2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS) 2018
DOI: 10.1109/icsess.2018.8663935
|View full text |Cite
|
Sign up to set email alerts
|

Medusa: Blockchain Powered Log Storage System

Abstract: Blockchain is one of the most heavily invested technologies in recent years. Due to its tamper-proof and decentralization properties, blockchain has become an ideal utility for data storage that is applicable in many real world industrial scenarios. One important scenario is web log, which is treated as sources of technical significance and commercial revenues in major internet companies. In this paper, we illustrate our design of a web log storage system based on HyperLedger. HyperLedger yields higher through… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…In this proposed scheme they have used private Ethereum and IPFS clusters. Authors of [12] have designed a log storage system using HyperLedger permissioned Blockchain network. This system uses two operations: data appending and querying.…”
Section: Related Workmentioning
confidence: 99%
“…In this proposed scheme they have used private Ethereum and IPFS clusters. Authors of [12] have designed a log storage system using HyperLedger permissioned Blockchain network. This system uses two operations: data appending and querying.…”
Section: Related Workmentioning
confidence: 99%
“…-Distributed solutions have a fundamental issue: they do not work for loosely connected or disconnected systems. There are multiple distributed solutions: traditional logging servers, cloud-based logging services (see for example [12,13]), self-securing storage like S4 [14], server-based systems that use history trees and randomized binary search trees (hash treaps) [15,16] and systems based on distributed ledger technology (DLT), or Blockchain [17][18][19][20][21]. As stated before, we focus on local tamper-evident logs.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, several distributed schemes and products based on blockchain have been proposed [22,23,24,25]. These schemes are intrinsically distributed, so they are not viable for disconnected scenarios.…”
Section: Related Workmentioning
confidence: 99%