Report on blockchain technology
Report on blockchain technology
Page 1 of 47
BSIET
4.3.1 How does cryptocurrency work…………………………………… 34
4.3.2 Cryptocurrency examples…………………………………………. 35
Conclusion………………………………………………………………. 38
Reference………………………………………………………………… 39
Page 2 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
CHAPTER 1
INTRODUCTION
1.1 History
Origin of Bitcoin in the 1990s: Blockchain principles were invented by researchers and
cryptographers. Stuart Haber and W. Scott Stornetta in 1991 formulated the first blockchain
system that secured the digital information cryptographically. It was aimed at recovering
timestamps from a Hash cash email and saving them as forms of proof for later referencing in
order to prevent it from being tampered.
The Bitcoin blockchain was started in 2009 and in January of that year,
the “genesis block” was mined (Bitcoin Blockchain, 2009). Its primary purpose was The
Bitcoin blockchain was started in 2009 and in January of that year, the “genesis block” was
mined (Bitcoin Blockchain, 2009). Its primary purpose was to create a public network for
transactions confirmation.to create a public network for transactions confirmation.
Ethereum and Smart Contracts (2015): Ethereum is a blockchain platform launched in 2015,
two years ago, by Vitalik Buterin in late 2013, that introduced the idea of smart contracts to
blockchain technology. On this platform, the creation of decentralized applications (daps) was
made possible by the Ethereum blockchain and enabled the execution of smart contracts which
are contracts that enforce themselves based on coded conditions. Major companies began to
examine the use of blockchain technology for different reasons. This led to the formation of
Page 3 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
enterprise blockchain solutions. Hyperledger and R3 Corda are some of the projects that were
developed by two non-profit groups:
The Linux Foundation and R3 respectively; these initiatives were well-received due to
their capacity to optimize processes, make them more transparent, and increase safety within
different economic niches such as finance, supply chains or medical care. "In what ways are
nurses’ perceptions about patient care influenced by nurses’ role in patient care? “Regulatory
Developments and Challenges:
The rising popularity of blockchain technology has not gone unnoticed by regulators
globally. There have been regulations set in place in different nations in order to deal with
problems related to money laundering, tax evasion, and safeguarding the rights of consumers.
The patterns of regulation differ greatly and are constantly changing in different areas.
Blockchain technology has gone beyond being a mere cryptocurrency and is now being
investigated for multiple uses such as supply chain management, voting systems and many
more. It is explored for many applications including supply chain management, voting systems,
identity verification digital asset ownership.
The founders of cryptographically secured chain of blocks for timestamping digital documents in 1991.
Page 4 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
However, we need to pay for the credit cost for credit intermediaries such as banks and
Alipay and other, which makes the financial industry the most profitable industry. How to
create decentralized digital cash or a kind of digital cash without credit intermediary has always
been a difficult problem. Digital records can be copied, and the copies are exactly the same as
the original records. Without a centralized database to record the data, how can we prevent the
same sum of money from being spent twice?
This is the so-called double payment or double spending. Before the advent of bitcoins,
the major electronic cash systems, e.g. Alipay and PayPal, relied on centralized databases to
avoid double spending, and such trusted third-party intermediaries were indispensable.
In the real world, behind cash transaction, there is a financial system related to currency:
the central bank, commercial banks and third-party online payment institutions. In the digital
world, to create a kind of disintermediated and decentralized electronic cash, a complete system
should be well designed as well. This system is supposed to solve the following problems: How
can electronic cash be issued impartially and fairly without being controlled by any centralized
organization or individual? How to transfer cash directly to another person without the help of
any intermediary? How can counterfeit electronic cash be prevented? In the digital world, this
can be translated into the following question: how to prevent the electronic cash from being
spent twice? In 2008, Satoshi Nakamoto published a paper entitled Bitcoin: A Peer-to-Peer
Electronic Cash System, where he improved previous centralized and decentralized electronic
cash with his innovative ideas based on former research results, and created bitcoins, a peer-
to-peer electronic cash system, thereby preventing double spending without the participation
of any intermediary in transaction 1.
Page 5 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
bitcoins, and each data block that contains the information about a network transaction is used
to verify the validity of information and generate the next block.
From a technical point of view, block chain refers to a series of time-stamped data
blocks generated using relevant cryptographic methods, and the node with the accounting right
must be time-stamped in the head of the current data block to indicate the writing time of the
data, thereby guaranteeing that each block is generated chronologically after the previous block
is generated and each block contains the hash value of the previous block, so as to form a chain.
Due to the irreversibility and irrevocability of time, any attempt to invade and tamper
with the data information in the block chain can be easily traced, and the counterfeiting is
extremely costly, which restrains relevant illegal acts 2.
Here,
Data layer. The block chain system packages a batch of transactions into blocks and organizes
transaction data in blocks. The words “block” and “chain” describe the characteristics of the
structure of data used in the block chain technology. A “block” is a data unit that records the
transaction information of bitcoins.
Page 6 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
The “chain” of the blocks is accomplished by the hash value of data in the block head,
and this hash value serves as the unique identification of all blocks. The only block linked can
be found in the block chain based on the harsh value of the parent block recorded in the block
head. In this way, a chain tracing from the latest block to the first block is established according
to a sequence of hash values that link each block to its respective parent block, thereby forming
a chained data structure for all blocks. Network layer.
Since block chain is a distributed network, the decentralized and dynamically changing
P2P network is applied. The nodes in the network are geographically dispersed but equal
servers, and there is no central node. Any node can freely join or exit the network. Consensus
layer. The consensus mechanism is the core engine of the block chain system. In a distributed
system without mutual trust, it is difficult for the nodes to reach an agreement, also known as
network-wide consensus, within a very short period. Block chain is exactly such a distributed
network where the nodes reach a consensus via the consensus mechanism, which directly
achieves point to-point transactions without the participation of any intermediate institutions.
