BCT Unit1
BCT Unit1
In 2017, Bahga and Madisetti published "Blockchain Applications: A Hands-On Approach," which provided an in-
depth overview of blockchain technology, including its history, core principles, and practical applications
Blockchain Applications
1. Cryptocurrencies: Bitcoin was the first and remains the most well-known application of blockchain technology.
Other cryptocurrencies, such as Ethereum, also use blockchain.
2. Smart Contracts: These are self-executing contracts where the terms are directly written into code. Ethereum
popularized smart contracts, enabling more complex decentralized applications (DApps).
3. Supply Chain Management: Blockchain can be used to track products through the supply chain, providing
transparency and reducing fraud.
4. Healthcare: Patient records can be securely stored and shared using blockchain, improving data integrity and
privacy.
5. Finance: Beyond cryptocurrencies, blockchain can streamline financial transactions, reduce costs, and increase
efficiency in traditional banking and financial service
Blockchain Architecture
1. Header: It is used to identify the particular block in the entire blockchain. It handles all blocks in the
blockchain. A block header is hashed periodically by miners by changing the nonce value as part of normal
mining activity, also Three sets of block metadata are contained in the block header.
2. Previous Block Address/ Hash: It is used to connect the i+1th block to the ith block using the hash. In short,
it is a reference to the hash of the previous (parent) block in the chain.
3. Timestamp: It is a system verify the data into the block and assigns a time or date of creation for digital
documents. The timestamp is a string of characters that uniquely identifies the document or event and
indicates when it was created.
4. Nonce: A nonce number which uses only once. It is a central part of the proof of work in the block. It is
compared to the live target if it is smaller or equal to the current target. People who mine, test, and
eliminate many Nonce per second until they find that Valuable Nonce is valid.
5. Merkel Root: It is a type of data structure frame of different blocks of data. A Merkle Tree stores all the
transactions in a block by producing a digital fingerprint of the entire transaction. It allows the users to
verify whether a transaction can be included in a block or not.
3
Blockchain – Transactions
A blockchain transaction refers to the transfer of digital assets between two parties on a blockchain network. Each
transaction is recorded in a block, which is then added to a chain of previous transactions, creating a comprehensive
ledger.
Key Components of a Blockchain Transaction
Digital Wallets: Users store their digital assets in digital wallets. These wallets use a pair of cryptographic keys: a
public key (address) and a private key.
Transaction Data: This includes the sender's and receiver's public addresses, the amount of assets being transferred,
and any additional data required by the transaction.
Digital Signature: Transactions are signed by the sender using their private key, ensuring authenticity and integrity.
Transaction Fee: A small fee paid to miners or validators who process and confirm the transaction.
How does Blockchain work?
Transaction Creation: A transaction is created and broadcast to the network. This transaction could be anything of
value, such as a financial transaction, a contract, or data.
Validation: Network nodes validate the transaction using a consensus mechanism. For example, in Bitcoin, miners
solve complex mathematical problems to validate transactions and create new blocks.
Block Formation: Validated transactions are grouped into a block. Each block contains a cryptographic hash of the
previous block, ensuring the chain's integrity.
Adding to Blockchain: The new block is added to the existing blockchain and propagated across the network. All
nodes update their copies of the blockchain to reflect this new block.
Public Ledger
Definition of a Public Ledger
A public ledger in the context of blockchain is a distributed database that is accessible to all participants in the
network. It records every transaction ever executed on the blockchain, ensuring transparency, security, and
traceability.
Benefits of a Public Ledger
Trustless Environment: Participants can transact without needing to trust a central authority. The ledger itself
provides the necessary trust.
Auditability: The transparent nature of the ledger allows for easy auditing and verification of transactions.
Security: The decentralized and cryptographic nature of the ledger makes it highly secure against attacks and fraud.
Efficiency: Automated processes and the removal of intermediaries can lead to faster and more cost-effective
transactions.
Pros of Blockchain
Decentralization
• Eliminates Central Points of Failure: By distributing data across a network of nodes, blockchain reduces the
risk of a single point of failure, enhancing the system's robustness.
• Increased Trust: Transactions can occur directly between parties without the need for intermediaries,
fostering trust in the system itself.
