Skip to main content

2019 | OriginalPaper | Buchkapitel

Application and Challenges of Blockchain Technology to Big Data-Based Credit Reference in China

verfasst von : Cheng-yong Liu, Cheng Chen

Erschienen in: Wireless Internet

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Big data-based credit reference gradually attracts wide attention due to its ad-vantages in remedying the shortages of traditional credit reference and dealing with new challenges arising from financial credit management. Nevertheless, this new method is also adapted through different studies and experiments to be problematic with island of credit information and information security. Some researchers begin exploring the possibility of applying blockchain technology to the individual credit reference field. The business links in the individual credit reference can be innovated through the blockchain mechanism so that credit data from different industries get collected through peering points, secure communication and anonymous protection on the basis of such techniques as distributed storage, point-to-point transmission, consensus mechanism and encryption algorithm. In this way, it is feasible to solve island of information and enhance the protection of user information security. A promising future can be expected about the big data-based credit reference, but there are also many problems with blockchain-based credit reference in China.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
It is specified in Article 2 and 14 of Credit service industry Management Regulations, personal information acquisition is limited to credit-related information, and the scopes of personal information that can and can`t be collected by the credit service agencies are defined.
 
2
It is specified that “when credit service agency or information supplier or user obtain the permission from information subject through contractual terms and conditions, prompt that can attract the attention of information subject shall be offered in the contract in combination with explicit explanation” in Article 19 of Credit Service Industry Management Regulations, and “information user shall use the personal information for the proposes agreed with the information subject instead of using it for any other purpose, or provide the information for a third party without gaining the permission from the information subject” in Article 20.
 
3
In accordance with Article 30 of Credit Service Agencies Management Methods, “the credit service agencies shall assess the safety of the credit information system according to national classified information security protection criteria. The information systems of level 2 security protection shall be assessed once every two years while those of level 3 or above shall be assessed every year”.
 