Actuator layer.
To encourage more users to participate in the consensus mechanism and improve the
security of the system, an incentive mechanism is set up to reward users who participate in the
consensus mechanism. For instance, in the case of bitcoins, the nodes involved in bookkeeping
are referred to as the miners, and the nodes that successfully gain the bookkeeping right will
receive bitcoins as a reward. Contract layer.
As the “virtual machines” at the bottom of the block chain, the data layer, the network
layer and the consensus layer are responsible for data representation, data dissemination and
data verification respectively, while the contract layer is a programming algorithm established
based on these virtual machines. Taking bitcoins as an example, the contract layer executes a
simple scripting language to control the transaction of bitcoins in the Internet trading market.
Such scripting language is the embryonic form of smart contract, which brings about the first
programmable global currency in human history.
Page 7 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
following six typical scenarios, namely digital currency, data storage, data authentication,
financial transactions, asset management and election voting.
Digital currency is the earliest application of the block chain technology, and the most
typical case must be bitcoins. The digital currency can be used to buy goods or services in the
digital currency system.
Broadcast each transaction to every node of the network to make it valid. Upon
receiving the transaction information, the miner node records this transaction on the ledger.
Once recorded, the transaction information is irrevocable and cannot be deleted randomly. The
miner node confirms the transaction through the bitcoin software running on the personal
computer.
To stimulate the enthusiasm of miners, the system rewards the miners with 25 bitcoins
for the transactions they’ve recorded and confirmed (As set by the system, the number of
bitcoins as a reward will be halved every 4 years). There is only one reward which will be given
to the first miner who solves the problem. The system will provide a problem which is supposed
to be worked out within ten minutes.
The one who can solve this problem using hash algorithm within the shortest time will
be given the bookkeeping right and win the corresponding reward. The miner winning the
bookkeeping right will broadcast the transaction to the whole network, the ledger will be made
public, and the other miners will check and confirm these accounts. If the transaction has been
confirmed by more than 6 miners, it will be successfully recorded.
Page 8 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
blockchain becomes the foundation for choosing the blockchain type. In Public blockchain
anybody in the world can participate, download, read and write the data.
It is like an open field in which the users can come and go and therefore the users
involved in the network needs to be very active. The well knows examples of public blockchain
are given in (Nakamoto and Bitcoin, n.d., Wood, 2018, Ben-Sasson et al., 2014) which include
Bitcoin and Ethereum. In Private Blockchain, all the permissions are kept central to an
organization. The participating users are selected in advance and only those users are granted
access to the network.
The well-known examples of private blockchain are given in (Brown et al., 2016) which
includes Block Stack and Multi Chain. Consortium blockchain are semiprivate blockchain
which means they are permissioned and controlled. It is distributed among common nodes and
privileged members. Ripple and R3 are examples of this type. Table 1 shows the comparison
of the above mentioned blockchain types.
Page 9 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Chapter 2
Development
Traditionally, trusted third parties, e.g., banks in the monetary context, have controlled
such digital ledgers in the form of databases. In contrast, the cryptocurrency Bitcoin, which
was presented in a white paper in 2008 [Nakamoto, 2008] and was subsequently implemented
and went into operation in 2009, is based on the decentralized management of the
corresponding ledger by redundant and synchronized (“physically decentralized, logically
centralized”) maintenance of the ledger on all participating computers (“nodes”). This means
that the validity and execution of transactions is now decided by all participants in the Bitcoin
network rather than by a single central authority.
In principle, such replicated state machines, which guarantee the security and
functionality of a distributed network even in the presence of system failures or Byzantine
errors, have been intensively researched [Lamport et al., 1982] since 1982 and then practically
implemented with Paxos [Lamport, 1998] and PBFT [Castro et al., 1999]. Consensus could be
found based on elections, following the principle of “one node, one vote”. What is new about
Page 10 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Bitcoin, however, is that not only predefined nodes can participate in the network and the
consensus process, but anyone who wants to can do so. This is known as a public
permissionless system. In it, the election-based process just described is not possible, because
an attacker who wants to overrule the system would only have to register enough accounts on
the network, which would be possible for them without significant costs (this is called “Sybil
attack”.
A permissionless system like Bitcoin must therefore tie the weight of a vote to a scarce
resource in order to prevent such attacks. With Bitcoin and many other cryptocurrencies this is
done via the so-called “Proof-of-Work (PoW)”, i.e., the weight of the vote is linked to proven,
performed computing work and, thus, energy. PoW involves finding a random number, the so-
called nonce, so that the hash value of the nonce – together with other data – takes on a certain
form. In the case of Bitcoin, this is the requirement that the integer representation of the hash
value is smaller than a certain upper limit. The choice of this upper limit thus defines a measure
of complexity, the so-called difficulty, of this cryptographic puzzle. The difficulty is indirectly
proportional to the probability that a randomly chosen nonce leads to a hash value of the desired
form. This method of proving computation effort has been known for a long time and has been
discussed, for example, in Hash cash for preventing spam [Back et al., 2002].
Participation in the Pow consensus mechanism, i.e. the search for appropriate nonces,
is therefore associated with costs, so that an economic incentive must be created for
participation in mining: Whoever finds a nonce that, together with a bundle of transactions,
leads to a hash value of the required form may also register a reward for themselves, more
precisely, a certain number of new Bitcoins created for this purpose (“block reward”). The
corresponding block can then be communicated to the other participants in the blockchain
network and thus be attached to the existing chain, which means that the corresponding
transactions are executed.
