Closed synctext closed 2 years ago
Progress meeting minutes:
Activities:
Meeting minutes:
24 pages for first 4 chapters
Chapter 2 research statement
Section 2.4 Requirements:
Section 5.1 "From requirements to use cases", no link to above research questions
"The system that is being designed in this master thesis is a prototype" strange defensive wording
POET: "For a permissioned blockchain, it is a secure and efficient algorithm" mention unlimited identity creation and cheating at the lottery. Mention commitment scheme. Magic Intel silicon can't be the magic solution (e.g. tamper-proof).
Section "5.2 Blockchains", selecting blockchain technology
Section "5.4 Digital signature algorithm", encryption implementation
A block contains it's own hash? "6. Hash of this block"
FIGURE 6.4: Screenshot of the my logs page (btw never referenced in text)
Pseudocode is tricky (strict: all variables in italic, defined, and used); for instance, undefined SigningBlock
. Magic variable "
single linked list, so no backwards traversal without (documented) index
Section 7 lacks intro sentence
7.1.1: please integrate these 2 lists
7.4 Speed of MediTrail features; performance analysis
Fig 7.2: not scientific to draw a line through 4 data-points! Plus line smoothing is considered bad practice.
"Distance to latest signing block" please conduct experiments with larger files; upto 1000.
7.5.3 Discussion of file access performance, please integrate into single experiment section
debugging of sleep time problem.
without consensus performance should be easily 10k blocks per second
New thesis draft, processed feedback from last time. thesis-7-jan.pdf
Review notes:
where is the open source repository?
thesis is "file oriented" and not 'any digital information' contained within a digital patient database.
Section 5.3.1, "this high resilience may not be fully needed." perhaps replace with something more technical, like, this solution to the double spending problem in an anonymous network is highly inefficient and not appropriate in our medical context.
5.5 Monitoring access to files; please reduce this section or make it more scientific by introducing an "5.5 event-based architecture" where evens can be remotely placed signatures, blockchain block creations, or file access. Void of all expensive continuous polling. 5.3.4 Proof of Elapsed Time; "it is a secure and efficient algorithm" hard claim without citations or mathematical proof! Please explain this simple 'sleep-and-wake-up' algorithm and compare it to leader election in Byzantine Fault Tolerant Systems and Nakamoto consensus.
"every file that has been uploaded should be downloadable by every user in the system." This formulations sounds very privacy invasive.
"To create a minimum level of aesthetic appeal" :-)
7.4.2 "Unfortunately, performing the same large experiments with the PoET configuration would cost too much time compared to the value of the data."; "no data" entries are unclear. why was this experiment stopped?
7.4.3: "Unfortunately, performing the same large experiments with the PoET"; again not a clean experiment.
The 2 magic parameters determine the PoET performance. Make that more explicit and clear, "which makes sense because the parameters for choosing the sleeping time stay set during the experiments."
"Using the PoET consensus algorithm with the chosen parameters adds tremendous overhead."; no motivation for magic parameter values.
Tip for scientific depth. Key to consensus is the expected outcome for an n participant lottery with drawing numbers between (min, max) interval. The expected duration of a consensus round can be expressed mathematically. Good theoretical depth to final chapter.
Future work ideas&brainstorm: run a test network using public datasets like a prescribed medication for all doctors in the UK for a whole year. Emulate all hospitals, doctors, and medication prescription events.
On Security Analysis of Proof-of-Elapsed-Time (PoET). Solid related work for a security analysis. It introduces a likelyhood of being a cheater.
The basic idea is to use z-test to check whether a node is generating blocks too fast (winning too frequently in the competition with other nodes for block creation
.
No more comments on thesis text and chapter wording. Except usage of Sybil term for cheating in a lottery (7.2.1 Sybil attacks). Advised to make "7.2 Resistance against attacks" a single text paragraph without sub-sub-headings.
Final thesis addition suggestion: link outcome of experimental results with the appropriate theory.
Great additional to theoretical thesis depth (1+ page):
Review notes:
General impression: Extensively introduced topic (good!; clear!); relatively short description of the actual work and its evaluation (but i'm not familiar with the standards in your field, so I'm not the best to judge.
I would be happy to discuss more practical aspects when implementing MediTrail in a medical environment such as an academic hospital. Looking forward to hear more!
Cheers,
Erik
I fixed the bug!!! performance is much better now
Had to re-do almost all experiments due to fixing the bug, but it enabled me to include the experiments that would take too much time previously
Represented Upload and Read event experiments with box plots
Implemented some text feedback THESIS-10feb.pdf
Need to fix the box plots (somehow add right numbers on horizontal axis and converting to ms)
Presentation draft: presentatie.pptx
Thesis FINISHED :clap:
draft thesis direction
Investigate the revealing of privacy-sensitive attributes of your identity. Should be usable even in the sensitive medical domain with electronic patient files.
First step, find related work in this area (irma, zero-knowledge, zkSNARKs)
For next meeting: gather all general docs, weforum Djuri his thesis, etc. in .PDF form.