Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

and industry applying Blockchain in

Blockchain varied domains.


The Proof-of-Work (PoW)
Technology mathematical challenge ensures BC
security by maintaining a digital
ledger of transactions that is
ABSTRACT considered to be unalterable.
Furthermore, BC uses a changeable
The goal of this paper is to
Public Key (PK) to record the users’
summarize the literature on
identity that provides an extra layer
implementation of the Blockchain
of privacy. The successful adoption
and similar digital ledger techniques
of BC has been implemented in
in various other domains beyond its
diverse non-monetary systems such
application to crypto-currency and
as in online voting, decentralized
to draw appropriate conclusions.
messaging, distributed cloud storage
Blockchain being relatively a new
systems, proof-of-location,
technology, a representative sample
healthcare and so forth. Recent
of research is presented, spanning
research articles and
over the last ten years, starting from
projects/applications were surveyed
the early work in this field. Different
to ascertain the implementation of
types of usage of Blockchain and
BC for enhanced security and to
other digital ledger techniques, their
identify its associated challenges and
challenges, applications, security
thence to propose solutions for BC
and privacy issues were investigated.
enabled enhanced security systems.
Identifying the most propitious
The knowledge domain of the
direction for future use of Blockchain
research is in the realm of the digital
beyond crypto-currency is the main
ledger, specifically, in Blockchain and
focus of the review study. Blockchain
crypto-currency.
(BC), the technology behind Bitcoin
crypto-currency system,
considered to be essential for
is
Technology
forming the backbone for ensuring Fundamentals of
enhanced security and privacy for
various applications in many other Blockchain
domains including the Internet of A Blockchain comprises of two
Things (IoT) eco-system. different components, as follows:
International research is currently
being conducted in both academia 1. Transaction:
A transaction, in a Blockchain, private key and hence cannot be
represents the action triggered by interpreted by everyone.
the participant.
Another major advantage of the
2. Block: Blockchain technology is that it is
decentralized. It is decentralized in
A block, in a Blockchain, is a
the sense that:
collection of data recording the
transaction and other associated • There is no single device that stores
details such as the correct sequence, the data (transactions and
timestamp of creation, etc. associated blocks), rather they are
distributed among the participants
The Blockchain can either be public
throughout the network supporting
or private, depending on the scope
the Blockchain.
of its use. A public Blockchain
enables all the users with read and • The transactions are not subject to
write permissions such as in Bitcoin, approval of any single authority or
access to it. However, there are have to abide by a set of specific
some public Blockchains that limit rules, thus involving substantial trust
the access to only either to read or as to reach a consensus.
to write. On the contrary, a private
• The overall security of a Blockchain
Blockchain limits the access to
eco-system is another advantage.
selected trusted participants only,
The system only allows new blocks to
with the aim to keep the users’
be appended. Since the previous
details concealed. This is particularly
blocks are public and distributed,
pertinent amongst governmental
they cannot be altered or revised.
institutions and allied sister concerns
or their subsidies thereof. One of the For a new transaction to be added to
major benefits of the Blockchain is the existing chain, it has to be
that it and its implementation validated by all the participants of
technology is public. Each the relevant Blockchain eco-system.
participating entities possesses an For such a validation and verification
updated complete record of the process, the participants must apply
transactions and the associated a specific algorithm. The relevant
blocks. Thus the data remains Blockchain eco-system defines what
unaltered, as any changes will be is perceived as “valid”, which may
publicly verifiable. However, the vary from one eco-system to
data in the blocks are encrypted by a another. A number of transactions,
thus approved by the validation and
verification process, are bundled terms of the lack of security and
together in a block. The newly privacy, especially when it comes to
prepared block is then FinTech and E-commerce.
communicated to all other Blockchain, the technology behind
participating nodes to be appended crypto-currency, brought forth a
to the existing chain of blocks. Each new revolution by providing a
succeeding block comprises a hash, a mechanism for Peer-to-Peer (P2P)
unique digital fingerprint, of the transactions without the need for
preceding one. Figure 1 any intermediary body such as the
demonstrates how Blockchain existing commercial banks [1]. BC
transactions takes place, using a validates all the transactions and
step-by-step example. Bob is going preserves a permanent record of
to transfer some money to Alice. them while making sure that any
Once the monetary transaction is identification related information of
initiated and hence triggered by Bob, the users are kept incognito. Thus all
it is represented as a “transaction” the personal information of the
and broadcast to all the involved users are sequestered while
parties in the networks. The substantiating all the transactions.
transaction now has to get This is achieved by reconciling mass
“approval” as being indeed “valid” collaboration by cumulating all the
by the Blockchain eco-system. transactions in a computer code
Transaction(s) once approved as based digital ledger. Thus, by
valid along with the hash of the applying Blockchain or similar
succeeding block are then fed into a crypto-currency techniques, the
new “block” and communicated to users neither need to trust each
all the participating nodes to be other nor do they need an
subsequently appended to the intermediator; rather the trust is
existing chain of blocks in the manifested within the decentralized
Blockchain digital ledger. network system itself.
Blockchain thus appears to be the
Use of Blockchain ideal “Trust Machine” paradigm. In
beyond fact, Bitcoin is just an exemplary use
of the Blockchain. Blockchain is
Cryptocurrency considered to be a novel revolution
Although the Internet is a great tool in the domain of computing enabling
to aid every sphere of the modern limitless applications such as storing
digital life, it is still highly flawed in and verifying legal documents
including deeds and various communication is in the form of
certificates, healthcare data, IoT, Machine-to-Machine (M2M)
Cloud and so forth. Tapscott [3] interactions.
rightly indicated Blockchain to be the
Thus establishing trust among the
“World Wide Ledger”, enabling
participating machines is a big
many new applications beyond
challenge that IoT technology still
verifying transactions such as in:
has not been met extensively.
smart deeds, decentralized and/or
However, Blockchain may act as a
autonomous
catalyst in this regard by enabling
organizations/Government services
enhanced scalability, security,
etc.
reliability and privacy . This can be
In the cloud environment, the achieved by deploying Blockchain
history of creation of any cloud data technology to track billions of
object and its subsequent operations devices connected to the IoT eco-
performed thereupon are recorded systems and used to enable and/or
by the data structure mechanism of coordinate transaction processing.
‘Data Provenance’, which is a type of Applying Blockchain in the IoT
cloud metadata. Thus this is very ecosystem will also increase
important to provide the utmost reliability by axing the Single Point of
security to the data provenance for Failure (SPF). The cryptographic
ensuring its data privacy, forensics algorithms used for encryption of
and accountability. Liang et al. puts the block data as well as the hashing
forward a Blockchain based trusted techniques may provide better
cloud data provenance architecture, security. However, this shall demand
‘ProvChain’, which is fully more processing power which IoT
decentralized. Such adoption of the devices currently suffer from.
Blockchain in a cloud
environment can provide strong
Thus further research is required to
protection against records being
overcome this current limitation.
altered thus enabling an enhanced
Underwood considers the
transparency as well as additional
application of Blockchain technology
data accountability. This also
to completely overhaul the digital
increases the availability,
economy. Ensuring and maintaining
trustworthiness, privacy and
trust is both the primary and initial
ultimately the value of the
concern of the application of the
provenance data itself. In an IoT
Blockchain. BC can also be used to
ecosystem, most of the
gather chronological and sequence of the developing countries if widely
information of transactions, as it adopted by e-governance
may be seen as an enormous applications for identity
networked time-stamping system. management, asset ownership
For example, NASDAQ is using its transfer of precious commodities
‘Linq Blockchain’ to record its private such as gold, silver and diamond,
securities transactions. Meanwhile healthcare and other commercial
the Depository Trust & Clearing uses as well as in financial inclusion.
Corporation (DTCC, USA) is working However, this will strongly depend
with Axoni in implementing financial on national political decisions.
settlement services such as post-
trade matters and swaps. Regulators
are also interested for BC’s ability to
offer secure, private, traceable real-
time monitoring of transactions.

