Hyperledger Fabric blockchain network, so that every data access, transfer or update is recorded in a public blockchain ledger, is non-repudiatable and can be verified at any time in the future. The work on this project, called “Blockhub,” is in progress.