Blockchain
Blockchain
Blockchain
Edited by
Pethuru Raj
Kavita Saini
Chellammal Surianarayanan
Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and publish-
ers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has not
been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted,
or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including
photocopying, microfilming, and recording, or in any information storage or retrieval system, without written
permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or contact
the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For
works that are not available on CCC please contact mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Editors................................................................................................................vii
Contributors........................................................................................................ix
v
Telegram Channel @nettrain
vi ◾ Contents
Index............................................................................................................247
vii
Telegram Channel @nettrain
viii ◾ Editors
ix
Telegram Channel @nettrain
x ◾ Contributors
His research interests include artificial intelligence, IoT and big data analysis in the
area of healthcare and data mining, and human computer interaction. He has writ-
ten chapters for books focusing on some of the emerging technologies such as IoT,
data analytics and science, blockchain and digital twin.
currently guides doctoral students. She is interested in exploring different places and
visit the same to know about the culture and people of various areas. Her areas of
research include data mining, machine learning, image processing and management
of information systems.
Distributed Computing
and/or Distributed
Database Systems
K. P. Arjun, N. M. Sreenarayanan,
K. Sampath Kumar, and R. Viswanathan
Contents
1.1 Introduction to Computing..........................................................................2
1.2 Evolution of Distributed Computing............................................................3
1.2.1 Centralized Computing ....................................................................3
1.2.2 Decentralized Computing.................................................................3
1.2.3 Parallel Computing............................................................................4
1.3 High-Performance Distributed and Parallel Computing...............................4
1.3.1 Parallel Computing............................................................................4
1.3.1.1 Bit-Level, Instruction-Level and Task-Level Parallel
Computing..........................................................................5
1.3.2 Distributed Computing.....................................................................5
1.3.3 Architecture of Distributed Computing.............................................6
1.3.3.1 Physical Architecture of Distributed Computing.................6
1.3.3.2 Software Architecture of Distributed Computing................8
1.4 Comparison of Distributed Computing with State of the Art.....................10
1.4.1 Distributed Computing versus Parallel Computing.........................10
1.4.2 Distributed Database Systems..........................................................11
1.4.3 Traditional versus Distributed Databases.........................................11
1.4.4 Distributed Computing and Blockchain..........................................12
1
Telegram Channel @nettrain
2 ◾ Blockchain Technology and Applications
1.1 Introduction to Computing
Computing involves process-oriented step-by-step tasks to complete a goal-oriented
computation. A goal is not a simple or single rather there may be more than one
goal. Normally we can say that a goal is a complex operation that is processed using
a computer. A normal computer contains hardware and software; and computing
can also involve more than one computing environment in hardware like worksta-
tions, servers, clients and other intermediate nodes and software like a worksta-
tion Operating System, server operating system and other computing software.
The computing in our daily life includes sending emails, playing games or making
phone calls; these are different kinds of computing examples at different contextual
levels. Depending on the processing speed and size, computers are categorized into
different types like supercomputers, mainframes, minicomputers and microcom-
puters. The computing power of a device is directly proportional to its data-storing
capacity.
All software is developed in a sequential way which means that before develop-
ing software to solve a large problem, we split the problem into smaller sub prob-
lems. These sub problems broken down step by step or in a flowchart are called
algorithms. These algorithms are executed by the central processing unit (CPU).
We can call this serial computing, as the main task is divided into a number of
small instructions, then these instructions are executed one by one. But in the
main, this serial communication is a huge waste of the hardware other than the
CPU. The CPU is continuously taking instructions and processing those instruc-
tions. The hardware contributing to processing that specific hardware is used for
that particular time only, and for the remaining time that hardware is idle.
So to overcome the deficiencies in resource utilization and improve the comput-
ing power we moved into another era of computing called parallel computing and
distributed computing. The insight of distributed computing is in solving more
complex and larger computational problems with the help of more than one com-
putational system. The computational problem is divided into many tasks, each of
which is executed in different computational systems that are located in different
regions.
1.2.1 Centralized Computing
The name “centralized computing” refers to computing that occurs in a central
situated machine. The specifications of the central computing server machine
include high computing capabilities and sophisticated software. All other com-
puters are attached to the central situated machine and communicate through
terminals. The centralized machine [3] itself controls and manages the peripher-
als, some of which are physically connected and some of which are attached via
terminals.
The main advantage of centralized system is greater security compared to other
types of computing because the processing is only done at the centrally located
machine. All the connected machines can access the centralized processing machine
and start processing their own task by using terminals. If one terminal goes down,
then the user can use another terminal and log in again. All the user-related files
are still available with that particular user login. The user can resume their session
and complete the task.
The main and most important disadvantage of the centralized computing sys-
tem is that all computing and storage is done at centrally located machine. If the
machine fails or crashes the entire system will go down. It affects the performance
evaluation on unavailability of service.
Figure 1.1 shows a block diagram of centralized computing. Centralized sys-
tems are somewhat related to client–server programming [5]. The client has mini-
mum computing power, but for advanced and high-level computing, client requests
for the server. The server computes the request received from the client and sends
the response back to the client.
1.2.2 Decentralized Computing
In centralized computing, a centrally located powerful system provides comput-
ing services to all other nodes connected. The disadvantage is that all processing
power is located at one entity. Alternatively, the burden at the central level can
be shared by the nodes connected on the network. In decentralized computing
[6] a single server is not responsible for the whole task. The whole workload is
distributed to the computing nodes so that each computing node has equal pro-
cessing power.
1.2.3 Parallel Computing
To overcoming the deficiencies in resource utilization and improve the computing
power we moved into another era of computing called parallel computing. The
name “parallel” means that more than one instruction can be executed simultane-
ously. It requires the configuration of a number of computing engines (normally
called “processors”) and related hardware and also software configuration.
1.3 High-Performance Distributed
and Parallel Computing
1.3.1 Parallel Computing
In a CPU, a main task is divided into a number of small instructions, and then
these instructions are executed one by one. The main problem with the serial com-
munication is wastage of large amount of resources in terms of hardware and soft-
ware resources. CPU continuously receives instructions and process them. The
hardware involved in serial processing remains idle in case there are no instructions
to be processed.
To overcome the deficiencies in resource utilization and to improve the com-
puting power we moved into another era of computing called parallel computing
[7]. The name “parallel” means that more than one instruction can be executed
simultaneously. It requires the configuration of a number of computing engines
(normally called “processors”) and related hardware and also software configura-
tion. Figure 1.2 shows the levels of parallel computing.
1.3.2 Distributed Computing
The distributed computing insight lies in solving more complex and larger com-
putational problems with the help of more than one computational system. The
computational problem is divided into many tasks, each of which is executed in
services or manages network resources. All the work is equally divided among all
the machines and each machine will serve that particular responsibility assigned
only for that machine, which is called a peer. It acts as both server and client.
The advantage of this architecture is that there is a sequential order for request
and response. Each layer has its already predefined duty so there is no confusion
about processing the request. We can easily update or replace each layer according
to our application without affecting the entire architecture. Figure 1.6 represents
the basic architecture style of a distributed system.
1.3.3.2.2 Object-Based Architectures
This style of architecture is used for loosely coupled arrangements of systems. This
loosely coupled system [12] cannot follow the sequential order architecture like
layered. In this architecture each component is referred to as an object; each object
in a system communicates with other objects through an interface.
Objects are the incorporation of data and methods into a single unit.
Communication flows from one object of a system A to an object in a system B
through remote procedure call. Examples of this method are CORBA, DCOM,
.Net Remoting and Java RMI. It is the one of most important architecture types in
large software systems.
1.3.3.2.3 Event-Based Architectures
Nodes or components communicate on the basis of the proliferation of events.
Components are connected through an event bus. An event bus carries the pub-
lished and subscribed events from other components. The main advantage of this
architecture is decoupled space. There is no need for the communicating compo-
nents to explicitly refer to each other. Another important aspect is that it is coupled
in time which means components can communicate at the same time. Figure 1.7
represents event-based architecture of distributed computing.
differences in the the placement of the hardware. In a distributed system, the com-
puters are placed in different locations and communicate through a network. But
in parallel computing all the computing hardware is combined to make a single
device. In parallel computing a huge single memory is shared between computing
engines, i.e. processors. Each computing station utilizes that memory with effi-
cient synchronization. Here each processor works independently of the others. In
distributed computing, each computing node has its own processor and memory
like single autonomous computing nodes. The advantages of parallel and distrib-
uted computing are high-performance parallel computation [13] by using shared-
memory multiprocessors and the use of parallel computing algorithms, while the
coordination of a large-scale distributed system uses distributed algorithms.
◾◾ The nodes are interconnected with others to offer services, and share or store
data (e.g. blockchain).
◾◾ All nodes communicate with others by using messages.
◾◾ Every node in the distributed system is capable of sending and receiving mes-
sages to and from the others.
1. Client–server architecture
2. Peer–peer architecture
1.5.2.1 Client–Server Architecture
In client–server architecture, the main entities are:
1. Server
2. Clients
Server: An entity that is purely responsible for offering services to the client;
servers provide services like storage, data processing, deploying applica-
tions, etc.
Client: A client is an entity that communicates with the server in order to
complete its local task. They are normally connected to the server on the
Internet (Figure 1.10).
1.5.2.2 Peer-to-Peer Architecture
P2P architecture is a network of inter-connected systems in which they are capa-
ble of sharing resources and information. Every system connected to the network
is referred to as a node or “peer”. This type of architecture can be used in block-
chain technology, transportation services, education, e-commerce, banking and
finance, etc.
Advantages of P2P architecture are:
◾◾ Government procedures
◾◾ Institutions
◾◾ Corporate work
◾◾ Issuance of passports
◾◾ Licenses
◾◾ Voting procedures
◾◾ Finance
◾◾ Agreements
◾◾ Identity cards
While the distributed-ledger technology has more advantages, it’s at an early stage
and is still being explored. The future of centuries-old ledgers is the decentralized
ledger.
1.7 Conclusion
The application of the blockchain mechanism is enhanced day by day with different
mechanisms and computing techniques. Many of the internet-based methodolo-
gies are now using the advantages of distributed systems as well as the blockchain
mechanism. Once submitted any data in the system will be safe forever, which
enables many applications in the field of finance and other related sectors. Some of
the areas are the following:
VeChain is a blockchain platform which aims to enhance business operations
by improving the tracking of products and processes. BitGold is a 2005 proposal
that resembles Bitcoin’s consensus system and incorporates hashes. A cryptocur-
rency can be defined as a digital or virtual currency that uses cryptography. A cryp-
tocurrency is very difficult to counterfeit because of this security feature. Digital
copy is a duplicate record of every Bitcoin transaction that has taken place over a
peer-to-peer network.
References
1. Nagasubramanian, Gayathri, Rakesh Kumar Sakthivel, Rizwan Patan, Amir H.
Gandomi, Muthuramalingam Sankayya, and Balamurugan Balusamy. “Securing
e-health records using keyless signature infrastructure blockchain technology in the
cloud.” Neural Computing and Applications (2018): 1–9.
2. Westerlund, Magnus, and Nane Kratzke. “Towards distributed clouds: a review
about the evolution of centralized cloud computing, distributed ledger technolo-
gies, and a foresight on unifying opportunities and security implications.” In 2018
International Conference on High Performance Computing & Simulation (HPCS), pp.
655–663. IEEE, 2018.
3. Archer, Charles J., Michael A. Blocksome, James E. Carey, and Philip J. Sanders.
“Administering virtual machines in a distributed computing environment.” U.S.
Patent 10,255,098, issued April 9, 2019.
4. Meng, Gang. “Stable data-processing in a distributed computing environment.” U.S.
Patent 10,044,505, issued August 7, 2018.
5. Wong, Wai Ming, and Michael C. Hui. “Method and system for modeling and
analyzing computing resource requirements of software applications in a shared
and distributed computing environment.” U.S. Patent Application 10/216,545, filed
February 26, 2019.
Blockchain Components
and Concept
M. R. Manu, Namya Musthafa,
B. Balamurugan, and Rahul Chauhan
Contents
2.1 Evolution of Blockchain .............................................................................22
2.1.1 Architecture of Blockchain .............................................................23
2.1.2 Blocks in Blockchain ......................................................................24
2.2 Types of Blockchain ...................................................................................24
2.2.1 Public Blockchain............................................................................24
2.2.2 Private Blockchain...........................................................................26
2.2.3 Consortium or Federated Blockchain..............................................28
2.3 The Logical Components of Blockchain......................................................29
2.4 Core Components of Blockchain Architecture............................................31
2.4.1 Ledger Management........................................................................32
2.5 Smart Contracts and Their Applications.....................................................35
2.6 Applications of Smart Contracts ................................................................37
2.6.1 Financial Services and Insurance.....................................................37
2.6.2 Mortgage Transactions....................................................................38
2.6.3 Supply Chain Transparency.............................................................38
2.6.4 Medical Research.............................................................................38
2.6.5 Digital Identity and Records Management......................................38
2.6.5.1 Peer Network and Membership Management....................39
2.6.5.2 Inviting and Removing Members in a Peer Network.........39
21
Telegram Channel @nettrain
22 ◾ Blockchain Technology and Applications
2.1 Evolution of Blockchain
The blockchain has evolved since 1991, starting with Stuart Haber and W Scott
Stornetta’s work on cryptographically secure chain of blocks, the first work on a
cryptographically secured block chain where no one tampered with time stamp of
document. Then in 1992, the system was upgraded with the Merkle tree approach,
which optimized and combined all tasks into a single one. In the year 2008 block-
chain gained relevance due to a group of people named Satoshi Nakamoto. Satoshi
Nakamoto is the accredited brain behind the digital ledger technology. The new
concepts and approaches evolved into the blockchain mechanism for transforma-
tion towards digital data utilization in the year 2009. In the beginning it was devel-
oped to support Bitcoin. Decentralized data using a decentralized database are the
core components of blockchain. The need for Bitcoin increased drastically so block-
chain made immediate changes to the Internet. The Russian-Canadian transferred
money in form of Bitcoin scripting language.
The decentralized nature of the blockchain mechanism can make any language
readable by computer rather than third party, which will generate smart contracts.
The Ethereum projects are useful in efficient transaction management systems. The
security of transaction through the blockchain methodology produces different
digital transaction systems such as Bitcoin, cryptocurrency, Ethereum, and light
coin ripple which can handle huge numbers of transaction per second.
2.1.1 Architecture of Blockchain
The blockchain provides a peer-to-peer distributed ledger mechanism for transac-
tion management in a secure manner. Each ledger is a block which is interlinked
to other blocks in the structure. The databases are shared among each other in a
distributed way. There is a timestamp server for controlling the databases and each
block is associated with a reference to the previous block. This reference is also
managed by a hashing mechanism for security (Figures 2.1 and 2.2).
2.1.2 Blocks in Blockchain
Blocks are the basic units of the blockchain. A block is a basic data structure for
transaction distributed to other monetary control. The blocks contain a block
header which verifies the validity of the block. It contains metadata which describe
the block. The metadata information of a block are mentioned below:
2.2 Types of Blockchain
The concept of cryptocurrencies (Bitcoin) introduced the idea of blockchain into the
spotlight; it is a database that protects the data from tampering and analysis. The
blockchain is still a rising technology, so it is difficult for us to understand its work-
ing without getting into its code and details. Blockchain is a new and more secure
connected network as compared to others.
Blockchain is an encrypted repository of digital information. A blockchain has
a decentralized and distributed style of network of computers. Hence its hosting
on a distributed network of systems allows secure transactions to occur across a
blockchain with little possibility of fraudulent activities. A blockchain allows users
to track assets across individuals. To accommodate all kinds of users there are three
major types of blockchains. The three types of blockchains are:
◾◾ Public blockchain
◾◾ Private blockchain
◾◾ Consortium or federated blockchain
Note: The consortium or federated blockchain is a hybrid of the public and private
blockchain. It is partly decentralized. The consensus process is controlled by a pre-
selected set of nodes, for instance, financial institutions (Figure 2.3).
2.2.1 Public Blockchain
As the name indicates the public blockchain is the blockchain for and of the public.
There is no one in charge, and anyone can take part in the processes like reading/
writing/auditing the blockchain. These types of blockchain are open and transpar-
ent, meaning anyone can review anything at any given instance on a public block-
chain. This idea will raise the question that if no one is in charge of anything here
then how are the decisions taken on these types of the blockchain? It is done by any
of a variety of decentralized consensus mechanisms. Here are some of examples for
decentralized consensus mechanisms:
◾◾ Proof of work (PoW)
◾◾ Proof of stake (PoS)
There are three things we have to be aware of, that make a public blockchain really
public. They are as follows:
From the figure we can understand that anyone can participate in a public block-
chain, without permission.
Examples of public blockchains include Bitcoin, Ethereum, Monero, Dash, and
Litecoin, among others.
1. Everyone can potentially shatter current business models through the reduc-
tion in the use of intermediaries.
2. By using a blockchain, we do not necessarily have to maintain servers or have
system administrators. Hence we can minimize the cost of creating and run-
ning decentralized applications or DApps.
2.2.2 Private Blockchain
A private blockchain as its name indicates is a private asset of an individual or an
organization. Unlike a public blockchain, a private blockchain has an in-charge who
monitors important tasks such as read/write or whom to selectively give access to
read or vice versa. A private blockchain is also known as a permissioned blockchain
as it has restrictions on who can access it and also who can participate in transac-
tion and validation. Only previously chosen entities have permissions to access the
Anyone can run Not everyone can run Selected members of the
BTC/LTC full node a full node consortium can run a full
node
blockchain. How are these entities are chosen? It is done by the respective authority
and are given permission by the chain developers while building the blockchain
application. An important consensus is achieved on the whim of the central in-
charge who can give mining rights to anyone or not give them at all. Suppose there
is a need to grant permissions to new users or revoke permissions from an existing
user, then it can be taken care of by the network administrator (Figure 2.5).
◾◾ Example: Bankchain
Similarly as we observed for public blockchains, here also we can encounter some
key implications of the implicit nature and characteristics of private blockchains.
by different nodes, and also it behaves like a private blockchain by restricting the
access to the blockchain from the different nodes. Therefore, it is partly public and
partly private.
A consortium blockchain consists of two types of users. They are:
1. The users who have control over the blockchain and decide who should have
permission to access the blockchain
2. The users who can access the blockchain
Here instead of a single authority in charge, you have more than one in charge.
Basically, you have a group of companies or representative individuals coming
together and making decisions for the benefit of the whole network. Such groups
are also called consortiums or a federation, hence the name consortium or federated
blockchain.
For example, let’s suppose you have a consortium of the world’s top 20 finan-
cial institutes; you have decided in the code that only if a transaction or a block
or decision is voted/verified by more than 15 institutes then it should get added to
the blockchain. So it is a way of achieving things much faster, and you also have
more than one single point of failures which in a way protects the whole ecosystem
against a single point of failure (Figure 2.6).
In such a blockchain:
◾◾ Members of the consortium can run a full node and start mining.
◾◾ Members of the consortium can make transactions/decisions on the chain.
◾◾ Members of the consortium can review/audit the blockchain in a blockchain
explorer.
◾◾ A node application
◾◾ A shared ledger
◾◾ A consensus algorithm
◾◾ A virtual machine
1. Node Application
Each computer inter-connected through the Internet needs to install
and run a computer application specific to the ecosystem they desire to
participate in. For example using the case of Bitcoin as an ecosystem,
2.4.1 Ledger Management
The blockchain is the underlying technology behind technology like Bitcoin. A
distributed ledger is essential as it is a list of all events and transactions entered onto
it and is held simultaneously by each node in the network. Whenever a new event
or transaction is added to the ledger, encryption is done to everything; by adding
to the ledger, the task becomes complex. The ledger is both visible to everyone in
the network and also secured so that people can’t tamper with it. Every new piece
of information added to this ledger is added as a ‘block’. This block is mathemati-
cally encrypted and is approved to be added to the ledger according to a series of
consensus protocols, that is, ways of approving additions and protecting against
fraud or double spending without the need for a centralized authority (Figure 2.8).
A distributed ledger is a database that is decentralized as it is distributed across
several distinct computers or nodes. Here every node will maintain the ledger, and
if any data changes happen, the ledger will get updated. The updating takes place
independently at each node. Through the ledger along with a little of computer
code, you can create ‘smart contracts’. These are a series of clauses which are added
to the ledger and powered by computer code. When the clause in the ledger is met,
the computer code activates and the next step of the contract is triggered.
All the nodes are equal in terms of authority. There is no central authority or
server managing the database that makes the technology transparent. Every node
can update the ledger, and other nodes will verify its existence. This property of
distributed ledgers makes them an attractive technology for the financial industry
or any other industry looking for more transparent technology and those who need
technology which is far from central authority.
By using distributed ledgers, there is no need for centralized authority. It is a
network of ledgers or contracts that is maintained by nodes. The nodes that can
be merged into blocks which make it even easier to maintain larger distributed
network ledgers. Even without a central authority, all the information stays secure.
To enable the distributed network, technology such as cryptography is required to
assign the data with cryptographic signatures and keys for use. Anything that is
stored on the distributed ledger is immutable. Immutability makes it even harder
for hackers to try to hack distributed ledger networks such as Bitcoin. Additionally
the absence of a central authority means that it is also free from any intentional
change as well (Figure 2.9).
Three major steps are involved:
◾◾ Upon receiving the transfer request, other nodes authenticate entity A’s iden-
tity and validate the transaction by checking to make sure that entity A has
the necessary cryptographic credentials to make an update to the record in
question. Validation would include, among other things, verifying that entity
A has sufficient funds to make the payment. Nodes also take part in the con-
sensus process to agree on the payments that should be included in the next
update to the state of the ledger.
◾◾ After the update has been accepted by the nodes, the properties of the asset
are modified such that all future transactions regarding the asset must be
initiated using the cryptographic credentials of entity B.
◾◾ During the coding procedure, blockchain developers write the smart con-
tract as a script using a programming language, and also implement the logic
behind the contract so that when a given action or transaction occurs, the
script enables the following step.
◾◾ Once the contract is coded completely, the script is sent out to the block-
chain. Execution of the code is done by a distributed network. Typically
those computers that are already made available for computation can execute
the contract, and the output of this execution should be the same for identical
input regardless of the computer where it is executed.
◾◾ Several conditions can be coded, and final smart contract users may choose
the conditions that are needed for their smart contract.
◾◾ Speed and accuracy: Smart contracts are digital and automated, so you won’t
have to spend time processing paperwork or reconciling and correcting the
errors that are often written into documents that have been filled manually.
Computer code is also more exact than the legalese that traditional contracts
are written in.
◾◾ Trust: Smart contracts automatically execute transactions following prede-
termined rules, and the encrypted records of those transactions are shared
across participants. Thus, nobody has to question whether information has
been altered for personal benefit.
◾◾ Security: Blockchain transaction records are encrypted, and that makes them
very hard to hack. Because each individual record is connected to previous
and subsequent records on a distributed ledger, the whole chain would need
to be altered to change a single record.
◾◾ Savings: Smart contracts remove the need for intermediaries because partici-
pants can trust the visible data and the technology to properly execute the
transaction. There is no need for an extra person to validate and verify the
terms of an agreement because it is built into the code.
Advantages:
◾◾ Intellectual property
◾◾ The legal industry (contracts, negotiations, etc.)
◾◾ Shipping and logistics
◾◾ Finance/banking
◾◾ Real estate
2.6.2 Mortgage Transactions
Another important application of smart contracts is in the mortgage industry.
Blockchain technology can allow for buyers and sellers to be automatically con-
nected together in a friction-less, hassle-free process. Construct a smart contract
governing all terms and conditions – evade the need for lawyers, realtors, and other
professionals. This saves both time and money for both sides of the transaction
while also minimizing any potential errors or costs that could otherwise come from
doing things manually.
2.6.4 Medical Research
As researchers in the medical field conduct clinical trials and research potential
cures to diseases such as cancer, effectively sharing data amongst the various insti-
tutions freely and openly is something smart contracts can facilitate. Data can
be freely exchanged without compromising the privacy and data security of the
patients and subjects involved. A smart contract consists of various if–then sce-
narios that work well in this particular use case.
percentage of votes required to pass the proposal, and the duration before the vote
expires, etc., for all proposals voting on the network.
Whenever a new member joins the network, one of the first things they must
do is create at least one peer node in the membership. Blockchain networks contain
a distributed, cryptographically secure ledger that maintains a history of transac-
tions in the network that is immutable—it can’t be changed. Each peer node stores
a local copy of the ledger in a distributed manner. Each peer node also holds the
global state of the network for the channels in which they participate, that gets
updated with each new transaction performed in the network. The peer nodes also
interact with each other to create and endorse the transactions that are proposed
on the network. Based on their business logic and the blockchain framework being
used members can define the rules in the endorsement. In this way, every member
can independently verify the transaction history without a centralized authority.
Due to these features, blockchain has a huge number of applications. Some of the
important applications of blockchain are discussed.
2.7.2.1 Fraud Detection
Blockchain is getting bigger because it can handle fraud detection in a way that
our normal banking system can’t. Most of the banking system nowadays is a cen-
tralized system. There is one server that holds records of all the transactions. But
these systems are vulnerable to cyberattacks. If any hacker breaches the system,
then he has full access to make any fraud. The blockchain is essentially a distrib-
uted ledger. In the blockchain, each block contains a timestamp and holds some
batches of individual transactions. These records also contain a link to a previ-
ous block. It is believed that this technology has the power to eliminate some of
the current crimes that are being committed online today against our financial
institutions.
2.7.2.3 Payments
Blockchain division could be highly transformative in the payments process.
Blockchain will give higher security and lower costs to organizations like banks
to process payments between companies and their buyers and even between banks
themselves. In the current reality, there are a lot of intermediaries in the payment
processing system, but blockchain would reduce the need for a lot of them.
2.8.1.1 Blockchain-Based Certification
Blockchain can also be used in creating authentic certificates or to verify the
authenticity of certificates. Counterfeiting in certificates has been a longstanding
issue. Not until the Massachusetts Institute of Technology Media Lab released
their project of Blockcerts, a technique which is mainly implemented by conflat-
ing the hash value of local files to the blockchain, did an effective technological
approach protecting authentic credential certification and reputation appear, but
there remain numerous issues.
Based on Blockcerts, a series of cryptographic solutions have been proposed to
resolve the issues above, including utilizing a multi-signature scheme to ameliorate
the authentication of certificates exerting a safe revocation mechanism to improve
the reliability of certificates revocation establishing a secure federated identification
to confirm the identity of the issuing institution.
2.8.1.2 Working Insight
When a user presents a document, the technology converts or encodes the docu-
ment into a cryptographic digest or cryptographic hash. Satoshi Nakamoto’s white
paper on Bitcoin carries a permanent hash of
Submitting the same document more than once, for verification, will have the
hash and the transaction markers match each time. If the document contains any
changes, the markers won’t match. The user will also have the power to allow or
disallow said organization or individual from viewing the document.
2.9 Building a Blockchain
Before starting, remember that a blockchain is an immutable, sequential chain of
records called blocks. They can contain transactions, files, or any data you like,
really. But the important thing is that they’re chained together using hashes.
Building a blockchain is not something for which you require a degree; anyone
with basic programming knowledge can create their own blockchain.
2.9.1 Generations of Hashes
By now you may know that each block of a blockchain contains a hash value, which
is changed if someone tries to change a single work in of the page. Each block also
contains a hash of the previous block and the next block, So, if someone tries to
change any value, he/she has to change the hash on every block on the blockchain.
The hash is what makes the blockchain foolproof.
Before starting to build blockchain, we need to get some basic knowledge of
what hashing is in cryptography.
Hashing is generating a value or values from a string of text using a mathemati-
cal function.
In simple words, hashing means taking a string of variable size and converting
it into an output of fixed length. Cryptocurrencies like Bitcoin use Secure Hashing
Algorithm 256, also known as SHA-256.
Let’s see how the hashing process works. We are going to put in certain inputs.
For this exercise, we are going to use the SHA-256.
As you can see in the image, hashing can take input of any length and generate
fixed output (256-bit output in SHA-256).
It is important to note that a particular string always generates the same hash
output. This hashing method is also used in storing passwords; instead of storing
the passwords of a user in a database, companies store the hash of the password and
whenever the user inputs their password, they compare the hash generated from the
user’s entered text and the hash stored in the database; if both hashes match, the
user is logged in.
Another important thing about hashes is that hashing is a one-way function.
That means if anyone has the hash key of a string, it is impossible to generate that
string back from its hash value.
import hashlib
def
hash(mystring):
hash_object = hashlib.md5(mystring.encode())
print(hash_object.hexdigest())
You have now created a function, hash(), which will calculate and print out the
hash value for a given string using the MD5 hashing algorithm. To run it, put a
string in between the parentheses in quotation marks, e.g.:
hash(“AnyString”)
After that, press ENTER to see the hash digest of that string.
You will see that calling the hash function on the same string will always gener-
ate the same hash, but adding or changing one character will generate a completely
different hash value:
hash(“AnyString”) =>
7ae26e64679abd1e66cfe1e9b93a9e85 hash(“AnyString!”)
=> 6b1f6fde5ae60b2fe1bfe50677434c88
In the Bitcoin protocol, the hash functions are a major part of the block hashing
algorithm which is used to write new transactions into the blockchain through the
mining process.
◾◾ First, to make a request for an API key, users must set up a wallet at www
.blockchain.info and request an API key at https://api.blockchain.info/v2/
apikey/request/.
◾◾ The next step is to generate an extended public key which is also called xPub. If
you generate a wallet from the address given above, the xPub can be found in:
◾◾ Now we generate a unique address for each customer. The basic URL for cre-
ating a new request for every customer is: https://api.blockchain.info/v2/rece
ive?xpub=$xpub&callback=$callback_url &key=$key.
This is an API key which contains three parameters. These parameters are as follows
References
W. Akins, J. L. Chapman, and J. M. Gordon, “A whole new world: Income tax consider-
ations of the bitcoin economy,” 2013. [Online]. Available: https://ssrn.com/abstract
=2394738.
A. Biryukov, D. Khovratovich, and I. Pustogarov, “Deanonymisation of clients in bitcoin
p2p network,” In Proceedings of the 2014 ACM SIGSAC Conference on Computer and
Communications Security, New York, NY, USA, 2014, pp. 15–29.
Blockchain Wikipedia. Available: https://en.wikipedia.org/wiki/Blockchain 2: Bitcoin
Wikipedia. Available: https://en.wikipedia.org/wiki/Bitcoin.
I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” In
Proceedings of International Conference on Financial Cryptography and Data Security,
Berlin, Heidelberg, 2014, pp. 436–454.
Follow my vote. Available: https://followmy vote.com/online-voting-technology/blockchain
-technology/ 5: cointelegraph.
G. Foroglou and A.-L. Tsilidou, “Further applications of the blockchain,” In 12th Student
Conference on Managerial Science and Technology. 2015.
G. Hileman. “State of blockchain q1 2016: Blockchain funding overtakes bitcoin,” Coindesk,
2016. [Online]. Available: http://www.coindesk.com/state-of-blockcha in-q1-2016/.
A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model
of cryptography and privacy-preserving smart contracts,” In Proceedings of IEEE
Symposium on Security and Privacy (SP), San Jose, CA, USA, 2016, pp. 839–858.
S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available:
https://bitcoin.org/bitcoin.pdf.
C. Noyes, “Bitav: Fast anti-malware by distributed blockchain consensus and feedforward
scanning,” arXiv preprint arXiv:1601.01405, 2016.
B. Marr. “Practical examples of how blockchains are used in banking and the financial
services sector,” Forbes, 2017. Available: https://ww w.forbes.com/sites/bernardmarr
/2017/08/10/practical-examples-of-how-blockcha ins-a re-used-in-bank ing-a nd-the-fi
nancia l-ser vices-sector/#23adfc4c1a11.
G. W. Peters, E. Panayi, and A. Chapelle, “Trends in crypto-currencies and blockchain
technologies: A monetary theory and regulation perspective,” 2015. [Online].