It should be mentioned that due to the competition in Bitcoin mining, participation with
CPUs has long since become unprofitable, as specialized hardware, so-called ASICs, have been
developed that can calculate hashes by orders of magnitude faster and more energy-efficiently
than CPUs and GPUs [De Vries, 2018]. The difference in Bitcoin is so significant that even the
world’s 500 largest supercomputers taken together can probably only achieve a small part of
the current hash rate of Bitcoin, which is mainly based on ASICs – and can only conduct mining
at a considerable financial loss.
Page 11 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
To prevent undetected manipulation of the system, Bitcoin uses a data structure that
makes it very easy to detect and locate subsequent changes, namely Merkle Trees. To reduce
the effort involved in finding a consensus, transactions, metadata, nonce and a hash pointer to
the previous block are combined in one block.
However, a fall in the price of Bitcoin in early March 2020 in the context of a generally
weak stock market sentiment due to the Covid-19 pandemic was accompanied by a slightly
less pronounced but nevertheless significant decrease in the hash rate. This could be explained
by the fact that due to the reduction in the value of Bitcoin and thus the level of the mining
incentive, miners with higher variable costs, for example due to obsolete hardware or high
electricity prices, were forced out of mining here for a short period of time. Thereafter, aligned
with the Bitcoin price, the hash rate also rose back to the previous level.
However, the Bitcoin halving on 11 May 2020, an event that is similarly scheduled in
many PoW blockchains and which takes place approximately every four years in the case of
Bitcoin, caused a permanent halving of the block rewards and a corresponding reduction of the
economic incentive to mine. As Bitcoin prices remained largely constant, the hash rate fell
significantly, like the previous situation.
Surprisingly, however, just one week later, the hash rate rose again significantly,
without Bitcoin prices rising to a similar extent. This could be due to the following reasons: –
A closer look at the expected profits from mining must also include transaction fees received
by the producer of a new block, especially after halving, these fees made up to 20 % of the
reward on some days, and the transaction fees have also increased after the halving.
Page 12 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Figure 2.1 Hash rate and price deve lopment for Bitcoin. 1 EH denotes 1018 hashes. Data retrieved
from [Blockchain.com, 2020]
The Difficulty is not adjusted in real time, but only around every 14 days. While with
the Difficulty before the halving it might not have been worthwhile to participate in mining,
this might have changed after the Difficulty was adjusted for the first time after the halving and
thus significantly reduced (it takes a while for the system to regain its balance).
In China, the rainy season begins in May and June in some regions, so that much
cheaper electricity is available through hydropower, and some mining pools were offering
electricity for just under 0.03 USD/kWh at that time; especially since competition has become
much fiercer in the face of declining mining revenues [Bloomberg NEF, 2020]. – More and
more modern, energy-efficient hardware is being purchased and used, significantly reducing
variable costs.
Figure 2.2 Hash rate and expected mining rewards for Bitcoin. Data re-thieved from
[Blockchain.com, 2020]
Page 13 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
calculated hashes, and the actual participation in the form of the hash rate, in the period around
the halving with a more accurate model. This also considers the actual current block time or
difficulty as well as the transaction fees received by the generator of a new block in addition to
the block rewards. The resulting curves are shown in figure 2. The correlation between
expected profits and the hash rate is approx. 0.57.
This suggests that some miners are already deciding in real time or in the short term
whether or not it is worthwhile for them to participate in mining because they have already
operated close to cost neutrality before halving. Apart from the irregularities around halving,
lower correlations have been observed, especially in the last two weeks analyzed, which could
be due to the changes in electricity tariffs in China’s mining pools described above. In order to
analyses the influence of electricity tariffs in more detail, we illustrate in Figure 3 the influence
of mining hardware and electricity prices on the relative margin, i.e., the ratio of mining profits
(i.e. the difference between mining revenues and electricity costs) to the electricity costs of
mining in detail. Only electricity consumption is considered; other variable costs and
investments (e.g. for hardware procurement) are ignored.
Thus, the data shown represents an upper limit of the relative margin. The reference
hardware used was the popular Bit main Ant miner S9 (11.5 Th) for hardware newly launched
in 2016, the Microbat What miner M10S for 2018, and the Bit main Ant miner S19 Pro (110
Th) for 2020 [Asicminervalue, 2020]. At the time of their market launch, these probably
corresponded to the most energy-efficient mining hardware for Bitcoin. The vertical line shows
the time of the Bitcoin halving, as in Figure 1 and Figure 2. In fact, at electricity prices of 0.05
USD/kWh, the halving can force old, less energy-efficient hardware out of the market in the
short term, whereas more modern, more energy-efficient hardware remains profitable and, at
lower electricity prices, mining with older hardware also makes economic sense.
Page 14 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
However, this does not necessarily mean that the use of a blockchain must be a
disadvantage from a sustainability perspective. The following rough estimate is intended to
illustrate this: A small, private blockchain network, such as Hyperledger Fabric or Quorum,
with 10 nodes, each with a mediocre hardware configuration (2 CPUs, 8GB RAM) can easily
handle 1000 simple transactions per second, thus each transaction consumes around 1 J. On the
other hand, based on the information provided in VISA’s Sustainability Report 2017, it can be
calculated that the energy consumption of the entire company (i.e. including heating of
buildings, etc.) amounts to approximately 6 000 J per transaction, of which 3 000 J per
transaction are incurred by data center’s [VISA, 2017]. A simple client-server system with a
key-value store, such as Level DB, can process several thousand simple transactions per second
with the above hardware equipment, resulting in a power consumption in the order of 0.02 J
per transaction. Although the power consumption of a blockchain is generally much higher
than that of a corresponding centralized solution (here by a factor of around 50) due to the
redundancy (and to some extent also due to the consensus and generally the more extensive
use of cryptographic methods), it may still only account for a very small part of the power
consumption of the entire IT solution or the entire process, even if clients and backups are
included.