The Future of
Blockchain
According to the Gartner Hype Cycle
for Emerging Technologies 2017,
shown in Figure 2, below, Blockchain
still remains in the region of “Peak of
Inflated Expectation” with forecast
to reach plateau in “five to ten
years”. However, this technology is
shown going downhill into the region
of the “Trough of Disillusionment”.
Because of the wide adoption of the CONCLUSION
Blockchain in a wide range of
The application of the Blockchain
applications beyond cryptocurrency,
concept and technology has grown
the authors of this paper are
beyond its use for Bitcoin generation
forecasting a shift in classification
and transactions. The properties of
from “five to ten years” to “two to
its security, privacy, traceability,
five years” to reach maturation.
inherent data provenance and time-
Blockchain possesses a great
stamping has seen its adoption
potential in empowering the citizens
beyond its initial application areas.
The Blockchain itself and its variants Trust Machine," Machine Lawyering,
are now used to secure any type of Chinese University of Hong Kong,
transactions, whether it be human- 23rd December 2017, Available:
to-human communications or http://dx.doi.org//10.13140/RG.2.2.
machine-to-machine. Its adoption 22541.64480/2
appears to be secure especially with [3] Don Tapscott and Alex Tapscott,
the global emergence of the Blockchain Revolution: How the
Internet-of-Things. Its decentralized Technology Behind Bitcoin Is
application across the already Changing Money, Business, and the
established global Internet is also World, 1st ed. New York, USA:
very appealing in terms of ensuring Penguin Publishing Group, 2016.
data redundancy and hence
survivability. The Blockchain has [4] Maaruf Ali and Mahdi H Miraz,
been especially identified to be "Cloud Computing Applications," in
suitable in developing nations where Proceedings of the International
ensuring trust is of a major concern. Conference on Cloud Computing and
Thus the invention of the Blockchain eGovernance - ICCCEG 2013,
can be seen to be a vital and much Internet City, Dubai, United Arab
needed additional component of the Emirates, 2013, pp. 1-8, Available:
Internet that was lacking in security http://www.edlib.asdf.res.in/2013/i
and trust before. BC technology still ccceg/paper001.pdf Furthermore, BC
uses a changeable Public Key (PK) to
has not reached its maturity with a record the users’ identity, which provides
prediction of five years as novel an extra layer of privacy. Not only in
cryptocurrency has the successful
applications continue to be adoption of BC been implemented but
implemented globally. also in multifaceted non-monetary
systems such as in: distributed storage
systems, proof-of-location, healthcare,
decentralized voting and so forth. Recent
research articles and
BIBLIOGRAPHY projects/applications were surveyed to
assess the implementation of BC for
[1] Nir Kshetri, "Can Blockchain enhanced security, to identify associated
challenges and to propose solutions for
Strengthen the Internet of Things?," BC enabled enhanced security systems.
IT Professional, vol. 19, no. 4, pp. 68
- 72, May 2017, Available:
http://ieeexplore.ieee.org/documen
t/8012302/
[2] Mahdi H. Miraz, "Blockchain:
Technology Fundamentals of the

You might also like