Personal Archive Service System using Blockchain Technology: Case Study, Promising and Challenging

This paper is to explore applications of the blockchain technology to the concept of “proof of X” such as proof of identity, proof of property ownership, proof of specific transaction, proof of college degree, proof of medical records, proof of academic achievements, etc. It describes a novel approach of building a decentralized transparent immutable secure personal archive management and service system. Personal archive is defined as a collection of various artifacts that reflect personal portfolio as well as personal unique identifications. Personal portfolio is beyond of a statement of personal achievement. It is an evidentiary document designed to provide qualitative and quantitative chronically documents and examples. Subjects can tag their information with proof, that is, certified by trusted entities or organizations like universities. Such proofs are associated with confidentiality levels exposed in the public domains. Personal identifications include biometrics as well as other multi-factors such as something the subject “has”, the subject “knows” or the subject “acts”. Stack holders in a consortium oriented blockchain network serve as verifiers and /or miners that provide their trusted services the delegated proof of stake. Such personal archive based system can be exploited to various applications including professional network like Linkedin, instant credit approval like alipay or live human from social bots like internet social media. A prototype simulation shows that such personal portfolio management and service system is feasible and immune to many ID attacks.

[1]  Srinivas Devadas,et al.  Pervasive, dynamic authentication of physical items , 2017, CACM.

[2]  Bruce Schneier Sensible Authentication , 2004, ACM Queue.

[3]  Craig I. Watson,et al.  Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report , 2004 .

[4]  Lin Liu,et al.  An Online Identity and Smart Contract Management System , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[5]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[6]  Manuel Blum,et al.  reCAPTCHA: Human-Based Character Recognition via Web Security Measures , 2008, Science.

[7]  Zhixiong Chen,et al.  RealID: Building A Secure Anonymous Yet Transparent Immutable ID Service , 2017, 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).

[8]  Keke Gai,et al.  Privacy-Preserving Adaptive Multi-channel Communications Under Timing Constraints , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).

[9]  Suneeta Agarwal,et al.  Ridgelet-based fake fingerprint detection , 2009, Neurocomputing.

[10]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[11]  Wei Zhang,et al.  Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources , 2015, Proc. VLDB Endow..