Particularly in scenarios in which processes can be further digitized with the help of
energy-efficient variants of blockchain technology, it is therefore reasonable to assume that
blockchain-based solutions can also save energy below the line. In the best-known
cryptocurrencies, such as Bitcoin and Ethereum, the corresponding blockchain networks
already consist of many thousands of nodes, and with large-scale adoption, their number would
be likely to rise even further in the future. Accordingly, the power consumption of these
networks can be considered problematic because of the resulting high degree of redundancy.
However, research also has promising solution concepts for this challenge:
Page 15 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
features and processes are distributed among the various shards, so it is difficult to quantify at
this point how much the degree of redundancy will ultimately decrease and what impact this
will have on security and functionality.
Page 16 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
CHAPTER 3
Working
3.1 Transaction
When it comes to blockchain technology, one of the basic units is a transaction that
denote the transmission of data or money among different system users. Here is a little piece
on what transactions entail in blockchain technology.
A transaction usually means that there is interchange of goods and services or financial
values between more than one person. These activities could either be exchange for cash,
products for goods or agreements for various other things with price consideration. Each party
in the transaction must give something valuable e.g., cash/currency notes,
merchandise/goods/services offered under the barter system without using money while the
other provides values that are differently calculated from what they have given away.
Transactions can take place under diverse situations including but not limited to
corporate world, money matters, or even general daily occurrences that require giving out
something in return for another item. They may become possible when there are agreements
present between involved parties through either digital systems or physical ones like papers in
legal terms hence making it necessary to have them done if there are those things needed in
this case could be purchasing property transferring assets and so on.
Definition: –
Blockchain's transaction refers to a digital asset or data transfer from one address to
another. This may involve such things as cryptocurrencies (such as Bitcoin or Ethereum),
digital tokens, smart contracts, among other digital information forms.
time indicated on clock or any other device with similar functions. Digital signature: It is a
cryptographic signature.
It is pointed out that all blocks are recognized by cryptographic hash values created by
SHA256 algorithm and these hash values are part of the block header. Granting that a block at
any given point has one parent, it can transitorily have multiple children. Every child block in
the chain refers to the same block as its parent and has the same parent hash value. Although
the multiple children situation occurs mainly when a blockchain fork is encountered, as soon
as the fork is resolved and the valid block is determined, the blocks in the fork would be
orphaned and not pursued in the future.
The identity of child blocks depends on the parent block identity and varies accordingly.
Then the hash value of the parent block changes. As a result, the preceding block hash pointer
of the child block is changed. This process continues until reaching each of the grandchild
blocks. The cascade effects make sure that once a block has many generations, it cannot be
meddled without compelling recalculations of all the consecutive blocks.
a) Data
The data stored in the blockchain depends on the service and the application. It could
be used in a peer-to-peer file system such as IPFS, in distributed databases such as apace
Cassandra, in cloud file storage such as story, and Ethereum swarm, Sia etc. The data stored
Page 18 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
can be used in various applications like recording the transaction details, banking, contracting
and IoT.
b) Hash.
A hash function is the one that takes an input of any length and generates the output with
unique fixed length. If a single value in the input is modified, the output is extremely different.
Hash functions are used ubiquitously in the blockchain technology. Each block containing data
is hashed and the changes could be big or small. For instance, a user named Alex tries to change
the data stored in a block.
Then the modified block will have a completely different hash value, assuring that every
node or miner in the network would have knowledge of the modification made by updating the
ledger copy of all users. This can increase the trustworthiness of data stored in blockchains. In
a hash tree or Merkle tree every node is represented as a leaf and is labelled with a block. This
Merkle tree permits the user to store large data structures in a secure and efficient way.
c) Timestamp.
It is necessary to record the time when the block was created. Timestamping is a method
used to track the creation or modification time of a document in a secure way. This method is
Page 19 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
becoming an essential tool in the business world today since it permits the involved parties to
identify the origin and availability of a document on a particular date and time.
d) Other Information.
Other information contains digital signatures, nonce values, nBits and a few other user
defined values. Every user has two keys, a private and public key. A digital signature containing
these two keys is involved in both signing phase and verification phase. The private key is kept
confidential and is used to sign a transaction to encrypt the data. The public key is known by
everyone and is used to validate and decrypt the data in the verification phase of the transaction,
consequentially confirming data authenticity. A nonce value is basically a 4-byte value starting
with 0 and increments each time a hash calculation is performed.
Traditional banks use centralized ledgers to track balances. Each bank branch
periodically updates this central ledger, but this ledger is neither public nor auditable. The
Bitcoin protocol changes this paradigm by allowing anyone to read and write directly to the
ledger. Anyone can publish a Bitcoin transaction. Miners will add that transaction to the
blockchain, and anyone can query the blockchain to check their balances and transaction
history.
All nodes in the Bitcoin network keep and validate identical copies of the ledger so that
there exists no central point of failure or fraud.
Whereas executives at a traditional bank can conspire to arbitrarily change the ledger
at their own bank, no one is capable of dishonestly altering the Bitcoin blockchain. This gives
Bitcoin ultimate security and trustworthiness.
Page 20 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
a) Bitcoin Node: -
A node is a separate part of a network that connects with other nodes and together they
form the network. A computer that runs an implementation of bitcoin while keeping all the
blockchain data is called bitcoin node.