Available: http://dx.doi.org/10.2139/ssrn. 2646618 563.
T. K. Sharma, “Documentation verification using blockchain” Blockchain Council, 2017.
Available: https://ww w.blockchain-council.org/blockchain/document-verifi cation-sy
stem-using-blockchain/.
M. Sharples and J. Domingue, “The blockchain and kudos: A distributed system for edu-
cational record, reputation and reward,” In Proceedings of 11th European Conference
on Technology Enhanced Learning (EC-TEL 2015), Lyon, France, 2015, pp. 490–496.
M. Yakubowski. “South Korean government to test blockchain use for e-voting system,”
CoinTelegraph, 2018. Available: https://cointelegraph.com/news/south-korean-govern
ment-to-test-blockcha in-use-for-e-voting-system.
Y. Zhang and J. Wen, “An iot electric business model based on the protocol of bitcoin,”
In Proceedings of 18th International Conference on Intelligence in Next Generation
Networks (ICIN), Paris, France, 2015, pp. 184–191.
Blockchain and
IoT Security
D. Peter Augustine and Pethuru Raj
Contents
3.1 Overview ....................................................................................................51
3.2 Understanding Blockchain..........................................................................52
3.3 Towards an Optimized Blockchain for IoT.................................................53
3.3.1 Proof of Work..................................................................................54
3.4 Blockchain – Backbone of IoT....................................................................55
3.5 Security Implications of Blockchain IoT.....................................................57
3.5.1 Better Safety of Data.......................................................................58
3.5.2 Robust Structure Creation...............................................................58
3.5.3 Implementation of Distributed and Parallel Computing..................58
3.6 Blockchain Technology for Large-Scale IoT Systems...................................58
3.7 Blockchain Mechanisms for IoT Security....................................................60
3.8 Blockchain for IoT Security and Privacy: The Case Study of a Smart
Home..........................................................................................................61
3.1 Overview
The fashion of technology merged with the resourceful invention evolving in the
information world in the current scenario is blockchain, which is the breakthrough
of a person identified by the alias Satoshi Nakamoto in 2008. But since then,
51
Telegram Channel @nettrain
52 ◾ Blockchain Technology and Applications
blockchain has gone through radical growth with the assured support in every
dimension of applications in the information technology world. Meanwhile the
question in the minds of everyone who comes across the word of blockchain is
“what is blockchain?”
Blockchain has changed the view of the Internet by making the information
distributed but not copied. Even though the main intention in the invention of
blockchain was for the digital currency, Bitcoin, currently there are many more
effective and efficient uses of the technology that have been explored by the IT
world.
Blockchain can be defined as a decentralized, distributed and public digital trans-
action ledger with the idea of recording those transactions across numerous systems; in
turn, any record of transactions cannot be edited with effect from a date of creation,
without the modification of all succeeding blocks.
A common man can define blockchain in the simplest form as records of data
flowing in with series of time-stamps which cannot be changed and which are orga-
nized by a set of computers, not possessed by any sole unit. The time-stamped record
in the series can be viewed as a block, and by means of cryptographic algorithms,
the blocks are fully bound to one another. Hence, the blocks and the chain of the
interlinked blocks lead to the term blockchain.
Emerging blockchain technology has had a vibrant influence, disrupting
the way IT has been working, because the blockchain network does not pos-
sess any central control. Subsequently it enables a shared and immutable ledger;
the information carried in the record can be accessed by anyone. Henceforth,
the knowledge of any domain put up on the blockchain will be in the public
domain, and anyone involved in any time-stamp in the series is responsible for
their activities.
3.2 Understanding Blockchain
A blockchain requires only infrastructure costs as in any other case. But it does not
require any transaction cost. The underlying mechanism in blockchain is simple,
secured, effective and robust transactions between any two systems by automated
means. It can be viewed as a transaction between any two parties. In this scenario,
the first party namely “A” initiates and requests a transaction from the other party
“B”. The initialization of the transaction is followed by the creation of a block. This
block is broadcasted to all the computers distributed in the network. The block is
verified by all the systems in the network and validated. This verified and validated
block is added to a chain and the chain is stored across the network; the birth of
new exclusive record with a unique history. The transactions are done with verifica-
tion and executed between “A” and “B”. Any scenario which affects a single record
falsely will in turn incorrectly affect the entire chain coupled with the blocks in
millions of instances.
In the simplest form, we can define IoT as the things which are cable of sending
and receiving data in the world of the Internet for controlling the device or analyz-
ing and manipulating the data shared. IoT begins with home appliances such as
lights, fans, refrigerators, televisions, etc., and broadens to any electronic device
in the network. IoT works with a combination of sensors as the input medium,
software to control it and the network for passing data between any objects in the
network. It meets purposes such as data analysis, cost cutting or predictive analysis
depends on the objective of the implementation.
In this IoT boom, the big giants in the manufacturing sectors such as Samsung,
Siemens and the IT giants like IBM and AT&T are working on the best adaptation
and usage of IoT for automation from the basic predictive maintenance stage to the
high-end data analytics level.
Indeed IoT gives a greater range of advantages in the fields of smart cities, smart
grids and healthcare. Amidst all these countless benefits, there is are serious privacy
concerns raised by the incessant acquisition of volumes of data from the devices
for processing and analyzing. Let us remember the object-oriented programming
concept of data encapsulation. So in this IoT world, we can understand that the
spontaneous flow of incredible volumes of data from numerous devices may lead to
the leakage of data or unauthorized access of data if it does not provide guaranteed
security mechanisms. We can visualize some of the privacy challenges like lack of
central control, heterogeneity in device resources, multiple attack surfaces, context-
specific risks and scale.
As discussed earlier in this chapter, blockchain technology can be used as
an effective tool for the protection of privacy and security of data in the IoT era.
Blockchain security primarily originates from a cryptographic puzzle identified as
proof of work (PoW), used for adding new blocks into the chain. The unfixed pub-
lic key for the users’ identities is used by blockchain to render a high level of privacy.
The salient features of blockchain and its usage in various non-financial applica-
tions can be used for providing distributed privacy and security in IoT.
3.3.1 Proof of Work
This is the most popular algorithm being used by currencies such as Bitcoin and
Ethereum, each one with its own differences.
Even though we can utilize most of these features, blockchain needs to be opti-
mized according the IoT. So the adoption of blockchain by IoT is not straightfor-
ward. The following are some major challenges that must be addressed:
(i) There is an actor to be elected as a leader and the block to be chosen to get
added to the blockchain in proof of work. In such a situation there is a need
to solve a particular mathematical problem to find a solution where resource
requirements are high.
(ii) Miners are the actors with the computing power for most of the time due to
their first solvable capability. In this scenario, scalability issues originate from
the need to achieve consensus among the miners.
(iii) Even if it is not IoT, in the case of cryptocurrency, great deferrals are endorsed
to PoW and mechanisms to avert twofold expenditure.
We can examine the scenario of smart home optimization to understand the afore-
said challenges since we have a case study of the same at the end of this chapter.
Some researchers have proposed different optimization techniques with respect
to the above-mentioned challenges. One of them is a lightweight instantiation of
blockchain without compromising the privacy and security benefits extracted from
blockchain implementation. They have focused on the optimization of resource
ingestion and increasing the network scalability by adopting a hierarchical struc-
ture. The structure for optimization comprises a smart home, overlay network and
cloud storage as three different tiers.
The transactions held among the IoT devices in the smart home are stored in
a private immutable ledger (IL), which can be visualized as a blockchain but with
the difference of central management and symmetric encryption to lessen the pro-
cessing overhead. Another difference in the case of blockchain is that the devices
requiring greater resources mutually create a distributed overlay that instantiates a
public blockchain. The transactions are the communications held between the enti-
ties in the mentioned different tiers which are assembled into blocks. These blocks
are attached to the chain without resolving the PoW, which reduces the appending
overhead considerably. The verified and validated transactions are accessible for the
complete network instantaneously. This mechanism potentially decreases the delay
of IoT transactions, like data access or queries. The possible salient distributed trust
method can be used in the overlay to decrease the processing overhead in authen-
ticating new blocks.
Even supposing the suggested mechanism has been constructed with the idea of
smart home IoT, it can be viewed and tested for similar applications and extended
to different IoT applications.
and connectivity since the computing takes place at the center of the network. The
industrial IoT (IIoT) applications for smart cities, smart factories, smart grids and
smart farms are not compatible with cloud-based architectures due to the aforesaid
issues. Therefore there is paradigm shift towards edge computing-based application
development which may be well-suited for such IIoTs. Edge computing coupled
with IoT can avoid all the issues of latency, bandwidth and connectivity. In this
scenario blockchain can render a great deal of security support for the IIoT along
with edge computing too.
There are concerns about the capability of IoT to protect the limitless number
of devices associated to a network. We can understand this from the evidence pro-
vided by Accenture which conducted an IoT security overview. It says that “The
urgency for viable IoT security solutions grows by the day. At front-of-mind for many
businesses and government leaders lies the same, nagging question: What do we need to
do to secure the IoT?”
There are two major weaknesses to be fixed due to the exponential growth of
usage of IoT devices.
In the meantime, the blockchain comes onto the scene as a standby to render a great
deal of support to overcoming these fundamental issues. The most prized crypto-
currencies in the world are being safeguarded by the blockchain. The entrenched
smart contracts and distributed network of the blockchain are substantial solu-
tions for IoT’s safety apprehensions. While centralized servers are vulnerable to the
security risks which demands more security, the risks are spread out in the network
since blockchain works based on distributed computing. But the mechanism of the
distributed ledger concept and the continuous connectivity of blockchain guar-
antees that an issue in one area will not have any influence in any other area. The
blockchain can confirm that IoT devices maintain the availability of the connec-
tion that they need to provide the services that they offer.
As previously mentioned, let us look at the situation of a driverless car intercon-
nected using the concept of IoT. There is a private blockchain used in this scenario
that facilitates safe and concurrent communications from the car initiating with
car startup, status verification and smart agreements to exchange the information
regarding the insurance and repairs service statistics and real-time locality data to
track security.
We can see how the blockchain with distributed ledger technology bridges the
serious breaches in IoT in the above context.
At the outset we can conclude that three major issues need to be resolve with
respect to security and privacy in IoT.
The novelty in blockchain is fundamentally securing the IoT transitions with a safe
information architecture to take the data and authenticate it. The following three
major characteristics reveal the implications of blockchain coupled with IoT.
well-advanced area of IT called cloud computing and its advancements also joins
hands for improvement in the research field of data science. The big data generated
from IoT using cloud-based architecture involving big data analytics will reap the
maximum benefits of business solutions. In this context making all possible elec-
tronic devices communicate with each other in the name of IoT floods data into the
network which may be a local area network, a wide area network or any type of cloud
platform. Let us consider this scenario of coupling these technologies of IoT, cloud
computing and big data analytics for enterprise solutions. Indeed, it is very true that
100% security is expected where one can never find a pitfall to lose the business at any
cost. Figure 3.1 illustrates eight areas across which blockchain enables IoT.
The increasing requirements of IoT and the applications being built on it in associa-
tion with other cutting-edge technologies make IoT a large-scale system. The cloud is
widely used as a central repository for such large-scale IoT systems and the centralized
server methodology cannot be a prudent solution. Most IoT systems that are imple-
mented as of now rely on the centralized server concept. But the truth is that these IoT
systems use the central server through a network with or without wired Internet. It is
necessary for the large-scale IoT systems in view of business development to accomplish
the analysis that requires high processing capabilities which is not realized in the exist-
ing infrastructure. It is evident that having decentralized or distributed network systems
can enhance the existing Internet infrastructure to tackle the huge data processed in
Figure 3.1 Eight areas across which blockchain enables IoT. (From Chemitiganti,
V. 2016. What blockchain can do for the Internet of Things. Vamsi Talks Tech.
Available at http://www.vamsitalkstech.com/?p=3314.)
large-scale IoT systems. The peer-to-peer networking (PPN), distributed file sharing
(DFS) and autonomous device coordination (ADC) functions which make the infra-
structure efficient can be implemented to track the vast quantity of linked and net-
worked devices in co-ordination.
The blockchain because of its robustness can make IoT systems more reliable
and maintain their confidentiality with respect to data. The transactions are also
made faster between peers using blockchain due to its distributed ledger.
When IoT is coupled with blockchain the data flow takes the path from sensors,
network, router, Internet, distributed systems, blockchain and then for analytics
and finally to the end user. There is no possibility of misreading or wrong valida-
tions in data in the distributed ledger because of the tamper-resistant nature of
blockchain.
The following are some of the most important advantages of blockchain
technology:
◾◾ Data protection
◾◾ Safe communication between peers
◾◾ Robust
◾◾ Extremely reliable
◾◾ High level of data privacy
◾◾ Maintaining complete records of actions
◾◾ Storing data of old transactions in smart devices
◾◾ Allows self-directed operations
◾◾ File sharing in distributed manner
◾◾ No room for solitary control power
◾◾ Removing middleman and cost
◾◾ Built-in trust
◾◾ Quickens transactions
vulnerability for restructuring. Using blockchain in any IoT ecosystem will cer-
tainly boost the trustworthiness by absolutely eradicating some single point of
failure. The hashing algorithms along with cryptographic mechanisms are used
in blockchain, to encrypt the data which can yield the best security mechanisms
while binding it with IoT. Meanwhile, the flip side of the IoT with respect to
the demand of high computing power while using hashing methods and cryp-
tographic techniques is a challenge when combining the blockchain technology
with IoT. But the research is going on to overcome these issues at the blockchain
level itself.
Some researchers like Underwood see blockchain as the healing remedy for the
digital economy where complete security is ensured. Blockchain is considered as
the complete tamper-proofing of data in the world of IoT where trust takes first and
foremost place.
Nasdaq in October, 2015 itself came out with “Nasdaq Linq” with the block-
chain concept to record its transactions with reserved safeties. Because of the advan-
tages of blockchain, Depository Trust & Clearing Corporation (DTCC), USA, is
also working with Axoni for the monetary payment facilities such as post-trade
stuffs and trades. The government regulatory boards are also keen on blockchain
for its capability to render safe, secluded, distinguishable simultaneous watching
of trades.
Safeguarding the ongoing operational technology is also of dominant promi-
nence. Therefore, the blockchain can preclude damaging information by handling
and safeguarding industrial IoT gadgets. In this wonderful fully protected scenario,
once a sensor, device or controller is deployed and starts functioning, there is no
room for any modification, and subsequently any changes in the device will be
traced in the blockchain.
The common network attacks which may focus on the cluster head may be a
denial-of-service (DOS) attack, modification attack, dropping attack or an append-
ing attack which will threaten accessibility for the genuine user.
The study can have a local blockchain connecting the policy header and devices
using a comprehensive Diffie–Hellman algorithm with a shared key. The shared
key should be assigned by the miner to devices for direct communication with each
other to accomplish user control over smart home transactions. Keeping data on
the local storage, each device is required to be authenticated to the storage using
a shared key. The locally stored data can be moved to the cloud storage in what is
known as a store transaction which is an anonymous process. The additional likely
transactions are access and monitor transactions. These transactions are primarily
produced by the home proprietor to observe the home when she/he is outside.
Nevertheless, the adversaries are not capable of breaking the encryption. There
are major threats such as accessibility threats, anonymity threats and authentica-
tion and access control threats.
These threats can prevent the genuine user from having access to the data or
services or they can find the identity of the user to breach the privacy or try to make
the adversary the genuine user.
In the first level of defense, Smart Home Manager finds any data packets that
violate the policies, then these packets will be dropped. The second-level defense is
that any device attached to the local blockchain will be allowed to make a transac-
tion only after genuine authentication at SHM. If any device is found to be genuine
it will be isolated from the network.
Consensus Algorithms –
A Survey
R. Indrakumari, T. Poongodi, Kavita Saini,
and B. Balamurugan
Contents
4.1 Introduction............................................................................................... 66
4.2 Consensus.................................................................................................. 66
4.3 Lottery-Based Algorithms...........................................................................67
4.3.1 Proof of Work..................................................................................67
4.3.2 Proof of eXercise (PoX)....................................................................69
4.3.3 Proof of Useful Work.......................................................................69
4.3.4 Proof of Stake..................................................................................70
4.3.5 Delegated Proof of Stake (DPoS).....................................................71
4.3.6 Leased Proof of Stake (LPoS)...........................................................71
4.3.7 Proof of Elapsed Time.....................................................................71
4.3.8 Proof of Luck (PoL).........................................................................72
4.3.9 Proof of Space or Proof of Storage....................................................73
4.3.9.1 Theory...............................................................................73
4.3.9.2 Burstcoin...........................................................................73
4.3.9.3 SpaceMint.........................................................................73
4.4 Voting-Based Consensus.............................................................................74
4.4.1 Byzantine Fault Tolerance-Based Consensus....................................75
4.4.2 Crash Fault Tolerance-Based Consensus..........................................75
4.5 Conclusions.................................................................................................76
References............................................................................................................76
65
Telegram Channel @nettrain
66 ◾ Blockchain Technology and Applications
4.1 Introduction
Blockchain is considered one of the technologies with the most potential [1].
Bitcoin, proposed by Nakamoto [2], attracted researchers and industrialist atten-
tion towards blockchain as it has the capacity to eradicate the limitations of the
traditional payment method which depends on a third party. In conventional pay-
ment methods, while making a payment people trust a third party who verifies the
validity of their transactions. In most cases, the third party is not trustworthy as
every transaction is based on a single organization, causing insufficient trust. This
can be addressed by using many independent organizations, which changes the
view from centralization to decentralization. Satoshi introduced the ledger design
that is called block, and contains a verified transaction. Genesis block [3], consid-
ered as the first block, contains the first transactions of Bitcoin.
When a transaction occurs its validity is verified by some nodes. Validity here
refers to the sufficiency of money with the sender and the digital signature of the
sender [4]. After verifying the validity, the block holding the transaction is added
to the chain which can be identified by all other nodes. A node can append a block
holding various transactions by distributing it to other node which requested to add
this node to the current chain. The limitation in this method is that, if every node
requests its preferable node, then there exists a mess in the situation. To avoid this,
the consensus algorithm is introduced, which holds an agreement made between
all nodes about which blocks should be appended, and which nodes are permitted
to append their proposed blocks. Many versions of the consensus algorithm have
been proposed to date.
In this chapter, various variants of the consensus algorithm in blockchain are
discussed with two main types. Initially, the proof-based consensus algorithm is
discussed followed by the voting-based consensus algorithm.
4.2 Consensus
The consensus algorithm is considered as a decision-making procedure for a
group in that individuals participate actively to make and support decisions that
fit well for the rest. In other words it can be thought of as a resolution where the
individuals are supporting the decision. The consensus algorithm is an active
research topic around the world that updates the distributed shared state in a
secure manner. In a traditional distributed system, fault tolerance is achieved by
distributing the shared state across multiple replicas in the network. Based upon
the preset state transition protocol framed by the state machine the updating of
replicated shared state occurs, which is referred to as state machine replication.
The concept behind replication is if one or more node crashes, it will not lose
anything. The main task of the state machine is to make sure that nodes with the
same inputs will produce the same outputs. These replicas contact each other to
construct consensus and consent the finality of the state after a state change is
executed. In blockchain-based applications, the shared state is the blockchain.
Consensus can be implemented through various ways such as lottery-based algo-
rithms like proof of work (PoW) and proof of elapsed time (PoET) or by voting-
based methods which include Paxos and Redundant Byzantine Fault Tolerance
(RBFT). These methods depend upon various fault-tolerance models and net-
work requirements.
In lottery-based algorithms, the winner can be scaled to a huge number of nodes
as they recommend a block and send it to the remaining nodes of the network
for validation. When two or more winners propose a block, the forking method
is invoked to analyze which results in a longer time to finality. In voting-based
algorithms, the result is based on low latency finality. Here, the nodes transfer the
message to other nodes and hence take more time to attain consensus, resulting in
a trade-off between speed and scalability.
4.3 Lottery-Based Algorithms
The lottery-based algorithm is otherwise known as the Nakamoto consensus, after
the founder of Bitcoin. Here a validator is elected, to make decision about the next
node to be appended. The lottery-based algorithm is not an equiprobable distribu-
tion technique, as it has its own probability distribution to the winner. Various
algorithms based on the lottery-based method are discussed as follows.
4.3.1 Proof of Work
Proof of work (PoW) [5] is the initial consensus protocol used for cryptocurrency
that permits the blockchain users to obtain consensus in Bitcoin. This protocol
particularly involves the SHA-256 hashing algorithm, Merkle tree and peer-to-peer
(P2P) network to create, broadcast and verify blocks in the blockchain network.
PoW also incurs costly digital computation since it includes various techniques to
complete the process. The properties of PoW are described below:
◾◾ PoW is developed for permission-less public distributed ledgers and for min-
ing processes; it consumes more computational resources.
◾◾ To construct a new block, a cryptographic puzzle must be solved by the miner,
and the user who solves the puzzle first will avail the reward by broadcasting
the result in the network.
◾◾ The protocol maintains the transactions in each block in a linear fashion and
a block consists of the set of transactions.
◾◾ The cryptographically signed transaction will be accepted only if the signa-
ture is validated and verified in the network.
◾◾ The challenge-response computation process is known as mining.
PoW introduces mining that involves a step for validating a block (group of trans-
actions) in the network by displaying the computational proof of the completed
work. Once a transaction is started, the available miners in the network compete
each other to become first by solving a cryptographic puzzle and form the block.
The miner who solves the puzzle successfully broadcasts the solution to the block
among other peers, and the solution is verified to make the new block acceptable on
the chain. Some of the implementation details are described below:
Analysis:
concept. With this, the miners can provide only the proof of the solution, not the
solution itself, to the delegated task. The solution becomes available only after the
certain pre-set condition is met in the network.
4.3.4 Proof of Stake
Proof of stake (PoS) is a consensus protocol that selects the validator based on eco-
nomic stake (refers the amount of coins that particular validator owns) and coin
age. It is available in so many variants with significant changes in the base protocol.
The different protocols differ in minimizing the centralization issue and double
spending.
The various properties of PoS are described below:
In PoS, the distributed ledger keeps track of the validators with their respec-
tive stake in the network. The validators in PoS invest stake to gain chances to
mine the next block. The chances are higher for the validator who has the higher
stake. The validators will be chosen randomly for block creation. For any cheating
attempt, the stake will get debited in the system. Moreover, the block creation
process in PoW is straightforward, and computational power is not significantly
required.
Ethereum [13] is an open-source blockchain influenced by PoS to reach the con-
sensus. Initially, it was based on PoW cryptocurrency; later the consensus mecha-
nism was shifted to Proof of Stake, and it became more secure and energy-efficient.
Smart contract is available to perform the operation in the blockchain network.
The Ethereum platform provides a blockchain development stack, in which the
developers can construct and deploy distributed apps (DApps). Huge opportuni-
ties are available to form unlimited ideas by using this promising technology in
the blockchain. Other PoS-based cryptocurrencies are Peercoin, Navvcoin, Neo,
Decred, Dash, PivX and Reddcoin.
Analysis:
of ownership and proof of time in order to enhance the efficiency of the mining
process by incorporating a fair lottery system. Random waiting time is enforced
for block creation by leveraging the capabilities of TEE. PoET uses Intel-based
hardware (e.g. Intel SGX), and it is specifically designed for permission-less public
distributed ledgers. The participants’ and transaction logs are transparent and veri-
fiable, showing more reliability of the network.
The systematic procedure of this protocol is similar to PoW, but it consumes
less computational resources. The nodes compete among themselves in order to
solve a cryptographic puzzle and search the next block. In the PoET protocol, each
validator is assigned ‘T’ a random wait time to construct the block and it is tracked
by it. The validator who has successfully completed the waiting time can create and
publish the block in the network. The protocol follows both first come first serve
(FCFS) and a random lottery scheme. The entire process relies on Software Guard
Extensions (SGX) which assure trusted code execution in a safe environment (i.e.
Intel Software Guard Extension).
PoET reaches consensus by maintaining the anonymity of the network partici-
pants. A monotonic counter-type hardware is maintained in TEE to protect the sys-
tem from malicious activities which also ensures that only one instance is currently
executing in a single CPU. There may be the chance of creating multiple instances of
‘T’ wait time by the participants in order to boost their luck. The protocol is highly
susceptible to various security attacks and lacks security analysis [10]. Particularly,
Intel Software Guard Extension is vulnerable to rollback attacks [15].
Hyperledger Sawtooth [16] is a modular blockchain introduced by Intel, and
it follows the PoET consensus algorithm for implementing a leader election lottery
system. Parallel processing is followed in transactions for block creation and valida-
tion by using ‘Advance Transaction Execution Engine’. The protocol is highly capa-
ble in providing efficient throughput among a huge network population. Moreover,
it is an enterprise grade protocol that enables the development process of general-
purpose smart contracts.
other participants in the network stop the mining process and their own block is
broadcasted as soon as the luckiest block is received; hence the network congestion
can be minimized.
◾◾ Proof of space is meant for public distributed ledgers, and the free disk stor-
age is considered as the resource.
◾◾ The influence of a miner’s power over the network is directly proportional to
the amount of disk space being contributed.
4.3.9.1 Theory
Proof of storage utilizes disk space to mine a block. It verifies the honesty of a
remote file by distributing a copy of data to a server and computing a challenge-
response protocol to ensure the integrity of the data. The actors in the proof-of-
storage algorithm are the Provers and the Verifiers. Provers are actors who store
data, and Verifiers are actors who authenticate that the Provers are storing the data.
Verifiers usually provide a challenge to the Provers, who in turn solve the challenge
with a proof to the exact proof-of-storage scheme.
Proof of storage generates random solutions called plots in advance using
the Shabal algorithm and saves it on hard drive. This process is called plotting.
Following the plotting process, the miners compare the solutions with the recent
puzzle [20].
4.3.9.2 Burstcoin
Burstcoin is a mineable coin implemented with an eco-friendly proof-of-space
algorithm in 2014. It is a decentralized cryptocurrency and payment system that
depends on space when mining resources [21]. Burstcoin mining is inexpensive,
and it can be performed on a mobile device [22]. The first Turing complete smart
contract which solves computing problems is implemented using proof-of-space
protocol.
4.3.9.3 SpaceMint
SpaceMint is a cryptocurrency, replacing energy-intensive computations associated
with cryptocurrencies by proof of space. Here miners invest disk space instead of
computing power. The mining process takes place in two phases, initialization and
mining. In initializing, the miners contribute N bits of space and create secret key
pairs. The miners publish its space commitment through a special transaction. In
the mining phase, mining is incentivized through block rewards and transaction
fees. Once initialized, each miner attempts to add a block to the blockchain every
time period. SpaceMint holds three types of transactions, namely, payment, space
commitments and penalties. Each transaction is signed by the users and sent to
miners to be added to the block.
4.4 Voting-Based Consensus
In voting-based consensus algorithms, the verifying network should be adjustable
and explicitly known in order to exchange the message without any complication.
In proof-based consensus algorithms, the nodes are allowed freely to unite and
pullout from the network.
The nodes in the voting-based consensus algorithm communicate with each
other prior to adding their own blocks into the chain. The execution process is
same as the conventional fault tolerance method incorporated in the distributed
system [23].
As in any fault-tolerance method, the voting-based consensuses are intended
to work when there is a crash in the nodes and sometimes the nodes are subverted.
When the node crashes, it waits for the information passed by other nodes. In
some cases, the waiting node will not receive any proper message or guidance from
other nodes to make a decision. To prevent this, there should be n + 1 nodes instead
of n nodes to perform uninterrupted operation [24].
In contrast to this, the subverting nodes perform outlandish operations, result-
ing in imprecise output. These issues can be addressed by a classical problem, popu-
larly called the Byzantine Generals Problem developed by Lamport et al. [25].
Here, the concept is that Byzantine generals have occupied an enemy’s camp
by dividing their army force into N groups under N generals, who are capable of
attacking the enemies from various sites. To win, the N groups of armies should
attack at the same time. Before commencing the attack, they should come to an
agreement about the time of attacking by exchanging proper messages, and the
decision is taken by the majority. Regrettably, there is some conspirator among
the general group whose intention is to cheat the other generals by passing diverse
decision to others which causes failure in the attack as some generals are not par-
ticipating in the attack.
The solution for this issue is proposed by Lamport et al. that to tolerate the n
subverted generals, there should be at least 2n + 1 generals to accompany them. The
same scenario is applicable in blockchain in that some nodes can be subverted when
executing the consensus work by propagating diverse results to other nodes. These
bad situations lead to the classification of voting-based consensus algorithms into
4.5 Conclusions
This chapter provides a survey of some consensus algorithms applicable in block-
chain. The algorithms are categorized into two types, namely, proof-based algo-
rithms and vote-based algorithms. In the proof-based algorithms, the nodes have
to prove its majority to append the blocks which it requires. In the vote-based
algorithm, an agreement is made among nodes regarding the blocks to be appended
to the ledger. The applications of these two types of algorithms are discussed elabo-
rately in the chapter.
References
1. S. Haber and W. S. Stornetta, “How to time-stamp a digital document,” Journal of
Cryptology, vol. 3, no. 2, pp. 99–111, 1991.
2. S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system,” 2008 [Online].
Available: https://bitcoin.org/ bitcoin.pdf.
3. Bitcoinwiki, “Genesis block,” 2017 [Online]. Available: https://en.bitcoin.it/wiki/
Genesis_block.
4. E. Robert, “Digital signatures,” 2017 [Online]. Available: http://cs.stanford.edu/pe
ople/eroberts/courses/ soco/projects/public-key-cryptography/dig _ sig.html.
5. S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system (white paper),” 2008.
[Online]. Available: https://bitcoin.org/bitcoin.pdf.
6. R. Greenfield, “Vulnerability: proof of work vs. proof of stake,” 27/08/2017. [Online].
Available: https://medium.com/@robertgreenfieldiv/vulnerabilit y-proof-of-work
-vs-proof-of-sta ke-f0c44807d18c.
7. J. Poon and T. Dryja, “The Bitcoin lightning network: scalable off-chain instant pay-
ments,” 26/01/2016. [Online]. Available: https://lightning.net work/lightning-netw
orkpaper.pdf.
8. Bitcoinj Community, “Working with micropayment channels,” [Online]. Available:
https://bitcoinj.github.io/.
Optimized Digital
Transformation in
Government Services
with Blockchain
R. Sujatha, C. Navaneethan, Rajesh Kaluri,
and S. Prasanna
Contents
5.1 Overview of Blockchain..............................................................................80
5.2 Blockchain in Traffic Management.............................................................81
5.3 Blockchain for Taxation..............................................................................82
5.4 Blockchain Could Transform the World of Indirect Tax.............................82
5.5 Blockchain Technology for Voting............................................................. 84
5.6 Blockchain for Land Registry......................................................................85
5.7 Blockchain in Health Care..........................................................................87
5.8 Blockchain in Finance.................................................................................91
5.9 Blockchain in Identity Management...........................................................92
5.9.1 Blockchain in Digital Payment........................................................94
References............................................................................................................96
79
Telegram Channel @nettrain
80 ◾ Blockchain Technology and Applications
5.1 Overview of Blockchain
The blockchain concept relies on cryptography that links the blocks and each block
holds the cryptographic hash of a previous block and timestamp along with data to
be transferred. The openness in the distributed setup is achieved with the help of a
peer-to-peer network. The main idea is that the need for central trusted third party
is obsolete. Each node, another name for block, possesses a complete replica of the
blockchain. Adding a new transaction, that is, adding a block, ensures that block
is appended to all blocks such that transparency is maintained. Tampering with
data is not possible, and the working of a system is flawless when integrated with
blockchain technology. Cryptographic arrangements help in increasing the security
of the transaction in any sort of application. The type of restriction blockchain is
broadly classified into public, private and consortium. The blockchain provides reli-
able, immutable, irrevocable, transparent data available at all times, with reduced
costs because a third party is not required.