Transparency
• Public Ledger: All transactions are recorded on a public ledger, allowing anyone to verify them, which
increases transparency and accountability.
• Auditability: The transparent nature of blockchain makes it easy to trace and audit transactions.
Security
• Immutability: Once data is recorded on the blockchain, it cannot be altered or deleted, preventing tampering
and fraud.
• Cryptographic Security: Transactions are secured using advanced cryptographic techniques, ensuring data
integrity and confidentiality.
•
Efficiency
4
• Reduced Intermediaries: Blockchain can streamline processes by eliminating the need for intermediaries,
reducing costs and delays.
• 24/7 Availability: Blockchain networks can operate continuously without downtime.
Smart Contracts
• Automation: Smart contracts can automate complex processes, executing predefined actions when certain
conditions are met.
• Reduced Errors: Automated processes minimize the risk of human error.
Enhanced Privacy
• Selective Transparency: While blockchain is transparent, it can also offer privacy features, allowing users to
choose what information they share.
Cons of Blockchain
Scalability
• Limited Transaction Speed: Blockchain networks can suffer from slower transaction speeds and higher
latency, especially as the number of users increases.
• Data Storage Issues: Storing large amounts of data on the blockchain can be inefficient and costly.
Energy Consumption
• High Energy Use: Proof of Work (PoW) consensus mechanisms, like those used in Bitcoin, require significant
computational power, leading to high energy consumption.
Regulation and Compliance
• Uncertain Regulatory Environment: The regulatory landscape for blockchain technology is still evolving,
creating uncertainty and potential legal challenges.
• Compliance Issues: Ensuring compliance with different national and international regulations can be
complex.
Security Risks
• 51% Attacks: If a single entity gains control of more than 50% of the network's computing power, they can
manipulate the blockchain, posing a significant security risk.
• Smart Contract Vulnerabilities: Bugs or vulnerabilities in smart contracts can be exploited, leading to
financial losses.
Complexity and Usability
• Technical Complexity: Blockchain technology can be complex and difficult to understand, which can hinder
widespread adoption.
• User Experience: Interacting with blockchain applications often requires a steep learning curve, affecting
user experience.
Cost
• Initial Setup Costs: Setting up a blockchain network can be expensive due to the need for specialized
hardware and software.
• Maintenance Costs: Maintaining and updating the blockchain infrastructure can also incur ongoing costs.
Types of Blockchain
1. Public blockchain
2. Private blockchain
3. Hybrid blockchain
Public Blockchain
5
Public blockchain, as the name indicates, is the blockchain for and of the public. There is no one in charge, and anyone
can take part in the process.
These types of blockchains are open and transparent. Since there is no one in charge, decisions are made through a
decentralized consensus mechanism
Characteristics of Public blockchain
It is an open network where nodes can join and leave without the permission of anyone.
All nodes in the network can verify a new piece of data added to the network.
This blockchain includes a protocol of incentive mechanism that aims to ensure the correct operation of the
blockchain system.This public blockchain is said to be permissionless as anyone can access it without any kind of
permission, and the ledger is shared and transparent.It is secure to the 51% rule.There is no need to use your real
name, or identity, everything can be hidden.No regulation hence no limit to how one can use the platform for
betterment.It offers anonymity, no one can track your transaction back to you.
Example: Bitcoin, Ethereum
Private Blockchain
Unlike, a public blockchain, a private blockchain has an in-charge who monitor important task and give access to
read or block access. It is also known as permissioned blockchain as it has restrictions on who can participate in
transactions and validations.
The entities have been chosen in this network by the respective authority and the chain developers while
building the blockchain application. This blockchain uses are internal to the company so companies will not want
it to be accessible by the public.By its nature, it performs better in database management and auditing in other
fields.Not everyone can run a full node and start mining.Everyone cannot make transactions on the chain.
Not everyone can review the blockchain in the blockchain explorer.A user has to be permitted by blockchain
authority before he could access the network thus making it Permissioned Network.Performance becomes faster
as fewer nodes participate.It is being able to give service on demand making it more attractive to the user.
Enterprises more often use a private blockchain to build a multi-party business.
