博碩士論文 110423024 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:84 、訪客IP:18.225.56.181
姓名 游舒方(Shu-Fang Yu)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱
(A Blockchain-based Work Performance Authenticity Platform with User Incentive Mechanism)
相關論文
★ DeFi 去中心化金融發展現況及風險分析- 以2017~2022 年 6 月為研究區間★ 基於區塊鏈防止雙重投票的匿名投票系統
★ NFT-based 車輛與零件履歷驗證平台★ 基於區塊鏈與代理重新加密之隱私保護威脅情資分享平台
★ 元宇宙與 NFT 應用於旅遊購物虛實整合架構規劃之研究★ Decentralizing DNS: Leveraging Web3 and Blockchain Smart Contracts for Enhanced Security
★ Innovations in 6G: Decentralized Network Slice Handover with Proxy Re-Encryption★ Blockchain-based Federated learning with Data privacy protection
★ 具公正性抽獎機制與隱私防護之問卷平台★ 建立安全可靠的推薦信平台: 基於分散式系統的創新方法
★ 去中心化電子書交易平台之區塊鏈框架設計與可行性分析★ A Decentralized Group-oriented Information Sharing System with Searchable Encryption in Supply Chain Environment
★ A Batch Verified Decentralized-AI Against Poisoning Attack In 6G Industrial CPS Environments★ 基於區塊鏈與存取控制之多媒體分享平台
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 (2028-7-1以後開放)
摘要(中) 有誠信的工作經歷能夠幫助企業尋找合適的員工,然而從過去至今求職履歷的驗證方式幾乎是由應徵者撰寫、未來雇主進行求證,如此的驗證情形一直沒有得到改善,若應徵者對自己的經歷及技巧誇飾描述,使企業聘用不適人選,將導致企業無法達到營運之最佳效益,甚至造成損失。因此,本論文設計一個能使雇主撰寫離職員工評語的平台,以保員工之工作經歷真實性,並透過區塊鏈的優點特性來確保資料不被竄改;搭配代理重新加密的技術以保持歷任雇主所撰寫之評語的機密性,如此平台的使用者便可以安全地進行資料分享,並由設計的用戶激勵機制吸引更多的使用者共同打造更可信的工作招募環境。
摘要(英) A credible work performance review assists businesses in finding suitable employees. However, traditionally the verification of résumés has predominantly been conducted through a process whereby applicants furnish details of their professional history, which are then subject to verification by future employers. This paradigm of verification has remained largely unchanged, and its inadequacies become apparent when applicants provide embellished accounts of their skills and experiences, leading to the recruitment of unsuitable candidates. This, in turn, impairs the ability of organizations to achieve optimal operational efficacy and may even lead to financial losses.
In response to these challenges, a platform has been conceived that facilitates employers in composing work performance reviews of their resigning employees, to ensure the authenticity of the employees′ work experience. Utilizing the inherent attributes of blockchain technology, the immutability of data is guaranteed by the platform, safeguarding it against unauthorized alterations. Furthermore, the confidentiality of the reviews written by previous employers is preserved through the use of proxy re-encryption technology, so that users can share information securely. Moreover, the integration of a user incentive mechanism is anticipated to stimulate broader participation, collectively contributing to the establishment of a more credible milieu for employment recruitment.
關鍵字(中) ★ 工作經歷真實性
★ 區塊鏈
★ 資料共享
★ 代理重新加密
★ 激勵性代幣
關鍵字(英) ★ work experience authenticity
★ blockchain
★ data sharing
★ proxy re-encryption
★ incentive token
論文目次 摘要 i
Abstract ii
List of Figures v
List of Tables vi
I. Introduction 1
1-1 Background and Motivation 1
1-2 Purpose 2
1-3 Contributions 3
II. Related Work 4
2-1 Technological Background 4
2-1-1 Blockchain 4
2-1-2 Smart Contract 5
2-1-3 IPFS 6
2-1-4 Proxy Re-encryption 7
2-2 Literature Review 8
III. Preliminaries 11
3-1 Explanation of Symbols 11
3-2 Symmetric-key Encryption 12
3-3 Proxy Re-encryption 13
IV. Proposed System 15
4-1 System Model 15
4-2 Design Goals 16
4-3 Workflow 17
4-3-1 Upload Encrypted Work Performance Review 17
4-3-2 Request Re-encryption Key Creation 18
4-3-3 Create Re-encryption Key 19
4-3-4 Execute Proxy Re-encryption 21
4-3-5 Download Work Performance Review 22
V. Implementation 24
5-1 Development Environment 24
5-1-1 Software 24
5-1-2 Hardware 25
5-2 Smart Contract Functions 25
5-3 Platform Features 26
VI. Security Analysis 28
6-1 Confidentiality 28
6-2 Data Integrity, Authenticity, and Tamper-proofing 28
6-3 Decentralization and Transparency 30
6-4 Fair and Convincing Incentive Mechanism 30
VII. Evaluation 32
7-1 Feature Comparison 32
7-2 Cost Analysis in Blockchain Network 33
7-3 Digital Signature Generation and Verification Time for Work Performance Review 35
7-4 Proxy Re-encryption Time for Multiple Files 35
VIII. Conclusion 37
References 38
參考文獻 [1] J. M. Phillips and S. M. Gully, "Multilevel and strategic recruiting: Where have we been, where can we go from here?" Journal of Management, vol. 41, no. 5, 2015.