Initially starting with the buzz word cryptocurrency, the blockchain has found
applications in various domains in both the public and private sectors across the
globe. A meeting conducted by the Organization for Economic Cooperation and
Development (OECD) discussed the uses and limitations of blockchain in the pub-
lic sector in October 2018. It mentioned clearly that the blockchain is progress-
ing exponentially. The meeting stats collated by the Illinois Blockchain Initiative in
April 2018 show 203 blockchain initiatives in 46 countries are booming. Among
those initiatives, a few are in exploration, so much at the strategy stage, a few are
in the prototyping and incubation state and a few are up or live. The blockchain is
utilized actively in public sectors like transport management, taxation, voting, land
registration, health care, identity management, digital payment, and the list goes on.
In particular payment systems which do not involve cryptocurrency also need
digital identification. To promote the export–import of a country, identifying
legitimate payment methods is a difficult task and involves dealing with a lot of
complaints. A blockchain-based digital identity that incorporates permissive block-
chain as one of the regulatory nodes that are incorporated in all transactions will
be a viable solution for the government sector.
Health care is a primary concern of all developing countries since there are
many registered alternate medicine practitioners and methodologies, and with
millions of illiterate people, it is cumbersome to maintain and retrieve the health
records of millions for future use for health care schemes. Blockchain can provide a
sustainable solution for the maintenance and retrieval of health records.
Even many of the regulatory mechanisms and departments can be incorporated
with a blockchain which provides a genuine authentic platform without any inter-
mediate intervention to common people.
Blockchain technology sounds like a viable solution for many departments
due to its decentralized distributed self-regulated nature. Even though there are
many critics of the first, most successful system, Bitcoin, by this technology all
federal governments across the globe understand the potential sustainable benefits
of blockchain technology. The successive improvement blockchain 2.0 and with the
Hyperledger (claimed as 3.0) have addressed the issue of scalability of the block-
chain. So by incorporating blockchain technology, a sustainable, adaptable, decen-
tralized system can be deployed which also consumes fewer resources and requires
almost zero interference from the government. The permissive blockchain will also
ensure that in the name of decentralization the regulator need not totally lose con-
trol. The system can be monitored, and to handle abnormalities the regulator can
enforce actions using a special privilege consensus mechanism which is possible
with blockchain 3.0.
(MADA). This work reduces the data dissemination and also the overhead of main-
taining the shared data consistency. Safe time and speed of updating are the sig-
nificant parameters taken for determining the mobility. It reduces the number of
messages that require retransmission and also the duplication of messages. The task
of maintaining data consistency is simplified (Lai & Liu, 2019).
◾◾ Do the ledgers from the distributed systems remove the need for invoices?
◾◾ How will the government policies levy cryptocurrencies of the individual and
refund and collect the various taxes?
Taxes like GST, VAT, etc. are the vital source of income (Ainsworth & Viitasaari,
2017), (Ainsworth & Shact, 2016) for local administrative organizations and
change contingent upon the item or administration they are exacted on, just as
the region of the locale they are connected to. These kinds of taxes are difficult
to monitor both by administrative organizations and the general population who
need to dispatch these charges. Now and again a huge segment of these expenses
goes unpaid, denying state offices some truly necessary financing (Budish, 2018).
Because of the complications and indeterminacies in the assessment and legiti-
mate frameworks joined with the failure of state offices to demonstrate and follow
these acts of neglect, various high-acquiring elements frequently pull off covering
absurdly low regulatory expenses, while many pay a lot.
Blockchain is very much essential in the field of taxation so that many changes
can easily happen and the efficiency of the taxation system will increase and thereby
every individual tax account will be safeguarded. Figure 5.1 illustrates a working
model of blockchain under the taxation system. Blockchain taxation can be revolu-
tionary by making the following promises:
◾◾ Nobody can modify or disturb the committed blocks of the respective block-
chain system.
◾◾ Immutability creates the origin of the money and thus makes tax calculation
easy.
◾◾ By checking the capital and ownership of the assets owned, the network sys-
tems can be transparently enabled.
The primary exchange added to the square will be an exceptional exchange that
speaks to the voter (Evans & Paul, 2004). Once the exchange begins, incorporating
applicants’ names as the first blocks each proceeds vote in favor of the particular
competitor. In contrast to different exchanges, the establishment won’t consider a
vote. It will just contain the label of the applicant (Noizat, 2015) (Wright & De
Filippi, 2015). With respect to the e-Casting, a ballot framework will permit a dis-
senting vote, where the voter may return a clear poll to show disappointment with all
options or refusal of the existing political framework as well as the race. Each time
an individual votes the exchange will be logged and the blockchain will be restored.
At the outset, our general public is improving and propelling, and it’s basic that
we exploit our innovation to guarantee that our casting ballot forms are as secure
as could reasonably be expected (Wang et al., 2018). The most ideal approach is to
investigate the potential employment of blockchain to improve the decision proce-
dure in general. This disposes of the need for any expert to check and legitimize the
votes (Hanifatunnisa & Rahardjo, 2017). Rather, the disseminated record innova-
tion does that consequently, guaranteeing that each vote is genuine and affirmed.
It might require investment for blockchain to be comprehended and utilized by
everybody, but it’s something to anticipate as our general public keeps on develop-
ing and advancing.
blockchain without the loss of patient data. Moreover, the blockchain speeds up the
resource and development process when any new drugs come on the market. Thus,
the blockchain may make disruptive changes in the future (Sadiku et al., 2018).
Making and maintaining electronic medical records (EMR) in the blockchain
is one of the precious and major resources for the health care system. Basically, an
EMR provides details like the patient’s treatment history, personal details and their
physician details. Even though details were stored in EMR security mode, control
data were stolen. This EMR method has a benefit called records and can exchange
from one place to another place without any security guarantee. But using exchange
records in the blockchain helps to preserve the privacy of systems as well as high
security. Ananth et al., in his research work, proposed a method to keep data in
secure and immutable, called the Dual-Tree Complex wavelet transform method
(Ananth et al., 2018).
1. Primary care – this method arranges details about physician and diagnostic
techniques used to collect the patient health status, such as symptoms of any
diseases, any other problem faced by patient, and previous history of medical
details.
2. Cross-disciplinary referral – the main purpose of this method is so that the
hospital chief or physicians or any other health care providers can communi-
cate about the patient’s health care.
3. A multidisciplinary approach – this method works with different people to
achieve a set of goals to cure the patient of the illness.
An electronic health record system may be used within the organization that was
created and maintained by a particular organization. But this method doesn’t suit
for those who are traveling or looking for a new hospital. Such issues will happen if
the patient details don’t fall under their seeking hospital, which means that patients
get disappointed and are inconvenienced by having to seek a hospital. To overcome
this issue, we are supposed to follow blockchain advancement technology. This
advancement technology is comprised of three operations, namely information
confidentiality, accuracy and ready-to-use information. In this advancement of the
blockchain technology method, when the user changes any information the mem-
bers will verify the accuracy of the information with a code. Once data are stored in
the records, the patient can neither delete the data nor edit the data in the records.
Here two methodologies are used to store and manipulate data in the EMR
system.
Data privacy in health care in terms of keeping data from being stolen by some-
one is difficult, especially cognitive security in blockchain technology based
on the environments called “smart ambient assisted living.” Using this we can
secure patient data, and only authorized parties can access this kind of data. In
this process, the individual care process helps to collect patients’ previous his-
tory and present health care situations. Three methods used are cognitive secu-
rity impact evaluation, blockchain data privacy and protection, and personal
rights and information protection. Several models and considerations are taken
to implement the blockchain technology in clinical health care. Hyperledger
Fabric DLA method is used for obtaining security in the environment. Top soft-
ware companies like Google and Microsoft and many conferences conducted
by the IEEE have been involved in ensuring security in clinical health care.
Blockchain technology has achieved unsurpassed security in keeping records in
the health care system.
To improve the health care system in terms of decreasing the cost and complex-
ity, we are supposed to follow blockchain technology insurance companies. The
Estonian government has taken a step to improve health care in the commercial
sector and the government sector. The Estonian government created an innovation
strategy that implements the blockchain technology in the whole country. They
demonstrated how the process works in govtech partnerships. The population of
the country year by year increases and places greater demands on the health care
system. Not only is demand rising but the cost of the medicines is also increasing.
In order to solve this problem, Estonia introduced an innovative plan in 2011 with
a technology called blockchain in govtech partnerships. In this method a propri-
etary keyless signature was introduced in blockchain to ensure the security of the
records, and it authorizes the availability of parties also. This blockchain-based
health care records system has some benefits like its scalable, secure record system.
Because of its distributed nature blockchain can easily share data only with autho-
rized parties. The data auditing method was improved by the blockchain because
blockchain records are immutable.
Using big data in blockchain technology aims to make information portable,
or if any third party person requires big data, it will set permission to access those
third parties. Nowadays medical industries work based on value-based business;
this will help to prevent the diseases, change each and every person’s lifestyle, iden-
tify infections, etc. In order to manage the complexity of health care sector data,
analytics tools help to smooth the process as well as improve the efficiency of the
medical practice and make workflow accurate. Here blockchain technology starts
with one trusted ecosystem especially for decision making, and this blockchain
involves a timestamp that helps to authenticate dataset changes; this ability pro-
vides the permission to manage the electronic health record data for one user or
more than user if they edit any document purpose. Previously patients were not
able to share their personal data but now they can share their data securely with
even new members because here the blockchain technology used as authentication
with a timestamp that makes more secure about patient record details. In this type
of approach if any patient’s data are lost or crash in the sense automatically bulk
of data that was crashed, those data will be updated soon as well as if any of the
attackers attack those data at last the attacker may get a message called failure or
rejection because this whole system conditions verified by multiple system condi-
tions. Even though we are using the current technology to enable or keep data very
secure or maintain privacy a little bit of difficulty. When we use big data technol-
ogy that helps to keep data security also sometimes we can break personal data.
For such issues, blockchain is one possible best fit model. When we divide our data
into so many categories big data with blockchain provide security to the users as
well as to hospital management (Shilpa et al., 2018). In the past all records were
created in handwritten format only. But now a new trend has evolved in health
care to generate reports as well as data in the format of the digital chart. This new
method of electronic medical records and electronic health records replaces the
old method anticipated paper chart creation and cumbersome. To keep electronic
records secure, one protocol helps which is based on the HIPAA Security rule. This
protocol protects health records from virus attacks, making records confidential.
There are two different methods used to secure data in blockchain; one is the Mooti
model, and the other model is the Enigma model. The Mooti model in blockchain
keeps data secure and gives access only to those who are authenticated users; the
Enigma model organizes entire medical health records which include private infor-
mation across a distributed network, and only the party owner can decrypt (Daniel
et al., 2017).
Blockchain technology in health insurance may provide a new solution to the
health care sector. This method is based on a framework that gives an efficient
and fraud-free solution to the insurance claims. This framework is designed based
on permissionless blockchain, an open source called “Ethereum”. This process of
authentication depends on the involvement of various parties over the network.
Involving blockchain in health insurance decreases the amount of time and cost
required for processing. There are technical challenges. In order to overcome these,
blockchain cannot solve the data standardization problem but can provide a data
share method in real time only in the trusted network. In this type of blockchain
(Health Insurance) initially tested three types of nodes in a framework that was
created earlier. The blockchain framework is Ethereum solidity v4.0.31 but con-
tracts were written. Experiment setup requires Ubuntu 64 bit, Intel i5 processor
and RAM, 15.6 GB with 15 Mbps of local area network speeds. After success-
ful completion of experiments, Ethereum gives results like different confirmation
time for the different networks as well as smart contracts and is different from the
Ethereum framework. While implementing this proposed method the same frame-
work is used with the help of IPFS for different applications in the same framework
environment (Sravan et al., 2018).
Even though blockchain offers a lot of e-services to the government sector again
it lacks in offering standards in terms of making a system more reliably secure as
well as providing authentication to the users and preserving the data for a long
time. In India deploying blockchain in public services is a big challenge. Some of
the states in India have started to adopt blockchain-based IT in their state services.
This creation of blockchain-based health care and making it a public service may
be challenging, but when compared to the above process, the health information
or health records of the patient’s are brought into important changes in the health
public sector concern; records or information has been criticized on account of the
centralization process. The problem in the public sector to develop blockchain in
all the places is due to the lack of platform availability; this is the major reason why
we were not able to develop across the country. However, when we try to develop
means the cost will be high. A security system in the blockchain is another criterion
while developing in the public sector. This security system requires the follow-
ing type of security data security (records, information): Physical security, user-
provider key-secret key security and risk management. The above types of security
ensure trustworthiness of records or information which is stored in the health care
sector (Navadkar et al., 2018).
Introducing blockchain technology innovatively with cloud computing as well
as IoT technology provides more network capabilities, and computing power may
be high.
5.8 Blockchain in Finance
A new force of digital technology is dynamic business models and is progressively
turning into an important issue around the world. Blockchain technology is gen-
erating significant interest across a wide range of industries in India. The use cases
and blockchain fit assessment have also been performed for some banking transac-
tions. Every bank and financial office needs to perform the KYC method one by one
and transfer the valid data and documents to the central register. By using a unique
ID, banks can access the stored data to perform due diligence whenever customers
request a new service within the same banking relationship or from another bank.
Having explained about the need for blockchaining in banking and finance, what
are all the solutions offered by the blockchaining, uses cases or processes where the
blockchaining can play a key role? The main benefits of blockchaining are that it’s
near real-time, i.e. the blockchain technology enables near real-time settlements of
recorded transactions, removing friction and reducing risk. The next benefit is that
there is no intermediary, i.e. blockchaining technology is based on cryptographic
proof instead of trust, allowing any two parties to transact directly with each other
without the need for a trusted third party. The next benefit of blockchaining is
irreversibility and immutability, i.e. the blockchain contains a certain and verifi-
able record of every single transaction ever made. This prevents past blocks from
being altered and in turn stops double spending, fraud, abuse and manipulations of
transactions (Jani, 2017).
The article examines some of the disruptive changes that are likely to occur in
financial services due to rapid technological advances. The article includes a brief
mention of regulatory challenges to the adoption of this new technology. Many
policymakers are seeking to gain a better understanding of the likelihood that the
use of Bitcoins or other cryptocurrencies will gather momentum in their jurisdic-
tion. He previously mentioned that laws and rules may well be programmed into
the blockchain itself so that they are enforced automatically. In other situations,
the ledger can act as legal evidence for accessing (or storing) data, since it can’t be
changed (Trautman, 2016).
◾◾ User control and consent – information should be revealed with the users’
consent.
◾◾ Disclose minimum for use – provide the data which are essential
◾◾ Justifiable parties – the collected information is shared between the parties,
and they get the rights to use the information in a transaction.
◾◾ Directed identity – for sharing the information the support must be there in
public.
◾◾ Design for duplication of operators and techniques – every identity scheme
must have a solution.
Integration of human – the experience of the user must match the level of users’
needs and expectations; then only they can easily interact in the system.
◾◾ Regular experience in context – users should have consistency with the expe-
rience across the security.
The ambiguity present in the user’s elements needs to be addressed (Ali et al., 2016).
The ID system is implemented with the help of the Hyperledger Fabric frame-
work to solve the privacy problem and to make the ID sharing process easy. The
current system holds problems such as proxies but blockchains may be a solution
for these ID problems.
Hyperledger is an open-source blockchain. It is a platform for confidentiality,
resiliency, flexibility and scalability. This system is private; the employees of the
Hyperledger Fabric network register in a membership service provider (MSP). It
has a ledger subsystem consisting of two components:
The security concern with this identity management system is sensitive. The per-
sonal data stored can be owned by third parties. The proposed system explains the
concept of personal cloud where the users reveal the information to the different
service provider rather than handling an entire bundle of personal information. It
allows the components such as:
◾◾ Consensus
◾◾ Member services
The client application will be built using bootstrap HTML, CSS and JS deployed
on a server.
This system is: Organizations issue digital currency, create and implement new
methods for their distribution and provide conditions for financial transactions.
Different electronic payment systems issue their own type of currency. Electronic
money refers to the system of storing and transferring both traditional currencies
and non-state private currencies.
Classifications of electronic money:
◾◾ Smart cards
◾◾ Network
Bitcoins are a type of digital currency. Bitcoins are transactions stored in encrypted
form with certain conditions for financial transactions. No separate records are
maintained regarding the number of Bitcoins. In cryptocurrencies, public and pri-
vate keys are used to transfer currency from one person to another. It reaches a con-
clusion with the sole proprietor of the key able to control the Bitcoins (Tschorsch
& Scheuermann, 2016).
FinCEN Bureau from the USA proposed various measures to monitor transac-
tions across different cryptocurrency exchanges. It also recommended measures to
curb the exchange rate differences and the revenue generated by miners. In order to
collect income tax, the income from Bitcoins is treated as property. The Australian
Taxation Office (ATO) encouraged cryptocurrencies since their law does not
restrict their citizens in choice of currency. Airports and several shops accept them
as legal tender. This allows anonymity in tickets, avoiding intermediaries. Since
the population is lower, this method is very comfortable. From the end of 2013
the Swiss government has considered cryptocurrencies as another foreign currency.
The incorporation of blockchain technology was widely adopted in their financial
services like trade exchanges, banks and exchanges. Japan is identified as the origin
of the protocol of cryptocurrencies. Here Bitcoins are approved as legal tender. It
is also the first government to impose regulatory controls for these transactions.
Recently the Chinese government banned the usage of Bitcoins due to the issues
with taxation and communist ideologies. However, blockchain technology is mas-
sively adopted in various government departments which are helping them to avoid
intermediaries (Anastasia, 2018).
Payment with card transactions concludes after much verification of informa-
tion interchanges between the merchant, cardholder, issuing bank, a merchant bank
and any intermediate card processors. Blockchaining technology is used to record
References
Adida, B. (2008, July). Helios: Web-based open-audit voting. In USENIX Security
Symposium (Vol. 17, pp. 335–348).
Ainsworth, R. T., & Shact, A. (2016). Blockchain (distributed ledger technology) solves
VAT fraud. Boston Univ. School of Law, Law and Economics Research Paper,
(16–41).
Ainsworth, R. T., & Viitasaari, V. (2017). Payroll tax & the blockchain.
Ali, M., Nelson, J., Shea, R., & Freedman, M. J. (2016). Blockstack: A global naming
and storage system secured by blockchains. In 2016 {USENIX} Annual Technical
Conference ({USENIX}{ATC} 16) (pp. 181–194).
Anand, A., McKibbin, M., & Pichel, F. (2016). Colored coins: Bitcoin, blockchain, and
land administration. In Annual World Bank Conference on Land and Poverty.
Ananth, C., Karthikeyan, M., & Mohananthini, N. (2018). A secured healthcare system
using private blockchain technology. Journal of Engineering Technology, 6(2), 42–54.
Anastasia. (2018, May 30). Top 5 countries embracing the blockchain technology. Retrieved
from Yogita Khatri. (2019, Janurary 17). Wyoming blockchain bill proposes issuance
of tokenized stock certificates. Retrieved from https://www.coindesk.com/w yoming
-blockcha in-bill-proposes-issuance-of-tokenized-stock-certificates.
Ayed, A. B. (2017). A conceptual secure blockchain-based electronic voting system.
International Journal of Network Security & Its Applications, 9(3), 01–09.
Beck, R., Avital, M., Rossi, M., & Thatcher, J. B. (2017). Blockchain technology in business
and information systems research.
Budish, E. (2018). The economic limits of Bitcoin and the blockchain (No. w24717).
National Bureau of Economic Research.
Chaum, D. L. (1981). Untraceable electronic mail, return addresses, and digital pseud-
onyms. Communications of the ACM, 24(2), 84–90.
Daniel, J., Sargolzaei, A., Abdelghani, M., Sargolzaei, S., & Amaba, B. (2017). Blockchain
technology, cognitive computing, and healthcare innovations. Journal of Advances in
Information Technology, 8(3).
Evans, D., & Paul, N. (2004). Election security: Perception and reality. IEEE Security &
Privacy, 2(1), 24–31.
Godfrey-Welch, D., Lagrois, R., Law, J., & Anderwald, R. S. (2018). Blockchain in pay-
ment card systems. SMU Data Science Review, 1(1), 3.
Hanifatunnisa, R., & Rahardjo, B. (2017, October). Blockchain based e-voting recording
system design. In 2017 11th International Conference on Telecommunication Systems
Services and Applications (TSSA) (pp. 1–6). IEEE.
Heston, T. (2017). A case study in blockchain healthcare innovation.
Jani, S. (2017). Scope for Bitcoins in India.
Jayachandran, P. (2017, May 31). The difference between public and private blockchain.
IBM Blockchain Blog.
Lai, C. C., & Liu, C. M. (2019). A mobility-aware approach for distributed data update on
unstructured mobile P2P networks. Journal of Parallel and Distributed Computing,
123, 168–179.
Lim, S. Y., Fotsing, P. T., Almasri, A., Musa, O., Kiah, M. L. M., Ang, T. F., & Ismail,
R. (2018). Blockchain technology the identity management and authentication ser-
vice disruptor: A survey. International Journal on Advanced Science, Engineering and
Information Technology, 8(4–2), 1735–1745.
McCorry, P., Shahandashti, S. F., & Hao, F. (2017, April). A smart contract for board-
room voting with maximum voter privacy. In International Conference on Financial
Cryptography and Data Security (pp. 357–375). Springer, Cham.
McMurren, J., Young, A., & Verhulst, S. (2018). Addressing transaction costs through
blockchain and identity in Swedish land transfers.
Mendes, D., Galvão, H., Eiras, M., & Lopes, M. (2017). Clinical process in blockchain
for patient security in home care. Journal of the Institute of Engineering, 13(1), 37–47.
Navadkar, Vipul H., Nighot, Ajinkya, Wantmure, Rahul. (2018). Overview of block-
chain technology in public /government sectors. International Research Journal of
Engineering and Technology, 5(6).
Nguyen, B. (2017). Exploring applications of blockchain in securing electronic medical
records. Journal of Health Care Law & Policy, 20, 99.
Noizat, P. (2015). Blockchain electronic vote. In Handbook of Digital Currency (pp. 453–
461). Academic Press.
Pokrovskaia, N. N. (2017, May). Tax, financial and social regulatory mechanisms within
the knowledge-driven economy. Blockchain algorithms and fog computing for the
efficient regulation. In 2017 XX IEEE International Conference on Soft Computing and
Measurements (SCM) (pp. 709–712). IEEE.
Ramya, U. M., Sindhuja, P., Atsaya, R. A., Dharani, B. B., & Golla, S. M. V. (2018,
July). Reducing forgery in land registry system using blockchain technology. In
International Conference on Advanced Informatics for Computing Research (pp. 725–
734). Springer, Singapore.
Sadiku, M. N., Eze, K. G., & Musa, S. M. (2018). Blockchain technology in healthcare.
International Journal of Advances in Scientific Research and Engineering, 4.
Schwanke, A. (2017). Bridging the digital gap: How tax fits into cryptocurrencies and
blockchain development. International Tax Review.
Sharma, P. K., & Park, J. H. (2018). Blockchain based hybrid network architecture for the
smart city. Future Generation Computer Systems, 86, 650–655.
Shilpa, Sharma, R., Singh, S. (2018). Big data analytic on blockchain across healthcare sec-
tor. International Journal of Engineering and Technology (UAE), 7(2.30), pp. 10–14.
Singh, M., & Kim, S. (2018). Branch based blockchain technology in intelligent vehicle.
Computer Networks, 145, 219–231.
Sravan, Nukala Poorna Viswanadha, Baruah, Pallav Kumar, Mudigonda, Sathya Sai, and
Phani, Krihsna. K. (2018). Use of blockchain technology in integrating health insur-
ance company and hospital. International Journal of Advances in Scientific Research
and Engineering, 9.
Swan, M. (2017). Anticipating the economic benefits of blockchain. Technology Innovation
Management Review, 7(10), 6–13.
Themistocleous, M. (2018). Blockchain technology and land registry. The Cyprus Review,
30(2), 199–206.
Thomas, R., & Huang, C. (2017). Blockchain, the Borg collective and digitalisation of land
registries. The Conveyancer and Property Lawyer (2017), 81.
Trautman, L. J. (2016). Is disruptive blockchain technology the future of financial services.
Trueb, B. A. (2013). Estonian Electronic ID–card application specification prerequisites to
the smart card differentiation to previous versions of EstEID card application.
Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on
decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3),
2084–2123.
United Nations. Economic Commission for Europe. (1996). Land administration guide-
lines: With special reference to countries in transition. United Nations Pubns.
Vos, J. (2016). Blockchain-based land registry: Panacea illusion or something in between?
In IPRA/CINDER Congress, Dubai.
Vos, J., Beentjes, B., & Lemmen, C. (2017, March). Blockchain based land administration
feasible, illusory or a panacea. In Netherlands Cadastre, Land Registry and Mapping
Agency. Paper Prepared for Presentation at the 2017 World Bank Conference on Land
and Povertry, The World Bank, Washington, DC.
Wang, B., Sun, J., He, Y., Pang, D., & Lu, N. (2018). Large-scale election based on block-
chain. Procedia Computer Science, 129, 234–237.
Wanitcharakkhakul, L., & Rotchanakitumnuai, S. (2017). Blockchain technology accep-
tance in electronic medical record system.
Wijaya, D. A., Liu, J. K., Suwarsono, D. A., & Zhang, P. (2017, October). A new block-
chain-based value-added tax system. In International Conference on Provable Security
(pp. 471–486). Springer, Cham.
Wright, A., & De Filippi, P. (2015). Decentralized blockchain technology and the rise of lex
cryptographia. Available at SSRN 2580664.
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017, June). An overview of blockchain
technology: Architecture, consensus, and future trends. In 2017 IEEE International
Congress on Big Data (BigData Congress) (pp. 557–564). IEEE.
Zheng, Z., Xie, S., Dai, H. N., & Wang, H. (2016). Blockchain challenges and opportuni-
ties: A survey. Work Pap.–2016.
Blockchain and
Social Media
Saugata Dutta and Kavita Saini
Contents
6.1 Introduction..............................................................................................101
6.2 How Blockchain Works............................................................................104
6.3 Blockchain in Social Media.......................................................................105
6.4 Blockchain-Based Social Media (A Revolution)........................................106
6.5 Social Media Opportunities in Blockchain...............................................107
6.6 Future Ahead............................................................................................113
References.......................................................................................................... 114
6.1 Introduction
A blockchain can be defined as an increasing list of blocks where each block
is linked with the hash of the previous one. A block consists of a collection of
transactions, time stamps and the hash of the previous block. Blockchain is a
distributed ledger where transactions are stored in blocks and spread across a
peer-to-peer network where every node holds a copy of the ledger. The value of
cryptography hashing and a distributed ledger makes it more unique than other
technologies in that it is highly secured and almost impossible to compromise. The
transparency in information for every node or participant is a property of block-
chain which shows information cannot be modified which reduces fraudulent
101
Telegram Channel @nettrain
102 ◾ Blockchain Technology and Applications
data and tampering with data which helps in building trust. Blockchain is cus-
tomizable where actions can be triggered once the contextual conditions are met.
Blockchain works on a peer-to-peer network, and there is no third party or cen-
tral authority involvement.
Encryption is a base concept for blockchain. It can be seen as immutability of
data which is also distributed. The history starts during the late 1970s when the
concept of a Merkle tree was introduced which is a binary hash tree. The concep-
tual tree consists of a leaf node with a hash and every non-leaf node has a cryp-
tographic hash of its child nodes. This helped in the secure verification of large
data. This conceptual model was invented by Ralph Merkle in 1979. In the early
1990s a blockchain-like technology was introduced by Stuart Haber and W. Scott
Stornetta, working on secure blockchain. In 1992, documents could be stored in a
single block with the help of the Merkle tree design. The actual inception of block-
chain was conceptualized by Satoshi Nakamoto in 2008 when he introduced the
peer-to-peer cash system. This triggered the launch of a currency in 2009 which
is a digital cryptocurrency with an underlying layer of blockchain technology. The
digital cryptocurrency known as “Bitcoin” came to existence. Satoshi Nakamoto
mined the first Bitcoin. Hal Finney who was the programmer for Bitcoin was the
first to receive 10 Bitcoins from Satoshi Nakamoto.
The year 2014 experienced a probability to use the blockchain technology as a
legitimate use of payments. This is the starting period where investors started focus-
ing on this technology. This is the time when smart contracts and decentralized
apps were conceptualized. This stepled to the realization of the benefit of running
decentralized apps and smart contracts. Ethereum is a public blockchain developed
in open source and decentralized whereas the cryptocurrency is named “Ether”.
Ethereum with a smart contracting layer gave the advantage of including various
parameters and also validating various levels over the transactions. This contracting
layer also helped various parameters and improved upon the overall interactions on
the transactions and contracts. Blockchain technology is transparent, secured and
there is no third party or central authority intervention. It has the ability to make
an organization that uses this technology more transparent, democratic, efficient,
decentralized and secure. Within the next five to ten years blockchain will disrupt
various industries. Some of the industries where blockchain has already started
include banking services intended for those who have no access to the banking
system that we use presently. Similarly Bitcoin allows users to send money. Barclays
has already started using blockchain to some extent. Blockchain is used in supply
chain management where users store data in decentralized locations and records
are kept in a secured manner which provides various benefits like minimizing cost
and labor. Some of the startup blockchain companies like Provenance, Fluent,
Skuchain and Blockverify are working to improve supply chain management. In
forecasting industries, blockchain is expected to change the traditional methods
of research, consulting, forecasting and analysis. In networking and IoT, IBM and
Samsung are using a new idea called “adapt” which will use blockchain technol-
ogy and create a distributed network of IoT devices. In the insurance industry, the
core is trust management. With the help of blockchain, technology ensured person
identity. Blockchain can be used to verify many types of data in insurance contracts
like the insured person’s identity. Blockchain smart contracts can be integrated
with oracles bearing real data. A blockchain project called Aeternity is developing
digital applications for the insurance industry. In private transport and the ride-
sharing industry, blockchain technology is being used to create a platform for rid-
ers and owners where riders can access the services by meeting a mutual terms and
condition without a central authority. Blockchain startups like Lazoos and Arcade
City are working in this area. In the online data storage industry, blockchain allows
storage to be more secure and robust against attacks. Storj is an example of decen-
tralized cloud storage. In the charity industry, blockchain can be used to address
inefficiencies and corruption. It can help to track that donations are going to the
right hands. BitGive uses blockchain technology to receive funds using a distrib-
uted ledger. In voting, blockchain can be used for a number of services like the
verification of identity, registration of voters and also counting the votes. It helps
in counting only the legitimate votes, no votes are changed or moved, and creat-
ing an immutable, publicly viewable ledger will make a massive step forward to
make elections more fair and democratic. Democracy Earth and Follow My Vote
are aiming in this field to create a blockchain-based voting system. In the health
care industry, blockchain is used to store and share sensitive data with authorized
doctors and patients. This will help in data security and improve in accuracy and
speed in diagnosis. Gem and Tierion are working in the health care data space. In
the energy management industry, TransactiveGrid allows customers to buy and
sell energy from each other in a decentralized way without involving the public
grid or a trusted private intermediary. In online music, blockchain can be used by
fans to pay musicians directly. Smart contracts can be introduced which can solve
licensing issues and better catalog songs with their respective creators. Mycelia and
Ujo are blockchain-based platforms made specifically for the music industry. In the
retail industry, blockchain utilities creates a lobby where sellers and buyers meet
and can deal as per the requirements without the intervention of a central author-
ity. The two startups OpenBazaar and OB1 use blockchain in the retail space. In
the real estate industry, some challenges can be overcome like lack of transparency,
fraud, bureaucracy and mistakes in public records. Blockchain technology can help
in reducing the need for documents, building accuracy and verifying ownership
and also speeding up transactions. Ubiquity is a blockchain-based secured plat-
form for real estate record keeping which is an alternative to legacy paper-based
systems. In the crowdfunding industry, many organizations are benefited especially
the startups by raising funds using blockchain smart contracts which eliminates the
need for a third party. New projects can release their own tokens that can be later
exchanged for services, cash or products.