Nodes validate, advertise, and ask for new blocks and or me pool from their peers over the
network. Should nodes run accordance in their software, the consensus will be reached. Having
a good number of nodes is of utmost importance in safeguarding the network against any
arbitrary or destructive modifications on the source code, reorganizations, among others.
b) Consensus: -
At the blockchain level, consensus must be maintained by all nodes running compatible
code. All nodes must agree on core parameters such as how many new bitcoins are created per
block and what blocks and transactions are valid. Additionally, nodes must agree on the exact
state of the network—which blocks comprise the blockchain and which transactions are
included therein. If nodes disagree on these parameters, the network will fracture and the
blockchain will splinter into several chains. Reconciliation between competing chains is
extremely difficult, so maintaining consensus is of utmost importance.
Page 21 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
c) Peer-to-Peer (P2P): -
A peer-to-peer network is one in which members can interact directly with one another
without relying on third parties for approval or support. Bitcoin is a peer-to-peer network
because nodes connect directly to one another and relay transactions and blocks. Additionally,
Bitcoin users can transact in a peer-to-peer fashion because ownership of bitcoin is passed
directly from sender to receiver.
Even though miners process transactions, they never take custody of the bitcoin, and
are never able to redirect a transaction to steal funds from users. Peer-to-peer systems are
usually resistant to censorship and corruption, and Bitcoin is a prime example. Tens of
thousands of peers in the Bitcoin network run nodes to validate the blockchain and maintain
Bitcoin’s decentralization.
d) Protocol: -
Instead of depending on a central figure such as CEO or Supreme Court, all bitcoin
nodes force each other towards adherence to the entire set of regulations. On the other hand, in
order to create an autonomous system, bitcoin protocol uses both token and blockchain
technology that is based on proof-of-work method.
Page 22 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
a) Concepts: -
As a data structure that stores in chronological order, blockchain can support different
consensus mechanisms. The consensus mechanism is an important component of blockchain
technology. The goal of it is to enable all honest nodes to keep a consistent blockchain view
while satisfying two properties:
1) Consistency. All honesty nodes save blockchain with exactly the same prefix.
2) Validity. The information published by one honest node will eventually be recorded by all
other honest nodes in their own blockchain.
b) Workload Certificate: -
The node can freely join the blockchain and the addition or withdrawal of the node will not
affect the consistency and security of the blockchain. The probability of each node to complete
the work that is determined by its computational resources, the attacker cannot increase the
probability of completing the proof by creating multiple public key addresses, this can
effectively fend off Sybil attacks.
At the same time, with most computing resources owned by the honest party, it can effectively
resist secondary payments and guarantee the security of the system.
c) Equity Certificate: -
Interest mechanism to a certain extent, solve the workload prove that the problem of
large energy consumption of the mechanism, shortened the time of block and set the time,
improve the efficiency of the system, but there are no perfect blockchain based on interest in
practical application. The equity certificate shows that each round produces multiple verified
representatives, that is, multiple blocks. In the case of poor synchronization of the network, the
system is easy to generate bifurcation and affect the consistency.
If the malicious node becomes the representative, the network partition will be formed
by controlling network communication. Sending different undetermined blocks to different
network partitions will result in network bifurcation, which can be used for secondary payment
Page 23 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
attacks, seriously affecting system security. A malicious adversary can also bribe an honest
representative to undermine consistency. The key of equity certification lies in how to choose
the right equity and construct the corresponding verification algorithm to ensure the
consistency and fairness of the system. Improper rights and interests will affect the fairness of
the system.
PPCoin, for example, USES the currency of age as a factor, rights and interests of in
the if part of the node in the system remain used to pay for part of the small and the currency
of age is big enough, the node is more likely to be selected as the representative, affect system
fairness.
The Byzantine conformance protocol was originally used for small-scale server
replication problems, and later expanded to dozens of servers. The Byzantine agreement
protocol mainly studies how to achieve the agreement of all the correct nodes to a certain input
value in a distributed system with wrong nodes.
To the existing blockchain work certificates, certificate of rights and interests and
Byzantine agreement mechanism such as consensus from consistency, security, scalability,
performance, efficiency, resource consumption, etc., this paper compares and analyzes their
application in blockchain on the advantages and disadvantages are shown in table.
Page 24 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
In view of the advantages and disadvantages of each consensus mechanism, we can try to
combine different consensus mechanisms to form a new obstacle of consensus mechanism.
Through the alternation of workload proof and equity proof, the security of the system
can be guaranteed even if there is a node with a large amount of computing resources. At the
same time, the influence of nodes with dominant computing resources on blockchain in the
initial state is weakened, and the security and fairness of the system are further improved.
2) Byzantine Consistency and Proof of Interest Algor and system, for example,
consider the Byzantine agreement, poor scalability problems Algor and system combining
proof mechanism and Byzantine agreement, to participate in the Byzantine agreement through
interest in limiting the number of nodes, to improve the scalability of the system. First, the node
verifies whether it is selected as the representative through the equity certification mechanism,
and the verified node can propose the undetermined block. Then, a new round of equity
certification is carried out to select new representatives to verify the validity of the pending
blocks.
After a limited rotation, the question of representation was agreed upon on the highest
priority blocks through the Byzantine agreement. Through interest elected representatives,
effectively solved the Byzantine agreement of scalability and efficiency, at the same time use
the Byzantine agreement to avoid the interest bifurcation weakness, improve the consistency
and security.
Page 25 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
b) Minimum privilege. In this strategy the access to data is reduced to the lowest level
possible to reinforce elevated level of security.