Literatur
1.
Zurück zum Zitat Xinhai, L.: Dingwei: application of big data-based credit reference and the revelation–with American internet financial company zestfinance as an example. Tsinghua Financ. Rev. 10, 98 (2014) Xinhai, L.: Dingwei: application of big data-based credit reference and the revelation–with American internet financial company zestfinance as an example. Tsinghua Financ. Rev. 10, 98 (2014)
2.
Zurück zum Zitat Mingsheng, S.: A study of big data credit reporting and the protection of personal information subjects’ rights and interests. Credit Ref. 5(220), 38–39 (2017) Mingsheng, S.: A study of big data credit reporting and the protection of personal information subjects’ rights and interests. Credit Ref. 5(220), 38–39 (2017)
3.
Zurück zum Zitat Yongqian, T.: Wang Xiaotian. Improvement of legislation about individual credit information against big data background, China internet 5, 43 (2017) Yongqian, T.: Wang Xiaotian. Improvement of legislation about individual credit information against big data background, China internet 5, 43 (2017)
4.
Zurück zum Zitat Qiang, W., Sude, Q., Jieru, B.: Discussion about application of blockchain to credit service industry. Telecommun. Netw. Technol. 6, 38 (2017) Qiang, W., Sude, Q., Jieru, B.: Discussion about application of blockchain to credit service industry. Telecommun. Netw. Technol. 6, 38 (2017)
5.
Zurück zum Zitat Guomao, S., Meng, L.: A study on application of blockchain technology to individual credit field–based on digital inclusive finance perspective. Stud. Corp. Financ. 1(15), 121 (2017) Guomao, S., Meng, L.: A study on application of blockchain technology to individual credit field–based on digital inclusive finance perspective. Stud. Corp. Financ. 1(15), 121 (2017)
6.
Zurück zum Zitat Tong, L., et al.: Hadoop-based visual deep web acquisition platform design. Comput. Eng. Sci. 2, 217–233 (2016) Tong, L., et al.: Hadoop-based visual deep web acquisition platform design. Comput. Eng. Sci. 2, 217–233 (2016)
7.
Zurück zum Zitat Liu, Y., Chenghuan, Z.: Scrapy-based deep web crawler study. Eng. Res. Appl. 7, 112 (2017) Liu, Y., Chenghuan, Z.: Scrapy-based deep web crawler study. Eng. Res. Appl. 7, 112 (2017)
8.
Zurück zum Zitat Harper, J.: Reputation under regulation: the fair credit reporting act at 40 and lessons for the internet privacy debate, cato institute policy analysis, No. 690. https://ssrn.com/abstract=2033360 (2011). Last accessed 8 May 2018 Harper, J.: Reputation under regulation: the fair credit reporting act at 40 and lessons for the internet privacy debate, cato institute policy analysis, No. 690. https://​ssrn.​com/​abstract=​2033360 (2011). Last accessed 8 May 2018
9.
Zurück zum Zitat Jie, H.: Application of blockchain technology and smart contract in intellectual property determination and transaction and corresponding laws and regulations. Intel. Prop. 2, 14–15 (2018) Jie, H.: Application of blockchain technology and smart contract in intellectual property determination and transaction and corresponding laws and regulations. Intel. Prop. 2, 14–15 (2018)
10.
Zurück zum Zitat Hailong, W., et al.: Rights ascertainment plan for big data in blockchain. Comput. Sci. 2, 16–17 (2018) Hailong, W., et al.: Rights ascertainment plan for big data in blockchain. Comput. Sci. 2, 16–17 (2018)
12.
Zurück zum Zitat Zhongbin, Z., Yansong, L.: Application practice of blockchain technology to credit service industry and future prospect. Credit Ref. 7(222), 47 (2017) Zhongbin, Z., Yansong, L.: Application practice of blockchain technology to credit service industry and future prospect. Credit Ref. 7(222), 47 (2017)
13.
Zurück zum Zitat Chunming, T., Long, G.: Multi-parties key agreement protocol in block chain. Netinfo Secur. 12, 19 (2017) Chunming, T., Long, G.: Multi-parties key agreement protocol in block chain. Netinfo Secur. 12, 19 (2017)
14.
Zurück zum Zitat Desheng, L., Jianping, G., Yibin, D.: A tentative discussion about the application of blockchain technology to book copyright protection. Science-Technology & Publication, vol. 6, p. 77 (2017) Desheng, L., Jianping, G., Yibin, D.: A tentative discussion about the application of blockchain technology to book copyright protection. Science-Technology & Publication, vol. 6, p. 77 (2017)
16.
Zurück zum Zitat Yong, Z., Xiaohui, L.: Study on and achievement of an improved blockchain consensus mechanism. Electron. Des. Eng. 1, 38–39 (2018) Yong, Z., Xiaohui, L.: Study on and achievement of an improved blockchain consensus mechanism. Electron. Des. Eng. 1, 38–39 (2018)
18.
Zurück zum Zitat Linming, G., Shundong, L., Jiawei, D., Yimin, G., Daoshun, W.: Homomorphic encryption scheme and a protocol on secure computing a line by two private points. J. Softw. 12, 3275 (2017)MathSciNetMATH Linming, G., Shundong, L., Jiawei, D., Yimin, G., Daoshun, W.: Homomorphic encryption scheme and a protocol on secure computing a line by two private points. J. Softw. 12, 3275 (2017)MathSciNetMATH
19.
Zurück zum Zitat Xian, Z., Yuzhao, J., Ying, Y.: A glimpse at blockchain: from the perspective of privacy. J. Inf. Secur. Res. 11, 985 (2017) Xian, Z., Yuzhao, J., Ying, Y.: A glimpse at blockchain: from the perspective of privacy. J. Inf. Secur. Res. 11, 985 (2017)
20.
Zurück zum Zitat Kang, L., Yi, S., Jun, Z., Jun, L., Jihua, Z., Zhongcheng, L.: Technical challenges in applying zero-knowledge proof to blockchain. Big Data 1, 59–60 (2018) Kang, L., Yi, S., Jun, Z., Jun, L., Jihua, Z., Zhongcheng, L.: Technical challenges in applying zero-knowledge proof to blockchain. Big Data 1, 59–60 (2018)
21.
Zurück zum Zitat Huaqun, W., Tao, W.: Cryptography on blockchain. J. Nanjing Univ. Posts Telecommun. (Nat. Sci.) 6, 64–65(2017) Huaqun, W., Tao, W.: Cryptography on blockchain. J. Nanjing Univ. Posts Telecommun. (Nat. Sci.) 6, 64–65(2017)
22.
Zurück zum Zitat Ruijue, Z.: Legal supervision of blockchain technology. J. Beijing Univ. Posts Telecommun. (Soc. Sci.) 3, 39–43 (2017) Ruijue, Z.: Legal supervision of blockchain technology. J. Beijing Univ. Posts Telecommun. (Soc. Sci.) 3, 39–43 (2017)
23.
Zurück zum Zitat Si, Z.: The Technology Principle, Application and Suggestion of Block Chain, Software, vol. 11, p. 52 (2016) Si, Z.: The Technology Principle, Application and Suggestion of Block Chain, Software, vol. 11, p. 52 (2016)
Metadaten
Titel
Application and Challenges of Blockchain Technology to Big Data-Based Credit Reference in China
verfasst von
Cheng-yong Liu
Cheng Chen
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-06158-6_15

Premium Partner