[3]. As mining is a guessing game, miners are special nodes with special hardware
or computational power who take part in this guessing game known as proof of
work and are rewarded with digital currency on successfully guessing and adding a
block in the blockchain. The miners with more computational power may succeed
more often, but due to the law of statistical probability, it is highly unlikely that the
same miner will do so every time. Using a consensus algorithm, you can actually
agree one particular state of blockchain in the entire network. So if a new block is
added in a blockchain, who will add it can be defined with the help of a consensus
algorithm like proof of work (POW).
technology, where vendors are verified which will make marketing simpler and
improve the return of investment and will also gain potential company growth.
Cryptocurrencies can be a good combination with the advent of blockchain in
social media. Posts, likes or any type of participation can yield small amounts of
cryptocurrencies. There is also a demand for the collectibles of cryptocurrencies
using blockchain technology where small investments are done in the form of cryp-
tocurrencies, for example companies develop crypto-collectible games for Android
and IOS in which cryptocurrencies are used. Blockchain with social media can
stop the use of fake content which is now flooding social media. The technology
will help to post traceable data and verified contents. This will help marketing
teams and brand managers. Journalistic social media faces challenges on the media
content that audiences rely on such as source reliability, excessive liberty in pri-
vacy, fake news and failure to regulate the structure and flow of information [5].
Although social media has given us lots of useful information, many of this is
untraceable, has integrity issues and is unreliable and unethical.
◾◾ Fake news: The advantage of using authentic content and source data verifica-
tion will help to fight this problem. The content creators are also verified. The
approach is versatile towards profitability on personal data, control and privacy.
◾◾ Advertisement: Where the user has the control to see ads at their own wish.
This will help in controlling advertisement frauds where there is wastage of
money. The users may be rewarded if they wish to see the advertisement.
◾◾ Rewards: With the help of smart contracts, creators are rewarded for views
and likes for quality posts. In comparison in other networking sites like
YouTube the compensation is too little and is only triggered with huge view
numbers.
◾◾ Privacy: Users can be anonymous if they want or may log in to their secured
account as per choice. The anonymity will help them not to be censored,
traced or tracked where in some countries social networking is blocked. The
benefits of social media with this technology will eliminate blocking.
The strongest argument made for this technology is that you have the control over
your data. This technology will be helpful not only for the brands but for individu-
als too because the users select the brands and they get paid for it. An individual’s
digital identity is worth everything. Imagine a celebrity’s digital identity on a social
networking site is valuable and a money earner. The answer remains to us for our
likes and views which earn them money. That is one of the major reasons why the
decentralization movement is powerful and we all will be a part of it. The tokenized
business model will help to generate token rewards for photo uploads, views and
likes. This will start a community business.. That is where the future is going, and
this is what the technology enables. Although the ideas and concepts were there
earlier, the technology execution was not possible, but now with the advent of vari-
ous latest technology models it is possible with various startup companies focusing
on these models.
◾◾ Steemit: This is the most common blockchain-based social media and need-
less to say it is decentralized; users can experience the same features as on
Facebook. Users will have better data privacy and security. The creators are
rewarded with digital currencies and for all in-platform transactions. Steemit
works with upvotes and downvotes. The earning mechanism works based
on the number of upvotes it receives for the content. The more the user is
engaged, the more he or she earns. It is the most successful blockchain-based
social media. The distribution of rewards is 50% to authors and the rest,
50%, to voters. The 50% of reward given to authors is further divided as
50% of the reward is given in Steem powers and rest, 50%, in Steem dollars.
Steem power rewards are distributed over two years of weekly payments. This
is done to bring stability to the market, not just to speculate and make money
but to help in continuous engagement. Steem powers are given to winners
to curate content and earn Steem rewards. The sign-up process takes some
time, as this ensures that the participants are real people. In this platform
individuals are rewarded for creating and curating content. Steem provides
opportunities for creators, curators, remitters, merchants, shoppers, market
makers, commenters, entrepreneurs, bloggers, referrers, community leaders
and Internet readers.
◾◾ Obsidian: It provides a collection of blockchain-based services and apps. But
the main purpose of obsidian is a highly secured blockchain-based messen-
ger. Due to its peer-to-peer nature, all messages are encrypted end-to-end
and you have full control over the data, files and photos you share. There
are features like timely auto deletion, and there is no intervention of a third
party. An individual can be assured that there is no breach in data privacy
and security. On a decentralized network of blockchain the encrypted private
messenger operates.
◾◾ Earn: It’s an application quite similar to LinkedIn. There are some differences
to it. Earn enables the user to receive messages which are paid, and the user
can also link with people of the same skills. One can make money through
the paid email system, inspiring users to pay for responses. One can create an
auto-reply to mail as well.
◾◾ Indorse: This platform is built on Ethereum blockchain. This is also simi-
lar to LinkedIn and sets profit from the skills when an account is created.
The contribution is rewarded and users have full rights to their content. In
Indorse, users can benefit from some technical skills and end up getting busi-
ness or job when reviewed by experts. This also allows smart contracts and
rewards users with digital currencies. All connections are validated, authentic
and reliable. This is a reliable channel to endorse skills and also display them.
Each user either can be a claimant or a moderator. A user once creates an
account and can claim the profile they upload. The same is reviewed by oth-
ers, called proof of stake. Once the claim is accepted and authentic, the user’s
score is elevated. This helps in the KYC process, freelance services, hiring,
advertising and market predictions. The digital currencies are used by the
advertisement firms to buy space in the social media. Score token are used for
posting, views and updates to the member profile.
their data. Users can see all social feeds and also have the facility to share
without disturbing the existing system. It’s an incentivized social dashboard
to connect and control social media accounts and also use a decentralized
social network where information will not be censored and restricted. Here
contents are never removed or banned. It uses a gravity algorithm, which is
used to identify and measure viral content to track a number of people in
a short amount of time. The measurements are made through positive and
negative gravity. Positive gravities are rewarded while negative gravities are
not rewarded but at the same time not punished. It uses dual blockchain
concepts both on waves and Ethereum.
◾◾ Smoke: It is a decentralized cannabis network. This is a blockchain built for
the cannabis community [10]. This is perhaps the first blockchain for can-
nabis services. This is resistant to censors, and the database is immutable.
Users can earn rewards and have business access without the disadvantage
of false identity and content. It uses a social consensus algorithm to mine for
reward transactions. The contents can be reviews, cannabis strains, articles,
etc. Voting rights and high-quality content rewards are done through special
utility coins called SMOKE cryptocurrency.
◾◾ Alfa: It is a blockchain-based social media platform which has enhanced
privacy and a user-friendly approach. It fosters digital sharing and gives the
opportunity to become a small entrepreneur without any central authority.
It has premium advertisement for various promotional activities and are all
time-based. Users will have the prerogative to see the ads as per their choice
and are rewarded for time spent watching ads. All the content postings are
time-based and in chronological order. The users can schedule posts on a time
frame; the posts can also be self-destructible. Breaking the walled garden as
against the traditional social media system, users are encouraged and given
value for the post while giving full control to users. It creates an eco-system
where users have the chance to be micro-entrepreneurs. This will provide
greater possibilities for everyone. Buyers and sellers and benefited in this plat-
form by services such as ride sharing, home sharing, information sharing and
other services where transactions are kept private. The content navigation
system is very appealing and can be accommodated on any screen. It also
has an alpha watch where all these apps are clubbed together like social net-
work, digital wallet and smart phone to have a different unified experience
altogether.
◾◾ APPICS: It’s a blockchain-based social media application covering various
categories like sports, arts, culture, lifestyles, fashion and so on. Users are
rewarded for content posting. The reward token is cryptocurrency-based and
is paid for creative content and at the same time helps users to earn a share
from the overall revenue. This platform helps to monetize the content created
and respect users who devoted time and energy to create content to keep
the site alive. The users who like the contents are also rewarded, creating a
win-win situation for both creators and viewers. You can send direct transac-
tions to another user’s account which are totally secured and take a matter of
seconds with no fees and no delays. There are 16+ categories.
◾◾ Peepeth: It is a decentralized social media like Twitter. Peepeth runs on
Ethereum blockchain. It runs like any other normal website except the smart
contract and data stored are open source. Peepeth reads and writes from the
smart contracts. One can use bulk posting, to post all data like posts and
follow in a single cheap transaction [11]. There is an option for free peeping
where a user can post for free if they have peeped several times and have
good social standing. It has features like twitter cross posting, bulk posting
and mail notifications. It has a convincing social media verification process,
where the user needs to post the Ethereum address to an external social media
account which the user claims. The link will then be verified by smart con-
tracts and, once done, the external social account will be linked with the
Ethereum address. It gives the user control over their own legacy. Data are
saved on a public blockchain where data are immutable. It has great features
like resistance to SPAM, transparency, verifications, authentic contents and
monetization.
◾◾ Mastodon: It’s a blockchain-based social network and open source-based
application which is similar to Twitter or Tumblr where users post photos,
videos and messages and follow, share or like and data are saved on a block-
chain platform. Messages use a limitation of 500 characters and are ordered
chronologically. It is decentralized, and there is no intervention from any
central or third-party authority. When a user creates their own version of
Mastodon it is known as instance. Users can create Mastodon instances with
their own set of rules and have full ownership over it [12]. Users can follow
each other on cross instances and can communicate with other users seam-
lessly from other instances. Private instances have the freedom to choose to
communicate with other users. It offers anti-abuse tools to moderate over the
instances. This type of social media cannot be sold, blocked or bankrupted.
Users have the ability to join any community they want and communicate.
Mastodon with its huge registered user base is growing fast among block-
chain social media platforms.
◾◾ Steepshot: It’s a social media application based on blockchain technology
where the user can earn rewards when uploading quality content. This is built
on Steem blockchain. It is also resistant to censorship. It is perhaps the first
blockchain-based application in Steem blockchain for sharing photos and
videos primarily. Users can earn Steem dollars. Similar to other blockchain-
based social media applications the user can share posts to other social media
sites and promote posts while earning rewards. It consists of a mobile wallet
where one can conduct transactions to claim rewards and check one’s balance
without going to Steemit account. It is equipped with push notifications for
upvotes, comments and likes and also can achieve updates from a specific
user. With the help of an NSFW tag, a user has the ability to post gore, por-
nographic, horror and violent contents. It has the capability to search content
based on certain topics or subjects. Full-screen mode, photo editing and tag-
ging are some of the enhanced features [13].
◾◾ Dtube: Is an alternative to YouTube, where users can earn in cryptocurrencies
when a video is uploaded. The platform is blockchain-based. The uploaded
videos can earn rewards for seven days [14]. The videos can be upvoted or
downvoted depending upon the quality of the content. The more upvotes,
the more a user can earn. It’s built on Steem blockchain. Like YouTube, users
can create channels and subscribe to channels. It is resistant to censorship,
because of its decentralized nature. It is a fair platform with full transparency,
where there is no hidden algorithm. It’s advertisement-free, however the user
has the freedom to put advertisements into their videos, but take their own
risk of losing subscribers from their channel. Dtube uses IPFS for decentral-
ized file storage. The content is hashed, and the hash becomes the identifier
of the uploaded file. This can also be rehashed and compared to check the
integrity of the file. This is also called DHT, which is known as distributed
hash table.
6.6 Future Ahead
Blockchain helps in securing content on social media. This might not be a concern
for most, but for those who have concerns, they might not be subscribers to social
networking sites at all. Social networking sites have their own terms and condi-
tions, promotion ideas and collaboration. Crowdfunding companies like Indiegogo
and Kickstarter help startup organizations to raise funds through digital currencies
or ICOs.
Thus, the quality of blockchain-based social networking sites help to raise funds
securely and without corruption. Without the external payment mechanism, the
network that is running on cryptocurrency can support crowd sales. Blockchain-
enabled social media will have an intense impact on widespread platforms like
Twitter, Facebook, Instagram and Snapchat. Marketers in social media should
explore and adopt these new blockchain-based social networking lobby to be an
early bird in this opportunity. In the absence of any centralized authority, users on
these networks benefit from greater privacy [15]. In turn, this upholds the freedom
of speech and expression, relieving users of the torments of being prosecuted for
their thoughts on social media. Most decentralized social media platforms offer
rewards for posting, liking and sharing content which provides a platform to earn.
The sooner the social media marketer recognizes the potential of blockchain-based
social media, the better they can create strategies for better business and earning
and be a part of the new reality. So far so good, here we have explored some social
media networks with underlying blockchain technology that are quite popular and
References
1. PTT Bilgi Teknolojileri A.S. (2018, June 29). Blockchain@next18 Event. Retrieved
from https://www.slideshare.net/obcag/blockcha innext18-event.
2. What is Blockchain Technology. (n.d.). Retrieved from https://www.ibm.com/block
chain/what-is-blockchain.
3. Binance Academy. (2019, November 11). Proof of Work Explained. Retrieved from
https://www.bina nce.vision/blockchain/proof-of-work-explained.
4. 5 Trends Shows How Blockchain Is Changing Social Media. (n.d.). Retrieved from
https://hackernoon.com/5-trends-shows-how-blockcha in-is-changing-socia l-media
-ba50c975c041.
5. UPADHYAY, N. I. T. I. N. (2019). Transforming Social Media Business Models through
Blockchain. S.l.: EMERALD GROUP PUBL.
6. Which are the Top 5 Blockchain-Based Social Media Networks? (2018, July 23).
Retrieved from https://www.kryptographe.com/top-5-blockchain-based-social-me
dia-networks/.
7. Daniel. (2017, December 12). Sola: Next-Gen Decentralized Social Network
Platform: ICO Review. Retrieved from https://ww w.chipin.com/sola-ico-social-n
etwork-user-reward/.
8. Minds. (n.d.). Retrieved from https://www.minds.com/.
9. SoMee.Social. (n.d.). Retrieved from https://somee.social/.
10. Smoke Network Social Blockchain. (n.d.). Retrieved from https://smoke.network/.
11. Microblogging with a Soul (powered by blockchain). (n.d.). Retrieved from https://
peepeth.com/about.
12. Mastodon. (n.d.). Retrieved from https://joinmastodon.org/.
13. Platform that Rewards People for Sharing their Lifestyle and Visual Experience.
(n.d.). Retrieved from https://steepshot.io/.
14. FAQ. (n.d.). Retrieved from https://about.d.tube/.
15. Blockchain Social Media - Towards User-Controlled Data. (2019, November 5).
Retrieved from https://www.leewayhertz.com/blockcha in-social-media-platforms/.
Assessing Security
Features of Blockchain
Technology
T. Subha
Contents
7.1 Introduction: History of Blockchain......................................................... 116
7.1.1 Working of Blockchain ................................................................. 117
7.1.1.1 Structure of a Blockchain ............................................... 118
7.1.1.2 Steps in Creating a Blockchain........................................ 118
7.1.2 Key Attributes of Blockchain......................................................... 119
7.1.2.1 Distributed...................................................................... 119
7.1.2.2 Peer to Peer...................................................................... 119
7.1.2.3 Cryptographically Secured..............................................120
7.1.2.4 Add Only.........................................................................120
7.1.2.5 Consensus........................................................................120
7.1.3 Types of Blockchain.......................................................................120
7.1.3.1 Public Blockchain............................................................121
7.1.3.2 Private Blockchain...........................................................121
7.1.3.3 Consortium/Federated Blockchain..................................121
7.1.3.4 Hybrid Blockchain..........................................................122
7.1.4 Pillars of Blockchain Technology...................................................122
7.1.4.1 Decentralization..............................................................122
7.1.4.2 Immutability...................................................................123
7.1.4.3 Transparency...................................................................123
115
Telegram Channel @nettrain
116 ◾ Blockchain Technology and Applications
7.1.1 Working of Blockchain
In this section we explain how blockchain works in detail. Blockchain is a buzz-
word for many.
The details of how blockchain works are explained below. Imagine if two friends
A and B want to transfer/transact money from one account to another account. In
a normal scenario, friend A first approaches the bank and asks the bank to transfer
the amount to the account of his friend B. This transaction detail is entered into
the bank registry that is maintained by the bank. This entry needs to be updated
on both the sender’s and receiver’s accounts. But the problem in this system is that
the entries can be easily manipulated or changed by those who are have knowledge
about the system. It is easily changeable. This process has been diagrammatically
specified in Figure 7.1 [1]. This is the place where blockchain comes into the picture
to resolve this issue.
For example, imagine a Google spreadsheet that consists of real-time transac-
tions. This sheet can be shared with multiple users through networks of computers.
The users can access this transaction but no one can edit it easily. The spreadsheet
is organized as rows and columns and it is treated as blocks in blockchain. A block
represents a collection of data in the blockchain. The data get added to the block in
chronological order by creating a chain of blocks that forms a link. The first block
in the blockchain is called the genesis block.
Blockchain is developed in such a way that it’s called a digital ledger. This digi-
tal ledger is duplicated and distributed to thousands of individual computers across
the world. These are called nodes, and the interactions between these nodes are
periodically updated to the ledger. Each user is given access to a public and private
key. These two are the cryptographic keys and are secured one. They allow limited
interaction with the system. For example, if there are two users and they agree on
an exchange of Bitcoin currency, a particular user can initiate the transaction using
their public and private keys. The other user can accept the transaction using their
own public and private keys. Both users can submit the transactions to the P2P
system.
A unique hash code present in the block checks the transaction information
so as to ensure that the transaction agrees with all other prior information. It may
deny the transaction if the initiating user does not have the cryptocurrency that
they claim for. Otherwise this checking node accepts the transaction and it is
added as a new block in the chain.
7.1.1.1 Structure of a Blockchain
The structure of a block is a container that consists of a series of transactions and it
is simply a distributed data structure. A block in a blockchain consists of two parts
named header and data (transactions).
◾◾ Header – this connects all the transactions. If there is a change in any trans-
action, it will be reflected in a change in the block header.
The subsequent block headers are connected in a chain. So to make a
change requires an update of the entire blockchain.
◾◾ Data (transactions)
Transactions are stored as blocks in the blockchain, and these transactions
are hashed and represented as a Merkle hash tree.
◾◾ Step 1: A node creates a transaction by digitally signing it with its own pri-
vate key. Key pairs are created using a cryptography algorithm. A particular
transaction may represent various actions, and it is commonly known as a data
structure that shows the transfer of value between different users in a network
of the blockchain. It represents information such as logic of transfer of value,
source address, destination address, relevant rules, and validation information.
7.1.2.1 Distributed
The ledger is shared among multiple peers in a network. So it is not easy to tamper
with or alter the data.
7.1.2.2 Peer to Peer
There is no central authority or central control to manipulate or monitor the trans-
actions. Every participant that participates in a transaction talks to the others
directly. This makes data exchange easy with the involvement of third parties.
7.1.2.3 Cryptographically Secured
Cryptographic algorithms can be utilized to make the ledger tamper-proof.
7.1.2.4 Add Only
Data are added to the blockchain in time sequential order. This implies that the data
cannot be altered once they are added to the blockchain. It is practically impossible
to alter the data and they are immutable.
7.1.2.5 Consensus
This is the most critical attribute of all the attributes of the blockchain. The ledger
data can be updated via consensus [4]. It leads to the property of decentralization,
i.e. no central authority is involved in updating the ledger. So in the case of any
update to the ledger, it must strictly follow the protocol designed and the update
should be validated. Finally, it is added to the blockchain only if all the participat-
ing peers and nodes reach consensus in a network.
7.1.3 Types of Blockchain
Mainly there are three different types of blockchain are present [5]. They are,
◾◾ Public blockchain
◾◾ Private blockchain
◾◾ Consortium/federated blockchain
◾◾ Hybrid blockchain
These types are represented diagrammatically in Figure 7.3 [2]. These types and its
uses are clearly explained below.
7.1.3.1 Public Blockchain
It is the blockchain for the public and it has no restrictions. Anyone with an
Internet connection is allowed to send a transaction (i.e. reading/writing/auditing)
and can become a validator in the group. This type of blockchain is transparent
and open type. If this is going to be the case, then who is responsible for transac-
tion confirmation? Because anyone in the group is allowed to review anything
at a given point of time. So this is done with the help of decentralized consensus
mechanisms such as PoW and PoS; all these nodes are participating in the execu-
tion of consensus.
This blockchain is “ for the people, by the people, and of the people”.
The largest known public blockchain examples are Bitcoin, Litecoin, and
Ethereum.
7.1.3.2 Private Blockchain
Private blockchains are for individuals or organizations. One cannot join in a pri-
vate blockchain unless invited by the network administrators. Restrictions are put
on participant access and validator access. This type of blockchain is convenient
for users who do not want to share their sensitive data with a public blockchain.
It is mainly used for accounting and for keeping records without compromising
autonomy. In a private blockchain, consensus is granted by a central authority and
he is responsible for granting mining access to all or not to anyone. Again this
comes under a centralized network which contradicts the idea of blockchain, but it
is cryptographically secured.
Bankchain is an example of a private blockchain. Private blockchains are also
called permissioned.
7.1.3.3 Consortium/Federated Blockchain
A consortium blockchain is a type of semi-decentralized blockchain but it is per-
missioned too. Multiple companies or multiple individuals combine together to
operate the node in a network. These groups are known as a consortium or fed-
eration, and their combined nature helps in making decisions for the benefit of
the entire network. Administrators will grant the reading request and consensus
request to a limited set of trusted nodes who can take part in consensus execution.
It is much faster in accomplishing things, and there is no single point of failure. For
example, the world’s top 20 financial institutions are grouped under one consor-
tium. At least 15 companies should vote for or validate the transaction in order to
add one block or to make decisions in this type.
R3 and EMF are examples of consortium blockchains.
7.1.3.4 Hybrid Blockchain
As the name suggests it’s a combination of different characteristics of public and
private blockchains. With this type we can decide which information is made pub-
lic and which information is private.
7.1.4.1 Decentralization
Users or industries know very well about centralized servers, and they have been
working on it since before Bitcoin and BitTorrent came into the picture. The idea of
storing data and retrieving the data from a central entity is an easy one. Users have
to interact only with the central authority for the required information. Banks are
one of the well-known examples for centralized systems.
A bank stores your money in an account and maintains all the transactions
in a centralized server. If you want to transfer money into your friend’s account it
must be done through the bank only. We can look at the client–server example as
the best one for a centralized system. For example, if you (client) search something
in a Google search engine, it queries the server (server) for the result and returns it
back to you. This is another good example for a client–server system. We have been
working with centralized systems for many years and at the same time they also
have vulnerabilities.
◾◾ As data are stored in a single central repository, this one spot becomes an easy
target for hackers and others.
◾◾ The entire system halts in case of any upgrade to be carried out in a central-
ized system.
◾◾ If the system is shut down for unknown reasons, then there is no way to
retrieve the data from a centralized system.
◾◾ What happens to the data if they get corrupted or become malicious in the
worst case? The data will be completely compromised in that case.
If we try to take this centralized entity out, it leads to the concept of decentraliza-
tion. In decentralization the data are not stored or maintained by a single entity.
In fact, they are owned by every user participating in the network. If two users
want to communicate in a blockchain then they can directly communicate without
the involvement of a third party. Bitcoin is implemented using this ideology only.
You are the only one responsible for your money, and you can transfer it to anyone
without going through the bank.
7.1.4.2 Immutability
Immutability is nothing but that the data cannot be tampered with once they are
entered into the blockchain. Blockchain is able to achieve this unique property with
the help of cryptography hash value. Hashing is the process of producing a fixed-
length hash as output, and it takes an input string of any length. Transactions are
the inputs in Bitcoins, and they run through a cryptography hash algorithm such
as SHA-256 (used by Bitcoin) and it produces fixed-length output.
Even if the input is of an arbitrary length it is easy to remember the 256 bits of hash
value output. The cryptography hash function has many attractive features. One of
the important properties that we need to keep in mind is the “Avalanche Effect”. If
you try to make even a small change in the input value, it will be reflected in a huge
change in the output hash value.
Blockchain is organized as a similar structure of linked lists which contain data
and a hash pointer that points to the previous block. A hash pointer is a kind of
pointer which points the hash value of data, i.e. present inside the previous block.
This property makes blockchain immutable and amazingly reliable. If anyone tries
to change a single bit of data in block 4, it is reflected in a huge change in the data
stored in block 3 and in turn it affects the data stored in block 2 and it contin-
ues further. The change in hash value is used to find whether the transactions are
altered by any means. But it is completely not possible based on the property of
hash.
7.1.4.3 Transparency
The most attractive feature of blockchain technology is the degree of transparency
it can provide in a network. Another important aspect of blockchain technology
is the degree of privacy that it can provide. Transparency is basically concerned
with the quality of being clear and understandable without ambiguity. What hap-
pens actually is blockchain hides the user identity by using complex cryptography
algorithms. So while looking for a particular transaction record it does not look
like “alice sent bob 2btc” in the original record. Instead it will look like encrypted
content “2BM2hdskjfhdfgRvndkERFVbjb237bu sent 2 btc”.
The transactions in Ethereum blockchain are still seen by the public address
even if the real identity is hidden. So blockchain ensures privacy, and this kind
of transparency has never existed in any of the earlier financial systems. It can be
checked easily in Internet Explorer if we know the public address of big companies
that do transactions using their cryptocurrency. But the big financial companies
won’t perform all their transactions using cryptocurrency. The big boom in block-
chain is because it can be integrated in supply chain management.
7.1.5 Benefits of Blockchain
The following lists out the benefits of blockchain in detail.
7.2 Literature Review
A blockchain is a shared and distributed ledger, in simple terms it is a chain of
blocks. The block talks about digital information and this information is stored in
a public database is called chain. The appealing aspect of blockchain technology is
easy to track the resources without having a centralized trusted authority [6]. It per-
mits two different parties to communicate and exchange resources easily wherein
the distributed decisions are taken by the majority rather than by a single central-
ized entity. It provides security from attackers who try to compromise centralized
systems or controllers.
Resources can be of different types such as tangible or intangible resources.
Money, cars, houses, and land are classified as tangible resources, and copyrights,
IPR, and digital documents are classified as intangible resources. As of late, the
blockchain innovation has pulled in huge enthusiasm from both the scholarly com-
munity and industry. The innovation began with Bitcoin, a cryptographic money,
also called cryptocurrency, that has arrived at a capitalization of 180 billion dollars
as of January 2018 [7, 8].
As indicated by the Gartner report in 2016, the blockchain innovation is attract-
ing billions of dollars in research and considerably more innovation is relied upon to
come sooner rather than later [9]. The innovation as of now traverses a few applica-
tions that are well-known and driving the systems administrators to explore further
innovations in the recent domains such as supply chain, retail etc. Such applications
incorporate medicinal services [10], the Internet of Things (IoT), and cloud storage
[11]. The innovations of blockchain technology pave the way to the development of
new platforms and applications. Many researches have written several survey papers
to highlight the benefits of this technology in current areas of application. Such
examples include blockchain technology for healthcare [10], IoT [12], blockchain
adoption in higher education [13], blockchain as a service platform [14], decentral-
ized digital currencies [15], and blockchain-enabled smart contracts [16].
The blockchain innovations and its potential have been demonstrated in many
of the popular applications. As of now regular monitoring and security services
comprising confidentiality, authentication, integrity, privacy, and provenance are
offered by third-party services or brokers. They use inefficient distributed applica-
tions to provide these services to customers. As a result of this it is found that the
security is the main threat for these applications. Researchers can focus on the
above-mentioned areas to give insight about the use or applications of blockchain
to leverage these security issues.
Transport and logistics Logistics services, shipping details and delivery data,
maintenance of toll data, vehicle tracking, tracking
of shipment containers
7.3.1.1 Defense in Penetration
A unique strategy is applied to protect the data in defense-related applications using
infinite counter measures. The principle of protecting data in multiple layers is
enforced in blockchain rather than providing security to a single layer.
7.3.1.2 Manage Vulnerabilities
Vulnerability checking involves identification, authentication, modification, and
patching of them whenever is required.
7.3.1.3 Minimum Privilege
In this principle access to data is restricted to the lowest level possible to promote a
high level of security.
7.3.1.4 Manage Risk
The identification of risk, assessing risk, and control of risks are processed in this
phase.
7.3.1.5 Manage Patches
Required patches are installed to patch the damaged part such as code, operating
system, firmware, and applications.
Many techniques have been used in blockchain to achieve security for the trans-
action data or block data irrespective of the usage. Bitcoin applications use encryp-
tion techniques for providing safety to the data. The combinations of public/private
key pairs are used to encrypt and decrypt data securely. The most secure part of
the blockchain is the longest one which is considered the authentic one. Fifty-one
percent of the major attacks and fork problems have been reduced by means of
blockchain. By considering the longest chain as the authentic one in blockchain, it
makes the other attacks null and void.
7.3.2 Privacy of a Blockchain
Privacy is an important parameter for users who maintain data in online reposito-
ries. This is the individual rights of a person to safeguard their data. It is possible
to perform transactions without leaking identical information in blockchain [18].
So it helps to achieve privacy. The user is allowed to perform their work without
showcasing it to the entire network. The primary goal of enhancing privacy in
blockchain is to make it harder to copy other users’ crypto profiles. Several volumes
of variations are perceived while applying blockchain in privacy.
7.3.3.1 Blockchain in Healthcare
Blockchain contributions to the healthcare domain need to maintain data privacy,
need to be public and secure, and also should support scalability at any point in
time. The blocks present in a healthcare blockchain represent data, images, and
documents about health records. Blockchain in healthcare faces the data storage
problem and limitations on throughput. If Bitcoin is chosen as a model for stor-
ing data, then every individual in a network will contain a copy of the healthcare
data which may lead to security problems. This is not the best storage method,
and bandwidth severity may occur. Network resources are wasted in this method.
If blockchain needs to be implemented in healthcare, an access control manager
should be added to specify the access and management of data, and storage of data.
In reality the blockchain maintains an index or list of all users’ data. This acts
as a catalog that stores metadata about the patient’s record and the location of data
where it is being stored. These data are accessed by authorized users. Data efficiency
can be improved by further encrypting the data, adding a timestamp to the data,
and retrieving the data by assigning a unique identifier to each record. A data lake
is defined as a blockchain data repository where all healthcare data are stored in
blockchain. They are extremely valuable data as they contain any form of data. It
provide all kinds of technical support such as querying the result, analyzing the
text, mining the data, and integration with machine learning [4]. The complete
view of blockchain transactions in a healthcare domain is represented in Figure 7.4.
7.3.3.2 Blockchain in Finance
Bitcoin is a popular digital currency which led to the development of blockchain
later. Further, blockchain is used in many cryptocurrencies, namely Ethereum,
Peercoin, Altercoin, Karma, Hashcode, and Binarycoin.
Bitcoin is the primary structure for most of the digital cryptocurrencies, but
they use different consensus algorithms for the verification and validation of data.
The primary part of a blockchain in the financial domain is the smart contract.
A detailed look at this is presented in the Figure 7.5. We will see the security and
privacy issues in finance domain blockchains. The common security problem in
implementing blockchain in any organization is they must ensure that data are
accessed by only authorized users. Checking the data access by authorized users is
mandatory in blockchain fundamentals. It is necessary to enforce the implementa-
tion of authentication and authorization control [20]. The importance of block-
chain in the finance industry is diagrammatically given in Figure 7.5.
Blockchain also ensures one of the basic security parameters, confidentiality,
by allowing data blocks to be encrypted. Different layers of security can be imple-
mented with the help of a combination of private and public key pairs. Data integ-
rity and consistency are preserved. Immutability and traceability ensure the integrity
of data in blockchain. This is another important parameter in providing security. In
addition, hash values ensure that no blocks of data can be altered or copied.
Ensuring the privacy of individual user data or organizational data is another
important aspect of security in blockchain. There are many ways to achieve this
property. One is to encrypt the personal information of every user. If a key is also
forgotten, then also it ensures privacy and security, since no one can access data
if they don’t possess the key. This is because all the transactions are timestamped
and signed using digital signature algorithm which ensures non-repudiation. So it
increases the reliability of blockchain in the finance domain.