Page 26 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
c) Manage vulnerabilities. In this strategy we check for vulnerabilities and manage them by
identifying, authenticating, modifying and patching.
e) Manage patches. In this strategy we patch the flawed part like code, application, operating
system, firmware etc. by acquiring, testing and installing patches. Blockchain technology uses
many techniques to achieve the security of transaction data or block data, irrespective of the
usage or data in the block.
Many applications such as bitcoin use the encryption technique for data safety.
explained in detail about using a combination of public and private key to securely encrypt and
decrypt data. The other most secure concept of blockchain is that the longest chain is the
authentic one.
This eliminates the security risks due to 51% majority attack and fork problems. As
the longest chain is the ultimately authentic, the other attacks become null and void as they end
up being orphaned forks. discusses blockchain security enhancement achievements for
blockchain systems like Smart pool, Quantitative framework, Oyente, Hawk and Town Crier.
We will learn about it in the later sections of this paper.
Page 27 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Privacy of blockchains.
At the same time, privacy allows a user to remain compliant by discerningly divulging
themselves without showcasing their activity to the entire network.
The goal of enhancing privacy in blockchains is to make it extremely difficult for other
users to copy or use other users’ crypto profile. An immeasurable volume of variations can be
perceived when applying blockchain technology. Some common characteristics are
particularly significant and are summarized as follows:
Blockchain provides the flexibility to store all forms of data. The privacy perspective
in blockchain varies for personal and organizational data. Although privacy rules are applicable
for personal data, more stringent privacy rules apply to sensitive and organizational data.
b) Storage distribution.
The nodes in the network that stores complete copies of the blockchain are called full
nodes. The full nodes in combination with the append-only characteristic of blockchain leads
to data redundancy. This redundancy of data supports two key features of blockchain
technology including transparency and verifiability. The compatibility of application with data
minimization decides the level of transparency and verifiability of that network for an
application.
c) Append-only.
It is impossible to alter the data of previous blocks in the blockchain undetected. The
append only feature of blockchain in certain cases does not curtail to the right to correction of
users, especially if data is recorded incorrectly. Special attention needs to be provided while
assigning rights to data subjects in blockchain technology.
Page 28 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Smart Contracts:-
Smart contracts are a significant development in blockchain. Smart contracts were first
proposed in the 1990s as a digital transaction protocol to carry out the terms of an agreement.
Smart contracts are simply containers of code that encapsulate and replicate the terms of real-
world contracts in the digital domain. Contracts are fundamentally a legally binding agreement
between two or more parties, with each party committed to fulfilling its commitments.
Importantly, the agreement must be enforceable by law, often via a centralized legal body
(organization).
Page 29 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Transactions on some blockchain platforms may mean executing smart contracts, which
are written-in code deals capable of self-execution. Once the conditions are met, smart
contracts need no supervision from third parties in order to implement an agreement.
Expert blockchain developers are needed to help clients in identifying the optimal
blockchain platform and method for developing and deploying smart contracts to their
organization’s needs. Different blockchain systems allow for the development and deployment
of smart contracts (e.g., Ethereum, Hyperledger Fabric, NEM, STELLAR, Waves, and Corda).
Because of its restricted scripting language and emphasis on security over programmability,
Bitcoin was rarely mentioned when smart contracts were addressed.
Bitcoin networks cannot support complex smart contracts. Furthermore, basic contracts
that may be carried out on Bitcoin are often difficult to draft and expensive to carry out. For
creating smart contracts, several platforms provide unique capabilities such as security levels,
contract code execution, and contract programming languages. Some platforms enable the
creation of smart contracts using high-level programming languages.
Page 30 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
a) Savings
Using smart contracts, the time and money often spent waiting for and paying
middlemen to process transactions is eliminated. The method presented by Khatoon utilizes
blockchain to establish a healthcare ecosystem. Through this study, many medical system
stakeholders would be assisted in providing improved healthcare services while reducing costs.
b) Security
The blockchain’s encrypted transaction records are almost hack proof. Additionally,
with a distributed ledger, hackers will need to modify the whole chain to change a single entry.
Pan et al. by developing an Edge Chain model, indicated the security advantages of smart
contracts and blockchain with fair cost.
Page 31 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Public Transparency: -
All transactions in a public blockchain are fully traceable and available for viewing by
anybody and hence participants do not have to depend on any central body in
order to verify them.
One of the best features of blockchain is its transparency. It means that it is entirely
traceable and much easier to maintain, and one of the areas where blockchain technology shows
its transparency is through Bitcoin casino sites. In gambling, there is a saying that the house
will always win. Although, it is not the case with casino sites that operate with cryptocurrencies
like Bitcoin.
Websites such as provably fair games allow users to check the server seeds of the game and
assure that the results, they are receiving are genuine and unbiased. This is a new and game-
changing factor of online gaming. It is something that many casino sites and gaming platforms
are looking to integrate into their systems to develop a new level of trust between the site and
players.
Page 32 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
CHAPTER 4
It is accurate and straightforward, saving time, effort, and cost-efficiently and therefore
saves on management effort. The biggest problem faced by the healthcare industry is the
leaking of essential data and used for malicious devices and other special interests, which the
applications of this technology can quickly sort out.
Another area of importance is allowing users and parties to the database access to the
latest up-to-date and authentic patient records and evaluations. Blockchain’s scope of health
care looks super up-and-coming and exciting because it contributes to solving some of the
industry's pressing issues. With Blockchain, we can connect therapy associates and other
services to the network such that everybody has access to the same data. Many methods will
bring positive benefits for businesses as a whole by using Blockchain technologies in health
care. It provides patient information, medical science, clinical trials, the medical supply chain,
and the integrity of medicinal products.
