skip to main content
10.1145/3377049.3377058acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaConference Proceedingsconference-collections
research-article

A decentralized computational system built on blockchain for educational institutions

Published:20 March 2020Publication History

ABSTRACT

An educational institute demands significant computational resources for which it mostly relies on centralized servers, networks and storage facilities. Currently these systems are built around the centralized model which exposes it to risks of data breach, low fault tolerance and the numerous pitfalls of a centralized system. Furthermore, the maintenance of these systems incur significant costs for the institute. The purpose of this research is to introduce a decentralized model of computational system built on blockchain for educational institutions which can mitigate the several drawbacks of a centralized system and further explore the possibilities of introducing a cryptocurrency within the network of the institute. This model proposes to utilize the computational power of devices of the members of the institute by allowing them to be participant nodes in the network. Using the Ethereum blockchain, this study proposes a Smart Contract based system and introduces a cryptocurrency to incentivize the participants of the network.

References

  1. 2019. Folder[at]Home. Retrieved November 1, 2019 from https://foldingathome.org/Google ScholarGoogle Scholar
  2. Arati Baliga. 2017. Understanding blockchain consensus models. In Persistent.Google ScholarGoogle Scholar
  3. Vitalik Buterin et al. 2013. Ethereum white paper. GitHub repository (2013), 22--23.Google ScholarGoogle Scholar
  4. Usman W Chohan. 2017. Initial coin offerings (ICOs): Risks, regulation, and accountability. (2017).Google ScholarGoogle Scholar
  5. Randy Chow and Yuen-Chien Chow. 1997. Distributed operating systems and algorithms. Addison-Wesley Longman Publishing Co., Inc.Google ScholarGoogle Scholar
  6. Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and smart contracts for the internet of things. Ieee Access 4 (2016), 2292--2303.Google ScholarGoogle ScholarCross RefCross Ref
  7. Nicolas T Courtois, Marek Grajek, and Rahul Naik. 2014. Optimizing sha256 in bitcoin mining. In International Conference on Cryptography and Security Systems. Springer, 131--144.Google ScholarGoogle ScholarCross RefCross Ref
  8. Michael Crosby, Pradan Pattanayak, Sanjeev Verma, Vignesh Kalyanaraman, et al. 2016. Blockchain technology: Beyond bitcoin. Applied Innovation 2, 6--10 (2016), 71.Google ScholarGoogle Scholar
  9. Stefano De Angelis, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, and Vladimiro Sassone. 2018. Pbft vs proof-of-authority: applying the cap theorem to permissioned blockchain. (2018).Google ScholarGoogle Scholar
  10. Maximilian Friedlmaier, Andranik Tumasjan, and Isabell M Welpe. 2018. Disrupting industries with blockchain: The industry, venture capital funding, and regional distribution of blockchain ventures. In Venture Capital Funding, and Regional Distribution of Blockchain Ventures (September 22, 2017). Proceedings of the 51st Annual Hawaii International Conference on System Sciences (HICSS).Google ScholarGoogle Scholar
  11. Seth Gilbert and Nancy Lynch. 2002. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. Acm Sigact News 33, 2 (2002), 51--59.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Paul Harry Gleichauf. 2019. Blockchain mining using trusted nodes. US Patent App. 16/383,420.Google ScholarGoogle Scholar
  13. Bernd Grobauer, Tobias Walloschek, and Elmar Stocker. 2010. Understanding cloud computing vulnerabilities. IEEE Security & privacy 9, 2 (2010), 50--57.Google ScholarGoogle Scholar
  14. Jerome Harrington, Corey Kuwanoe, and Cliff C Zou. 2007. A BitTorrent-driven distributed. In Proceedings of the 3th International Conference on Security and Privacy in Communications Networks. 261--268.Google ScholarGoogle Scholar
  15. Yoichi Hirai. 2017. Defining the ethereum virtual machine for interactive theorem provers. In International Conference on Financial Cryptography and Data Security. Springer, 520--535.Google ScholarGoogle ScholarCross RefCross Ref
  16. Merit Kolvart, Margus Poola, and Addi Rull. 2016. Smart contracts. In The Future of Law and etechnologies. Springer, 133--147.Google ScholarGoogle Scholar
  17. Ralph C Merkle. 1989. A certified digital signature. In Conference on the Theory and Application of Cryptology. Springer, 218--238.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Siamäk Naghian, Tapio Lindstrom, Tero Kärkkäinen, Jarmo T Mäkinen, Keijo Lähetkangas, and Kai Mustonen. 2005. Mobile mesh Ad-Hoc networking. US Patent 6,879,574.Google ScholarGoogle Scholar
  19. Satoshi Nakamoto. 2008. Bitcoin whitepaper. URL: https://bitcoin. org/bitcoin.pdf-(: 17.07. 2019) (2008).Google ScholarGoogle Scholar
  20. Marc Pilkington. 2016. 11 Blockchain technology: principles and applications. Research handbook on digital transformations 225 (2016).Google ScholarGoogle Scholar
  21. Ethan George Russell, Stephen William Cote, Erkki Ville Juhani Aikas, Brian David Marsh, and John Bradley Chen. 2009. Method and system for monitoring the performance of a distributed application. US Patent 7,600,014.Google ScholarGoogle Scholar
  22. Nitin Vaidya, Anurag Dugar, Seema Gupta, and Paramvir Bahl. 2005. Distributed fair scheduling in a wireless LAN. IEEE Transactions on Mobile Computing 4, 6 (2005), 616--629.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Marko Vukolić. 2017. Rethinking permissioned blockchains. In Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts. ACM, 3--7.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A decentralized computational system built on blockchain for educational institutions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICCA 2020: Proceedings of the International Conference on Computing Advancements
        January 2020
        517 pages
        ISBN:9781450377782
        DOI:10.1145/3377049

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 March 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader