SlideShare a Scribd company logo
1 of 20
PROJECT ON
SAFE REMOTE PURCHASE BY PRIVATE SMART
CONTRACT ON PUBLIC BLOCKCHAIN
Presented by: ALI MANSOUR AL-MADANI
Email: abounazek2012@gmail.com
DST- NRDMS - ICPS Sponsored
Two Weeks National Short Term Training Program on Block
Chain Technology (NW-STTP-BCT),
3rd – 15th Feb 2020
OUTLINE
◦ Introduction
◦ Problem statements
◦ Use Case
◦ Methodology
◦ Block diagram
◦ Expected Outcome
◦ Conclusion
◦ References
2
INTRODUCTION
◦ Safe Remote Purchase by Private Smart Contract on Public Blockchain.
◦ Blockchain, proposed as an underlying technology of cryptocurrency like Bitcoin,
allows users to transfer currency over a distributed, public and trust-less network.
◦ Over the last few years, blockchain systems have evolved to support smart contracts
which can run custom Turing-complete code on the blockchain, such as Ethereum.
Today, public cryptocurrencies are widely used. On Ethereum, more than 10 million
ethers are hold by more than 1 million smart contracts.
3
PROBLEM STATEMENTS
 Safe Remote Purchase Purchasing goods remotely currently requires multiple
parties that need to trust each other.
 The simplest configuration involves a seller and a buyer. The buyer would like to
receive an item from the seller and the seller would like to get money (or an
equivalent) in return. The problematic part is the shipment here: There is no
way to determine for sure that the item arrived at the buyer
 There are multiple ways to solve this problem, but all fall short in one or the
other way.
4
5
Use case:
6
By using remix.ethereum I designed the program for Safe
Remote Purchase :
7
8
9
 Function confirmReceived()
Confirm that you (the buyer) received the item.
IsState(State.Locked) // This will release the locked ether.
 And function emit ItemReceived();
It is important to change the state first , otherwise, the contract called
using ‘send ‘ below can call again here.
10
11
After have written the code we will run the program from run
button and Deploy it:
12
 And by using Hyperledger composer I will make similar program
trading network using Blockchain
13
Script File
14
Create 2 the participants.
15
Now that we have two Trader participants, we need something for them to trade.
Creating an asset is very similar to creating a participant. The Commodity we're
creating will have an owner property indicating that it belongs to the Trader with
the tradeId of T1.
16
REFERENCES
◦ CostanV, Devadas S. Intel SGX explained. IACR Cryptology ePrint Archive: Report 2016/086,
2016. http://eprint.iacr.org/, Mar. 2018.
◦ XuY Z, CuiW D, Peinado M. Controlled-channel attacks: Deterministic side channels for
untrusted operating systems. In Proc. IEEE Symp. Security and Privacy, May 2015, pp.640-
656.
◦ Shih MW, Lee S, KimT, Peinado M.T-SGX: Eradicating controlled-channel attacks against
enclave programs. In Proc. the Annual Network and Distributed System Security Symposium,
March 2017.
◦ Shinde S, Chua Z L, NarayananV, Saxena P. Preventing page faults from telling your secrets:
Defenses against pigeonhole attacks. In Proc. the 11th ACM on Asia Conf. Computer and
Communications Security, May 2016, pp.317-328.
◦ Lee S, Shih MW, Gera P, KimT, Kim H, Peinado M. Inferring fine-grained control flow inside
SGX enclaves with branch shadowing. In Proc. the 26th USENIX Security Symp.,August 2017,
pp.16-18.
17
REFERENCES
◦ F. Lv, X. Song, B. Wu, V. K. Singh, and R. Nevatia. Leftluggage detection using Bayesian
inference. In Proc. 9th IEEE Intl. Workshop Perform. Eval. Track. Surveill., pages 83–90,
2006.
◦ D. Makris, T. Ellis, and J. Black. Bridging the gaps between cameras. In 2004 IEEE
Computer Society Conference on Computer Vision and Pattern Recognition, volume 2, pages
205–210, 2004.
◦ Z. Wang, Y. Zhao, J. Zhang, and Y. Guo, “Research on motion detection of video surveillance
system,” Image and Signal Processing (CISP), 2010 3RD international Congress on, vol, 1,
pp. 193-197, 2010.
◦ Guler, P., Emeksiz, D., Temizel, A., Teke, M., & Temizel, T. T. (2016). Real-time multi-camera
video analytics system on GPU. Journal of Real-Time Image Processing, 11(3), 457-472.
◦ Agarwal, P., Kahlon, S. S., Bisht, N., Dash, P., Ahuja, S., & Goyal, A. (2018). Abandoned
object detection and tracking using cctv camera. In Information and communication
technology for sustainable development (pp. 483-492). Springer, Singapore.
18
19
 Safe Remote Purchase Purchasing goods remotely currently requires
multiple parties that need to trust each other.
 The simplest configuration involves a seller and a buyer. The buyer
would like to receive an item from the seller and the seller would like
to get money (or an equivalent) in return. The problematic part is the
shipment here: There is no way to determine for sure that the item
arrived at the buyer
 There are multiple ways to solve this problem, but all fall short in one
or the other way by using BlockchainTechnology.
CONCLUSION
20
THANK YOU …
Contact:-
abounazek2012@gmail.com
csit.amm@bamu.ac.in
Ali Mansour Al-madani
+917755957156