Page 33 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Before and after the different clinical study phases, a significant amount of patient
information and health data is generated. There are many people's blood tests, quality
assessments, estimates, and wellness polls. It can provide results that show the existence of
some document or record. Healthcare providers traverse the stored data and suspect its validity,
and they will check this seamlessly by matching it to the original records stored on the
Blockchain system. Blockchain is based on existing cryptographic techniques, which include
the appropriate framework for cryptography for data sharing.
The patient's name, date of birth and diagnosis, treatments, and ambulatory history are
recorded in EHR format during patient details by the healthcare provider. This information is
stored in cloud computing or the current databases.
Blockchain makes the job of the pharmacies simpler since it has all the data on top of
it. They will efficiently instruct patients on how to take the medication from these results. It
will update the clinicians on the present stage of the patient with the wearable data gathered in
real-time and alert them to any emergency.
Blockchain can be a perfect technology for record-keeping in the medical world. Its
applications include sharing healthcare data, keeping electronic healthcare records, managing
insurance, and performing administrative tasks. Patients can send their health information via
an app to a Blockchain network. The collaboration of sensors and intelligent devices is
facilitated based on digital Blockchain contracts.
In most cases, electronic health records are spread through various care institutions.
Blockchain will unify all details and provide patients with historical access. The connection of
all data in the same place will give us new perspectives on a patient's health status. Therefore,
Page 34 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
the Blockchain paradigm would ensure the information is authentic and legitimate and preserve
users ‘privacy.
Clinical Trial: -
The management of medicines on the Blockchain is just another chance of building and
monitoring the chain from the manufacturer to the customer by incorporating Blockchain
credibility.
Patient monitoring: -
A Blockchain's trust allows medical professionals to ensure they have access to medical
equipment when necessary. Doctors may also be more time-consuming to watch patients and
react distantly to health-related incidents. Via Blockchain and healthcare, monitoring
temperatures inside patient rooms, beds use, and supply availability are improvable. A
Blockchain healthcare network to build a stable digital identity for healthcare institutions and
providers.
Improves safety: -
Regardless of the medical entrées and organizations. Blockchains would allow all data
to be stored centralized location. The interoperability of Blockchain technology will enable
doctors to conveniently view the detailed medical records to help diagnose their diagnosis and
develop a better and more precise operation.
Page 35 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Page 36 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
In such a model, since the identity provider is a separate entity, the identity resource
used for authentication only stores in the identity provider, and the identity dependent can only
verify the authentication of the user’s identity by querying the identity provider. In addition to
providing user identities, identity providers should also have identity management, identity
reset, identity revoke, and other related functions.
User
Users are the primary enablers of the system, enjoying the various services offered by
the service provider and identity provider. Not all users have the same privilege.
Identity provider
Identity provider, the core of the system, is tasked with providing users with identity
services (e.g. registration, authentication and management). This entity also provides user
authentication.
Service provider
Service provider is an important part of the system and is mainly responsible for
providing services for users (once they are successfully authenticated). The flow-chart of the
system is presented in Fig. 1 and explained below: In order to enjoy the desired service, a user
must submit a request for an identity from the identity manager. The identity manager then
generates a unique identity based on the information provided by the user and replies to the
user.
The user requests a specific service from the service provider, and the service provider
requests for identity information from the user. The user receives the request and replies with
the corresponding data.
Page 37 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
The service provider requests the identity provider to verify the validity of user’s
identity. The identity provider returns the authentication results, and the service provider
provides the service based on the received validation results.
4.2.2 Architecture:
There are many different identity management systems and architectures in the
literature, which can be broadly categorized into independent identity management
architecture (IMA), federated identity management architecture, and centralized identity
management architecture.
Independent IMA
In this architecture, each service provider has its own user identity data. In other
words, the identities of different service providers are not interoperable. Although the
structure is simple, it is not scalable as the number of service providers increases (e.g.
implications for storage requirements at the service providers).
Page 38 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
Also, it is not practical for the users to remember their identity information for every
single service provider, without reusing or recycling their user credentials.
Centralized IMA
The centralized IMA has only one identifier and identity provider in the trusted
domain. This means that all service providers in the same trusted domain will share the users’
identity. Hence, the identifier should be carefully selected, and the unique identity in the
trusted domain is a typical choice.
Federated IMA
The federated IMA establishes a trusted domain and comprises multiple identity
providers in the federation. A trusted domain consists of multiple service providers within the
federation that recognizes users’ identity from other service providers. For example, a U.S.-
based academic can choose to sign in to Research.gov using either their National Science
Foundation (NSF) identity information or their organization credentials.
Page 39 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
The first cryptocurrency was Bitcoin, which was founded in 2009 and remains the best
known today. Much of the interest in cryptocurrencies is to trade for profit, with speculators at
times driving prices skyward.
Page 40 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
mathematical problems that generate coins. Users can also buy the currencies from brokers,
then store and spend them using cryptographic wallets.
If you own cryptocurrency, you don’t own anything tangible. What you own is a key
that allows you to move a record or a unit of measure from one person to another without a
trusted third party.
Although Bitcoin has been around since 2009, cryptocurrencies and applications of
blockchain technology are still emerging in financial terms, and more uses are expected in the
future. Transactions including bonds, stocks, and other financial assets could eventually be
traded using the technology.
Bitcoin:
Bitcoin was built with a distributed digital record in mind called a blockchain.
Blockchain is a type of public ledger -- a digital system for recording transactions and related
data in multiple places at one time. Blocks in a blockchain are units that contain data about
every transaction, including the date, time, value, buyer and seller, and an identifying code for
each exchange. Bitcoin is stored in a digital wallet application on a computer or
smartphone. Cryptocurrency wallets is among one of the best ways to keep bitcoin secure.