7.3.3.5 Blockchain in Defense
Blockchain will play an important role in defense in the near future because the
defense applications are cyber-enabled systems and they must provide utmost secu-
rity to the data they handle. The current cyber systems lack the technology to
address the growing cyber threat. Blockchain helps to reduce the error rate in cyber
defense systems by providing transparency, fault tolerance, and trust in transac-
tions. The following security features of blockchain such as hashing, back linked
list of data structure, consensus algorithm, and immutability play an important
role in implementing blockchain applications [21].
Cyber defense applications require their data to be confidential and accessed only
by authorized users. Blockchain accomplishes authentication by granting access only
to the permissioned users. Confidentiality of the data can be ensured by encrypting
the data before storing it in blockchain. Then access control can be defined at various
levels to restrict access to the data. Blockchain is capable enough of playing a opera-
tional or support role in cyber defense applications. They are as follows.
7.3.3.5.1 Cyber Defense
In cyber defense applications blockchain transmits data to all other nodes in a
network and applies a consensus algorithm to verify and validate the transactions.
The data cannot be manipulated once they are time stamped and stored as a block.
In case of a data update by the authorized users, then it needs to be newly time
stamped and maintain proper log information. The weapon, components, and its
details can be imaged, hashed, and then it is stored in a secure data base. They can
be monitored continuously using blockchain applications [22].
7.3.3.5.3 Resilient Communications
The secure communication of blockchain helps to provide resilient communication
in contested environments. This helps to make the data transfer reliable between
the nodes across the world.
7.3.3.6.1 Scalability
This system must be scalable based on demand because in VANET the numerous
vehicles with onboard electronics equipment get added to the network frequently.
7.3.3.6.2 Safety
It should not generate new security threats, and the malfunctioning of devices leads
to false driving behavior. So a blockchain implemented in smart vehicle architec-
ture needs to protect users from security threats.
7.3.3.6.3 Decentralization
A decentralized architecture is required for storing the data since data stored in a
centralized repository are prone to a single point of failure. Blockchain offers this
decentralized concept which is suitable for incorporating into automobiles.
7.3.3.6.4 Maintenance
The architecture of smart vehicles is comprised of a lot of hardware and software
equipment. So blockchain should support this maintainability for a certain period
of time and should have the option for maintainability.
The main critical challenge in the automobile industry is wireless remote soft-
ware updates (WRSU). WRSU fixes the errors in the control unit whenever a
software upgrade is needed, so that the complete life cycle of a vehicle is clearly
captured. The focus is required in the WRSU security architecture for the better
management of vehicular ad-hoc network [20].
The software update process of WSRU architecture is illustrated in the follow-
ing steps.
7.3.4 Challenges in Blockchain
This section describes the challenges faced by blockchain technology.
7.3.4.1 Privacy Leakage
The problem in blockchain privacy is the leakage of transactional privacy data
because the details and the balances of public keys are visible to all in the net-
work. Anonymity in blockchain is classified into mixing solutions and anonymous
7.3.4.2 Scalability
Blockchain needs to be scalable because of its increasing volume of applications.
Every node should store the copy of the transaction to validate the data. First the
transaction source needs to be validated before the transaction is validated. Block
size also plays a role in the scalability issue because miners want to validate bigger
transactions in order to receive higher transactional fees. The scalability issue may
be categorized into storage optimization and redesigning of blockchains. Solutions
are invited from research community to address these challenges.
7.3.4.4 Selfish Mining
Another challenge faced by blockchain is selfish mining. A block is called a suscep-
tible block if a small amount of hashing power is used. In this method, miners do
not broadcast the mined block’s result immediately. They open a private branch in
which the mined blocks are posted after certain conditions are met. True miners
waste their resources and a lot of time in mining the block whereas the private link
is mined by selfish miners.
7.3.4.5 Security
Security is the main important feature in any upcoming new-generation technol-
ogy. Security can be detailed in terms of confidentiality, integrity, and availabil-
ity. This always remains an open challenge in public blockchain. Confidentiality
is poor in distributed systems since it copies information to entire network. The
integrity principle of CIA triad still faces many more challenges in real time; even
integrity of information proves to be not altered. Read availability is high compared
to write availability in blockchain.
7.3.5.1 Cryptocurrency
Risk linked with cryptocurrency: As digital currencies are encrypted it is pos-
sible only to identify currency and not its owner. The currency is owned by
whoever owns the encryption key. So if a currency is stolen, the money is
never recoverable. There is no way to get it back.
Solution: Any method to store the encryption keys in a secure vault of trust.
7.3.5.2 Smart Contracts
Risk linked with smart contracts: A smart contract is a computer-based pro-
gram that details their capability to self-execute and enforce the contract
rules. The smart contract rules and self-execution are altered if the blockchain
is breached. It breaks the basic trust of a blockchain and it removes a way of
doing business between parties without the involvement of a middleman.
Solution: Secure the terms and self-execute factors of a smart contract and store
the encryption keys in a hardware-based root of trust with an anonymous party
with secured authentication. That ensures that no one can access the data.
7.4 Conclusion
This chapter clearly discusses the blockchain technology, its properties, and how
blockchain can be implemented in the various domains of applications such as IoT,
healthcare, supply chain management, automobiles, finance, etc. Whenever the
new technology is released it also brings security threats simultaneously. Security
issues in blockchain have been discussed in detail. Popular use cases of blockchain
technology have been explained briefly.
References
1. https://blog.goodaudience.com/blockchain-for-beginners-what-is-blockcha in/.
2. https://cointelegraph.com/bitcoin-for-beginners/how-blockchain-technology-works-
guide-for-beginners/.
3. https://blockgeeks.com/guides/what-is-blockcha in-technology/.
4. Z. Zheng et al. 2017. “An Overview of Blockchain Technology: Architecture,
Consensus, and Future Trends”. Proceedings of the 2017 IEEE BigData Congress,
Honolulu, Hawaii, pp. 557–564.
5. S. S. N. L. Priyanka and A. Nagaratnam. 2018. “Blockchain Evolution – A Survey
Paper”. IJSRSET 4(8): ISSN:2395-1990.
6. Tara Salman et al. 2018. “Security Services Using Blockchains: A State of the Art
Survey”. IEEE Communications Surveys & Tutorials 21(1): 858–880.
7. I. Eyal et al. 2016. “Bitcoin-NG: A Scalable Blockchain Protocol”. In Proceedings of
13th Usenix Conf. Network System Design and Implementation (NSDI), Berkeley, CA,
pp. 45–59.
8. Crypto Currency Market Capitalization. Accessed August15, 2017. [Online].
Available: https://coinmarketcap.com/currencies/.
9. STAMFORD. Gartnet’s 2016 Hype Cycle for Emerging Technologies Maps the
Journey to Digital Business, August, 2016. [online]. Available: http//www.gartner
.com/newsroom/id/3412017.
10. M. Mettler. 2016. “Blockchain Technology in Healthcare: The Revolution Starts
Here”. In Proceedings of IEEE 18th International Conference on e-Health Networks
Applications Services(Healthcom), Munich, Germany, pp. 1–3.
11. K. Christidis and M. Devetsikiotis. 2016. “Blockchains and Smart contracts for the
Internet of Things”. IEEE Access 4: 2292–2303.
12. M. Conoscenti, A. Vetro and J. C. De Martin. 2016. “Blockchain for the Internet
of Things: A Systematic Literature Review”. In Proceedings of IEEE/ACS 13th
International Conference on Computer Systems Applications (AICCSA), Agadir,
Morocco, pp. 1–6.
13. Khoula Al Harthy et al. 2019. “The Upcoming Blockchain Adoption in Higher
Education: Requirements and Process”. IEEE International Conference.
14. W. Zheng et al. 2019. “NutBaaS: A Blockchain-as-a-service Platform”. IEEE Access.
15. S. Ahamad et al. 2013. “A Survey on Crypto Currencies”. In Proceedings of 4th
International Conference on Advanced Computer Science (AETACS), pp. 42–48.
16. S. Wang et al. 2019. “Blockchain Enabled Smart Contracts: Architecture, Applications,
and Future Trends”. IEEE Transactions on Systems, Man, and Cybernetics: Systems
49(11): 2266–2277.
17. J. Yli-Huumo et al. 2016. “Where is Current Research on Blockchain Technology? –
A Systematic Review”. PLoS ONE 11(10): e0163477. doi.10.1371/Journal, 2016.
18. G. Zyskind et al. 2015. “Decentralizing Privacy: Using blockchain to protect personal
data”. Security and Privacy Workshops (SPW), 2015 IEEE, IEEE, pp.180–184.
19. Zibin Zheng et al. 2018. “Blockchain Challenges and Opportunities: A Survey”.
International Journal of Web and Grid Services 14(4): 352–375.
20. Archana Prashanth Joshi, Meng Han and Yan Wang. 2018. “A Survey on Security and
Privacy Issues of Blockchain Technology”. Mathematical Foundations of Computing
1(2): 121–147.
21. J. Mendling et al. 2018. “Blockchains for Business Process Management – Challenges
and Opportunities”. ACM Transactions on Management Information Systems (TMIS)
9(1): 1–16. Article No.4.
22. W. Tirenin and D. Faatz. 1999. “A Concept for Strategic Cyber Defense”. In Military
Communications Conference Proceedings, MILCOM 1999, IEEE, vol. 1, pp. 458–463.
Merger of Artificial
Intelligence and
Blockchain
Pooja Saigal
Contents
8.1 Introduction..............................................................................................140
8.2 Artificial Intelligence.................................................................................140
8.2.1 The Scope of Merger......................................................................143
8.3 Blockchain with Exonum Framework.......................................................144
8.4 AI and Blockchain: Technologies That Are Poles Apart............................. 145
8.5 Location of Control: Centralized or Decentralized .................................. 145
8.5.1 Visibility: Transparent or Black Box..............................................146
8.6 Blockchain-Facilitated AI..........................................................................146
8.6.1 Secure Data Sharing......................................................................147
8.6.2 Data Management Challenges.......................................................148
8.6.3 Reliable AI Modeling and Predictions...........................................148
8.6.4 Better Control over Data and Models............................................149
8.6.5 Real-Time Data.............................................................................149
8.6.6 Transparency and Trust.................................................................150
8.6.7 Better Management of Blockchain Using AI.................................150
8.6.8 Prospective Applications of Blockchain and AI.............................. 151
8.7 AI with Distributed Computing................................................................ 151
8.7.1 Data Privacy.................................................................................. 152
8.7.2 Marketplace for Algorithms and Data........................................... 152
139
Telegram Channel @nettrain
140 ◾ Blockchain Technology and Applications
8.1 Introduction
Artificial intelligence and blockchain are the two most promising technologies that
have evolved in the last few years. In a very short span of time they have permeated
into almost every possible industry. AI enables machines to make decisions like
human beings and can handle complex problems, whereas blockchain provides a
distributed data environment and offers data transparency, security and privacy.
Although these technologies look quite different from each other, there are pros-
pects to combine them. This amalgamation would take the strengths of both AI
and blockchain, so that the resulting technology would be robust and more efficient
than either of them individually. These two technologies complement each other
and can therefore reduce the weaknesses of each other. Since AI requires huge
amounts of data for making predictions, these datasets can be stored on a distrib-
uted platform provided by blockchain. Blockchain could be benefited by the use of
AI to create autonomous organizations or to monetize user-controlled data. Both
AI and blockchain are in their nascent stage and are going to evolve individually.
In this chapter, we’ll see how these two technologies interact and what the future
prospects for their merger are.
8.2 Artificial Intelligence
Human beings have the ability to imagine and convert it to reality. Its true manifes-
tation is realized in the last few decades. Although a common man may not realize
it, artificial intelligence (AI) is already embedded into our life. While searching for
keywords on the Internet, on our way to work, purchasing online or while chatting
with friends, we are most likely using AI in the background. The airline industry
has been using AI for decades now, to regulate air traffic and for efficient landing
and take-off schedules. Boeing planes involve human steering mostly at the time of
landing and take-off, whereas for the rest of the flight, autopilot takes command.
Google Maps uses location data from smartphones and analyzes the traffic patterns
for that location in real time. By using feedback data of visitors and user-reported
cases like breakdown, construction, accidents, etc., Maps can provide more accu-
rate information and route suggestions. These suggestions significantly reduce the
commuting time by informing the user about the fastest route between two loca-
tions. Various cab booking apps like Ola, Uber, etc., use AI to determine the cost
of the ride, best route and for booking nearby cabs on request with minimum
arrival time. Their ride-sharing feature optimally books the passengers to minimize
detours. They use AI to determine surge pricing, estimated time of arrival (ETAs),
meal delivery time and also for fraud detection. Figure 8.1 shows a few popular
applications of AI.
AI plays a major role in managing social networking sites like Facebook,
LinkedIn, and Pinterest. Facebook has an AI-based feature called tagging that can
identify faces in any uploaded image and can suggest names for them. It is based
on a face recognition algorithm of machine learning (ML). ML is a branch of AI
that develops algorithms which can learn from data and can predict outcomes for
unknown data. For a common man, it is not easy to understand how Facebook is
able to recognize his family members and friends. For tagging, Facebook uses an
ML algorithm built upon artificial neural networks (ANN) that mimics the human
brain to recognize human faces. In 2016, Facebook introduced DeepText [1] which
is a text-understanding engine that can understand the textual content of thou-
sands of posts, from multiple languages (around 20), with accuracy close to human
understanding. DeepText helps to identify and mark the content that is most rel-
evant. For example, a property broker is most interested in posts related to sale and
purchase. So, DeepText can identify such posts and displays the most relevant con-
tent. Similarly, DeepText helps popular public figures to automatically identify the
most relevant text from the comments on their posts. Facebook acquired Instagram
which uses machine learning to suggest emojis. Recently, emojis have replaced text
and are used to show sentiments. The ML algorithm also tries to understand user
sentiments, by studying the type of emojis used by users at a given point of time.
Instagram has made emojis very popular not only among the young generation, but
for almost every user of any age. It has totally changed the way people communicate
with each other. Only a decade before, no one would have imagined that simple
emoji graphics would be used to show the sentiments of a distant person. There is
another popular social media app called Pinterest that has a huge image and video
database. Pinterest uses computer vision and pattern recognition techniques of ML
to automate the process of object identification in images and videos. Pinterest also
recommends similar pins to the users. The visual search feature of Pinterest is based
on image matching and retrieves the best matches for any given image. Snapchat
is very popular these days due to its feature called Lenses. These are filters that can
track facial movements and can add animated effects to the images. Snapchat pres-
ents a variety of filters and keeps updating them on a regular basis. These filters use
ML algorithms to learn the movements of faces in real-time videos.
Email inboxes use an AI-enabled powerful feature for spam filtering. It is not
based on a fixed set of words, but it continuously learns from the messages, related
metadata and user responses. Google uses an AI approach to mark emails as impor-
tant based on the sender’s data or message content and categorizes emails under
primary, forum, social, promotion and update inboxes. Gmail also learns if a user
marks an email as spam or important. Recently, many banks have started to provide
the facility to deposit cheques through a smartphone app. Banks rely on companies
like Mitek [2] that use identity verification and mobile capture technology, built on
artificial intelligence algorithms, to decipher and convert handwriting on cheques.
Banks also use AI to find fraudulent transactions, by creating systems which can
learn from fraud transaction data. Atiya [3] proposed neural network algorithms to
determine the credit worthiness of a loan applicant, based on historical data. The
decision is based on a number of factors like the credit history of the applicant,
frequency of transactions, kind of business, etc. The algorithm not only approves
or disapproves the loan application, but it also determines the interest rate, time
period and credit limit. Hence, AI improves the risk assessment for the banks and
provides efficient decisions. This would further help in reducing the losses faced by
banks due to fraudulent transactions and delinquent customers. Machine learn-
ing is also used to prevent frauds in online credit or debit card transactions [4].
Financial service providers like MasterCard suffer more losses due to false declines
than fraud [5]. So, MasterCard has employed AI algorithms to learn the purchas-
ing habits of cardholders in order to minimize false declines and to maximize the
probability of identifying a fraudulent transaction.
Online shopping portals like Amazon and Flipkart have gained popularity in
the last few years. These portals use efficient search engines to return the most
relevant products to the user based on keywords. They also maintain the history of
each buyer and recommend products based on their previous purchases. These por-
tals also manage the demographic data of the customers, so that they can recom-
mend products which were ordered by other customers with similar demographic
data [6]. Amazon uses ANN to generate recommendations for its customers.
Nowadays, every smartphone is equipped with a feature that converts voice to
text. About a decade ago, it was beyond imagination to accurately convert voice to
text by the most advanced systems of that time. But ML has made it possible today,
even for hand-held devices like smartphones, tablets, etc. Recently, Hinton et al. [7]
proposed the use of artificial neural networks for speech recognition. Dahl et al. [8]
proposed context-dependent pre-trained deep neural networks for large-vocabulary
speech recognition. We start our day by saying “OK Google, open Maps”, to find
the best route from home to office. As soon as we start speaking, the ML algorithm
instantly converts it into text and takes action. To connect a call, we only say “OK
Google, call Mom” and it behaves like an obedient assistant. For Google’s voice
search, ANNs are used. At times, these speech recognition systems can transcribe
more accurately than human beings. So, spoken instructions to smart personal assis-
tants have now become the new interface. Siri [9] by Apple and Google Now are
two personal assistants that can set reminders, call contacts from the phonebook,
perform searches and manage appointments. Amazon took speech recognition one
step further, by introducing complementary hardware called Alexa [10]. Alexa is a
personal assistant that recognizes voice commands to carry out a number of tasks. It
is powered by AI algorithms. Alexa can answer questions asked in natural language,
set reminders, order food, play music and perform a number of other activities.
integration of these two technologies would revolutionize the new digital genera-
tion. Chen et al. recently proposed an AI convolution neural network-based nodes
selection in blockchain networks [18].
they actually are. But the explosion of data in recent times has created a need for the
fusion of these technologies. There are various startups like Endor and Blockchain
Data Foundations that are actively working on the idea of the amalgamation of
blockchain with AI. Neuromation [23] is a successful startup and proposes the use
of distributed computing along with blockchain proof-of-work tokens to revolu-
tionize AI model development. These startups have raised good amounts of fund-
ing from the investors, which itself proves that people are confident about the scope
of blockchain and AI.
hardware to train the algorithms. The greater the size of the data, the better the
performance of the AL/ML algorithm. Companies with huge data and enriched
AI technology have more resources to improve and experiment with AI algorithms.
This gives us a view that AI requires the centralization of data. It requires complete
and consolidated data at one location for better computing results. In contrast,
blockchain believes in the decentralization of data and its control. At the same
time, the data and other resources are available to every user connected to the net-
work. The decentralization of data in a blockchain involves execution cost due to
network latency, and in order to reduce it, steps must be taken to speed up the data
access. Blockchain guarantees that users have complete ownership of their data and
computing power, which can be rented to other users on request. Various agencies
and companies working with AI models could take advantage of the data present
on the blockchain. They might not own the data, but can access them legally due
to decentralized distribution. The computing resources can also be decentralized.
Thus blockchain could manage the requirements of AI, allowing authorized users
to develop and run AI algorithms on huge datasets provide by multiple users.
8.6 Blockchain-Facilitated AI
Artificial intelligence trains machines to behave like humans, for efficient decision
making. The AI algorithms require extensive data for training and efficient decision
making. Here, blockchain could play a significant role by storing and managing the
data securely. Unlike traditional centralized database systems, blockchain creates a
decentralized-distributed network of databases. This essentially means that the data
are stored on a large network, where information is verified by multiple parties, and
once data are entered, they cannot be erased from the blockchain. Any illegal muta-
tion in data will be noticed by other computers of the blockchain, which will rectify
the invalid data. Also, the data on the blockchain are secured through cryptogra-
phy, which makes it incredibly difficult to decipher and modify. Any tempering
with the data on the blockchain can be observed by the users due to cryptographic
signatures associated with the data available on the network, across all the systems.
This makes blockchain ideal for storing sensitive information. Therefore, block-
chain is considered more secure than traditional database systems which are more
prone to cyber-attacks. It appears that the requirements of AI can be supported by
blockchain and we can expect a seamless communication between the two tech-
nologies. A few key characteristics of their interaction are discussed here.
Figure 8.4 Annual digital growth (Jan 2018–Jan 2019): Change in statistics [25].
problems, but they are not freely accessible to public. This limitation of data acces-
sibility can be resolved by blockchain, by the concept of peer-to-peer communica-
tion. Since blockchain is an open distributed registry, its data are available to every
network user. Hence, the monopoly of companies over the data would be relaxed
and other users could gain access to the data.
principle of computer systems. There are malicious users who intentionally modify
the data for their individual or company’s interest. Modified data would lead to
the alteration of results also. Data may get corrupted unintentionally in instances
like incorrect data captured by a malfunctioning sensor or a part of critical data
may be lost due to hardware failure. Block can help in creating partitions of veri-
fied datasets, so that the AI models should use only the verified data. This will
further identify any fault in the data chain and would lead to its correction. This
would also help in reducing the efforts required in troubleshooting and locating
the erroneous data in the segments. The data once captured through a transaction
in a blockchain becomes immutable i.e. any intentional or unintentional altera-
tion in the data will be reported by other users of the system. This makes the data
traceable and verified.
8.6.5 Real-Time Data
AI has transformed various domains like healthcare, finance, weather forecasting,
etc., by providing real-time access to data. But these models suffer due to lim-
ited access to relevant data. Required data may not be available due to ownership
restrictions. As a result, AI algorithms may end up working with low-quality data
and the results may not be accurate. Blockchain could overcome this situation, as it
provides access to a huge accumulation of data, which might be owned by distinct
users and is immutable but accessible to all. Various applications designed using AI
suffer from barriers like lack of authentication, unwanted intermediaries, risk of
fraud, monopoly ownership on data, inaccuracy, etc. AI together with blockchain
can reduce the ownership of a single entity, eliminate intermediaries and assure that
the data is secure, accurate and authenticated by the stakeholders involved.
blockchain cost millions of dollars. The cost is high as each node executes the
same task on its copy of data and tries to produce the solution before other nodes.
AI can reduce the cost involved by predicting the node that will be the first one
to deliver the solution. It can inform other nodes to shut down their operations,
so that only the node which is going to give the earliest correct solution will com-
plete the execution. This will ultimately reduce the cost of operations of the entire
blockchain and can improve the efficiency of the system. Blockchain is known
to maintain data with high security. AI can assimilate features like multi-dimen-
sional data representation, image labeling, natural language processing, sound rec-
ognition, etc., into blockchain. This would allow miners to convert a large-scale
system into several smaller subsystems that can optimize data transactions in a
more secure environment.
In future, blockchain would store the data and interested users could buy them
directly from the data owners. In this case, AI can provide solutions for keeping
track of data usage, granting permissions and effective data management. AI mod-
els would behave as doorways through where the blockchain data would flow.
8.7.1 Data Privacy
Blockchain stores anonymous data, although it has ways to determine the source
of data. The anonymous data provide great opportunities for research. Rather than
centralized and restricted control of the companies over the data, blockchain pro-
vides open access to anonymous data, which could be used for analysis, model
training and for making predictions. If the algorithms are trained with decentral-
ized and anonymous data, they would be able to generate models with less bias.
A company in the US might train the algorithms with the data collected from its
population. With the use of blockchain, the data would not be restricted to a local
region only. Hence, the algorithms would be trained on data that represent the
global population.
8.7.3 Decentralized-Autonomous Organizations
Mohanty et al. [32] talk about the idea of decentralized autonomous organizations
(DAOs), which is an application of AI-blockchain. DAOs hard code their rules, in
the form of smart contracts. These organizations perform actions but follow the
rules of a smart contract while taking any decision. By integrating AI technology
with DAOs, there is a possibility that they can take independent decisions. The
decisions would be based on market data and trends. Since DAOs exist on a decen-
tralized network, there is a remote possibility that they will shut down. If they are
developed well, they could reduce workload for knowledge workers, and would lead
to economic equality with better management.
the data anonymously. They will provide access to only those users who have paid
for it. They could receive analysis of their health reports from data analysts working
in the network. Another category of system users is the customers who are inter-
ested in buying the data for analysis and can provide reports to users about their
health. They could get aggregate data collected from multiple users. Since it is an
open system, it is important to validate the quality of data, which is done by data
validators. They confirm the quality of the data and give assurance to customers.
There could be other users who are using cryptocurrency.
Any interaction that occurs in a blockchain is registered in the form of a trans-
action. Blockchain maintains hashes which record a timestamp for a transaction
and approve them. Timestamping is achieved through blockchain anchoring and
the transactions are approved by digital signing and public key infrastructure. The
storage of a medical data ecosystem could be an existing cloud storage like AWS
that provides a platform for building applications [35]. This storage is not part of
blockchain, but it is required to hold large medical files which are in the form of
images or videos. To provide authentic access to the data, public key infrastructure
is required which is established through blockchain. To keep the data secure, the
data uploaded on the cloud, at the user side, are encrypted with a threshold encryp-
tion scheme [36]. The data can be kept at the user’s local storage also which would
provide actual privacy and control to the user over their data. There is a possibility
of lending the data to customers instead of selling it. The full nodes of blockchain
are the organizations that have complete access to data in the blockchain. They are
of three types. Validators commit new blocks with transactions to the blockchain.
Another type is auditors who audit the marketplace. The third category is the key
keepers who maintain key shares as per a certain threshold encryption scheme,
required for decrypting the data.
Thus, blockchain allows the creation of a distributed and secure collection of
personal data, where patients (data owners) have complete control over their data.
They can also grant permissions to access their data. Thus medical data blockchain
eventually builds a data marketplace where patients could get paid for their per-
sonal medical data. The data corpus thus accumulated will be used by data analysts,
organizations for developing prediction models, pharmaceutical companies and by
researchers. Currently, very few people go for comprehensive periodic medical tests
that include laboratory tests, MRI, ECG, etc. If these data are combined with life-
style data, demographic data and medical history, they would be of great value for
researchers. There are number of companies that can pay for the data to train their
AI algorithms. More data used for the training of an AI model means improved
accuracy. The funds generated could be used further for research and development
of sophisticated tools.
8.8 Conclusion
Blockchain and artificial intelligence are the two technologies that have the poten-
tial to revolutionize many industry sectors. We can foresee that the synergy of
these two would have greater benefits. The fusion of AI and blockchain will bring
growth in diverse domains and has many potential applications. The idea of their
amalgamation is so powerful that it has recently attracted many researchers and
organizations. Initially, AI and blockchain appear to be poles apart but at the same
time, they complement each other. They have applications in fields like finance,
medical, public service, security, banking, IoT, etc. The future of this integration is
a decentralized system of operations, where machines could interact in a better way
with better modeling of human activities.
References
1. Chang, Shiyu, Wei Han, Jiliang Tang, Guo-Jun Qi, Charu C. Aggarwal, and Thomas
S. Huang. “Heterogeneous network embedding via deep architectures.” In Proceedings
of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining, pp. 119–128. ACM, 2015.
2. Mitek Systems. https://www.miteksystems.com/mobile-verif y.
3. Atiya, Amir F. “Bankruptcy prediction for credit risk using neural networks: A survey
and new results.” IEEE Transactions on Neural Networks 12, no. 4 (2001): 929–935.
4. Bolton, Richard J., and David J. Hand. “Statistical fraud detection: A review.”
Statistical Science, 17, no. 3 (2002): 235–249.
5. Tapscott, Alex, and Don Tapscott. “How blockchain is changing finance.” Harvard
Business Review 1, no. 9 (2017).
Identification of
Blockchain-Enabled
Opportunities and
Their Business Values:
Interoperability
of Blockchain
N.S. Gowri Ganesh
Contents
9.1 Introduction .............................................................................................160
9.2 How Does Blockchain Work?................................................................... 161
9.3 Flow of Operation.....................................................................................162
9.3.1 Blockchain Characteristics.............................................................164
9.3.2 Asymmetric Key Cryptography ....................................................164
9.3.3 Block Containing Transactions......................................................164
9.3.4 Consensus in Blockchain Environment.........................................164
9.3.5 Mining for Block Acceptance........................................................164
9.4 Classification of Blockchain Systems.........................................................165
9.4.1 Public Blockchain..........................................................................165
9.4.2 Private Blockchain.........................................................................165
159
Telegram Channel @nettrain
160 ◾ Blockchain Technology and Applications
9.1 Introduction
An application development evolved in various stages with respect to the evolu-
tion of the hardware and the software (operating systems). Thus it started with the
applications that worked on independent computers whose benefits restricted to
the users of that computer, distributed applications that delivered useful services to
large number of clients with client/server architecture. Then with the introduction
of web services the scenario changed from the tightly coupled application to that
of the loosely coupled application. The loosely coupled application in the service-
oriented architecture did not share the transaction and did not trust each other but
relied on some centralized control.
The complete independence from centralized control with the introduction of
the blockchain happened with the trust among the participants in the business
networks. Also blockchain made a major impact by the introduction the concept of
cryptocurrency like Bitcoin.
The evolution of the architecture in the field of application development and
security has now transformed to the applications without agents or intermediar-
ies (which increases the effective cost of a single transaction For example, trans-
fer of money through bank involves commission by the agents) so that there can
be peer to peer transaction in the decentralized network by establishing trust
among unknown peers placed its position with the enablement of a new world of
Table 9.1 clearly explains how the decentralized nodes of Alice, Bob, Jane and
Dave participate in the transactions and update the public ledger. As the transac-
tion happens the information from the public ledger blocks transaction 4 when
there is a shortage of money.
Formally blockchain (Iansiti and Lakhani 2017) can be defined as “Blockchain
is an open, distributed ledger that can record transactions between two parties efficiently
and in a verifiable and permanent way”.
The following is a description of the flow of operations in a blockchain
environment.
9.3 Flow of Operation
1) Broadcast the transaction: Each and every transaction is announced to the entire
network for verification through broadcasting.
2) Collection and verification of transaction: The transactions are verified by the par-
ticipants and will be added to the block according to the block size (1 MB for
Bitcoin).
3) Mining using consensus protocol: The mining process is to solve the cryptographic
puzzle. If a miner is able to solve the puzzle, this block is added to the block-
chain. This is done using a consensus as proof of work (PoW) as in Bitcoin.
There are consensus protocols used in blockchain like proof of stake (PoS),
proof of burn (PoB) and proof of elapsed time (PoET).
4) Updating the blockchain: The nodes receive the block and can accept the block,
provided that the computed PoW is correct and it contains valid transactions.
Nodes add the block to their copy of the ledger. The hash of the last block will
be used as the previous hash of the successive block. If solutions are obtained
by two miners at the same time, the valid blockchain is the one which is
So blockchain works like the public ledger with the following characteristics.
9.3.1 Blockchain Characteristics
The blockchain can be generally characterized by the following concepts and varies
for different implementations.
that cannot be reused in replay attacks due to which the hashed or rehashed block
meets the difficulty level of restrictions. The miners try to solve the puzzle to iden-
tify the nonce in the last block. The nodes accumulate the verified transactions in a
block and use the computation power to find a value that makes the SHA-256 hash
value of this block less than a dynamically varying target value. The header of the
block includes the arbitrary nonce, the hash of the previous block, the Merkle root
hash of the listed transactions, the timestamp and the block version. The hash of all
the hashes of the transactions in a block is called the Merkle root. Every leaf node
is the hash of the data block and the non-leaf node is the cryptographic hash of its
child nodes. This is used in Bitcoin.
9.4.1 Public Blockchain
A public blockchain is an open platform for participants from various backgrounds
to join, perform transactions and mine. There is no constraint on any of these fac-
tors. These are also knowns as permissionless blockchains. Every user is given full
authority to make transactions and perform auditing in the blockchain. The block-
chain exhibits openness and transparency. It does not include any specific validator
nodes. All users can collect transactions and participate in the mining process and
earn mining rewards. The copy of the whole blockchain is synchronized with all of
the participating nodes.
9.4.2 Private Blockchain
A private blockchain system is to aid the sharing and exchange of data among a
group of individuals (in a single organization) or among multiple organizations pri-
vately. Here mining is controlled by single organization or selected group of individ-
uals. This is known as a permissioned blockchain. This is because strangers cannot
access it unless they are solicited. A set of rules decides the nodes’ participation.
