Professional Documents
Culture Documents
Block Chain Concept
Block Chain Concept
BLOCK
CHAIN
Zulkifli (302212)
Spv: dr inż. Robert Wojtachnik 1
Why should we use
BC and How to
optimize it?
4
OPERATION
How it works? Does the systems could not be
tampered?
▪ The basic idea behind the Block Chain Technology (BCT) is that it
allows actors in a system (called nodes) to transact digital assets using
P2P network that stores these transactions is distributed way across
the network [5].
▪ If the nodes agree on its legitimacy, they confirm the transaction and
this transaction is laid down in a block. Then the new blok is added to
the previous chain of blocks and as such locked. So, the latest block
maintains a shared, agreed-upon view of the current state of the BC
[6].
▪ Each block includes the hash cash of the prior block. But, it doesn’t
mean that the BC is unalterable.
▪ BC could be tampered if we couldn’t control the parties that set up it. 5
From the hash-based linking of blocks.
Authentication
Process that ensures and confirms a user’s identity. Begins when user
tries to access information. The Public Key Infrastucture (PKI)
authentication method uses digital certificates to prove a user’s
identity.
TECHNOLOGY
STATUS
Authorization
A security of mechanism used to determine user/client previleges or
A lot of research to develop BC for more safety access levels related to system resources, including computer
(enhanced security), reduced costs and increased data programs, files, services, data and appllication features
transfer speed.
Accounting
The record-keeping and tracking of user activities on a computer
network including planning for expected capacity, performing user
trend analysis, record bills, accomplishing audits and allocating
costs.
6
DESIGN RULES
Nodes Actors in a system
7
POTENTIAL BENEFITS AND PROMISES
Strategic Organizational
▪ Transparancy (history of transctions remains visible and ▪ Increased trust (Trust in in process by increased control due to
every nodes has complete overview of transactions); immutable recordkeeping nd by verification of the data by
multiple nodes);
▪ Avoiding fraud and manipulation (information is stored in
multiple ledgers that are distributed); ▪ Transparancy and auditability (Being able to track transaction
history and create an audit trail);
▪ Reducing corruption (storage in distributed ledgers allows ▪ Increse predictive capability (as history can be traced back, this
for preventing corruption). availibility of the historic information increased the predictive
capability);
▪ Increased control (by needing consensus to add transactions);
▪ Clear ownerships (need clearly defined and how information can
be changed)
Economical Informational
▪ Reduced costs (reduced as no human involved is needed); ▪ Data integrity and higher data quality;
▪ Increase resiliance to spam and DDOS attacks (higher ▪ Reducing human errors (automatic transactions and controls);
level of resilience and security reduces the costs of ▪ Access to information;
measure to prevent attacks)
▪ Privacy (users can be anonymous by providing encryption keys);
▪ Reliability (information is stored at multiple place, and only
information changed when all relevant parties agrees).
9
POTENTIAL BENEFITS AND PROMISES
Technological
▪ Resilience (resilient to malicious behaviour);
▪ Secuity (Data is stored in multiple databases and using
encryption manipulation is more difficult and hacking
them all is less likely);
▪ Persistency and irreversibility (immutable) (Once data has
been written to a BC it is hard to change or delete it
without noticing);
▪ Reduced energy consumption (energy consumption of the
network is reduced by increased efficiency and
transaction mechanisms).
10
DLT in Modern
Industry
We always overstimate the change that will
occur in the next two years and
underestimate the change that will occur in
the next ten. Don’t be yourself be lulled
into inaction –Bill Gates
11
BUSINESS MODEL
There’s no such thing as BCT comes in many different forms, with different
properties.
1 2
Private or Public Private or Public open
closed BCs BCs
Termed as a private/public permisioned Termed as a permisionless Blockchain.
Blockchain.
12
Block Chain Technology Design Space
Many researchers are developing this
technology because they are understand it will
be powerful technology in the future.
Public Private
▪ Permissioned: No restricted data access or transactions. ▪ Permissioned: Restricted access, data wiring and validation.
Only a restricted set of nodes can participate in the Only the owner determines who can participate.
consensus mechanism. ▪ Permissionless: Restriction on access and who can transact. No
▪ Permissionless: No restriction on access, transaction restriction on participation in the consensus mechanism.
(data wiring) or validation.
13
And the BC winner is
14
Supply-Chain
Communications & Proof-
of-Provenance
15
Paying Employees
Could be used as an
application to
compensate employees
because this technology
What’s BC has it’s roots in
nowadays?
cryptocurrency.
Electronic Voting
Delegated Proof of
Stake (DPOS) is the
fastest, most efficient,
most decentralized and
most flexible consensus
model available
16
FUTURE
Global Blockchain Survey by Deloitte 2018
17
RESULT
Global Blockchain Survey by Deloitte 2018
18
SUMMARY
Some recommendation for better future with BCT
19
REFERENCES
▪ Olnes., Ubach., & Janssen. 2017. Benefits and Implications of Distributed Ledger Technology for Information Sharing. Elsevier,
Government Information Quarterly (356-363).
▪ Aztori, M. 2015. Blockchain technology and decentralized government: Is the state still necessary? Retrieved from
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2709713
▪ Buterin. 2014. Ethereum White Paper: A Next-Generation Smart Contract and Decentralized Application Platform. Retrieved from
https://weusecoins.com/aasets/pdf/library/Ethereum_white_paper-a-
next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf
▪ Cai,Y., & Zhu, D. 2016. Fraud Detection for Online Business: A Perspective from Blockchain Technology. Financial Innovatio, 2(1),
20
▪ Nakamoto. 2008. Bitcoin: A-peer-to-peer Electronic Cash System. Consulted, 1(2012), 8
▪ Zyskind & Nathan. 2015. Decentralizing Privacy. Using Blochchain to Protect Personal Data. IEEE Security and Provacy
Workshops (SPW2015) (pp. 180-184)
▪ David G Birch. 2018. Ambient Accountability: Shared Ledger Technology and radical Transparancy for Next Generation Digital
Finance Services. Elsevire, Handbook of Blockchain, Digital Finance and Inclusion Vol. 1
▪ Joseph, Woodside. 2017. Blockchain Technology Adoption Status and Strategies. Journal of International Technology and
Information Management Vol 26 Issue 2
▪ Aviva Rutkin. 2016. Blockchain Aids Solar Sales. Technology Newspaper.
▪ Deloitte. 2018. Breaking Blockchain Open. Blockchain Survey. Retrieved 24.10.2018 10.02 ECT
▪ Bloomberg Intelligence. 2018. Blockchain is Coming Everywhere, Ready or Not. Retrieved 20.10.2018 08.15 ECT
▪ https://blockgeeks.com/guides/blockchain-applications-real-world/ Retrieved 24.10.2018 10.15 ECT 20
MRP Databases
THANK
YOU!
Warsaw University of
Technology
Phone: Email:
+48 796142812 zulkifli@onet.pl
21
THANK YOU!
APPLICATIONS
Some Applications were combined with AI
24