More Related Content

Similar to Safe remote purchase by private smart contract on public blockchain

220943-RSP.pptx
220943-RSP.pptx220943-RSP.pptx
220943-RSP.pptxINDHUJALV
 
Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Self-employed
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
Diseño del Smart Contract Blockchain: ejemplo para Real Estate
Diseño del Smart Contract Blockchain: ejemplo para Real EstateDiseño del Smart Contract Blockchain: ejemplo para Real Estate
Diseño del Smart Contract Blockchain: ejemplo para Real EstateJosé Luis Casal
 
IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET Journal
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYIRJET Journal
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESIRJET Journal
 
DARQ - The Bleeding Edge Technology
DARQ - The Bleeding Edge TechnologyDARQ - The Bleeding Edge Technology
DARQ - The Bleeding Edge TechnologyIRJET Journal
 
Ijsrp published research paper november 2020
Ijsrp published research paper november 2020Ijsrp published research paper november 2020
Ijsrp published research paper november 2020shoaibulhassanuos
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackPriyanka Aash
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
Blockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real WorldBlockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real WorldIRJET Journal
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyIRJET Journal
 
IRJET- Smart Contracts using Blockchain
IRJET- Smart Contracts using BlockchainIRJET- Smart Contracts using Blockchain
IRJET- Smart Contracts using BlockchainIRJET Journal
 
Blockchain for the internet of things a systematic literature review
Blockchain for the internet of things  a systematic literature reviewBlockchain for the internet of things  a systematic literature review
Blockchain for the internet of things a systematic literature revieweraser Juan José Calderón
 

Similar to Safe remote purchase by private smart contract on public blockchain (20)

final.pdf
final.pdffinal.pdf
final.pdf
 
220943-RSP.pptx
220943-RSP.pptx220943-RSP.pptx
220943-RSP.pptx
 
Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Internet of things .pptx [repaired]
Internet of things .pptx [repaired]
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Diseño del Smart Contract Blockchain: ejemplo para Real Estate
Diseño del Smart Contract Blockchain: ejemplo para Real EstateDiseño del Smart Contract Blockchain: ejemplo para Real Estate
Diseño del Smart Contract Blockchain: ejemplo para Real Estate
 
IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking Application
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
 
DARQ - The Bleeding Edge Technology
DARQ - The Bleeding Edge TechnologyDARQ - The Bleeding Edge Technology
DARQ - The Bleeding Edge Technology
 
Ijsrp published research paper november 2020
Ijsrp published research paper november 2020Ijsrp published research paper november 2020
Ijsrp published research paper november 2020
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
Blockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real WorldBlockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real World
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain Technology
 
IRJET- Smart Contracts using Blockchain
IRJET- Smart Contracts using BlockchainIRJET- Smart Contracts using Blockchain
IRJET- Smart Contracts using Blockchain
 
Blockchain for the internet of things a systematic literature review
Blockchain for the internet of things  a systematic literature reviewBlockchain for the internet of things  a systematic literature review
Blockchain for the internet of things a systematic literature review
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Safe remote purchase by private smart contract on public blockchain

