Advertisement

The Random Neural Network with a BlockChain Configuration in Digital Documentation

  • Will Serrano
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 935)

Abstract

This paper presents the Random Neural Network in BlockChain configuration where neurons are gradually incremented as user information increases. The additional neurons codify both the new information to be added to the “neural block” and previous neurons potential to form the “neural chain”. This configuration provides the proposed algorithm the same properties as the BlockChain: security and decentralization with the same validation process: mining the input neurons until the neural network solution is found. The Random Neural Network in BlockChain configuration is applied to a digital documentation application that avoids the use of physical papers. Experimental results are presented with optimistic conclusions; this paper provides a digital step forward to avoid physical currencies, documentation and contracts.

Keywords

Random neural network BlockChain Digital documentation Smart contracts 

References

  1. 1.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System-Bitcoin.org. (2008)Google Scholar
  2. 2.
    Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the Blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Symposium on Security and Privacy, pp. 839–858 (2016)Google Scholar
  3. 3.
    Yuan, Y., Wang, F.-Y.: Towards Blockchain-based intelligent transportation systems. In: International Conference on Intelligent Transportation Systems, pp. 2663–2668 (2016)Google Scholar
  4. 4.
    Biswas, K., Muthukkumarasamy, V.: Securing smart cities using Blockchain technology. International Conference High Performance Computing and Communications/Smart City/Data Science and Systems, pp. 1392–1393 (2016)Google Scholar
  5. 5.
    Huh, S., Cho, S., Kim, S.: Managing IoT devices using BlockChain platform. In: International Conference on Advanced Communication Technology, pp. 464–467 (2017)Google Scholar
  6. 6.
    Serrano, W., Yin, Y., Gelenbe, E.: The random neural network with deep learning clusters in smart search. Neurocomputing (2018) (To be published)Google Scholar
  7. 7.
    Serrano, W, Gelenbe, E.: Deep learning clusters in the cognitive packet network. Neurocomputing (2018) (To be published)Google Scholar
  8. 8.
    Serrano, W.: The random neural network with a genetic algorithm and deep learning clusters in fintech: smart investment. In: Iliadis, L., Maglogiannis, I., Plagianakos, V. (eds.) AIAI 2018. IAICT, vol. 519, pp. 297–310. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-92007-8_26CrossRefGoogle Scholar
  9. 9.
    Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1, 502–510 (1989)CrossRefGoogle Scholar
  10. 10.
    Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5, 154–164 (1993)CrossRefGoogle Scholar
  11. 11.
    Gelenbe, E.: G-networks with triggered customer movement. J. Appl. Probab. 30, 742–748 (1993)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Gelenbe, E., Hussain, K.F.: Learning in the multiple class random neural network. IEEE Trans. Neural Netw. 13(6), 1257–1267 (2002)CrossRefGoogle Scholar
  13. 13.
    Pointcheval, D.: Neural Networks and their Cryptographic Applications. Livre des resumes Eurocode Institute for Research in Computer Science and Automation, pp. 1–7 (1994)Google Scholar
  14. 14.
    Kinzel, W., Kanter, I.: Interacting Neural Networks and Cryptography Secure exchange of information by synchronization of neural networks. Adv. Solid State Phys. 42, 383–391 (2002)CrossRefGoogle Scholar
  15. 15.
    Klimov, A., Mityagin, A., Shamir, A.: Analysis of neural cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 288–298. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-36178-2_18CrossRefGoogle Scholar
  16. 16.
    Volna, E., Kotyrba, M., Kocian, V., Janosek, M.: Cryptography based on the neural network. In: European Conference on Modelling and Simulation, pp. 1–6 (2012)Google Scholar
  17. 17.
    Yayık, A., Kutlu, Y.: Neural network based cryptography. Int. J. Neural Mass Parallel Comput. Inf. Syst. 24(2), 177–192 (2014)Google Scholar
  18. 18.
    Schmidt, T., Rahnama, H., Sadeghian, A.: A review of applications of artificial neural networks in cryptosystems. In: World Automation Congress, pp. 1–6 (2008)Google Scholar
  19. 19.
    Peters, Gareth W., Panayi, E.: Understanding modern banking ledgers through Blockchain technologies: future of transaction processing and smart contracts on the internet of money. In: Tasca, P., Aste, T., Pelizzon, L., Perony, N. (eds.) Banking Beyond Banks and Money. NEW, pp. 239–278. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-42448-4_13CrossRefGoogle Scholar
  20. 20.
    Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using Blockchain to protect personal data. Security and Privacy Workshops, pp. 180–184 (2015)Google Scholar
  21. 21.
    Kishigami, J., Fujimura, S., Watanabe, H., Nakadaira, A., Akutsu, A.: The Blockchain-based digital content distribution system. Big Data Cloud Comput. 187–190 (2015)Google Scholar
  22. 22.
    Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A., Kishigami, J.: Blockchain contract: Securing a Blockchain applied to smart contracts. In: International Conference on Consumer Electronics, pp. 467–468 (2016)Google Scholar
  23. 23.
    Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, Blockchain and anonymous messaging streams. IEEE Trans. Dependable Secur. Comput. 1–14 (2016)Google Scholar
  24. 24.
    Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: The case study of a smart home. In: Pervasive Computing and Communications Workshops, pp. 1–6 (2017)Google Scholar
  25. 25.
    Kraft, D.: Difficulty control for Blockchain-based consensus systems. Peer-to-Peer Netw. Appl. 9(2), 397–413 (2016)CrossRefGoogle Scholar
  26. 26.
    Beck, R., Stenum, J., Lollike, N., Malone, S.: Blockchain-the gateway to trust-free cryptographic transactions. In: European Conference on Information Systems, pp. 1–14 (2016)Google Scholar
  27. 27.
    Heilman, E., Baldimtsi, F., Goldberg, S.: Blindly signed contracts: anonymous on-Blockchain and off-Blockchain bitcoin transactions. In: Clark, J., Meiklejohn, S., Ryan, Peter Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 43–60. Springer, Heidelberg (2016).  https://doi.org/10.1007/978-3-662-53357-4_4CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Intelligent Systems and Networks Group, Electrical and Electronic EngineeringImperial College LondonKensingtonUK

Personalised recommendations