Safe Remote Purchase by Private Smart Contract on Public Blockchain.
Blockchain, proposed as an underlying technology of cryptocurrency like Bitcoin, allows users to transfer currency over a distributed, public and trust-less network.
Over the last few years, blockchain systems have evolved to support smart contracts which can run custom Turing-complete code on the blockchain, such as Ethereum. Today, public cryptocurrencies are widely used. On Ethereum, more than 10 million ethers are hold by more than 1 million smart contracts.
#BlockchainTechnology #Blockchain #Smart_Contract #discenterlized
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Safe remote purchase by private smart contract on public blockchain
1. PROJECT ON
SAFE REMOTE PURCHASE BY PRIVATE SMART
CONTRACT ON PUBLIC BLOCKCHAIN
Presented by: ALI MANSOUR AL-MADANI
Email: abounazek2012@gmail.com
DST- NRDMS - ICPS Sponsored
Two Weeks National Short Term Training Program on Block
Chain Technology (NW-STTP-BCT),
3rd – 15th Feb 2020
2. OUTLINE
◦ Introduction
◦ Problem statements
◦ Use Case
◦ Methodology
◦ Block diagram
◦ Expected Outcome
◦ Conclusion
◦ References
2
3. INTRODUCTION
◦ Safe Remote Purchase by Private Smart Contract on Public Blockchain.
◦ Blockchain, proposed as an underlying technology of cryptocurrency like Bitcoin,
allows users to transfer currency over a distributed, public and trust-less network.
◦ Over the last few years, blockchain systems have evolved to support smart contracts
which can run custom Turing-complete code on the blockchain, such as Ethereum.
Today, public cryptocurrencies are widely used. On Ethereum, more than 10 million
ethers are hold by more than 1 million smart contracts.
3
4. PROBLEM STATEMENTS
Safe Remote Purchase Purchasing goods remotely currently requires multiple
parties that need to trust each other.
The simplest configuration involves a seller and a buyer. The buyer would like to
receive an item from the seller and the seller would like to get money (or an
equivalent) in return. The problematic part is the shipment here: There is no
way to determine for sure that the item arrived at the buyer
There are multiple ways to solve this problem, but all fall short in one or the
other way.
4
9. 9
Function confirmReceived()
Confirm that you (the buyer) received the item.
IsState(State.Locked) // This will release the locked ether.
And function emit ItemReceived();
It is important to change the state first , otherwise, the contract called
using ‘send ‘ below can call again here.
15. 15
Now that we have two Trader participants, we need something for them to trade.
Creating an asset is very similar to creating a participant. The Commodity we're
creating will have an owner property indicating that it belongs to the Trader with
the tradeId of T1.
17. REFERENCES
◦ CostanV, Devadas S. Intel SGX explained. IACR Cryptology ePrint Archive: Report 2016/086,
2016. http://eprint.iacr.org/, Mar. 2018.
◦ XuY Z, CuiW D, Peinado M. Controlled-channel attacks: Deterministic side channels for
untrusted operating systems. In Proc. IEEE Symp. Security and Privacy, May 2015, pp.640-
656.
◦ Shih MW, Lee S, KimT, Peinado M.T-SGX: Eradicating controlled-channel attacks against
enclave programs. In Proc. the Annual Network and Distributed System Security Symposium,
March 2017.
◦ Shinde S, Chua Z L, NarayananV, Saxena P. Preventing page faults from telling your secrets:
Defenses against pigeonhole attacks. In Proc. the 11th ACM on Asia Conf. Computer and
Communications Security, May 2016, pp.317-328.
◦ Lee S, Shih MW, Gera P, KimT, Kim H, Peinado M. Inferring fine-grained control flow inside
SGX enclaves with branch shadowing. In Proc. the 26th USENIX Security Symp.,August 2017,
pp.16-18.
17
18. REFERENCES
◦ F. Lv, X. Song, B. Wu, V. K. Singh, and R. Nevatia. Leftluggage detection using Bayesian
inference. In Proc. 9th IEEE Intl. Workshop Perform. Eval. Track. Surveill., pages 83–90,
2006.
◦ D. Makris, T. Ellis, and J. Black. Bridging the gaps between cameras. In 2004 IEEE
Computer Society Conference on Computer Vision and Pattern Recognition, volume 2, pages
205–210, 2004.
◦ Z. Wang, Y. Zhao, J. Zhang, and Y. Guo, “Research on motion detection of video surveillance
system,” Image and Signal Processing (CISP), 2010 3RD international Congress on, vol, 1,
pp. 193-197, 2010.
◦ Guler, P., Emeksiz, D., Temizel, A., Teke, M., & Temizel, T. T. (2016). Real-time multi-camera
video analytics system on GPU. Journal of Real-Time Image Processing, 11(3), 457-472.
◦ Agarwal, P., Kahlon, S. S., Bisht, N., Dash, P., Ahuja, S., & Goyal, A. (2018). Abandoned
object detection and tracking using cctv camera. In Information and communication
technology for sustainable development (pp. 483-492). Springer, Singapore.
18
19. 19
Safe Remote Purchase Purchasing goods remotely currently requires
multiple parties that need to trust each other.
The simplest configuration involves a seller and a buyer. The buyer
would like to receive an item from the seller and the seller would like
to get money (or an equivalent) in return. The problematic part is the
shipment here: There is no way to determine for sure that the item
arrived at the buyer
There are multiple ways to solve this problem, but all fall short in one
or the other way by using BlockchainTechnology.
CONCLUSION