Reference Hub1
Donation Model Development Based on the Methodologies of Blockchain

Donation Model Development Based on the Methodologies of Blockchain

Meng-Hsuan Fu
Copyright: © 2018 |Volume: 9 |Issue: 4 |Pages: 17
ISSN: 1947-8186|EISSN: 1947-8194|EISBN13: 9781522545118|DOI: 10.4018/IJISMD.2018100102
Cite Article Cite Article

MLA

Fu, Meng-Hsuan. "Donation Model Development Based on the Methodologies of Blockchain." IJISMD vol.9, no.4 2018: pp.20-36. http://doi.org/10.4018/IJISMD.2018100102

APA

Fu, M. (2018). Donation Model Development Based on the Methodologies of Blockchain. International Journal of Information System Modeling and Design (IJISMD), 9(4), 20-36. http://doi.org/10.4018/IJISMD.2018100102

Chicago

Fu, Meng-Hsuan. "Donation Model Development Based on the Methodologies of Blockchain," International Journal of Information System Modeling and Design (IJISMD) 9, no.4: 20-36. http://doi.org/10.4018/IJISMD.2018100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In order to solve the problems occurring in the current donation systems, the methodologies of blockchain include decentralized data storage, transaction hash, digital signature, blocks connection within the chain are adopted to the donation model, called blockchain donation model (BDM). In BDM, all donation transactions are recorded in detail and stored permanently; they are not allowed to change, modify, or delete. In addition, donors could indicate the specific groups for donating directly because of the peer-to-peer transmission method. All the information is sealed through the secure mechanism; only donors and donees could decrypt it with their own keys. BDM records transaction flows starting from receiving to spending the donation in detail. BDM is not only a place for listing details of donations but also a secured transaction storage. The blocks are connected together with a strong chain which is maintained by all nodes in the blockchain network. Thus, BDM is a platform dealing with the donation issue under a well secure mechanism, no intermediaries, and a permanent storage.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.