There are also multiple types of wallets. Software wallets enable users to keep only a
small amount of bitcoin on a computer or mobile phone for everyday use, with the balance kept
in a separate offline wallet. This safeguards the majority of a user's bitcoin from malware trying
to intercept the password used to access a wallet.
Offline wallets are wallet software that is installed on a USB or a live CD rather than
on the internet, so it can be kept physically secure. Hardware wallets, another form of offline
wallet, are physical devices such as a flash drive that store a user's private keys. Even when
connected to another device, the private keys are never exposed, as signed transactions are
completed on the device. Multi-signature wallets require two or more private keys to authorize
transactions.
Page 41 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
This greatly decreases the chances of a wallet being accessed if lost or stolen. One key
is stored in a secure location as a backup, another is stored on the user's mobile device and a
third key can be stored with a multi-signature provider.
People can send bitcoin to others via bitcoin wallet-to-wallet transfer. Bitcoin can be
sent by initiating a transfer request from a bitcoin address in the customer's wallet to a bitcoin
address, or alphanumeric string, in the vendor's wallet. Senders can select the amount to transfer
either as bitcoin or in their local currency. Each bitcoin transaction is charged a small fee, which
is paid to a bitcoin miner. This fee can vary, depending on factors including how quickly the
bitcoin transaction needs to be confirmed.
Ethereum:
Litecoin:
Page 42 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
taking over the lion's share of Litecoin mining, the cryptocurrency has reworked itself into a
minable coin and a peer-to-peer payment system.
In 2011, Bitcoin was becoming more popular with enterprise-sized miners because of
its potential price appreciation. It appeared that businesses were going to take control of
mining because it was quickly becoming computationally unfeasible for individuals to
participate. To some, this looming centralization went against one of the original concepts
behind the cryptocurrency, that it would remain decentralized.
In a project led by Charlie Lee, a former Google engineer, Litecoin was released to the
public in 2011. Like Bitcoin, Litecoin is an open-source global payment network designed to
be decentralized. Lee referred to Litecoin as "the silver to Bitcoin's gold."1 This statement
inferred that Litecoin was not intended to act as a replacement for Bitcoin but rather
supplement it. Like silver, it would never be as valuable as gold, but it would still maintain a
place as a payment method and be used more.
Ripple:
Ripple was first founded back in 2004 as Ripple Pay in Vancouver, Canada by Ryan
Fugger as a way of securely moving money around the world. In 2012, Fugger sold the
company to Jed McCaleb, Arthur Britto, and David Schwartz, who transformed the company
into a digital currency network and renamed it Open Coin. McCaleb, who was the former
founder of failed cryptocurrency exchange, Mt. Gox, left the company and forked Ripple into
Stellar in 2013.The company was renamed Ripple Labs in 2013 and, in 2015, was finally
shortened to just “Ripple.”
Ripple is a blockchain-based digital payment network and protocol that uses its
own cryptocurrency, XRP. Ripple's main focus is as a payment settlement asset exchange and
Page 43 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
remittance system, similar to the SWIFT system for international money and security transfers
used by banks and financial intermediaries dealing across currencies.
The token used for the cryptocurrency is premised and uses the ticker symbol XRP. Ripple is
the name of the company and the network, and XRP is the cryptocurrency token. The purpose
of XRP is to serve as an intermediate mechanism of exchange between two currencies or
networks—as a sort of temporary settlement layer denomination. Ripple was first released in
2012 and was co-founded by Chris Larsen and Jed McCaleb.
Dogecoin:
Jackson Palmer, a product manager at the Sydney, Australia, office of Adobe Inc.,
created Dogecoin with Billy Markus, a software developer at IBM. The intent behind the
cryptocurrency was to be a way to satirize the hype surrounding cryptocurrencies.1
2013–2014
Palmer and Markus launched the coin on Dec. 6, 2013. By Dec. 19, the value of
Dogecoin jumped 300%, bolstered by China's policy to forbid its banks from investing in
cryptocurrency. Markus and Palmer based Dogecoin's code on Lucky coin, derived from
Litecoin (a Bitcoin fork). Initially, they used a randomized block mining reward, but that was
changed to a static reward in March 2014. Dogecoin uses Litecoin's Scrypt technology and
uses proof-of-work (PoW) on its blockchain.2
2015–2023
Page 44 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
CONCLUSION
Blockchain technology is already in use in the private sector, though clearly in the early
stages of adoption, the most prevalent example being virtual currency known as Bitcoin.
Further study is required before considering it for the regular business of the State, and
moreover, any application would certainly need to support rather than replace the existing
records management infrastructure. It is the belief of the study committee that the benefits of
adoption of blockchain technology by state agencies is, at this time, not outweighed by the
costs and challenges of such implementation.
Page 45 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
REFERENCES
Page 46 of 47
BSIET
BLOCKCHAIN TECHNOLOGY
11. S. Billah, “One weird trick to stop selfish miners: Fresh bitcoins, asolution for the
honest miner,” 2015
12. K. Nayak, S. Kumar, A. Miller, and E. Shi, “Stubborn mining: Generaliz-ing selfish
mining and combining with an eclipse attack,” in Proceedingsof 2016 IEEE European
Symposium on Security and Privacy (EuroS&P),Saarbrucken, Germany, 2016, pp.
305–320.
13. E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, andM. Virza,
“Zerocash: Decentralized anonymous payments from bitcoin,”in Proceedings of 2014
IEEE Symposium on Security and Privacy (SP),San Jose, CA, USA, 2014, pp. 459–
474
Page 47 of 47
BSIET