This characterizes the network very much in the direction of centralization, while
detracting from the blockchain features described by Nakamoto of decentralization
and openness. But after nodes participate in the network, they contribute in running
a decentralized network. The writes are restricted with the set of constraints.
9.4.3 Consortium Blockchain
A consortium blockchain is a partly private and permissioned blockchain, where a
single organization is not responsible for consensus and block validation but rather
9.4.5 Bitcoin
The term blockchain (Yuan and Wang 2018) was introduced when Bitcoin was
first described in a posting in a cryptography mail group, about an article entitled
“Bitcoin: A peer-to-peer electronic cash systems” (Nakamoto, n.d.) by a researcher
with the pseudonym of “Nakamoto”. Blockchain is defined as a kind of decentral-
ized shared ledger that uses linearly timestamped, securely encrypted chains of
blocks to contain verifiable and synchronized data across a peer-to-peer network.
that issues electronic cash managed by the banks is closed sourced software
executed in controlled secured environment and is not available to the users.
e) Bitcoin is a digitized form of zeroes and ones. However, Bitcoin can gain
value by increasing users. The more users trust and use Bitcoin, the more
value Bitcoin will have. In contrast, almost all traditional electronic cashes
are endorsed by fiat money.
9.4.7 Bitcoin Ecosystem
Digitally signed and encrypted transactions are verified by peers. Cryptographic
security ensures that participants can only view the information if they are autho-
rized to do so. Data are grouped in a chain of blocks that are stored on all complete
nodes of the blockchain network using a Merkle tree. The data structures of Merkle
trees are encrypted, hashed and asymmetric time-marked. In particular, each node,
after winning a consensus mechanism, will be allowed to place all data generated
during that period (usually a regular interval, for example 10 minutes in the Bitcoin
system) from the contest into a new timestamp unit, indicating the time of cre-
ation. If contradictory data are available, for example, Bitcoin double spending,
only one agreed version is selected and added to the blocks.
The Bitcoin block consists of block headers and block parts.
a) The block header consists of (1) previous block hash, (2) Mining statistics
used to construct the block (mining statistics – time stamp, nonce and dif-
ficulty), (3) Merkle tree root.
b) The block part consists of transactions.
Figure 9.2 shows the structure of the transactions in the form of a tree with a Merkle
root. If a transaction is changed all the subsequent blocks need to be changed. The
Figure 9.3 Snapshot of a blockchain summary for block 575401. (Source: https://
www.blockchain.com/btc/block/575401.)
Figure 9.4 Snapshot of block header summary for the block. (Source: https://
www.blockchain.com/btc/block/575401.)
difficulty of the mining algorithm decides the toughness of tampering with the block-
chain. Figure 9.3 shows a summary of a blockchain transaction. Figure 9.4 shows
the identifier of verified and hashed data (e.g. via double SHA256 algorithm), pre-
vious block, next block and Merkel Root. The blocks are chained one by one in
chronological order, forming the entire history from the genesis block to the newly
generated one. Figure 9.5 illustrates the transactions for the chosen block which is
sourced from https://blockchain.com.
goal is to explore the solution space for integrating a fair exchange of payment
for receipt into existing cryptocurrency payment schemes (hereafter referred to as
fair payments for the sake of brevity). We assume the communication is weakly
synchronous, under which messages are guaranteed to be delivered after a certain
time bound.
will come up with the new version of blockchain. The hardware fork is not back-
ward compatible. Soft forks are software updates to the existing blockchain and
are compatible to the existing blockchain. There is a possibility of malicious fork-
ing (aiming to create a fork in blockchain with the malicious need) and consensus
mechanisms looks at destroying the other branch of a protocol fork merged mining
which is used as a form of attack against a parent chain in the context of a hostile
protocol fork.
The main idea of a pitchfork attack is to use merged mining as a form of attack
on another branch in permissionless PoW cryptocurrency, which is the result of a
controversial change in consensus rules. The pitchfork must reduce the usefulness
of the affected branch so that the miner leaves the offending branch and switches
to the branch of the fork which performs merged mining and follows the new
consensus rules.
iPlexus use the blockchain to make all unpublished and published data from drug
development studies available.
Blockchain also has use cases in managing clinical trials for pharmaceutical
research. The IEEE Standards Association held a forum for blockchain for clini-
cal trials, exploring the use of the blockchain for patient recruitment innovations,
to ensure data integrity and to make rapid progress in drug development. Scrybe,
the blockchain project presented in the forum, provides an effective and reliable
mechanism to accelerate clinical and research trials.
Parallel Health Systems (PHS) (Wang et al. 2018) uses artificial health systems
to model and display patient status, diagnosis and care, then uses computer experi-
ments to analyze and evaluate various treatment regimens, and carry out parallel
implementations to support real-time decisions and optimization – both in actual
and artificial conditions – in healthcare. The emerging blockchain technology is
being used in the construction of PHS. In particular, consortium blockchain con-
sisting of patients, hospitals, health offices, the medical community and medical
researchers will be deployed, and smart and block-driven contracts will enable the
exchange of electronic medical records (EHR).
MedRec and Patientory (Kuo, Zavaleta Rojas and Ohno-Machado 2019) offer
the use of Ethereum-based blockchain platforms to exchange patient-driven health
information. The same is adopted in clinical applications such as clinical data shar-
ing and automatic remote patient monitoring. The clinical data exchange frame-
work for oncological care patients recommends using the Hyperledger platform.
Hyperledger is also involved in developing a framework for the implementation
of Institution Review Board regulations. In addition, Hyperledger is available for
mobile health applications and for medical data storage or access applications.
There are also some health-related blockchain applications that do not explicitly
reveal their main platforms, such as Luna DNA, a database planned for genomic
and medical research. The challenge of choosing a platform for health blocks con-
sumes a lot of energy. Other problems include blockchain openness (e.g. public or
private), the ability to modify and distribute code (such as licenses) and the need for
certain hardware (such as SGX processors).
The Patient Centric Agent (PCA) (Uddin et al. 2018) includes lightweight com-
munication protocols to enforce data security in various segments of continuous
real-time patient-monitoring architecture. Architecture involves entering data into
a private blockchain to facilitate the exchange of information among health profes-
sionals and their integration into electronic health records, while maintaining pri-
vacy. The blockchain was adapted for remote patient monitoring (RPM), requiring
modifications that require PCA to select a miner to reduce the number of calcula-
tions. This allows PCA to manage multiple blockchains for the same patient and
change the previous tree block to minimize energy consumption and to account for
payment of safe transactions.
The center of the security mechanism is a key management system (Zhao et
al. 2018), and an appropriate key management plan must be designed before the
the process of data exchange that is verifiable (ensures about the correctness of the
data), a product that allows sharing of secure and traceable data between members
of the hospital and university networks. All exchanges of the data inside the net-
work are stored in a blockchain along with the identity of the person whose data is
exchanged to create an audit trail from the exchange of data.
Medshare (Uddin et al. 2018) allows the blockchain-based data exchange of
electronic health records among untrusted parties to be relied upon by entering
source data, and auditing and tracking medical data. With smart contracts and
access control systems, they claim that their systems can effectively track the behav-
ior of data and decide to revoke access to the data based on incorrect data rules and
insufficient permissions. Iryo is created for the global integrity of data repository in
the OpenEHR format.
Healthcare Data Gateway (HDG) is a smartphone application that integrates
traditional databases and blockchain distributed databases to manage patient health
information. They propose a multi-party calculation (MPC) approach that allows
third parties to access data but does not change data. Key management is based on
a fuzzy repository on blockchain health architecture. The blockchain-based integ-
rity framework architecture includes patient user sensor nodes, multiple implant
nodes and body region sensor input nodes. The portal collects physiological data
from supporting sensor nodes and sends aggregated data to designated hospitals
that makes a block in the blockchain separately. The message generated by the gate-
way is considered as one block. Wearable sensor nodes produce keys before sending
physiological data to the gateway node and encrypt data with keys generated by the
patient’s body signals. Neither the blockchain community nor health professionals
can leak patient information. Patients can only recover keys from their physiologi-
cal data to decrypt the data. However, this approach places a significant burden on
limited power medical sensors, because these sensors must build key physiological
patient data during decryption.
Patient Centric Agent (PCA) connects patients’ body sensor network (BSN) to
personalized blockchain networks. PCA decides which data should be included in
the blockchain and which miners should be chosen. The blockchain is not only a
distributed database for patients, but also an authentic platform that is checked by
all nodes on the blockchain. The blockchain node can be provided by healthcare
providers, other organizations or individuals.
A BSN (Zhao et al. 2018) consists of dozens of biosensor arrays located on or
inside the human body. This node is equipped with various biosensors which can
detect physiological signals such as blood pressure (systolic and diastolic), electro-
cardiogram, blood oxygen content (SpO2), photoplethysmogram signals (PPG) and
so on. In addition, they are also equipped with wireless network chips, and these
chips not only assist biosensor nodes in forming BSN, but also help these nodes to
send composite physiological signals to special relational nodes (commonly referred
to as PDAs) that are responsible for combining and sending signals to remote medi-
cal centers, such as hospitals.
The blockchain system has been proposed to support records of immutable edu-
cational processes. There are proposals that record creative work or ideas to gain a
scientific reputation, keep a diary of student activities in various learning organiza-
tions and allow higher education institutions around the world to give credit to
courses for students who have completed the exhibition of their ideas in the course.
Training and other records can be included in the general system for managing
personal records and used by companies and audit services.
Researchers also use blockchains to solve problems related to the academic
community. Examples of applications cover the entire life cycle of research meth-
odology, peer review and research publications for the protection of intellectual
property. First, it is proposed at the experimental stage to block and release the
data recording system and its results if necessary to avoid damage to the experi-
mental integrity by negligence or intentional errors, e.g. audit trail from research
data. This guide recommends the use of adaptive blockchain-based choreogra-
phy for collaborative experiments, which can be reproduced silico experiments
towards both robust accountable reproducible explained (RARE) research and
findable accessible interoperable reusable (FAIR) results. Second, the paper phase
introduces a blockchain-based platform that stores and measures author contribu-
tions based on changes made by the author. Third, the blockchain system in the
peer review phase can also stimulate a timely and sustainable review process. As
explained above, the system can give the examiners a cryptographic prize if the
quality check is received by the editor. This valued currency can later be used
to publish reviewers’ papers in journals, creating an incentive mechanism. The
fourth part uses the previous work of Semantic Web technology in the release
phase to give the author the opportunity to work on an evolutionary version of
scientific research that can be opened for reviews, conferences or journals. This
allows decentralized publishing systems. These include blocking chains, smart
contracts and MAS to coordinate the traceability of food in agricultural products.
Implementing this new model will increase the supply chain of current agricul-
tural products by adding blockchain. The current supply chain and supply chain
architectures via blockchain models are described below, including the advantages
provided by the new supply chain model.
(1) Current supply chain: This model starts with manufacturers and imports.
Two supply chain members send their products and data to the next layer of
the supply chain. The next shift is export, process or wholesale. This is the
middle layer that processes the main products of the supply chain. Finally,
the last layer accommodates retailers and catering service providers who sell
products. The main disadvantage of this model is that data in each element
of the supply chain are centralized and other elements cannot see the transac-
tion. The main result of this error is that consumers do not have the opportu-
nity to check the source of food to be purchased. In addition, there is no way
to ensure that user data is reliable.
(2) Supply chain through blockchain: With the addition of blockchain to agri-
culture, the supply chain changes. Now, all supply chain members store all
their transactions in one block. This allows greater security in transactions.
In addition, this new model corrects the shortcomings of the current supply
chain. Data are decentralized, and each member can read important data
about the block operation. For example, the manufacturer can check proces-
sor product information and transport provider pickup details.
A traceability system (Lu and Xu 2017) enables product tracking by providing informa-
tion (for example, origin, components or location) during production and distribution.
Product suppliers and retailers usually require independent and government-certified
tracking service providers to verify products throughout the supply chain. If all meet
the requirements, the traceability service provider issues a test certificate confirming
the quality and authenticity of the product. Tracking systems usually store informa-
tion in conventional databases controlled by service providers. Centralized data storage
is a potential single point of failure, and there is a risk of tampering.
This restructures the current traceability system to track service providers by
replacing the central database with a blockchain. OriginChain provides transpar-
ent data tracking, increases data availability, and automates compliance testing.
OriginChain is tested realistically based on user tracking information. Product
suppliers and retailers request tracking services for various purposes. Suppliers
want to receive certificates to show consumers their origin and the quality of their
products and to comply with regulations. The dealer wants to check the origin and
quality of the product.
OriginChain currently uses private blockchains that are geographically dis-
persed in tracking service providers, which have offices in three countries. The
plan is to create a reliable tracking platform for other organizations, including gov-
ernment-certified laboratories, large suppliers and retailers with long-term plans.
The parties signed a legal agreement covering tracking services. OriginChain pro-
duced smart contracts that represented legal agreements. The smart contract codi-
fies the combination of services and other provisions specified in the agreement. A
smart contract can automatically check and apply this condition. It will also check
whether all information required by the regulations is available to allow an auto-
matic review of compliance with regulations stipulated with the company.
Tracking service providers manage required information for traceability in
place such as regulations, date of inspection, etc. and hash of certificates or photos.
Because data memory is limited to the blockchain, originChain stores two types of
data along with the blockchain as variables for smart contracts:
photos (.pdf or .jpg) and the addresses of the smart contracts are off-chain. It
is available in a centralized MySQL database hosted by originChain. Other
partners may still have their own product information database (for suppliers
or retailers) or other sample numbers (for laboratories). The laboratory peri-
odically injects the results of test samples from the outside world into block-
chain. Blockchain permission control can be off-chain or on-chain. However,
the centralized off-chain rights management module can be the focal point
of withdrawal, both operationally and from a management perspective.
OriginChain stores control information, for example, information for having
permission to join the blockchain network (having a copy of all historical
transactions). On-chain permission management leverages the blockchain by
influencing the nature of the decentralized blockchain, so that all partici-
pants have access to the blockchain. On OriginChain, the factory contract
creates a smart contract. This reduces the complexity of creating special smart
contracts. The employment contract contains code fragments that represent
various tracking services. The creation of smart contracts requires permission
from search service providers and suppliers or dealers. When a factory con-
tract is invoked, it creates two types of smart contracts: Signing contracts and
service contracts. A registration contract is a legal agreement and addresses
the service contract that codifies the legal contract. Service contracts can be
renewed by changing the address specified in the registration agreement with
the new version address. Possible updates include adding or removing services
from legal agreements after signing an original legal agreement or selecting a
testing laboratory based on availability. The registration agreement contains
a list of addresses that are permitted to renew the registration agreement and
the threshold for the minimum number of addresses needed for upgrading.
some traffic comes from IoT devices, including webcams, baby monitors, home
routers and digital video recorders. Malware called Mirai, which controls online
devices and uses them to initiate for DDoS attacks. The process involves phishing
emails that infect computers or home networks. Malicious software then spreads
to other devices such as DVRs, printers, routers and cameras that are connected
to the Internet and used by businesses, and most companies are forced to compro-
mise on surveillance issues. Tools like Shodan and IoTSeeker can be easily used to
detect vulnerable devices. This raises important questions about how widespread
use of such vulnerabilities can be prevented, because Internet-based devices have
very limited self-sufficiency.
The creation and management of vulnerability profiles, which may involve
manufacturers, can ensure that users are dealt with seriously in matters of security
and privacy. Blockchain must define a new fundamental approach to security that
goes beyond each other.
The device itself must contain the following:
Identity security: Blocking identity theft, prohibiting the use of unfair public
key certificates, countermeasures against “humans in the middle”
Data protection: Prevent data manipulation, development of access control
mechanisms and blockchain abuse
Security communication: Domain name services, DDoS attacks, important
information infrastructure protection
In particular, the approach to public safety through transparency has clear benefits
for the Internet of Things.
To improve the security of CE devices that support IoT, consider the following
phases throughout their life cycle.
9.4.11.1 Registration
When assembled, the product goes into a blockchain that links its cryptographic
trace with blockchain entries.
9.4.11.2 Update
If changes are made, e.g. as a firmware update, new fingerprints are created by the
peers and sent to the network, which insert fingerprints using the consensus algo-
rithm in their local copy.
9.4.11.3 Inspection
A node can check device properties at any time by recreating fingerprints and com-
paring those values with
entries (correct) in one block.
However, this can be considered as the hope that the device behaves well for
certain purposes and does not pose a threat or danger to the other party. Both
objective (e.g. vulnerability, integrity, etc.) and subjective measurements (for exam-
ple, recommendations or reputation) contribute to this proposal in calculations to
use blocks in the form of crypto blocks as alternative bits (called altcoins), which are
accompanied by consensus protocols adapted to the application. Examples include
distributed access management systems where users own and control their personal
information, binary systems and certificate monitoring systems and crypto bodies
that can be used by the device to show that it has contributed to DDoS attacks
on certain purposes. The security of this proposal, if managed strictly, depends on
assumptions about the security of the basic block data structure.
When the blockchain is integrated into IoT technology, IoT devices exchange
data across distributed books and smart contracts. In this scenario, each device can
be disconnected, generating around a device’s footprint, because each device leaves
a unique track. So, when a device is associated with someone, personal data are pro-
cessed. This is in line with the European Data Protection Regulations (GDPR) (EU
2016/679), according to which a pseudonym may not be considered anonymization
even though it reduces the risk of data from the data subject that causes threats. It is
assumed that GDPR applies to most organizations, even if they are not within the
European union but their data is processed within the region of European Union
jurisdiction of law.
Another challenge that may be faced by the blockchain on legal compliance is
the deletion of personal data from books if the user (if any) cancels the processing
authorization. This is called the right to be forgotten in GDPR.
The partnership between IBM and Samsung has produced an autonomous
platform, decentralized for peer-to-peer exchanges. In particular, Ethereum is
used to coordinate devices by providing features such as registration, authen-
tication and consensus revocation lists. Gladius recently proposed an approach
to reduce DDoS attacks using a blockchain where pool nodes are dynamically
formed (through the Intelligent Ethereum contract) to validate the requested link
and block malicious activity. Additional security tools for IoT blockers such as
Factom, Filament and Guardtime have been developed to focus on protecting
system component integrity.
With the integrated IBM Watson IoT platform, users can add selected blocks
of registry data from the Internet to private registry blocks that may be included
in shared transactions. The platform translates data from devices connected to
the format required by the API for one block contracts. The blockchain agree-
ment does not need to know the specificity of device data. This platform filters
events on the device and only sends the data needed to execute the contract (ibm
.co/2rJWCPC).
Creating new business models eliminate the need for centralized cloud servers,
For example, Filament, a blockchain-based solutions provider for IoT, has launched
wireless sensors, called Taps, that allow communication with computers, phones, or
tablets within 10 miles (bit.ly/2rsxZ Yf). Taps create low-power, autonomous mesh
networks that enable companies to manage physical mining operations or water
flows over agricultural fields. Taps don’t rely on cloud services. Device identifica-
tion and intercommunication is secured by a blockchain that holds the unique
identity of each participating node.
Business is the main reason behind the creation of blockchain-oriented soft-
ware. The demand for security in blockchain applications is, therefore, even more
pressing, and thus that for specialized software engineering processes.
Software architecture: For the development of special BOS design records, a mac-
roarchitecture or meta-model can be defined. For this purpose, software engineers
must establish criteria for selecting block performance that is most appropriate for
assessing acceptance of side chain technology or ad-hoc block applications. For
example, Ethereum5 has received key storage, which is a very simple database.
Using a higher level of data representation, for example, graphical objects, can
speed up many operations that should be expensive with key-value repositories.
Modeling language: Block-oriented systems may require special graphic pre-
sentation models. In particular, existing models can also be adjusted to BOS. UML
diagrams can be changed or even rebuilt to reflect BOS features. For example,
charts such as Case Use, Activity Diagrams and Status Charts cannot effectively
represent the BOS environment.
Metrics: BOSE can utilize the introduction of certain metrics. For this pur-
pose, it will be useful to refer to the target/metric/metric (GQM) method, which
was originally developed to make measurement activities, but can also be used to
control analysis and improve the software process.
IBM recently stated the need for ongoing testing to ensure the quality of block
software. Testing must be based on the type of application, which in the case of
BOS is a critical safety system. In particular, the applications must be tested for
BOS. These testing packages must contain:
◾◾ Smart contract testing (SCT), in particular special testing to verify that smart
contracts (i) satisfy the principals.
Specifications, (ii) comply with jurisdictional law and (iii) do not contain unfair
contractual provisions.
Testing of blockchain transactions (BTT), e.g. double spending test and condi-
tion integrity (e.g. UTXO4).
Making software for smart contract languages: Implementation of the smart
contract development environment (SCDE) – block-oriented IDE transfer can
be key to building and disseminating BOS knowledge. Such an environment can
facilitate intelligent contracting in special languages (for example, Solidity, lan-
guage for writing contracts in Ethereum).
Blockchain-oriented software engineering (BOSE) (Wessling and Gruhn
2018) is a new research field for decentralized application development (“DApps”
for short) based on blockchain technology. Currently, Ethereum blockchain is the
most popular platform to build DApps. The business logic is represented by one or
more executable code contracts (abbreviated as “EDCC”, the term used to describe
smart contracts) located on the blockchain network. This involves designing exist-
ing DApps, identifying possible architectural models and comparing their pros and
cons with the basic architectural model of DApp, where users interact directly with
EDCC by generating and sending transactions. There are three ways:
The DApp provider provides websites that can interact with users without requir-
ing Cryptobrowser or the MetaMask plugin. The website communicates with the
DApp logic backend through REST calls and summarizes all blockchain-specific
actions. This means that the backend is responsible for interacting with the block-
chain and sending transactions to users who cannot validate it. For this reason,
Pattern C offers maximum comfort, but places great trust in the DApp provider,
which processes user input data and manages the private key.
References
Baran, Paul. 1964. “On Distributed Communications.” Product Page. 1964. https://www
.rand.org/pubs/research_memora nda/R M3420.html.
Casino, Fran, Thomas K. Dasaklis, and Constantinos Patsakis. 2019. “A Systematic
Literature Review of Blockchain-Based Applications: Current Status, Classification
and Open Issues.” Telematics and Informatics 36 (March): 55–81. doi:10.1016/j.
tele.2018.11.006.
Engelhardt, Mark. 2017. “Hitching Healthcare to the Chain: An Introduction to Blockchain
Technology in the Healthcare Sector.” Technology Innovation Management Review 7
(10): 22–34. doi:10.22215/timreview/1111.
Iansiti, Marco, and Karim R. Lakhani. 2017. “The Truth about Blockchain.” Harvard
Business Review, January 1, 2017. https://hbr.org/2017/01/the-truth-about-block
chain.
Katuwal, Gajendra J., Sandip Pandey, Mark Hennessey, and Bishal Lamichhane. 2018.
“Applications of Blockchain in Healthcare: Current Landscape & Challenges.”
ArXiv:1812.02776 [Cs], December. http://arxiv.org/abs/1812.02776.
Kuo, Tsung-Ting, Hugo Zavaleta Rojas, and Lucila Ohno-Machado. 2019. “Comparison
of Blockchain Platforms: A Systematic Review and Healthcare Examples.” Journal of
the American Medical Informatics Association 26 (5): 462–78. doi:10.1093/jamia/
ocy185.
Liu, J., W. Li, G. O. Karame, and N. Asokan. 2018. “Toward Fairness of Cryptocurrency
Payments.” IEEE Security Privacy 16 (3): 81–89. doi:10.1109/MSP.2018.2701163.
Lu, Q., and X. Xu. 2017. “Adaptable Blockchain-Based Systems: A Case Study for Product
Traceability.” IEEE Software 34 (6): 21–27. doi:10.1109/MS.2017.4121227.
Meijer, Albert, and Manuel Pedro Rodríguez Bolívar. 2016. “Governing the Smart City:
A Review of the Literature on Smart Urban Governance.” International Review of
Administrative Sciences 82 (2): 392–408. doi:10.1177/0020852314564308.
Nakamoto, Satoshi. n.d. “Bitcoin: A Peer-to-Peer Electronic Cash System,” 9.
Porru, Simone, Andrea Pinna, Michele Marchesi, and Roberto Tonelli. 2017. “Blockchain-
Oriented Software Engineering: Challenges and New Directions.” In Proceedings
of the 39th International Conference on Software Engineering Companion, 169–171.
ICSE-C ’17. Piscataway, NJ, USA: IEEE Press. doi:10.1109/ICSE-C.2017.142.
Shen, C., and F. Pena-Mora. 2018. “Blockchain for Cities—A Systematic Literature
Review.” IEEE Access 6: 76787–76819. doi:10.1109/ACCESS.2018.2880744.
Uddin, M. A., A. Stranieri, I. Gondal, and V. Balasubramanian. 2018. “Continuous Patient
Monitoring With a Patient Centric Agent: A Block Architecture.” IEEE Access 6:
32700–32726. doi:10.1109/ACCESS.2018.2846779.
Wang, S., J. Wang, X. Wang, T. Qiu, Y. Yuan, L. Ouyang, Y. Guo, and F. Wang. 2018.
“Blockchain-Powered Parallel Healthcare Systems Based on the ACP Approach.”
IEEE Transactions on Computational Social Systems 5 (4): 942–950. doi:10.1109/
TCSS.2018.2865526.
Wessling, F., and V. Gruhn. 2018. “Engineering Software Architectures of Blockchain-
Oriented Applications.” In 2018 IEEE International Conference on Software
Architecture Companion (ICSA-C), 45–46. doi:10.1109/ICSA-C.2018.00019.
Yuan, Y., and F. Wang. 2018. “Blockchain and Cryptocurrencies: Model, Techniques, and
Applications.” IEEE Transactions on Systems, Man, and Cybernetics: Systems 48 (9):
1421–1428. doi:10.1109/TSMC.2018.2854904.
Zhao, H., P. Bai, Y. Peng, and R. Xu. 2018. “Efficient Key Management Scheme for
Health Blockchain.” CAAI Transactions on Intelligence Technology 3 (2): 114–118.
doi:10.1049/trit.2018.0014.
Contents
10.1 Introduction............................................................................................186
10.2 The Blockchain Perspective of Digital Twin............................................187
10.3 Real-Time Blockchain-Enabled Digital Twins.........................................189
10.4 Some Notable Cases ...............................................................................189
10.5 Challenges to Realizing Blockchain-Enabled Digital Twins....................199
10.6 Digital Twin in the Human Context.......................................................201
10.7 Digital Twin-Enabled Business Trends....................................................202
10.7.1 Constant Consumer Commitment........................................... 206
10.7.2 Business Process Supervision..................................................... 206
10.7.3 Automated Services................................................................... 206
10.7.4 Expanded Big Data................................................................... 206
10.7.5 Embedded IT............................................................................ 206
10.8 Conclusions............................................................................................ 206
10.9 Future Scope...........................................................................................207
References......................................................................................................... 208
185
Telegram Channel @nettrain
186 ◾ Blockchain Technology and Applications
10.1 Introduction
In the 1990s the Internet paved the way for the digitization and global accessibility
of information. However, this transfer of confidential data involved third parties
ensuring secure transfer. As a result with passing time and increasing volumes of
data, the secure transfer of assets was liquidated and somehow all personal data
could be retrieved from the Internet either through ethical or unethical means [1].
Recent times have noted a rapid change in the world in terms of the rising digital
transformation in almost all walks of life [2]. Industries have also noted a signifi-
cant movement towards digital initiatives like the digital twin [3–6] to provide
timely and quality services to the customer. This altered business model is actually
an attempt to optimize operations to improve the overall customer experience. The
new generation popularly known as the millennials are catalyzing this new trend.
They prefer to use assets, products and processes as services rather than owning
and maintaining them. It is estimated that by the turn of this decade the number
of Internet of Things (IoT)-enabled devices will be over 20 billion across the globe
[3]. These networked devices shall sustain millions of digital twins with important
data. The digital twin technology amalgamates physical units with their virtually
premeditated twins. It is actually mapping a physical entity with its digital image
to enhance the performance and behavior of installed physical machines. It helps
reduce downtime and increase performance. Digital twin technology is actually
enabling the digital transformation of the entire society to facilitate competence
and transparency in almost all endeavors of human life [2]. The digital twin is not
a recent model, it has existed for several years and more lately has witnessed greater
implementation from the perspective of machines where the digital copy of the
machine (combining CAD/CAE technology, IoT and analytics) “lives” in conjunc-
tion with the physical machine and helps proactively foresee the need for repairs,
potential improvement for enhanced performance, augmentation of the product
line, etc. [7].
The IoT ecosystem demands IT components and connectivity. A digital
twin can mirror a physical entity and facilitate the requisite digital supervision
and maneuvering competencies of their physical counterparts in the real world.
Furthermore they also allow efficient storage and transmission of data along with
added services like analytics solutions which are key to domains like predictive
modeling. Thus a digital twin can also prove to be an important component of
realizing a smart city [7].
In recent years the blockchain technology has materialized into a novel organiz-
ing paradigm for the detection, evaluation and transmission of distinct units of all
human activity at a greater magnitude than what has been achievable before. It is
predicted that blockchains could significantly facilitate the application of digital
twins in IoT [7]. The application of blockchain to digital twin is being termed as the
rebirth of digital twin [7]. To truly leverage the benefits of digital twins in an IoT-
enabled ecosystem a technology to transparently handle data-based transactions
1. S/4HANA Cloud SAP Cloud solution on cloud SAP platform. It To maintain compliance with data
for Intelligent aids in managing and digitalizing your protection regulations, industry-
Product Design product research and development. specific legislations in different
[4, 25] Storage and sharing as well as review of countries especially in personal
engineering documents are fostered data deletion scenario.
through a process-driven approach.
2. Energy metering Siemens, Siemens Electrical Digital Twin initiative Digital twinning can be applied to
[26] Emerson closely aligns real and virtual worlds by every energy generation or
providing utilities with a single distribution site; however
synchronization point to model data uninterrupted data access remains
across their IT landscape. This digital the primary issue to ensure
twin replica of the live plant runs in successful twin operation.
parallel to the real control system
(Continued)
Table 10.1 (Continued) Notable Digital Twin Initiatives
Blockchain-
S. Enabled Digital
No Twin Project Company Description Challenges Ahead
3. GE Digital [27] General Electric GE Digital is a subordinate of the Globalization, novel manufacturing
Predix Platform American multinational conglomerate techniques and liberalization
corporation General Electric. GE Digital policies are the potential
functions across a number of industries, challenges. Further managing all
including aviation, manufacturing, the design data for digital twin
mining, oil and gas, power generation amongst collaborators and
and distribution, and transportation suppliers while the physical
among others. products change shall be a test.
GE Digital defines a hierarchy of digital
twins like component twin, asset twin,
system twin and process twin. These
varied twins effectively help to monitor,
simulate and control online or offline
assets or processes.
4. Aviation [2, 28, Boeing They are creating a digital twin of each Availability of suitably complete
29] plane they are manufacturing in order to and accessible digital data for all
keep it up to date in real time. This helps equipment is the main challenge
airlines optimize their data efficiency. for the aviation digitization as
Helps in enhancing customer value much of the equipment in use in
through services like immediate remote the aviation sector was put into
assistance through a HoloLens and use long ago using older
Skype. Further it is allowing the aviation technologies, hence information
industry save space through prescriptive relating to such components may
and predictive analytics. be missing, incomplete or
incorrect. This combined with
challenges related to data security,
ownership, volume and integrity
5. Connected cars Ford Digital twins are being successfully applied The right kind of probes so that
[2] in the automobile sector to generate the behavioral data is captured and
virtual model of a connected vehicle. This continuously updates the virtual
twin helps continuously analyze vehicle vehicle. The instrumentation is
performance as well as those of the tricky since it has been performed
connected components. This helps in without compromising the system
enabling a customized service for each performance.
customer.