Example: Hyperledger, Corda
Centralization: With the presence of a few nodes it is possible that untrustworthy individuals gain control over the
network. These blockchains are generally centralized as it is mostly used by business and enterprises. Although,
blockchain is made to avoid centralization private blockchain inherently becomes centralized.
Integrity: Integrity depends on the standing authorized user/participants. It is necessary to trust in order to
validate the transaction. Confidentiality alone is not sufficient to ensure the participant trusts the private
blockchain. It also requires integrity to get confidence in private blockchain
Control: With fewer participants, it is easier for the hacker to take control of the network and manipulate the data
on it. It can happen when two minors are calculating the hash of the block at the same time and get the same
result. As a result, the blockchain will split and users have two different blockchains.
Hybrid Blockchain
A Hybrid blockchain is a blockchain that combines elements of both public and private blockchains. It is designed
to reduce the disadvantages of both types of blockchains while maximizing their benefits. A hybrid database
contains both public and private entries. Similar to public blockchains, where anyone is invited to join and
participate in the network, public nodes operate similarly to those in those systems. Private nodes, on the other
hand, are in charge of validating and checking transactions and are governed by specific organizations or
individuals. Using private nodes, a hybrid blockchain can process transactions more rapidly and with greater
privacy and security. Public nodes provide decentralization and transparency at the same time, making it difficult
for one group to maintain control over the network. In a hybrid blockchain, the members can decide who can
participate in the blockchain or which transactions are made public. Example:Ripple
Protecting from 51% attack: Hybrid blockchain is immune to 51% attack as hackers cannot have access to the
network to carry out the attack.
Permissioned Access:
In tokenless blockchain networks, participation is restricted to authorized entities or selected nodes. This feature
allows for enhanced privacy, data confidentiality, and compliance with regulations.
Centralized Governance:
Tokenless blockchains often rely on centralized entities or consortiums to validate transactions and maintain the
network. This governance structure provides control over the blockchain’s operations, making it suitable for
enterprise use cases.
Enterprise Applications:
Tokenless blockchains find extensive applications in industries where privacy and confidentiality are paramount,
such as supply chain management, healthcare, finance, and government sectors. These industries require a fine
balance between transparency and restricted access to sensitive information.
Enhanced Scalability:
Tokenless blockchains can achieve higher scalability compared to tokenized blockchains. By reducing the
computational load required for token-related operations, tokenless blockchains can process transactions more
efficiently, making them suitable for enterprise-level applications.
Shared Ledger
A shared ledger is a type of ledger that multiple parties can access and contribute to, but it is not necessarily
distributed. All participants have access to the same version of the ledger, which is maintained by a central
authority or a single organization that manages and controls the ledger.
Example of a Shared Ledger:
Bank Account Ledger: In traditional banking systems, a shared ledger might be the internal ledger
of a bank where the bank records all transactions of its account holders. Customers and bank staff
can view and update the ledger, but it’s managed by the bank, not shared across different institutions
or decentralized.
Distributed Ledger
A distributed ledger is a type of ledger that is replicated, shared, and synchronized across multiple locations
or nodes. Unlike a shared ledger, a distributed ledger does not rely on a central authority. Instead, each
participant (node) in the network maintains a copy of the ledger and participates in validating and recording
transactions.
Examples of Distributed Ledgers:
1. Blockchain: Blockchain technology is a well-known example of a distributed ledger. In a blockchain
network like Bitcoin or Ethereum, every node in the network maintains a copy of the entire
blockchain. Transactions are grouped into blocks and added to the chain in a decentralized manner,
with consensus mechanisms ensuring that all copies of the ledger are synchronized.
2. Ripple: Ripple is a distributed ledger technology designed for fast and secure international payments.
Ripple’s ledger is shared among financial institutions and payment providers, allowing them to
validate and settle transactions without relying on a central clearinghouse.
Side Chain
A sidechain is a separate blockchain that is attached to a main blockchain (often referred to as the
"mainchain") through a two-way peg mechanism. This mechanism allows assets to be transferred between
the mainchain and the sidechain. Sidechains are used to experiment with new features, improve scalability,
or support different consensus mechanisms without compromising the security or functionality of the
mainchain.
1. Two-Way Peg: The two-way peg allows assets to be moved from the mainchain to the sidechain and
back again. This is often achieved through a process where assets are locked on the mainchain and
an equivalent amount is unlocked on the sidechain (or vice versa).
