Global Naming and Storage System Using Blockchain

Author(s):  
Chanti S. ◽  
Taushif Anwar ◽  
Chithralekha T. ◽  
V. Uma

The global naming systems are used to resolve the DNS (domain name system) queries by providing the IP address of a particular domain. Humans are familiar in remembering the text rather than numbers. So the DNS servers help in resolving the human-readable domain names into system understandable IP address. In the current DNS architecture, there are several threats that cost a lot of damage to the organizations. At the earlier stage, DNS protocol lacks security assurance in place. To solve this issue, they introduced DNSSEC (subsequent DNS) as an additional layer of trust on top of DNS by providing authentication. Still, the current DNS servers couldn't address issues such as DoS/DDoS attacks. To address all these issues, blockchain technology offers an innovative method to handle those challenges. The existing naming systems are centralized, which is a major problem in achieving security.. The main aim of this chapter is to provide an overview of blockchain technology and a brief introduction to blockchain-based naming and storage systems.

Author(s):  
Chanti S. ◽  
Taushif Anwar ◽  
Chithralekha T. ◽  
V. Uma

The global naming systems are used to resolve the DNS (domain name system) queries by providing the IP address of a particular domain. Humans are familiar in remembering the text rather than numbers. So the DNS servers help in resolving the human-readable domain names into system understandable IP address. In the current DNS architecture, there are several threats that cost a lot of damage to the organizations. At the earlier stage, DNS protocol lacks security assurance in place. To solve this issue, they introduced DNSSEC (subsequent DNS) as an additional layer of trust on top of DNS by providing authentication. Still, the current DNS servers couldn't address issues such as DoS/DDoS attacks. To address all these issues, blockchain technology offers an innovative method to handle those challenges. The existing naming systems are centralized, which is a major problem in achieving security.. The main aim of this chapter is to provide an overview of blockchain technology and a brief introduction to blockchain-based naming and storage systems.


Author(s):  
Torsten Bettinger

Although the Internet has no cross-organizational, financial, or operational management responsible for the entire Internet, certain administrative tasks are coordinated centrally. Among the most important organizational tasks that require global regulation is the management of Internet Protocol (IP) addresses and their corresponding domain names. The IP address consists of an existing 32 bit (IP4) or 128 bit (IP6) sequence of digits and is the actual physical network address by which routing on the Internet takes place and which will ensure that the data packets reach the correct host computer.


2021 ◽  
Author(s):  
Gregory Kaminski ◽  
Philip Odonkor

Abstract The decreasing cost of implementation and increasing regulatory incentive to lower energy use have led to an increased adoption of distributed energy resources in recent years. This increased adoption has been further fueled by a surge in energy consciousness and the expansion of energy-saving products and technologies. To lower reliance on the electrical grid and fully realize the benefits of distributed energy resources, many consumers have also elected to use battery systems to store generated energy. For owners of multiple buildings, or multiple owners willing to share the operational cost, building clusters may be formed to more effectively take advantage of these distributed resources and storage systems. The implementation of these systems in existing buildings introduces the question of what makes a “good” building cluster. Furthermore, the scalable nature of distributed energy sources and storage systems create countless possibilities for system configuration. Through comparison of unique two-building clusters from a stock of five buildings with a given distributed energy resource (in this case, a solar photovoltaic panel array) and energy storage system, we develop a fundamental understanding of the underlying factors that allow building clusters to be less reliant on the utility grid and make better use of energy generation and storage systems.


2013 ◽  
Vol 455 ◽  
pp. 402-407 ◽  
Author(s):  
Huai Ling Shao ◽  
Zhi Qiang He ◽  
Er Qiang Xu ◽  
Lei Liu

Explains smart energy meter testing and storage systems,the background,analysis of the current development of the industry at home and abroad,focusing on Metrology Centre of Electric Power of Henan meter verification and storage systems,the content of the system in key technologies summary,the process of building the proposed risk control measures.


2013 ◽  
Vol 50 (3) ◽  
pp. 612-631 ◽  
Author(s):  
D. Perry ◽  
W. Stadje ◽  
S. Zacks

Based on pathwise duality constructions, several new results on truncated queues and storage systems of the G/M/1 type are derived by transforming the workload (content) processes into certain ‘dual’ M/G/1-type processes. We consider queueing systems in which (a) any service requirement that would increase the total workload beyond the capacity is truncated so as to keep the associated sojourn time below a certain constant, or (b) new arrivals do not enter the system if they have to wait more than one time unit in line. For these systems, we derive the steady-state distributions of the workload and the numbers of customers present in the systems as well as the distributions of the lengths of busy and idle periods. Moreover, we use the duality approach to study finite capacity storage systems with general state-dependent outflow rates. Here our duality leads to a Markovian finite storage system with state-dependent jump sizes whose content level process can be analyzed using level crossing techniques. We also derive a connection between the steady-state densities of the non-Markovian continuous-time content level process of the G/M/1 finite storage system with state-dependent outflow rule and the corresponding embedded sequence of peak points (local maxima).