(Continued)
Table 10.1 (Continued) Notable Digital Twin Initiatives
Blockchain-
S. Enabled Digital
No Twin Project Company Description Challenges Ahead
6. Steel POSCO Are using digital twins to simulate their To unlock the actual value of the
manufacturers complex manufacturing operations, digital twin demands a holistic
[30] empowering them to predict issues far in approach to accumulate, control
advance even before processes and and direct the digital data of the
products reach the factory floor. They product. A robust engineering
have achieved this digitization through change management process is
Dassault Systèmes’ 3DEXPERIENCE also desirable to guarantee that
platform. the digital twin precisely manages
the virtual and physical
configurations.
7 Housing Global Housing Enables a transparent housing Common, holistic policies and
development Builders development marketplace with more regulations across the global
[31] prospects for the less recognized firms marketplace are crucial for the
(Continued)
Enabling Digital Twin through Blockchain ◾ 193
Table 10.1 (Continued) Notable Digital Twin Initiatives
Blockchain-
S. Enabled Digital
No Twin Project Company Description Challenges Ahead
9 Secure plug and Asset The concept expects that as soon as a new All system components require
produce [34] Administration module is connected to a system, the successful behavior adaptation to
Shell (AAS) data configuration transfer begins. imbibe self-x capabilities like
Combining AAS with blockchain ensures self-optimization, auto
uniform, standardized, authentic transfer configuration, etc.
of configuration data.
10 Edge Europe These marketplaces enable support to Resilience, cost, and quality of
marketplaces multiple providers for offering services service and experience will
[35] at the network edge. subsequently enable such a
marketplace to adapt its services
over time.
11 Traffic Deloitte Proposes real-time, flexible, precision- Delivering real-time road status
avoidance [36] quantity, administration and enrichment effective and digitally connected,
resolutions towards sustainable smart smart mobile apps for efficient
cities. service delivery.
(Continued)
Table 10.1 (Continued) Notable Digital Twin Initiatives
Blockchain-
S. Enabled Digital
No Twin Project Company Description Challenges Ahead
13 Space-based Recent lighter and cheaper nanosats are Regulating this infrastructure to
digital twins being deployed to generate new services prevent its misuse shall be of
[39, 40] as well as supply chains in space. This utmost importance in its actual
can enable creation of an immutable, realization.
trusted, digital twin of the earth. This
replica could be utilized for almost
anything and everything.
(Continued)
Enabling Digital Twin through Blockchain ◾ 195
Table 10.1 (Continued) Notable Digital Twin Initiatives
Blockchain-
S. Enabled Digital
No Twin Project Company Description Challenges Ahead
15 e-Village[42] India Government facilities and services All geographically distinct villages
require citizen essential information. A need to be connected through ICT
government trusted information to realize this model.
repository can be created by digitizing
the parivar register through blockchain.
This shall enable quicker service delivery
to one and all.
16 Global FinTech China, India Digitized financial technology services In a demographically diverse
revolution [43] linked to mobiles have generated the country like India three key
financial revolution capturing the normal enablers often referred to as the
as well as the financially underserved, i.e. JAM trinity including Jan Dhan
the banked and unbanked consumer Yojana, Aadhar and Mobile
alike. China has emerged as the leader in phones have paved the way for
17 3D printing [21] Moog Aircraft Applied to ensure secure 3D printing of Automation of creation and testing
Group aircraft components via blockchain. as well as servicing of all such
aircraft components shall need
effort.
(Continued)
Table 10.1 (Continued) Notable Digital Twin Initiatives
Blockchain-
S. Enabled Digital
No Twin Project Company Description Challenges Ahead
18 Supply chain IBM Blockchain is successfully applied for Digitization of the complete
management tracking of containers during shipping, shipping supply chain involving
[21, 44] register certifications and crucial many conventional components is
product information through the entire a challenge.
chain.
19 Education [21] Holburton This school is applying blockchain to Globally empowering all
School, San store and deliver its certificates and curb universities and schools to adopt
Francisco fake certificate issue. this technology though
challenging shall help eliminate
many scams in education.
20 Cyber-physical DeCyMo Enable smart monitoring and control in Large-scale deployments of the
systems (CPSs) industrial as well as home scenarios. May solution require testing to test
to understand and appreciate the knowledge, assets, data and intelligence that go
into realizing a successful digital twin. We discuss the case of a smart factory, the
digital version of the crucial supply chain manufacturing process [7, 48–51]. The
progression of creating a digital twin usually follows this path:
i. Understanding the operation and prediction at the asset level and leverage to
optimize individual performance.
ii. Optimize maintenance at individual level.
iii. Aggregate for multiple assets and optimize them at the operations level.
iv. Rethink business models and enable new values and services.
Connectivity is crucial to the manufacturing process. With the rise of industry 4.0
and the confluence of digital and physical worlds, supply chain dynamics has under-
gone complete transformation. The new open chain mechanism of supply chain
operations better known as the digital supply network is actually the basis for future
competition in the manufacturing industry. However, to completely comprehend
these, digital supply network firms need to provide parallel integration through the
innumerable operational systems that influence the business; vertical integration
through the associated manufacturing systems; and end-to-end, holistic amalga-
mation through the entire value chain. Together this integration is known as the
smart factory that enables greater value both within the factory and across the supply
network. The smart factory enables a fully connected, flexible system that utilizes a
constant stream of data from connected operations and production systems to adapt
to new demands through the digital twin. The resultant is a flexible, agile system
with higher efficiency and reduced downtime. Such a system can self-optimize per-
formance across a broader network, self-adapt to and learn from dynamic conditions
in real-time and autonomously run the entire production process. Hence, such a sys-
tem can evolve and grow with the changing needs of the organization. Figure 10.2
displays the features of a smart factory that are critical to its success.
As displayed in Figure 10.2 connectivity, optimization, transparency, proactiv-
ity and agility are the major attributes of a smart factory. Together they ensure
better decision making, helping organizations improve their production process.
In the Indian perspective, Hero Moto Corp, the world’s largest two-wheeler
manufacturer, is the first automobile company in India to have adopted the digi-
tal twin approach in April, 2016 [52]. This demanded collaboration across varied
departments, to adopt a digitally enabled manufacturing facility to achieve reduced
costs and better quality. They have realized a digital replica for their Vadodara
(Halol) manufacturing facility to digitally visualize the facility continuously to
enable timely changes and enhancements.
The company aims to visualize its product and process as well as resources in a
virtual context to enhance productivity, reduce costs and eliminate disruptions for
each of its manufacturing facilities. The company also achieved pre-validation of
x. Interaction between smart components within and with other [32]: This
can be the primary challenge in successful application of blockchain-enabled
digital twins in varied domains. Successful interaction between all compo-
nents of a twin is necessary to ensure accurate replication of the physical asset
be it human or physical entity. Hence, establishing healthy, continuous inter-
action between all smart components of a twin as well as with other twins as
well as entities in the ecosystem is essential for the effective implementation
of blockchain-enabled digital twins across the industry.
The above challenges are just the tip of the iceberg, there are many more challenges
and issues that shall keep coming up as digital twins are applied across varied busi-
nesses and domains.
i. Attributes: They are the core data that constitute our identity. For example:
Name, age, gender, address, education, nationality, etc. These data help map
an individual and predict whether they are prone to certain health conditions
due to origin or dwelling.
ii. Interactions: This footprint is generated on the basis of our interaction with
the external world. For example: Impact of frequent air travel on one’s health,
shopping habits’ relation to bank data. New technology like Fitbit watches,
interaction data with doctor, phone usage statistics, etc., are all essential
components of the “Digital Me” that if consolidated with attributes can aid
in monitoring, diagnostics and prognostics of individual performance and
well-being. These data may even help organizations in their decision making.
However, these decisions involve a lot of issues we would not discuss here.
iii. Online persona: With the Internet, each one of us also has a digital identity
through which we do all browsing. These data are already stored and shared
by varied websites and can again provide interesting insights into many of our
personal attributes like health, interests, etc.
The above three attributes clarify the possibility of the human digital twin. Just like
a machine digital twin can aid in gauging the need for maintenance, growth, etc.,
human digital twins can help in varied life-savvy predictions.
Clearly, the above discussion clarifies the advantages of digital twins for
humans. However, if such a digital replica is built on traditional technologies, it
will hold all data in a central repository which would require guarding along with
analytics to provide guarded predictions. To overcome the additional security
costs blockchains provide a viable alternative. Blockchains enable the creation of
identities on an immutable ledger with no centralized owner. Such self-sovereign
identity is capable of deciding who gets access to their data and can also track all
those who accessed it. For example: The Hyperledger Indy blockchain platform
enables the creation of such identities. Such a blockchain network is generally con-
stituted by the data owner (individual), the data attester (university that issued the
qualification certificates) and the data requestor, say the employer. Governance of
such a network can be democratic and each access to data can be authorized by the
data owner. This ability to create digital replicas of citizens holds the potential to
transform the global economy. Many governments across the globe are investing
large amounts in blockchain-enabled initiatives like self-sovereign identities, own-
ership registration for movable assets, verification, etc. Blockchain-enabled human
digital twins are going to be a vital component in realizing and implementing all
such initiatives [64]. Table 10.2 lists some notable government initiatives realizing
the same.
Table 10.2 depicts how different governments across the globe have realized the
importance of digital twins and are spending huge capital to realize blockchain-
enabled twins to digitize and improve citizen life in different scenarios [44, 74].
What is notable from Table 10.2 is that varied governments or private players in dif-
ferent countries have simply embraced the blockchain technology to provide safer,
easier and better-connected citizen services. This simple adoption of blockchain in
processes has eliminated the need for an intermediary third party, risk of data leak-
age, etc., while enabling services for one and all alike. Further these blockchain-
powered processes are generating human digital replicas in the background while
improving human quality of life.
(Continued)
(Continued)
10.7.3 Automated Services
Varied industries including automobile can now deploy IoT sensors on vehicles
and packages to maximize the visibility of supply chains and improve operations
of valuable assets. These sensors can identify variations in temperature, light and
other attributes, and can be used to alleviate risks of delays, interruption, robbery
and more.
Real-time alerts can enable services to be at the right place at the right sched-
uled delivery times, and with the apparatus required to amplify efficiencies.
10.7.5 Embedded IT
The transition from accumulation of IoT “smarts” to current devices and generat-
ing devices with IoT components built-in will be transformative. However this big
industrial transformation rightly referred to as Industrial Revolution 4.0 shall actu-
ally transform the industrial landscape and its mechanisms.
10.8 Conclusions
The Internet of Things and digital twins as well as blockchains have been suc-
cessfully implemented in varied industrial sectors and domains. Together they
are instrumental in realizing the new industry 4.0 revolution. However their
implementation has always faced technical as well as financial limitations. As
the number and volume of IoT devices increase, the technical and financial chal-
lenges diminish. However, for the relatively novel digital twin platform we need
to realize that they are just not an academic modeling exercise. Digital twins are
created for specific outcomes or what may be termed as key performance indica-
tors (KPI). These KPIs are integral to deciding issues like maintaining a specific
quality of service, predicting component lives to reduce downtime, etc. However,
an integrated, stable underlying platform was missing till now. The underlying
distributed ledger technology of a blockchain offers immutability and transpar-
ency as well security benefits for its participating entities. Hence, blockchain has
emerged as a promising underlying platform to realize an effective and efficient
digital twin. Instead it can be appropriately termed that digital twins are the
technology of the future which hold the potential of transforming corporate as
well as human life.
10.9 Future Scope
The Digital Revolution is surely sweeping across the globe, transforming mankind
and industries as well as economies alike [43]. Everything around us, be it assets,
solutions, processes or even technologies themselves, is transforming into services.
Blockchain-enabled digital twins are surely an innovative technology that holds
the capability of revolutionizing the industrial landscape as well as transforming
human life. However, there is still a long way to go before realizing the complete
potential of this technology as depicted by the research and academia. Many future
potential areas of research and effort can be understood and outlined from this
study. However, they are not complete and may keep expanding with novel applica-
tions of this technology to varied domains:
in the IoT ecosystem. To solve these issues again effective ontologies may be
used to delegate some information of the weak devices over to some strong
devices in the chain.
4. Bigger and bigger big data [77]: This new wave of digital transformation
includes digitalization as well as digitization. Digitization involves creating
digital replicas of physical assets, entities, etc., while digitalization involves
the use of appropriate technologies to effectively use digitized entities in
societal processes. This complete process generates the creation and usage of
bigger and bigger amounts of big data that require effective mechanisms of
storage, analysis and sharing.
References
1. M. Miscevic, Gea Tijan, Edvard Zgaljic, Drazen Jardas, “Emerging trends in e-logis-
tics,” Mipro, pp. 1353–1358, 2018.
2. S. Nadella, J. Euchner, “Navigating digital transformation,” Res. Manag., vol. 61, no.
4, pp. 11–15, 2018.
3. Deloitte and Riddle& Code, “IoT powered by Blockchain How Blockchains facilitate
the application of digital twins in IoT,” p. 20, 2018.
4. J. Kobielus, “Networked digital twins are coming to industrial blockchains -
SiliconANGLE,” 2018. [Online]. Available: https://silicona ngle.com/2018/04/24/
networked-digital-twins-coming-industria l-blockcha ins/. [Accessed: 07-Sep-2018].
5. T. Rueckert, “Digital twin + blockchain - SAP news center,” 2017. [Online]. Available:
https://news.sap.com/2017/05/sapphire-now-digital-t win-blockchain/. [Accessed:
07-Sep-2018].
6. Gary Schwartz, “Our digital twin & the blockchain – Gary Schwartz,” 2018.
[Online]. Available: https://ww w.ifthingscouldspeak.com/2018/05/14/our-digita l-tw
in-the-blockchain/. [Accessed: 07-Sep-2018].
7. S. Wang, J. Wan, D. Li, C. Zhang, “Implementing smart factory of industrie 4.0: An
outlook,” Int. J. Distrib. Sens. Networks, vol. 2016, 2016.
8. A. H. Gausdal, K. V. Czachorowski, M. Z. Solesvik, “Applying blockchain technol-
ogy: Evidence from norwegian companies,” Sustain, vol. 10, no. 6, pp. 1–16, 2018.
9. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Www.Bitcoin.Org, p.
9, 2008.
10. J. Yli-Huumo, D. Ko, S. Choi, S. Park, K. Smolander, “Where is current research on
Blockchain technology? - A systematic review,” PLoS One, vol. 11, no. 10, pp. 1–27,
2016.
11. P. Deepak, M. Nisha, S. P. Mohanty, “Everything you wanted to know about the
blockchain,” IEEE Consum. Electron. Mag., vol. 7, no. 4, pp. 6–14, 2018.
12. D. Folkinshteyn, “A tale of twin tech: Bitcoin and the www,” J. Strateg. Int. Stud., vol.
X, no. 2, pp. 82–90, 2015.
13. M. Weeks, “The evolution and design of digital economies,” 2018.
14. B. Pellot, “Fast forward,” Ibm, vol. 42, no. 3, pp. 46–49, 2013.
15. P. A. Corten, “Blockchain technology for governmental services: Dilemmas in the
application of design principles,” pp. 1–14, 2017.
16. M. Swan, Blockchain: Blueprint for a New Economy, 2015, O'Reilly Media: Newton, MA.
17. D. Schahinian, “IoT forecast: Digital twins to be combined with blockchain - digi-
tal twin - HANNOVER MESSE,” 2018. [Online]. Available: https://www.hannover
messe.de/en/news/iot-forecast-digita l-twins-to-be-combined-with-blockchain-88960
.xhtml. [Accessed: 29-Nov-2018].
18. Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, “An overview of blockchain technol-
ogy: Architecture, consensus, and future trends,” In Proc. - 2017 IEEE 6th Int. Congr.
Big Data, BigData Congr. 2017, pp. 557–564, 2017.
19. B. Cearley Walker, “Top 10 strategic technology trends for 2017,” no. October 2017,
2016.
20. Z. Zheng, S. Xie, H.-N. Dai, X. Chen, H. Wang, “Blockchain challenges and oppor-
tunities: A survey Shaoan Xie Hong-Ning Dai Huaimin Wang,” Int. J. Web Grid
Serv., vol., 14, no. 4, pp. 1–24, 2016.
21. Virbahu Nandishwar Jain, Devesh Mishra, “Blockchain for supply chain and manu-
facturing industries and future it holds!” Int. J. Eng. Res., vol. 7, no. 9, pp. 32–40, 2018.
22. G. Chen, B. Xu, M. Lu, N.-S. Chen, “Exploring blockchain technology and its
potential applications for education,” Smart Learn. Environ., vol. 5, no. 1, p. 1, 2018.
23. L. Lee, “New kids on the blockchain: How bitcoin’s technology could reinvent the
stock market,” Hast. Bus. Law J., vol., 12, no. 2, pp. 81–132, 2015.
24. A. Bahga, V. K. Madisetti, “Blockchain platform for industrial internet of things,” J.
Softw. Eng. Appl., vol. 9, no. 10, pp. 533–546, 2016.
25. “Introduction - SAP help portal.” [Online]. Available: https://help.sap.com/viewer/d3
a4810ff 9dd41c59c50e1d1a6d4d7ae/1811/en-US. [Accessed: 19-Nov-2018].
26. “Prepare for a sustainable digital future Enable interoperable data exchange and
synchronization.”
27. “Digital twin | GE digital.” [Online]. Available: https://ww w.ge.com/digital/applicat
ions/digita l-twin. [Accessed: 19-Nov-2018].
28. S. Datta, “Cybersecurity-an agents based approach?” 2017.
29. “Digital twins and threads in aviation, aerospace and defense,” 2017. [Online].
Available: https://www.capgemini.com/us-en/2017/12/establishing-a-f ully-func
tional-digital-t win-or-digital-thread-in-aviation-aerospace-a nd-defense/. [Accessed:
19-Nov-2018].
30. S. Dudley, “Dassault systèmes helps POSCO digitise its manufacturing opera-
tions,” 2015. [Online]. Available: http://www.technologyrecord.com/Article/dassa
ult-syst232mes-helps-posco-digitise-its-manufacturing-operations-49171. [Accessed:
30-Nov-2018].
31. I. Savu, G. Carutasu, C. L. Popa, C. E. Cotet, “Quality assurance framework for new
property development: A decentralized blockchain solution for the smart cities of the
future,” Res. Sci. Today, vol. 13, 2017.
32. N. Teslya, I. Ryabchikov, “Blockchain-based platform architecture for industrial
IoT,” In Conf. Open Innov. Assoc. Fruct, pp. 321–329, 2018.
33. K. Czachorowski, M. Solesvik, Y. Kondratenko, The Application of Blockchain
Technology in the Maritime Industry, vol. 171. Springer International Publishing, 2019.
34. D. Lang, M. Friesen, M. Ehrlich, L. Wisniewski, J. Jasperneite, “Pursuing the vision
of industrie 4.0: Secure plug-and-produce by means of the asset administration shell
and blockchain technology,” In 2018 IEEE 16th International Conference on Industrial
Informatics (INDIN), pp. 1092–1097, 2018.
35. B. Varghese, M. Villari, O. Rana, P. James, T. Shah, M. Fazio, R. Ranjan, “Realizing
edge marketplaces: Challenges and opportunities,” IEEE Cloud Comput., vol. 5, no.
6, pp. 9–20, 2018.
53. S. Goldberg, “The promise & challenges of digital twin,” HarperDB, 2018. [Online].
Available: https://ww w.harperdb.io/blog/the-promise-challenges-of-digita l-twin.
[Accessed: 19-Nov-2018].
54. David Schahinian, “IoT forecast: Digital twins to be combined with blockchain -
digital twin - HANNOVER MESSE,” 2018. [Online]. Available: http://www.hann
overmesse.de/en/news/iot-foreca st-digita l-twins-to-be-combined-wit h-blockcha in-8
8960.x html. [Accessed: 06-Sep-2018].
55. S. Goldberg, “The promise & challenges of digital twin,” 2018. [Online]. Available:
https://ww w.harperdb.io/blog/the-promise-challenges-of-digita l-twin. [Accessed:
30-Nov-2018].
56. S. Ferguson, E. Bennett, A. Ivashchenko, “Digital twin tackles design challenges,”
World Pumps, vol. 2017, no. 4, pp. 26–28, 2017.
57. S. Haag, R. Anderl, “Digital twin – Proof of concept,” 2018.
58. R. Adams, G. Parry, P. Godsiff, P. Ward, “The future of money and further applica-
tions of the blockchain,” Strateg. Chang., vol. 26, no. 5, pp. 417–422, 2017.
59. A. Shakir, Zeeshan Muhammad;Aijaz, “IoT, robotics and blockchain: Towards the
rise of a human independent ecosystem | IEEE communications society,” 2018.
[Online]. Available: https://www.comsoc.org/publications/ctn/iot-robotics-and-blo
ckchain-towards-rise-human-independent-ecosystem. [Accessed: 04-Dec-2018].
60. J. K. Hodgins, “Animating human motion,” Sci. Am. vol. 278. Scientific American, a
division of Nature America, Inc., pp. 64–69, 1998.
61. S. Tyagi, A. Agarwal, P. Maheshwari, “A conceptual framework for IoT-based health-
care system using cloud computing,” In 2016 6th International Conference - Cloud
System and Big Data Engineering (Confluence), pp. 503–507, 2016.
62. F. Liu, A. Wollstein, P. G. Hysi, G. A. Ankra-Badu, T. D. Spector, D. Park, G.
Zhu, M. Larsson, D. L. Duffy, G. W. Montgomery, D. A. Mackey, S. Walsh,
O. Lao, A. Hofman, F. Rivadeneira, J. R. Vingerling, A. G. Uitterlinden, N. G.
Martin, C. J. Hammond, M. Kayser, “Digital quantification of human eye color
highlights genetic association of three new loci,” PLoS Genet., vol. 6, no. 5, p.
e1000934, 2010.
63. J. Davis, H. Bracha, “Prenatal growth markers in schizophrenia: A monozygotic co-
twin control study,” 1996.
64. D. Baars, “Towards self-sovereign identity using blockchain technology,” University
of Twente, p. 90, 2016.
65. V. Gohil, “Blockchain’s potential in India • indiaChains,” 2018. [Online]. Available:
https://indiacha ins.com/blockchains-potential-in-india/. [Accessed: 29-Nov-2018].
66. S. Haridas, “This Indian city is embracing blockchain technology -- here’s why.”
[Online]. Available: https://www.forbes.com/sites/outofasia/2018/03/05/this-india
n-city-is-embracing-blockchain-technology-heres-why/#337fcfb88f56. [Accessed:
29-Nov-2018].
67. e-Estonia, “Frequently asked questions: Estonian blockchain technology,” 2017.
68. “Government of Canada ’ s Innovation supercluster initiative.”
69. “Digital government 2020 prospects for Russia.”
70. Y. Handoko, “Developing IT master plan for smart city in Indonesia,” pp. 1–17.
71. C. Stolwijk, M. Punter, “Going digital: Field labs to accelerate the digitization of the
dutch industry,” 2018.
Contents
11.1 Blockchain Concepts...............................................................................213
11.1.1 Internet of Things......................................................................216
11.2 Integrating Blockchain in IoT................................................................. 217
11.3 Secure IoT Applications Using Blockchain.............................................. 218
11.4 Challenges in Integrating Blockchain and IoT....................................... 220
11.5 Advantages of Using Blockchain in IoT................................................. 220
11.6 Related Works in IoT and Blockchain.................................................... 220
11.7 Summary............................................................................................... 222
References......................................................................................................... 222
11.1 Blockchain Concepts
Blockchain is an interesting technology which offers a secured mode for digital
transactions. It acts like a ‘distributed ledger’ which records every transaction in
a secure, auditable, efficient and transparent manner. This concept is new and has
many applications and relevance in various business domains. Blockchain is simply
a database system that holds a continuously growing distributed set of data records.
Every transaction is digitally verified and signed to assure the authenticity. There
is no master server which holds the entire chain. All the participating computers
213
Telegram Channel @nettrain
214 ◾ Blockchain Technology and Applications
(nodes) possess a copy of the transaction chain. Figure 11.1 illustrates the working
of typical blockchain architecture [1].
A blockchain consist of two elements:
When a transaction edit request or a new transaction comes into blockchain, most
of the nodes participating in the blockchain implementation run algorithms to
verify and evaluate the history of every blockchain block that is considered. If the
majority of the participating nodes feels the history and digital signature are valid,
the new transaction block is accepted into the distributed ledger and a new block
is appended to the transaction chain. If majority of the participating nodes doesn’t
feel the digital signature as authentic, then the change request or the addition
request is denied and discarded. Thus this distributed consensus model permits
blockchain to act as a distributed ledger which doesn’t require some centralized
authority to validate the records or transactions.
The three key properties of blockchain technology are
◾◾ Decentralization
◾◾ Immutability
◾◾ Transparency
In previous days there was a centralized system which may monitor and record all
the transactions in a system. Any change can be initiated by the central coordina-
tor. But the people working with a centralized system can tamper with the data
of various transactions without the knowledge of other clients. This may lead to
serious problems in case of a financial organization. Blockchain overcomes this
demerit by providing a de-centralized system where the transaction chain is distrib-
uted among the participating clients or nodes. Whenever a node or a client tries to
modify the data, it is intimated to all the other clients participating in that system.
Thus it is impossible to tamper with the data without the consent of a majority of
participating clients inside a blockchain. Thus decentralization became a key prop-
erty of blockchain technology.
The property ‘transparency’ is a bit confusing for blockchain technology as it
is considered as a secure system. Of course the system is secure and all the transac-
tions and details of clients involved are stored in an encrypted form. But still if any
clients tries to access or modify a transaction, all the participating clients will be
alerted and thus it achieves transparency.
Immutability in blockchain is the property that ensures once a data is added
to the system, it is impossible to tamper with the same. This is one of the unique
properties of blockchain compared to other similar techniques like Bitcoin and cen-
tralized systems. Immutability is achieved in blockchain using some cryptographic
hash function. Blockchain can be considered as a linked list which includes data
and a hash pointer. The hash pointer points to its previous block and thus generates
a chain of blocks. A hash pointer is similar to a pointer in a linked list, but instead
of simply holding the address of the previous block it also holds the hash of the data
inside the previous block existing in the chain.
The blockchain network is simply a collection of nodes which are intercon-
nected. The blockchain is maintained by peer–peer network architecture. In a
peer–peer model, there is no single centralized server. Every system participating in
the network has equal priority. Every system can communicate with the others. The
same system can work as both client as well as server in different instances. Thus
there will be multiple distributed and decentralized servers. Though the system is
using a peer–peer model, there will not be a single point of failure.
A node in the blockchain can be categorized as follows:
◾◾ Smart contracts
◾◾ Crowd funding
◾◾ Supply chain auditing
◾◾ Prediction markets
◾◾ File storage
◾◾ Internet of Things (IoT)
◾◾ Identity management
◾◾ Protection of intellectual property
◾◾ Anti-oney aundering (AML)
◾◾ Land title registration
◾◾ Stock market
This chapter further focuses on the application and scope of blockchain technology
in Internet of hings (IoT)-based systems.
11.1.1 Internet of Things
The Internet has made a dramatic change in the field of information technol-
ogy, making communication easier. As the world is using intelligent and smarter
devices, technical experts derived the concept of ‘Internet of Things’. The Internet
of Things (IoT) is a networked class of devices, sensors and actuators deployed in
distinct locations [2]. The connection between various components can be wired or
wireless. Each device in the network should have a unique address. IPv6 protocol
is used for the same as it can address up to millions of distinct devices. The typical
IoT architecture is illustrated in Figure 11.2.
It is basically an inter-networked set of devices and embedded physical com-
ponents. The physical system may include a microprocessor or a microcontroller.
Arduino, Intel Galeleo and Raspberry PI boards are examples of the same [3].
Different sorts of sensors are deployed to collect real-time data. These fetched data
are fed to the central coordinator device which processes the data accordingly and
initiates suitable action using the connected actuators.
IoT uses both hardware and software. Apart from the hardware architectures,
it uses a class of software architectural patterns. The various standardized software
architectural patterns for IoT applications include lient–server, eer–eer, epresenta-
tional tate ransfer (REST) and ublish–ubscribe. The pattern selection criteria for
different IoT applications is primely based on heterogeneity and security [4].
The Internet of hings has much relevance in the digital world where people
like to control all objects and things remotely. Though the devices are heterog-
enous in nature, it is herculean task for the designer to model an IoT system for
a particular domain. The various challenges in designing an IoT-based system are
listed below:
applications where the network participants don’t have a clear vision of the shared
data through the network. The shared information may look like a black box, and
the users don’t know the authenticity and source of data. The need for blockchain
in IoT is discussed in the next section.
Due to the distributed nature of IoT networks, every node is a possible point
of failure which may be exploited by cyber attackers (e.g. distributed-denial-
of-service attacks). An integrated class of nodes with multiple infected devices
working simultaneously may lead to system collapse. Another key concern is the
presence of a central cloud service provider in an IoT environment. Any failure
to this central node may lead to vulnerability which should be addressed. One
of the most critical issues is data authentication and confidentiality. A lack of
data security in IoT devices can be exploited and may be used in an inappropri-
ate manner. Due to intervention of modern business models where the system
can share or exchange data/resources autonomously, the need for data security
is critical.
Another critical challenge in IoT is data integrity which has found some appli-
cations in the area of decision support systems (DSS). The collected data from
the sensors can be used for generating timely instructions or decisions. Thus it is
mandatory to protect the system from injection attacks where the attackers inject
false measures or values into the system which may seriously affect the accurate
decision making. Availability is critical for application domains, manufacturing
plants, automated vehicular networks and smart grids where the real-time data are
continuously monitored. Loss of data during a particular interval may result in the
entire system failure. The integration of a security measure to publicly verify the
audit trail will be beneficial for these sorts of systems. This can be easily achieved
by the integration of blockchain.
The integration of various technologies like IoT, loud computing and lockchain
into a single system has proven to be incomparable as it ensures both performance
and security. The concept of implementing blockchain in IoT systems is a revolu-
tionary step as it provides trusted data-sharing services where the data are reliable
and traceable [5]. The source of the data being generated can be traced out at any
stage and at the same time the data remain immutable.
In domains like smart cities and AI-based smart cars, reliable data are to be
shared for the inclusion of new nodes (participants) in the system, thereby enhanc-
ing the services. Thus the implementation of blockchain can complement Internet
of hings (IoT)-based applications with increased reliability and enhanced security.
Though the IoT functionalities can be improved with the aid of blockchain, there is
still a great number of research constraints and issues that are to be resolved.
◾◾ Supply chain and logistics: A supply chain network system involves different
stakeholders like raw material supplier, brokers, retailers, etc. Also it involves
multiple payment receipts and invoices. The duration of a supply chain may
extend over months. Due to the presence of multiple stakeholders, a delay in
delivering will be a serious challenge. Thus companies are using IoT-enabled
vehicles to track the live location and shipment process. Though the current
supply chain management system lacks transparency and data security, it is
possible to incorporate blockchain to enhance the traceability and reliability of
the network. The information collected through sensors is then stored in block-
chain. Various IoT sensors like PIR motion sensors, GPS trackers, RFID chips
and temperature sensors collect the information from logistic vehicles/logistics
and provide accurate details about the status of shipments. Sensor information
is then stored in the blockchain and all new actions are noted as transactions.
Hence it is no longer possible for a stakeholder to tamper with or modify the
data which may make the supply chain system transparent and trustable.
◾◾ Smart home: Most of the smart home applications like intrusion detection
systems, authentic access to rooms, remote controlling of devices and systems
require personal details like biometric recognition, facial recognition, voice rec-
ognition, etc. All these data stored in a typical centralized data store are vulner-
able to security threats. This can be resolved by using the concept of blockchain.
◾◾ Automotive industry: The automotive industry started using the concept of
IoT for smart car parking in parking slots using some sort of e-wallets or bit
currency. The time at which the vehicle parked in a particular slot is automat-
ically estimated and the approximated charge is deducted from the e-wallet
remotely. The integration of blockchain technology during this process may
enhance the trust of the end users.
