Difference between revisions of "Analysis of Data Structures on the Ethereum Blockchain"
(expanded problem description) |
|||
Line 5: | Line 5: | ||
|DueDate=1.5.2015 | |DueDate=1.5.2015 | ||
|ThesisStatus=Ongoing | |ThesisStatus=Ongoing | ||
− | |Objective= | + | |Objective=Edward Snowden was asked at SXSW 2014: "What steps do you suggest the average person take now to ensure a more secure digital experience? Is there anything we can do on individual level to confront the issues of mass surveillance that we are talking about today." To this Snowden mentioned several tools, including TOR, for making peoples online presence somewhat more secure. And Ben Wizner threw in: "You know, when there is a question about average users and the answer is TOR we have failed." |
+ | |||
+ | My master sets out to look at how Average Joe can avoid the digital mass surveillance that is going on without having to go off the grid. The synergy of combining data in the cloud produces such desirable products that citizens are embracing them at the cost of their privacy. E.g. facial recognition which can automatically tag all your photos. The same technology can also be used to track your every move around the globe. While a solution is to refrain from adopting technologies that can be used for tracking, is abstaining from the use of social media, search engines and cell phones not a desirable solution for neither end-users nor companies. | ||
+ | |||
+ | The idea of [[unhosted services]] is a popular idea lately. It means that data is stored with the user instead of with the provider. But many questions with this paradigm needs to be answered. In unhosted applications: | ||
+ | * where is the data stored | ||
+ | * how is the data synchronized between the user’s devices | ||
+ | * how is the data made available to web apps as well as Windows applications and mobile apps | ||
+ | * how can the data be accessed by the application if the user is offline | ||
+ | * how is the data safe from dataloss and corruption | ||
+ | * how can applications be as fast as today’s services like Google Drive and Siri | ||
+ | * how can data from several users be aggregated in a reasonable time e.g. a service like Facebook’s newsfeed | ||
+ | * how can the same data be shared between applications | ||
+ | ** while providers still find value in creating services | ||
+ | ** while only having permission to the given data | ||
+ | ** while different applications using unique data e.g. the user wanting to use different names with different services | ||
+ | * how can we avoid that the application provider do not save the data it receives | ||
+ | |||
|Methods=The tools and methods in this thesis are based on | |Methods=The tools and methods in this thesis are based on | ||
* A set of scenario, describing the challenges | * A set of scenario, describing the challenges |
Revision as of 20:27, 13 March 2014
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
Deliver cloud services without compromising privacy
by | Jon Ramvi |
---|---|
Supervisor(s) | Gisle Hannemyr, Josef Noll |
Due date | 1.5.2015 |
Status | Ongoing |
Problem description: | Edward Snowden was asked at SXSW 2014: "What steps do you suggest the average person take now to ensure a more secure digital experience? Is there anything we can do on individual level to confront the issues of mass surveillance that we are talking about today." To this Snowden mentioned several tools, including TOR, for making peoples online presence somewhat more secure. And Ben Wizner threw in: "You know, when there is a question about average users and the answer is TOR we have failed."
My master sets out to look at how Average Joe can avoid the digital mass surveillance that is going on without having to go off the grid. The synergy of combining data in the cloud produces such desirable products that citizens are embracing them at the cost of their privacy. E.g. facial recognition which can automatically tag all your photos. The same technology can also be used to track your every move around the globe. While a solution is to refrain from adopting technologies that can be used for tracking, is abstaining from the use of social media, search engines and cell phones not a desirable solution for neither end-users nor companies. The idea of unhosted services is a popular idea lately. It means that data is stored with the user instead of with the provider. But many questions with this paradigm needs to be answered. In unhosted applications:
|
Methods and Tools: | The tools and methods in this thesis are based on
|
Time schedule | The envisaged time schedule (for a long thesis/60 ECTS) is:
|
Pre-Knowledge | This thesis includes a reasonable amount of programming. The envisaged thesis is based on radio communications, thus expects the user to have followed at least two radio-related courses |
Approved | Pending by |
Keywords | Privacy, Mobile Security, Information Security |
Depiction | File:201401Master-Jon Ramvi.pdf |
this page was created by Special:FormEdit/Thesis, and can be edited by Special:FormEdit/Thesis/Analysis of Data Structures on the Ethereum Blockchain
This page provides hints on what to include in your master thesis.
TOC
Title page, abstract, ...
- 1. Introduction, containing: short intro into the area, what is happening
- 1.1 Motivation, containing: what triggered me to write about what I'm writing about
- 1.2 Methods, containing: which methods are you using, how do you apply them
- 2. Scenario, optional chapter for explaining some use cases
- 2.1 user scenario, (bad name, needs something bedre)
- 2.2 Requirements/Technological challenges
- 3. State-of-the art/Analysis of technology, structure your content after hardware/SW (or other domains). Describe which technologies might be used to answer the challenges, and how they can answer the challenges
- 3.1 technology A
- 3.2 technology B
- 4. Implementation
- 4.1 Architecture, functionality
- 4.2
- 5. Evaluation
- 6. Conclusions
- References
Comments
Red line
Your thesis should have a "red line", which is visible throughout the whole thesis. This means you should mention in the beginning of each chapter how the chapter contributes to the "goals of the thesis".
Use of scientific methods
A thesis follows a standard method:
- describe the problem (problemstilling)
- extract the challenges. These challenges should be measurable, e.g. method is too slow to be useful to voice handover.
- Analyse technology with respect to challenges. Don't write & repeat "everything" from a certain technology, concentrate on those parts (e.g. protocols) which are of importance for your problem
References
- Wikipedia is good to use to get an overview on what is happening. But there is not scientific verification of Wikipedia, thus you should use wikipedia only in the introduction of a chapter (if you use text from wikipedia). Use scientific literature for your thesis.
- Scientific library is "at your hand", you can get there directly from UiO: [[How to get access to IEEE, Springer and other scientific literature -> Unik/UiOLibrary]]
- I suggest that references to web pages, e.g. OASIS, W3C standards, are given in a footnote. Only if you find white papers or other .pdf documents on a web page then you refer to them in the reference section.
Evaluation of own work
Perform an evaluation of your own work. Revisit the challenges and discuss in how you fulfilled them. Provide alternative solution and discuss what should be done (or what could have been done).