11
2. Independent Operation: Sidechains operate independently of the mainchain. They can use different
consensus algorithms, have different transaction rules, and implement various features that are not
available on the mainchain.
3. Scalability and Experimentation: Sidechains allow developers to test new technologies, features,
and protocols without affecting the mainchain. They also help in scaling the overall blockchain
ecosystem by offloading some transactions and smart contracts from the mainchain.
Example of Sidechains
1. Scalability: Sidechains can reduce the load on the mainchain by handling certain types of
transactions or smart contracts separately. This can help the mainchain operate more efficiently.
2. Innovation and Experimentation: Sidechains allow developers to experiment with new features
or improvements without risking the mainchain’s stability. For example, new consensus
mechanisms or transaction types can be tested on sidechains.
3. Specialized Functionality: Different sidechains can offer specialized functionalities tailored to
specific use cases. For example, one sidechain might focus on privacy, while another might focus
on high-speed transactions.
A fully private blockchain is a type of blockchain where access to the network and participation in the
consensus process are restricted to a specific group of authorized entities. Unlike public blockchains, which
are open to anyone, private blockchains are controlled by a single organization or a consortium of
organizations.
Key Characteristics
1. Access Control: Only authorized participants can access the blockchain network. This is typically enforced
through permissions and credentials.
12
2. Consensus Mechanism: The consensus process is often managed by a limited number of trusted nodes,
which can lead to faster transaction processing compared to public blockchains.
3. Privacy: Transactions and data on a private blockchain are visible only to authorized participants,
enhancing privacy and security.
Examples
1. Hyperledger Fabric:
o Overview: Hyperledger Fabric is an open-source, permissioned blockchain platform designed for
enterprise use. It provides a modular architecture that allows organizations to configure their own
consensus mechanisms, access controls, and privacy features.
o Use Case: Companies use Hyperledger Fabric for supply chain management, financial transactions,
and other enterprise applications where data privacy and control are crucial. For instance, Walmart
uses Hyperledger Fabric to track the origin and journey of food products in its supply chain, ensuring
transparency and reducing the risk of foodborne illnesses.
2. R3 Corda:
o Overview: Corda is a distributed ledger technology developed by R3, designed specifically for
financial institutions. It focuses on privacy and regulatory compliance, enabling businesses to record
and manage financial transactions securely.
o Use Case: Corda is used by banks and financial institutions to manage transactions, trade finance,
and other financial services while maintaining privacy and confidentiality. For example, Corda has
been employed by banks in consortiums to streamline trade finance processes and reduce
administrative costs.
Proprietary Blockchain
A proprietary blockchain is a blockchain whose technology, including its codebase and underlying
infrastructure, is owned and controlled by a single organization. This type of blockchain is not open-source,
meaning that its source code and development processes are not publicly available. Proprietary blockchains
may be public or private but are characterized by their exclusivity and control by the owning entity.
Key Characteristics
1. Ownership and Control: The organization that develops and maintains the proprietary blockchain has full
control over its operation, development, and governance.
2. Customization: The owning organization can tailor the blockchain to meet specific needs and requirements,
often integrating it with existing systems and technologies.
3. Access Restrictions: Proprietary blockchains can be either open to a broad audience (public) or restricted to
a specific group (private), depending on the organization’s goals.
Examples
1. IBM Blockchain:
o Overview: IBM Blockchain is a proprietary blockchain solution built on Hyperledger Fabric. IBM offers
enterprise-grade blockchain services, including consulting, development, and support.
o Use Case: IBM Blockchain has been used in various industries, including supply chain, healthcare,
and finance. For example, IBM's Food Trust solution, built on its proprietary blockchain, helps
companies track and trace food products through the supply chain to ensure quality and safety.
2. Ripple (XRP Ledger):
o Overview: Ripple’s XRP Ledger is a proprietary blockchain designed for fast and low-cost cross-
border payments. Ripple Labs, the company behind Ripple, controls and maintains the XRP Ledger.
o Use Case: Ripple is used by financial institutions to facilitate international money transfers and
currency exchange. For example, Ripple’s technology is employed by banks and payment providers
to process cross-border transactions more efficiently compared to traditional methods