  • 1. PROJECT ON SAFE REMOTE PURCHASE BY PRIVATE SMART CONTRACT ON PUBLIC BLOCKCHAIN Presented by: ALI MANSOUR AL-MADANI Email: abounazek2012@gmail.com DST- NRDMS - ICPS Sponsored Two Weeks National Short Term Training Program on Block Chain Technology (NW-STTP-BCT), 3rd – 15th Feb 2020
  • 2. OUTLINE ◦ Introduction ◦ Problem statements ◦ Use Case ◦ Methodology ◦ Block diagram ◦ Expected Outcome ◦ Conclusion ◦ References 2
  • 3. INTRODUCTION ◦ Safe Remote Purchase by Private Smart Contract on Public Blockchain. ◦ Blockchain, proposed as an underlying technology of cryptocurrency like Bitcoin, allows users to transfer currency over a distributed, public and trust-less network. ◦ Over the last few years, blockchain systems have evolved to support smart contracts which can run custom Turing-complete code on the blockchain, such as Ethereum. Today, public cryptocurrencies are widely used. On Ethereum, more than 10 million ethers are hold by more than 1 million smart contracts. 3
  • 4. PROBLEM STATEMENTS  Safe Remote Purchase Purchasing goods remotely currently requires multiple parties that need to trust each other.  The simplest configuration involves a seller and a buyer. The buyer would like to receive an item from the seller and the seller would like to get money (or an equivalent) in return. The problematic part is the shipment here: There is no way to determine for sure that the item arrived at the buyer  There are multiple ways to solve this problem, but all fall short in one or the other way. 4
  • 6. 6 By using remix.ethereum I designed the program for Safe Remote Purchase :
  • 7. 7
  • 8. 8
  • 9. 9  Function confirmReceived() Confirm that you (the buyer) received the item. IsState(State.Locked) // This will release the locked ether.  And function emit ItemReceived(); It is important to change the state first , otherwise, the contract called using ‘send ‘ below can call again here.
  • 10. 10
  • 11. 11 After have written the code we will run the program from run button and Deploy it:
  • 12. 12  And by using Hyperledger composer I will make similar program trading network using Blockchain
  • 14. 14 Create 2 the participants.
  • 15. 15 Now that we have two Trader participants, we need something for them to trade. Creating an asset is very similar to creating a participant. The Commodity we're creating will have an owner property indicating that it belongs to the Trader with the tradeId of T1.
  • 16. 16
  • 17. REFERENCES ◦ CostanV, Devadas S. Intel SGX explained. IACR Cryptology ePrint Archive: Report 2016/086, 2016. http://eprint.iacr.org/, Mar. 2018. ◦ XuY Z, CuiW D, Peinado M. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In Proc. IEEE Symp. Security and Privacy, May 2015, pp.640- 656. ◦ Shih MW, Lee S, KimT, Peinado M.T-SGX: Eradicating controlled-channel attacks against enclave programs. In Proc. the Annual Network and Distributed System Security Symposium, March 2017. ◦ Shinde S, Chua Z L, NarayananV, Saxena P. Preventing page faults from telling your secrets: Defenses against pigeonhole attacks. In Proc. the 11th ACM on Asia Conf. Computer and Communications Security, May 2016, pp.317-328. ◦ Lee S, Shih MW, Gera P, KimT, Kim H, Peinado M. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In Proc. the 26th USENIX Security Symp.,August 2017, pp.16-18. 17
  • 18. REFERENCES ◦ F. Lv, X. Song, B. Wu, V. K. Singh, and R. Nevatia. Leftluggage detection using Bayesian inference. In Proc. 9th IEEE Intl. Workshop Perform. Eval. Track. Surveill., pages 83–90, 2006. ◦ D. Makris, T. Ellis, and J. Black. Bridging the gaps between cameras. In 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, volume 2, pages 205–210, 2004. ◦ Z. Wang, Y. Zhao, J. Zhang, and Y. Guo, “Research on motion detection of video surveillance system,” Image and Signal Processing (CISP), 2010 3RD international Congress on, vol, 1, pp. 193-197, 2010. ◦ Guler, P., Emeksiz, D., Temizel, A., Teke, M., & Temizel, T. T. (2016). Real-time multi-camera video analytics system on GPU. Journal of Real-Time Image Processing, 11(3), 457-472. ◦ Agarwal, P., Kahlon, S. S., Bisht, N., Dash, P., Ahuja, S., & Goyal, A. (2018). Abandoned object detection and tracking using cctv camera. In Information and communication technology for sustainable development (pp. 483-492). Springer, Singapore. 18
  • 19. 19  Safe Remote Purchase Purchasing goods remotely currently requires multiple parties that need to trust each other.  The simplest configuration involves a seller and a buyer. The buyer would like to receive an item from the seller and the seller would like to get money (or an equivalent) in return. The problematic part is the shipment here: There is no way to determine for sure that the item arrived at the buyer  There are multiple ways to solve this problem, but all fall short in one or the other way by using BlockchainTechnology. CONCLUSION