2007 ◽  
Vol 6 ◽  
pp. 39-63
Author(s):  
Jorge Alberto Fierro Abella

El desarrollo de la llamada red de redes o internet ha supuesto un cambio sustancial en la forma de entender las relaciones comerciales. La extensión del acceso a aquella a un número cada vez mayor de agentes económicos, unido a un crecimiento continuo de los contenidos de toda índole disponibles en la red, implica que la facilidad con que se acceda a la información de una determinada compañía tenga un elevado valor. El objetivo de este documento de reflexión es ofrecer en primer lugar, un panorama general del marco teórico en el que se desarrolla la actividad de registro de nombres de dominio, tanto en el ámbito internacional como en el local (España) y su relación con el derecho de marcas, para a partir de ello exponer una serie de casos, que tienen una relación directa con España, bien por tratarse de resoluciones de nuestros tribunales, bien por ser asuntos en los que se discutía la titularidad de nombres de dominio en los que aparecía como perjudicado (real o pretendido) una marca o nombre comercial española o al menos con presencia en este país. Abstract Domain names are the familiar and easy-to-remember names for internet computers. They map to unique Internet Protocol (IP) numbers that serve as routing addresses on the Internet. The domain name system (DNS) translates internet names into the IP numbers needed for transmission of information across the network. The challenge pursued by the following research is to provide a general outlook of the theoretical frame for the technical activity of domain name registration procedure, as well as the implication of complementary sources of rules. The territorial context of the analysis is only apparent, since the empirical application of concepts can also be applied by other jurisdictions. Palabras Claves Nombre de dominio, marcas, marcas de internet, derecho de marcas, competencia desleal, usurpación de marcas. Keywords Nombre de dominio, marcas, marcas de internet, derecho de marcas, competencia desleal, usurpación de marcas


Author(s):  
Jarmila Pokorná ◽  
Eva Večerková

Internet domains have become an integral part of our lives, so one can easily understand that during their use, conflicts can arise, whose participants will search for rules enabling resolution of conflicts. Since the domain name is a replacement of the computer IP address, in the technical sense of the word, this does not concern for domain names a commercial name or brand, because it primarily does not belong to a person in the legal sense of the word and does not serve for its individualization. The average user regularly affiliates domain names with a person offering goods or services on the relevant Website. Domain names used by entrepreneurs in their business activity are often chosen so that the second-level domain (SLD) would use words that form the trade name of corporations formed of trading companies. This fact brings domain names close to such designations that serve the individualization of persons or products, especially the trademarks and the commercial name. Domains can come into conflict with the rights to designations, especially trademarks and commercial names. Court practice is resolving these conflicts using rules for unfair competition, or rules for protection of commercial names and trademarks, but it is not ruled out that in the future, special legal regulation of domain names could be established.


Author(s):  
Ian J. Lloyd

Internet access is dependent on two major factors: Internet (generally referred to as IP) addresses, which are a functional equivalent to telephone numbers, and domain names. The former element raises a number of technical issues but is generally non-contentious. Systems of domain names—which effectively serve as an alias for IP numbers—are much more controversial and raise major issues how the Internet should be regulated. This chapter begins with a discussion of the emergence of Internet regulation. It then turns to domain names and the regulation of the domain-name system.


Author(s):  
Torsten Bettinger ◽  
Mike Rodenbaugh

Since its creation in 1998, the Internet Corporation for Assigned Names and Numbers (ICANN) has been responsible for ensuring free trade and marketplace competition in the sale and regulation of domain names, as well as overseeing the stability of the Domain Name System (DNS) and the creation of consistent, functional policies. Therefore, its responsibilities include assessing when, and to what degree, additional generic top-level domains (gTLDs) are needed in order to ensure the proper functioning of the DNS. In order to make such a determination, ICANN relied on the input of interested Internet stakeholders as mandated through its multi-stakeholder model, which involves interested business entities, individuals, and governments from around the world.


2019 ◽  
Vol 2 (3) ◽  
pp. 238-242
Author(s):  
Andreas Tedja ◽  
Charles Lim ◽  
Heru Purnomo Ipung

The Internet has become the biggest medium for people to communicate with otherpeople all around the world. However, the Internet is also home to hackers with maliciouspurposes. This poses a problem for Internet Service Providers (ISP) and its user, since it ispossible that their network is compromised and damages may be done. There are many types ofmalware that currently exist on the Internet. One of the growing type of malware is botnet.Botnet can infect a system and make it a zombie machine capable of doing distributed attacksunder the command of the botmaster. In order to make detection of botnet more difficult,botmasters often deploy fast flux. Fast flux will shuffle IP address of the domain of themalicious server, making tracking and detection much more difficult. However, there are stillnumerous ways to detect fast flux, one of them is by analysing DNS data. Domain Name System(DNS) is a crucial part of the Internet. DNS works by translating IP address to its associateddomain name. DNS are often being exploited by hackers to do its malicious activities. One ofthem is to deploy fast flux.Because the characteristics of fast flux is significantly different thannormal Internet traffic characteristics, it is possible to detect fast flux from normal Internettraffic from its DNS information. However, while detecting fast flux services, one must becautious since there are a few Internet services which have almost similar characteristics as fastflux service. This research manages to detect the existence of fast flux services in an ISPnetwork. The result is that fast flux mostly still has the same characteristics as found on previousresearches. However, current fast flux trend is to use cloud hosting services. The reason behindthis is that cloud hosting services tend to have better performance than typical zombie machine.Aside from this, it seems like there has been no specific measures taken by the hosting service toprevent this, making cloud hosting service the perfect medum for hosting botnet and fast fluxservices.


Sign in / Sign up

Export Citation Format

Share Document