[2] K. Navarra, "The real costs of recruitment," Society for Human Resource Management. [Online]. Available: https://www.shrm.org/resourcesandtools/hr-topics/talent-acquisition/pages/the-real-costs-of-recruitment.aspx. Accessed: Apr. 11, 2022.
[3] P. Sinha, A. kumar Rai, and B. Bhushan, "Information Security threats and attacks with conceivable counteraction," in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), vol. 1, pp. 1208-1213, Jul. 2019.
[4] T. Hunt, "Pwned websites," Have I Been Pwned. [Online]. Available: https://haveibeenpwned.com/PwnedWebsites#LinkedIn. Accessed: May 24, 2016.
[5] P. Wang and C. Johnson, "CYBERSECURITY INCIDENT HANDLING: A CASE STUDY OF THE EQUIFAX DATA BREACH," Information Systems, vol. 19, no. 3, pp. 1-7, 2018.
[6] N. Daswani and M. Elbayadi, "The Marriott Breach," in Big Breaches, Apress, Berkeley, CA, 2021. [Online]. Available: https://doi.org/10.1007/978-1-4842-6655-7_3.
[7] L. Abrams, "533 Million Facebook Users’ Phone Numbers Leaked on Hacker Forum," Bleeping Computer. [Online]. Available: https://www.bleepingcomputer.com/news/security/533-million-facebook-users-phone-numbers-leaked-on-hacker-forum/. Accessed: Apr. 3, 2021.
[8] "Cost of a Data Breach 2022," IBM. [Online]. Available: https://www.ibm.com/reports/data-breach. Accessed: Apr. 2023.
[9] "Cost of a Data Breach Action Guide," IBM. [Online]. Available: https://www.ibm.com/reports/data-breach-action-guide. Accessed: Jul. 2, 2023.
[10] M. M. Rahman, M. S. U. Siddiqe, and A. Uddin, "Headhunting System Using Blockchain Technology," in 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Servers (HORA), pp. 1-7, Jun. 2022.
[11] N. S. Dhanala and D. Radha, "Implementation and testing of a blockchain based recruitment management system," in 2020 5th International conference on communication and electronics systems (ICCES), pp. 583-588, Jun. 2020.
[12] R. Sulaiman, A. Alamsyah, and P. Wulansari, "Reshaping the Future of Recruitment through Talent Reputation and Verifiable Credentials using Blockchain Technology," in 2022 10th International Conference on Information and Communication Technology (ICoICT), pp. 316-321, Aug. 2022.
[13] M. M. H. Onik, M. H. Miraz, and C. S. Kim, "A recruitment and human resource management technique using blockchain technology for industry 4.0," in Smart Cities Symposium 2018, pp. 1-6, Apr. 2018.
[14] D. Serranito, A. Vasconcelos, S. Guerreiro, and M. Correia, "Blockchain ecosystem for verifiable qualifications," in 2020 2nd Conference on Blockchain Research & Servers for Innovative Networks and Services (BRAINS), pp. 192-199, Sep. 2020.
[15] P. Sarda, M. Chowdhury, A. Colman, M. A. Kabir, and J. Han, "Blockchain for Fraud Prevention: A Work-History Fraud Prevention System," in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering, pp. 1–6, 2018.
[16] G. Zhao, H. He, B. Di, and J. Chu, "StuChain: an efficient blockchain-based student e-portfolio platform integrating hybrid access control approach," Multimedia Tools and Servers, pp. 1-25, 2023.
[17] S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008.
[18] J. A. Jaoude and R. G. Saade, "Blockchain Servers – Usage in Different Domains," IEEE Access, vol. 7, pp. 45360-45381, 2019.
[19] K. -K. R. Choo, S. Ozcan, A. Dehghantanha and R. M. Parizi, "Editorial: Blockchain Ecosystem—Technological and Management Opportunities and Challenges," in IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 982-987, Nov. 2020, doi: 10.1109/TEM.2020.3023225.
[20] B. Müßigmann, H. von der Gracht and E. Hartmann, "Blockchain Technology in Logistics and Supply Chain Management—A Bibliometric Literature Review From 2016 to January 2020," in IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 988-1007, Nov. 2020, doi: 10.1109/TEM.2020.2980733.
[21] T. Hewa, A. Braeken, M. Liyanage and M. Ylianttila, "Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing," in IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7174-7185, Oct. 2022, doi: 10.1109/TII.2022.3140792.
[22] J. Zhang, Y. Yang, X. Liu and J. Ma, "An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things," in IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7139-7150, Oct. 2022, doi: 10.1109/TII.2022.3145851.