◾◾ Pharmaceutical industry: The problem of counterfeit drugs in the phar-
maceutical sector is drastically increasing. A pharmaceutical company is
responsible for manufacturing, developing and distributing medicines across
the globe. Thus tracking the complete shipment process of drugs is not an
easy task. The traceable and transparency features of blockchain technology
can be used to remotely monitor the shipment of medicines from origin to
destination. The data stored in the distributed ledger are time stamped and
recorded by various stakeholders.
◾◾ Agriculture: Here the farmers deploy various sensors in the farm fields. The
data fetched by the sensors are monitored by farmers, buyers, etc. All the data
are represented as a block and are distributed among the farmers, buyers and
consumers. By monitoring the data, farmers can initiate suitable measures to
enhance the yield whereas the suppliers and consumers can decide whether to
buy that crop or not based on the data analytics.
Apart from these areas, integrated IoT–blockchain systems are used in the
stock market, the land registering process, online vehicle tracking and man-
agement in toll booths etc. The various challenges involved in implementing
these concepts are discussed in the next section.
architecture and a smart contract is used to ensure the data integrity. They validated
their system with a home automation system. Their experimental results prove that
various security threats like man-in-the-middle attacks, data stealing, etc., can be
avoided with the help of blockchain.
Fakhri et al. proposed [7] a comparison model of a smart refrigerator system
with and without blockchain technology. They initiated explicit sniffing attacks
to prove the validity of their model. The experiment results claim that blockchain
has the upper hand over traditional security measures in an IoT system. They have
observed the avalanche effect of encryption algorithms and the hash functions
used. MQTT is used as the software pattern for application without IoT.
Oscar Novo [8] proposed a detailed clear-cut implementation of incorporat-
ing blockchain in IoT. This lightweight, transparent and scalable model intro-
duces a new access control policy among the stakeholders using the benefits of
blockchain. A node called the management hub is introduced in IoT to store
the various distributed smart contract information. They have implemented
their model with the help of Ethereum which is one of the most popular block-
chain platforms.
Pin et al [9] proposed an publish–subscribe-based IoT model over blockchains.
This model mainly focuses on centralized IoT systems where all the data are stored
at a single point. The failure of this node may lead to the failure of the entire sys-
tem. The data integrity of this sort of system can be ensured by using blockchain
technology. They have implemented a light-weight, primitive key-based algorithm
for ensuring the data security. They have validated their model with the help of the
Ethereum platform.
Viriyasitavat et al. [10] proposed a blockchain-based service handling operations
in Internet of Things. Their model claims that blockchain can be used for achiev-
ing interoperability of various services. They integrated together service-oriented
architecture (SoA), blockchain technology (BCT) and various key performance
indicators (KPI) which resolves both trust issues and interoperability challenges in
the IoT system.
Doku et al. [11] proposed Lightchain which is a dedicated blockchain archi-
tecture for IoT. A proof of work (PoW) mechanism was initially used for verifying
transactions. But the computational tasks and effort required to resolve a PoW
puzzle are enormously high which is not acceptable in a light-weight architecture
like IoT. The PoW puzzle-solving efforts are distributed among various nodes in
the IoT system. Thus the overhead of every single node can be drastically reduced
which will improve the overall system performance and security.
Pan et al [12] proposed Edgechain which is an edge computing-based IoT
architecture which incorporates the blockchain technology. The central node
of the IoT architecture is excluded from the computational overhead of block-
chain technology. All these operations are performed in the edge-based cloud
pool which makes the architecture light-weight. Thus it can ensure features like
data security, integrity, scalability, interoperability and enhanced performance
aspects.
11.7 Summary
Blockchain is a promising technology for ensuring the data security and trustwor-
thiness of the end user. Though IoT is incorporated in almost all aspects of human
life, the security of personal data is the primary concern of every end user. Though
IoT uses light-weight architecture, it is not easy to use strong security algorithms to
prevent data stealing. In this scenario blockchain came to rescue IoT applications
by providing a light-weight decentralized, distributed architecture to secure the
data. The implementation of Edgechain and Lightchain proves that blockchain and
IoT can go a long way in the future years of computer technology.
References
1. Blockgeeks. [Online]. 2019, May. https://blockgeeks.com/guides/what-is-blockcha in
-technology/.
2. Vijay Madisetti, Arshdeep Bahga, Internet of Things: A Hands on Approach. Universities
Press, First edition, 2015.
3. Prasanna Mani, Pramod Mathew Jacob, “A Reference Model for Testing Internet of
Things Based Applications,” Journal of Engineering, Science and Technology (JESTEC,
vol. 13, no. 8, pp. 2504–2519, 2018.
4. Prasanna Mani, Pramod Mathew Jacob, “Software Architecture Pattern Selection
Model for Internet of Things Based Systems,” IET Software, vol. 12, no. 5, pp. 390–
396, October 2018.
5. Cristian Martín, Jaime Chen, Enrique Soler, Manuel Díaz, Ana Reyna, “On
Blockchain and Its Integration with IoT. Challenges and Opportunities,” Future
Generation Computer Systems, vol. 88, pp. 173–190, November 2018.
6. M. Singh, A. Singh, S. Kim, “Blockchain: A Game Changer for Securing IoT Data,”
In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, pp. 51–55,
2018.
7. D. Fakhri, K. Mutijarsa, “Secure IoT Communication Using Blockchain Technology,”
In 2018 International Symposium on Electronics and Smart Devices (ISESD), Bandung,
pp. 1–6, 2018.
8. O. Novo, “Blockchain Meets IoT: An Architecture for Scalable Access Management
in IoT,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1184–1195, April 2018.
9. L. Wang, H. Zhu, W. Deng, L. Gu P. Lv, “An IoT-Oriented Privacy-Preserving
Publish/Subscribe Model Over Blockchains,” IEEE Access, vol. 7, pp. 41309–41314,
2019.
10. L. Da Xu, Z. Bi, A. Sapsomboon, W. Viriyasitavat, “New Blockchain-Based
Architecture for Service Interoperations in Internet of Things,” IEEE Transactions on
Computational Social Systems, vol. 6, no. 4, pp. 739–748, August 2019.
11. D. B. Rawat, M. Garuba, L. Njilla, R. Doku, “LightChain: On the Lightweight
Blockchain for the Internet-of-Things,” In 2019 IEEE International Conference on
Smart Computing (SMARTCOMP), Washington, DC, USA, pp. 444–448, 2019.
12. J. Wang, A. Hester, I. Alqerm, Y. Liu, Y. Zhao, J. Pan, “EdgeChain: An Edge-IoT
Framework and Prototype Based on Blockchain and Smart Contracts,” IEEE Internet
of Things Journal, vol. 6, no. 3, pp. 4719–4732, June 2019.
Contents
12.1 Introduction............................................................................................224
12.1.1 Background ..............................................................................224
12.1.2 Introduction of Bitcoin..............................................................225
12.1.3 Bitcoin Features.........................................................................225
12.1.4 Blockchain and Bitcoin............................................................. 226
12.1.5 Bitcoin Security........................................................................ 226
12.1.6 Bitcoin Transaction....................................................................227
12.1.7 Transaction Lifecycle.................................................................227
12.1.8 Overview of Bitcoin Architecture...............................................231
12.1.8.1 Procedure to Add a New Block..................................233
12.2 Consensus Protocol.................................................................................233
12.3 Peer-to-Peer Network............................................................................. 234
12.4 Role of Bitcoin in Crimes....................................................................... 234
12.4.1 Bitcoin Exchange.......................................................................235
12.4.2 Ransomware..............................................................................235
12.4.3 Tax Evasion................................................................................236
12.5 Dark Side of Bitcoin Crimes....................................................................237
12.5.1 Darknet.....................................................................................237
12.5.2 Tor Browser...............................................................................238
12.5.3 Money Laundering....................................................................240
12.5.4 Scams and Fakes........................................................................240
12.6 Open Challenges to Bitcoin Crimes........................................................241
12.6.1 Law Enforcement and Criminal Strategies.................................242
12.7 Conclusion..............................................................................................243
References......................................................................................................... 244
223
Telegram Channel @nettrain
224 ◾ Blockchain Technology and Applications
12.1 Introduction
The Internet is a data warehouse where the content is huge and browsers provide the
service of retrieving the data from the Internet. Although the data on the Internet
are huge, the retrieval of data by most of the browsers is minimized. Only 5% of
the data is retrieved from the Internet that is indexed. Even though search engines
like Google have an enormous amount of data, all the data cannot be retrieved
because they are not indexed. The information which is retrieved from the Internet
is indexed and it is called the surface web. The remaining 95% [7] of the web is
called the deep web. Four percent of the highly confidential information on the
deep web is called the dark web. The deep web contains confidential data like bank
details, Facebook private details, etc., that should not be visible to all the people in
the world. The criminals are accessing dark web for criminal activities with bitcoins
as a transaction currency. I2P (Invisible Internet Project), Freenet and Tor browser
provide access to the dark web that cannot be accessed by the normal browser. I2P,
Freenet and Tor browser is not created for malicious access. It was created with the
intention of providing anonymity and protecting private data from the Internet.
Anonymity provides the protection of data from the Internet by hiding the user’s
identity on the Internet, but this is leading to criminal activities. The Tor browser
is used for anonymity, and it is also called onion routing.
12.1.1 Background
The Naval Research Laboratory in the US developed an onion routing technique
in 1998. On September 20, 2002, the Tor browser was released publicly for use
on the Internet. With a normal browser like Google, the requested data are sent
to the Internet service provider and to the Domain Name System where it will be
verified with the IP address. Each website address on the Internet has an IP address
to access the website. The Domain Name System provides the service of changing
the website address to an IP address on request and changing the IP address to the
website address in response.
The Tor browser provides anonymity [19] because search details are not known
to the Internet service provider. The Internet service provider knows only which
browser is accessing now but does not know what content is accessed. The Tor
browser transfers the data, though nodes, which are already connected in the Tor
network. The relaying of data in the network node passes through different places
because the nodes are in different places all over the world. The Tor browser provides
encrypted data by https add-on service because http is not encrypted. Even though
onion routing provides anonymity and protects private data, criminal activities are
increased because of the anonymity. Criminals use the Tor browser to do illegal
activities like selling guns, drugs, etc. Hitman Network is a website that is used for
criminal activities such as selling drugs with the exchange of money. These criminal
activities with exchange of money leads to problems for the criminals when it is
transferred through a bank. Criminals carry out the transaction with cryptocur-
rency to maintain anonymity. Cryptocurrency has an encryption mechanism to
protect money from hacking. Bitcoin is the first cryptocurrency that works with the
blockchain network. The Bitcoin blockchain is a distributed ledger that has all the
transaction details. The cryptocurrency network carries out the transaction without
a third party, such as banks. Bitcoin was created by Satoshi Nakamoto and he is the
first man entered into the blockchain network. In banking, the transaction bank
will act as a trusted third party, and it governs all the transactions over the network.
The dependency on a trusted third party is essential for bank transactions. If a bank
robbery or a hacking of bank database happens. That will lead to an uncontrollable
situation. To avoid the third-party trust cryptocurrencies came into existence.
12.1.2 Introduction of Bitcoin
A cryptocurrency, as described by Satoshi Nakamoto in 2008 [1] and introduced
as open-source software in 2009, is a collection of technologies that form digital or
cryptocurrency. The units of this cryptocurrency are called Bitcoin. Bitcoin works
with the concept of blockchain to avoid the double-spending problem in transac-
tions [2]. It is used to store and transmit value among all the participants in the
Bitcoin network. It is a peer-to-peer technology which is not governed by any cen-
tral authority or bank. Unlike traditional currencies, Bitcoins are entirely secure
and virtual. There are no physical coins available, rather it is an entirely virtual
currency. The system is run by the Bitcoin protocol, and it is based on mathematics,
unlike conventional currencies that are based on a fixed quantity or fiat currencies.
12.1.3 Bitcoin Features
Bitcoin has several features that set it apart from fiat currencies:
The basis of the Bitcoin protocol is a peer-to-peer system (Figure 12.1) which means
that there is no need for a third party. Therefore, it is not controlled by a central
authority but rather is created by a community of people that anyone can join.
The Bitcoin protocol stores details of every single transaction that occurred in
the network in a huge version of the general ledger (blockchain). Bitcoins are stored
in a wallet with digital credentials for your Bitcoin holdings, allowing you to access
them. The wallet uses public-key cryptography, in which two keys, one public and
one private, are generated. The public key can be thought of as an account number
or name; the private keyis a ownership credentials.
Bitcoin is transferred to the next owner when the next owner gives a public
key and the previous owner uses his private key to publish a record into system
announcing that the ownership has changed to the new public key. Unlike transac-
tions through the bank, Bitcoin doesn’t charge fees for any transfers at the national
or international level [9]. Bitcoin protects against double-spending [11] by verifying
each transaction added to the blockchain to ensure that the inputs for the transac-
tion had not previously already been spent.
12.1.5 Bitcoin Security
Figure 12.2 shows a representation of Bitcoin security. The biggest challenges of
bitcoin [5] are to check authentication, integrity, availability and confidentiality.
All these challenges are taken care of very smoothly.
It is based on public key crypto (Figure 12.3): Encryption uses public key and
private key. Public key crypto or digital signature are used to make sure that it is
secure. First, create a message digest using a cryptographic hash and, then, encrypt
the message digest with your private key.
12.1.6 Bitcoin Transaction
The most important part of the Bitcoin system is the transactions. Transactions
are basically data structures that encode the transfer of value between participants
evolved in the Bitcoin system [8]. It is ensured that transactions can be created
and broadcasted on network. Once broadcasted on network they are added to the
global ledger of transactions (blockchain) after validation.
12.1.7 Transaction Lifecycle
Various activities are involved in the transaction lifecycle (Figure 12.4), starting
from the origin to recorded on the blockchain. The origin is basically the creation of
the transaction. Once it is created it must be signed and authorized to spend funds
referenced by the transaction. Once the transaction is authorized it is broadcasted
to the network for validation. Finally, the transaction is verified by a mining node
and included in a block of transactions that is recorded on the blockchain.
◾◾ Creation of transaction
◾◾ Broadcast on network
collect some transactions as a single unit known as a “block” that are in the queue
for processing. A block will be broadcasted in the entire network to claim the
reward after completing the validation and mining process. Before updating the
newly mined block in a public ledger, it will be verified by most of the miners in the
network. The miners collect a reward once it is successfully added into blockchain.
The significant characteristics of technical components that are essential in the
Bitcoin system are presented.
The transaction input consists of:
1. Hash pointer (i.e., identifier that contains the output) to previous transaction
that is taken as the input for the current transaction.
2. An index specifying the unsent previous transaction output (UTXO) that
can be used in current transaction.
3. Unlocking script length.
4. Unlocking script (satisfies the condition associated with UTXO).
Every transaction input can be authorized using the corresponding user’s public
key, and the cryptographic signature is created using a private key. The input values
from previous transactions which are listed in a single transaction can be added up
and the sum is used by the output of the current transaction. In Bitcoin, the output
of a previous transaction is exploited as the input of the current transaction; often
the coin value may be higher than the user desires to pay. In this case, the sender
creates a new Bitcoin address for getting back the difference amount. For example,
user B has 100 coins from any of the previous transaction output, and he would
like to transfer 10 coins to user A using the same output as an input in the current
transaction. Particularly, user B has to generate a new transaction with an input
(i.e., the output that user B has received the 10 coins) and two more outputs. In the
output, one shows that 10 coins are being transferred to user A, and the other shows
the transfer of remaining coins in any one of the wallets owned by user B.
Hence, the Bitcoin achieves two objectives:
payment system in which the nodes communicate using the P2P network. It uses a
probabilistic distributed consensus protocol to achieve consensus among the com-
municating nodes. A centralized private ledger is maintained in a central bank
to verify the process and record all transactions, whereas in Bitcoin, every user
maintains their own copy of the ledger in blockchain. Vulnerabilities arise because
of maintaining multiple copies of blockchain at many nodes in the network as it
provides a consistent global view in the blockchain system. For example, user A
could simultaneously create two different transactions to two different users, user
B and user C, using the same set of coins. This malicious activity is referred to as
double-spending [2]. In this instance, if both receivers are processing the transac-
tion independently and the transaction verification process is successful, it leads to
an inconsistent state. Bitcoin uses consensus protocol and proof of work (PoW) to
satisfy the below-mentioned requirements:
Every distributed transaction process checks that the majority of miners [4] verify
the authenticity of it before the transaction is added to the blockchain. If there is
any update in the blockchain, the local copy which is maintained in all nodes will
get updated; the correct state is attained by considering the majority of miners’
agreement. Still, this system is vulnerable to Sybil attacks. In this type of attack,
multiple virtual nodes can be created by the miner and those nodes will start send-
ing false information in the network as positive votes for the faulty transactions to
interrupt the election process. The countermeasure for Sybil attack in Bitcoin is to
use PoW based on a consensus model; some computational tasks have to be accom-
plished by the miners to prove that they are real entities. PoW enforces a high-level
computational cost for every transaction verification process, and the verification
is based on the computing power of a miner. Faking computer resources is harder
than performing a Sybil attack in the network.
A block is created by collecting pending transactions instead of mining indi-
vidual transactions. A block is mined by computing the hash value with a varying
nonce. A different nonce value is taken every time until the hash value becomes
lower than or equal to the targeted value. The target is taken as a 256-bit number
that is shared among all miners. Computing the desired hash value is extremely
challenging. Bitcoin uses SHA-256 for calculating the hash value. Every time, dif-
ferent nonces (random values) are used for finding the required hash value until the
solution is obtained. The correct hash value has been found by the miner for a block
and the block is immediately broadcasted in the network with the computed hash
value along with nonce. The remaining miners quickly verify the correctness of the
received block by comparing the hash value with the target value. They will update
the local blockchain by appending the newly mined block.
A block will be added successfully to the blockchain, once the majority of min-
ers agree on the block as valid. The miner who got the solution for PoW [5] will be
rewarded with a set of recently generated coins. Because of the absence of a central
authority, the rewards do not reach anyone in the network. Rather, the rewards
will be given for the block generation process, in which a coinbase transaction is
inserted by the miner for the Bitcoin address, and it appears to be the first transac-
tion in every block. Once the mined block is approved by the peers, then the newly
inserted transaction becomes valid, and the miner obtains the awarded Bitcoins.
The Bitcoin network is usually not having transaction fee for their transactions,
and it is only mentioned by the owners of a transaction and it also varies for every
transaction. However, the transaction fees are increasing to some extent, discour-
aging the usage of Bitcoin. The security issues in Bitcoin that might occur if block
rewards did not exist are investigated [17].
Blockchain is a public, linked-list based data structure which tracks the whole
transaction history in the form of blocks. A Merkle tree structure [6] is followed for
storing the transactions in every block, along with the secure time-stamp and hash
value of the previous transaction.
12.2 Consensus Protocol
For assuring continuous service without any interruption, the fault-tolerant con-
sensus protocol is essential to ensure that the participating nodes are agreed on the
order. The set of rules mentioned in the consensus protocol should be followed by
the miner to append a new block in the blockchain. Bitcoin obtains the distributed
consensus based on PoW and the consensus algorithm. The major rules followed in
this algorithm are as follows:
Hence, blockchain-based Bitcoin is considered as robust and secure due to the con-
sensus model.
Micropayment channel networks have been introduced to address the scalabil-
ity issue by maintaining the block size unchanged. In this, the payment channel
is established among two parties, who can pay on behalf of others which are not
recorded in the blockchain. This off-blockchain mode of payment assists in process-
ing the payment faster and suggests a way to track the money transfer among two
entities. Yet, these payment channel networks face the set of challenges regarding
user privacy [18, 21], processing concurrent payments, and routing.
12.3 Peer-to-Peer Network
The Bitcoin system follows the communication structure as an unstructured peer-
to-peer (P2P) network using the non-encrypted persistent TCP connections. In an
unstructured P2P network, the peers are arranged randomly in a flat or hierarchi-
cal manner. Time-to-live (TTL) search, expanding rings, random walks are used
to find the peers who have interesting data items. In common, the unstructured
overlay network is a highly dynamic network topology in which the peers can join
and leave the network frequently. This type of network is best suited for the Bitcoin
system to disseminate the information as soon as possible to reach the consensus
in the blockchain. Shadow event discrete simulator assists in simulating large-scale
Bitcoin networks in a single machine.
12.4.1 Bitcoin Exchange
Bitcoin provides a space to change black money into white. Bitcoin exchangers are
used to exchange money. Some of the popular Bitcoin exchangers are:
1. Binance
2. Bittrex
3. KuCoin
4. Huobi Pro
5. Bibox
6. Poloniex
7. Bitmex
8. GDAX
9. LocalBitcoins
10. Kraken
11. Bitstamp
Bitcoin exchange websites also available for changing money. A few websites are:
1. Cex.io
2. CoinMama
3. Wirex
4. Bitit
12.4.2 Ransomware
Computer bugs infect and lock up a computer, server or mobile device, and the
attacker demands a ransom to restore control of the device. The WannaCry ran-
somware attack, in May 2017, was a worldwide cyber-attack by the WannaCry ran-
somware cryptoworm, which targeted computers running the Microsoft Windows
operating system by encrypting data and demanding ransom payments in the
Bitcoin cryptocurrency. These kinds of ransomware attacks are happening every
year, for example:
Anonymity in Bitcoins allows the user to hide their face, and it is not an easy task
to find them. Digital currency like U.S. dollars can be easily tracked when we do
transaction because it has a centralized authority like a bank, but Bitcoin, which
works under the concept of blockchain, does not depend on any centralized author-
ity such as a bank. Bitcoin provides a decentralized network, in which nobody can
control their money. The user can control their own money, and it is not an easy task
to track the transaction because the ledger has only the address as a public key like
1. 1BvBMSEYstWetqTFn5Au4m4GFg7xJaNVN2
2. 3J98t1WpEZ73CNmQviecrnyiWrnqRhWNLy
Denial-of-service attacks are possible in the Bitcoin network [15]. Tampering with
a Bitcoin transaction also requires more than 90% of users to give approval. In
real time, it is highly impossible. In Russia, a ransomware payment made to an
account in Bulgaria was traced, but the account was split into 12 different accounts
in different cities of Russia with the command and control located somewhere in
Germany. As many Bitcoin addresses can be created as you wish because there is no
single point of the address issuing authority and address generation for transaction
will not be affected by any environmental issues.
12.4.3 Tax Evasion
Tax is very important to run the government with good economy in a safer zone.
Tax evasion is happening nowadays all over the world but it can be identified by
the government to take necessary action against the evasion. Bitcoin provides a
way to evade tax because the money can be easily exchangeable by exchangers and
it will become white money. Another issue is that governments’ and tax agencies’
guidelines are unclear. Even in the U.S. there is a lot of confusion around the fixing
of taxes for Bitcoins. An investigation is required to check the Bitcoin network and
their transaction to fix the tax for Bitcoins. An illegal transaction has to be checked
at least for targeted users to find the illegal transaction but in bitcoin blockchain
it is very difficult. If tracking of a suspect user is possible then the government
authorities will have the power to handle the issues in tax evasion.
Bitcoin exchanges handle a large amount of money, that is, more than billions
of dollars of transactions. If there is cooperation between the authorities and the
exchangers there is no need to shut down the Bitcoin transaction. If it is possible
to get all the information about Bitcoin’s illegal transactions and the users’ device
addresses, a complete study is required to find out whether there are any changes
in wallets. The existing information about the Bitcoin wallets [16] from its site is
only the device compatibility issues that either on mobile or system. The measur-
able strategies necessary to catch artifacts from awed Bitcoin wallet (the place a user
might sign in with the username and password).
12.5.2 Tor Browser
Tor stands for The Onion Router, so-called because of the layered encryption pro-
cess. Crypto-anarchism and onion routing are the two active terms linked to the
underground web. Tor was originally founded by the U.S. Navy at the start of the
millennium and is used by numerous agencies and others to transmit and receive
sensitive information. Tor masks the user’s identity and allows them to travel the
surface web with total anonymity. Transferring money without leaving a trace is
not always easy; however, the dark net’s own currency Bitcoin provides the solution.
The Naval Research Laboratory in the U.S. developed the onion routing tech-
nique in 1998. The Tor browser was released publicly on September 20, 2002 for
use on the Internet. In a normal browser like Google, the requested data are sent
to the Internet service provider and to the Domain Name System, where it will be
verified with the IP address. Each website address on the Internet has an IP address
to access the Internet. The Domain Name System provides the service of changing
the website address to an IP address on request and changing the IP address to the
website address in response.
The Tor browser provides anonymity because searching details are not known
to the Internet service provider. The Internet service provider knows only which
browser is accessing now, but it does not know what content is accessed. The Tor
browser transfers the data, through nodes, which are already connected in the Tor
network. The relaying of data in the network node passes through different places
because the nodes are in different places all over the world. The Tor browser pro-
vides encrypted data by https add-on because http is not encrypted. Even though
onion routing provides anonymity and protects private data, criminal activities are
increased because of the anonymity. Criminals use the Tor browser to carry out
illegal activities like selling guns, drugs, etc. Hitman Network is a website that
provides criminal services by the exchange of money. This exchange of money for
criminal activities leads to problems when it is transferred through a bank.
The dark web is the place that criminals use for illegal activities. In a survey,
9.3% of drug users bought drugs off the darknet in 2016, and 97.4% of illicit activ-
ity using Bitcoins originated from darknet marketplaces in 2013–2016. Criminals
sell illegal drugs through sites like the first darknet market Silk Road, launched as
the “eBay of drugs”. There are:
Figure 12.8 shows the number of people who bought drugs in the darknet mar-
ket. The Tor hidden network and Bitcoin system [8] are undoubtedly useful in
many aspects, playing vital roles in the cybercrime landscape. Distinguishing legit-
imate and illicit use of these services is a difficult task. This is how Bitcoin enables
criminal enterprises to perform money laundering schemes compared to banks or
12.5.3 Money Laundering
Laundering is the act of making illegally gained proceeds or dirty money appear
clean by placing them within a legitimate financial system alongside legal trans-
actions. Three to four percent of all criminal proceeds in Europe are laundered
through cryptocurrency, which is estimated at US$4–5 billion of laundered
Bitcoins in 2016.
◾◾ 3.84% in multiservice
◾◾ 0.30% in crypto exchange
◾◾ 12.21% in gambling
Illegal online betting is much easier when money transfers can be made swiftly and
untraceable.
◾◾ 0.05% in ATM
◾◾ 24.20% in the mixer
◾◾ 59.40% in the Bitcoin exchange
◾◾ Bitcoin laundering locations in 2016:
◾◾ 56.65% in Europe
◾◾ 36.44% in unknown jurisdictions
◾◾ 5.28% in North America
◾◾ 1.21% in Asia
◾◾ 0.35% in Oceania
◾◾ 0.07% in South America
◾◾ 0.00% in Africa
12.7 Conclusion
Although numerous challenges handled by international law enforcement commu-
nity and faces lots of investigating on cryptocurrencies, problems keep on increasing
day by day. The blockchain is here to stay due to the wide use of cryptocurrencies by
investors, adopters and pioneers. While it is anticipated that a large number of its
characteristics will significantly adapt in the near future to overcome critical tech-
nological shortcomings such as its size and scalability, its use for illicit activities will
only continue to grow. It is imperative for law enforcement agencies to co-evolve
with the current state of the art and identify and thwart online criminal activities
that are linked to cryptocurrencies. For better efficiency [20] in combatting crypto-
currency-related crime, an implementation of an international understanding and
a legal framework to regulate it should be considered; this will enable law enforce-
ment to access information for criminally linked transactions and urge crypto-
markets and exchanges to enforce strong KYC policies. The solution is required to
access Bitcoin network without the criminal activities for smooth functioning of
the blockchain with cryptocurrency in the future.
References
1. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008, Available:
http:// bitcoin.org/ bitcoin.pdf.
2. G. O. Karame, E. Androulaki, and S. Capkun, “Double-spending fast payments in
bitcoin,” In Proceedings of the 2012 ACM Conference on Computer and Communications
Security, ser. CCS ’12. New York, NY, USA: ACM, 2012, pp. 906–917.
3. A. Maria, Z. Aviv, and V. Laurent, “Hijacking bitcoin: Routing attacks on cryptocur-
rencies,” In Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 2017.
4. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin miningis vulnerable,” In
Financial Cryptography and Data Security: 18th International Conference. Berlin
Heidelberg: Springer, 2014, pp. 436–454.
5. J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten, “Sok:
Research perspectives and challenges for bitcoin and cryptocurrencies,” In 2015 IEEE
Symposium on Security and Privacy, May 2015, pp. 104–121.
6. F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: A technical survey on
decentralized digital currencies,” IEEE Communications Surveys Tutorials, vol. 18, no.
3, pp. 2084–2123, 2016.
7. W. F. Slater, “Bitcoin: A current look at the worlds most popular, enigmatic and con-
troversial digital cryptocurrency,” In A Presentation for Forensecure 2014, April 2014.
8. M. Kiran and M. Stannett, “Bitcoin risk analysis,” Dec. 2014, Available: http:// www
.nemode.ac.uk/ wp-content/ uploads/ 2015/ 02/2015-Bit-Coin-risk-analysis.pdf.
9. B. Masooda, S. Beth, and B. Jeremiah, “What motivates people to use bitcoin?” In
Social Informatics: 8th International Conference, SocInfo 2016. Springer International
Publishing, 2016, pp. 347–367.
10. K. Krombholz, A. Judmayer, M. Gusenbauer, and E. Weippl, “The other side of the
coin: User experiences with bitcoin security and privacy,” In Financial Cryptography
and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados.
Berlin Heidelberg: Springer, 2017, pp. 555–580.
11. G. O. Karame, E. Androulaki, M. Roeschlin, A. Gervais, and S. Capkun,
“Misbehavior in bitcoin: A study of double-spending and accountability,” ACM
Transactions on Information and System Security, vol. 18, no. 1, May 2015.
12. J. Heusser, “Sat solvingan alternative to brute force bitcoin mining,” 2013, Available:
https:// jheusser.github.io/ 2013/ 02/ 03/ satcoin.html.
13. G. Wood, “Ethereum: A secure decentralised generalised transaction-ledger,” yellow
paper, 2015.
14. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain
model of cryptography and privacy-preserving smart contracts,” In IEEE Symposium
on Security and Privacy, May 2016, pp. 839–858.
15. M. Vasek, M. Thornton, and T. Moore, “Empirical analysis of denial-of-service
attacks in the bitcoin ecosystem,” In Financial Cryptography and Data Security: FC
2014 Workshops, BITCOIN and WAHC 2014. Berlin Heidelberg: Springer, 2014, pp.
57–71.
16. “Biometric tech secures bitcoin wallet,” no. 6, 2015.
17. M. Spagnuolo, F. Maggi, and S. Zanero, “Bitiodine: Extracting intelli-gence from
the bitcoin network,” In Financial Cryptography and Data Security: 18th International
Conference, FC 2014. Berlin Heidelberg: Springer, 2014, pp. 457–468.
18. S. Goldfeder, H. A. Kalodner, D. Reisman, and A. Narayanan, “When the cookie
meets the blockchain: Privacy risks of web payments via cryptocurrencies,” CoRR,
2017.
19. A. Biryukov and I. Pustogarov, “Bitcoin over tor isn’t a good idea,” In 2015 IEEE
Symposium on Security and Privacy, May 2015, pp. 122–134.
20. S. Barber, X. Boyen, E. Shi, and E. Uzun, “Bitter to better — how to make bitcoin
a better currency,” In Financial Cryptography and Data Security: 16th International
Conference, FC 2012. Berlin Heidelberg: Springer, 2012, pp. 399–414.
21. J. Herrera-Joancomart´ı and C. Perez´-Sola, “Privacy in bitcoin transac-tions: New
challenges from blockchain scalability solutions,” In Model-ing Decisions for Artificial
Intelligence: 13th International Conference, MDAI 2016. Springer International
Publishing, 2016, pp. 26–44.
247
Telegram Channel @nettrain
248 ◾ Index