[23] J. Cui, F. Ouyang, Z. Ying, L. Wei and H. Zhong, "Secure and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 8857-8867, July 2022, doi: 10.1109/TITS.2021.3086976.
[24] X. Wang, S. Garg, H. Lin, M. J. Piran, J. Hu and M. S. Hossain, "Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain," in IEEE Transactions on Industrial Informatics, vol. 17, no. 11, pp. 7725-7733, Nov. 2021, doi: 10.1109/TII.2021.3049405.
[25] P. Zhuang, T. Zamir and H. Liang, "Blockchain for Cybersecurity in Smart Grid: A Comprehensive Survey," in IEEE Transactions on Industrial Informatics, vol. 17, no. 1, pp. 3-19, Jan. 2021, doi: 10.1109/TII.2020.2998479.
[26] J. Xie, F. R. Yu, T. Huang, R. Xie, J. Liu and Y. Liu, "A Survey on the Scalability of Blockchain Systems," in IEEE Network, vol. 33, no. 5, pp. 166-173, Sept.-Oct. 2019, doi: 10.1109/MNET.001.1800290.
[27] H. Jin, Y. Luo, P. Li and J. Mathew, "AReview of Secure and Privacy-Preserving Medical Data Sharing," in IEEE Access, vol. 7, pp. 61656-61669, 2019, doi: 10.1109/ACCESS.2019.2916503.
[28] N. Szabo, “Smart Contracts: Building Blocks for Digital Markets,” Nick Szabo -- smart contracts: Building blocks for Digital Markets. [Online]. Available: https://web.archive.org/web/20180427165653/http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html. Accessed: Jul. 2, 2023.
[29] V. Buterin, "A next-generation smart contract and decentralized server platform," white paper, vol. 3, no. 37, pp. 2-1, 2014.
[30] Z. Zheng, S. Xie, H. N. Dai, W. Chen, X. Chen, J. Weng, and M. Imran, "An overview on smart contracts: Challenges, advances and platforms," Future Generation Computer Systems, vol. 105, pp. 475-491, 2020.
[31] "REACHABLE BITCOIN NODES," Bitnodes. [Online]. Available: https://bitnodes.io/. Accessed: Jul. 2, 2023.
[32] "Ethereum Node Tracker," Etherscan. [Online]. Available: https://etherscan.io/nodetracker. Accessed: Jun. 5, 2023.
[33] G. Wood, "Ethereum: A secure decentralised generalised transaction ledger," Ethereum project yellow paper, vol. 151, pp. 1-32, 2014.
[34] H. Huang, jianru Lin, B. Zheng, Z. Zheng, and J. Bian, "When Blockchain Meets Distributed File Systems: An Overview, Challenges, and Open Issues," IEEE Access, vol. 8, pp. 50574-50586, 2020.
[35] J. Benet, "IPFS - Content Addressed, Versioned, P2P File System," ArXiv. [Online]. Available: https://arxiv.org/abs/1407.3561. Accessed: Jul. 14, 2014.
[36] E. Daniel and F. Tschorsch, "Ipfs and friends: A qualitative comparison of next generation peer-to-peer data networks," IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 31-52, 2022.
[37] M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in International conference on the theory and servers of cryptographic techniques, Springer, pp. 127–144, 1998.
[38] H. Delfs, H. Knebl, Introduction to cryptography, vol. 2, Heidelberg: Springer, 2002.
[39] S. Mehnaz and E. Bertino, "Privacy-preserving Real-time Anomaly Detection Using Edge Computing," in 2020 IEEE 36th International Conference on Data Engineering (ICDE), Dallas, TX, USA, pp. 469-480, 2020, doi: 10.1109/ICDE48307.2020.00047.
[40] R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption," in Proceedings of the 14th ACM conference on Computer and communications security, pp. 185-194, Oct. 2007.
[41] S. S. Chow, J. Weng, Y. Yang, and R. H. Deng, "Efficient unidirectional proxy re-encryption," in Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings 3, pp. 316-332, Springer Berlin Heidelberg, 2010.
[42] D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," International journal of information security, vol. 1, pp. 36-63, 2001.
[43] "Patricia Merkle Trie," Ethereum.org. [Online].Available: https://ethereum.org/en/developers/docs/data-structures-and-encoding/patricia-merkle-trie/. Accessed: Jul. 2, 2023.
[44] B. Kashyap, "PROOF-OF-STAKE (POS)," Ethereum.Org. [Online]. Available: https://ethereum.org/zh-tw/developers/docs/consensus-mechanisms/pos/. Accessed: May 12, 2023.
[45] "WHAT IS ETHEREUM?" Ethereum.Org. [Online]. Available: https://ethereum.org/zh-tw/what-is-ethereum/. Accessed: Jun. 2023.
[46] C. Smith, "ERC-20 TOKEN STANDARD," Ethereum.Org. [Online]. Available: https://ethereum.org/zh-tw/developers/docs/standards/tokens/erc-20/. Accessed: May 31, 2023.
指導教授 葉羅堯 審核日期 2023-8-17
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明