Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

C H A R T I N G T H E F U T U R E O F I N N O V A T I O N | # 0 3∙2 0 1 9

ERICSSON
TECHNOLOGY

Blockchain

Domain D1 Domain D2

Owner1
Owner 1 Owner2
Owner2

User3
User1D1D1 User2
User2D1D1 User3
User3D1
D1

BLOCKCHAINS
AND ONLINE TRUST
✱ BLOCKCHAINS AND ONLINE TRUST

FACILITATING ONLINE TRUST WITH

blockchains
A decade after its launch, blockchain is still the only internet-age technology
that is able to facilitate online trust using mathematics and collective
protocolling exclusively.

DANIEL BERGSTRÖM, One of the fundamental challenges in the certificates – their digital fingerprints. By instructing
BEN SMEETS, online, digital world is that implicit, our devices to trust the root certificate of the trusted
MIK AEL JA ATINEN, fundamental concepts in the off-line, third party, they are able to computationally infer
JAMES KEMPF, physical world need to be formalized and trust in all underlying entities.
JONAS LUNDBERG, made explicit. Trust is a prime example. The primary weakness of this hierarchical
NICKLAS SANDGREN, approach to establishing trust stems from the
GASPAR WOSA ■ In the physical world, trust is intangible but it is underlying structure of centralized power. The root
nonetheless central to our interactions with other keys of each certificate authority are a core asset of
people and to our consumption of services. Creating today’s internet, but they are privately managed and
an online environment in which people feel secure sensitive to exposure. Blockchain was originally
when interacting and consuming in a similar way designed to uproot this hierarchy and create a new
requires the development of technologies and kind of trust system for electronic transactions. In
protocols that formalize and digitalize trust. essence, the blockchain itself becomes its own trust
The current solution to the challenge of facilitating anchor based on a distributed, transparent and
trust online is to rely on trusted third parties such as community-driven infrastructure.
banks and major internet companies to act as trust A blockchain removes the need for trusted third
anchors, creating and attesting certificates for parties, distributes the centralized power of the
people or web-based services. Each device, browser certificate authorities, and allows anonymous
and operating system comes preconfigured with a members to join and contribute to the infrastructure
list of these trusted third parties and their at their own discretion – although at a very high cost

2 ERICSSON TECH NOLOGY REVIEW ✱ APRIL 4, 2019


BLOCKCHAINS AND ONLINE TRUST ✱

in terms of throughput. While digital currencies are


strongly associated with blockchains – the “coins”
[PRIVATE BLOCKCHAINS]
are generated by contributing resources to the EMPLOY STRONG IDENTITIES,
networks and spent by making transactions that are
processed by the networks – the value of blockchains
USER MANAGEMENT AND A
goes beyond digital currencies. PROTECTED DATA STRUCTURE
Public versus private blockchains private, permissioned ones is that the latter employ
Bitcoin and Ethereum are both classified as public, strong identities, user management and a protected
permissionless blockchains. These systems have data structure. Private blockchains target use cases
three properties that form the basis of trust. Firstly, somewhere between a public blockchain in an
anyone can become a participant by contributing untrusted public environment and a distributed
computing resources – there is no need to have a database hosted in a fully trusted internal
prior relation to any other node in the system. deployment. This segment includes bank consortia,
Secondly, generating a new block on the blockchain for example, that have a mutual reliance and at least
is computationally expensive, as the consensus some level of preestablished trust, but where a
mechanism is designed to require a certain amount privately managed backend for transaction
of wall-clock time to complete regardless of the size management is not a feasible alternative. Due to the
of the network. And lastly, it is impossible to predict difference in network constitution and the presence
which contributor will be the first to complete the of at least partial trust, the computationally expensive
next block. PoW scheme is not required in private blockchains.
If more than half of the computational resources Instead, they can use the same consensus algorithms
in the system are technically well-behaved, their that are used in other distributed systems, designed
results will dominate any malicious or to compensate for both malicious and malfunctioning
malfunctioning nodes that may try to alter the nodes.
history of the system in an erroneous direction. In The differences in scope between public and
the consensus method used in these systems, known private blockchains have a large impact on
as proof of work (PoW), there are no shortcuts to technology choices. From a technical standpoint,
generating new blocks; it can only be done through a there is virtually no overlap between the two different
computationally intensive hashing process. Other types of blockchains. It is also significant to note that
schemes for consensus are being developed and public blockchains are by design very difficult for
discussed, but these have yet to see widespread use. companies to monetize, which is why most firms have
The difference between public blockchains and chosen to focus on private blockchains instead.

Terms and abbreviations


ABI – Application Binary Interface | IOT – Internet of Things | JSON – JavaScript Object Notation
| POW – Proof of Work | REST– Representational State Transfer | SOFIE – Secure Open Federation
for Internet Everywhere | TEE – Trusted Execution Environment

APRIL 4, 2019 ✱ ERICSSON TECHNOLOGY REVIEW 3


✱ BLOCKCHAINS AND ONLINE TRUST

The most commonly used software technology Related technologies


to realize private blockchain installations is The technical development and broadening of
Hyperledger Fabric. blockchains is constantly ongoing. By altering or
extending the core functionality, we can both widen
Key technical properties of suitable use cases the scope and applicability of blockchains as a
We have identified four key technical properties technology and mitigate the limitations of existing
of the partial-trust use cases that we expect to be offerings.
suitable for blockchains: (1) a shared trusted history,
(2) structure built on multiple stakeholders of Smart contracts
equal standing, (3) largely independent nodes, With traditional databases, it is straightforward to
and (4) access to data history. create software that monitors a database, determines
whether or not a certain condition has been fulfilled,
Shared trusted history and updates the database accordingly. This is exactly
The key benefit of the blockchain is trust between what smart contracts do as well, but in the trusted
stakeholders, and to establish a history of environment of blockchains. A smart contract is
transactions that is very hard to tamper with. neither smart nor a legal contract; rather, it is an
agreement between two or more parties that is
Multiple, equal stakeholders formulated and enforced with immutable
The main niche of blockchains lies in the area of cryptographic code. This code is executed on every
partial trust between roughly equal stakeholders. node within the blockchain network and determines
how data in the distributed ledger is modified. If a
Largely independent nodes smart contract depends on external information, an
Use cases where each node operates independently oracle must be used to feed this information into the
and uses the blockchain for support are desirable ledger to make it accessible to the smart contracts.
due to the relatively high cost and/or delay of running Smart contracts remove reliance on trusted
transactions on the blockchain. intermediaries when making business agreements.
Typically, a smart contract includes terms and
Access to data history conditions, performance metrics and possibly
Because the historical data is normally retained penalties. During execution, the smart contract will
indefinitely, it is highly beneficial if there is a value to monitor, verify and enforce agreed conditions
the use case in having access to historical automatically, which can potentially save time and
transactions. money for the parties involved.
The technology behind smart contracts is
promising, but there are some caveats; smart
THE SMART CONTRACT contracts need to be very carefully designed and
WILL MONITOR, VERIFY implemented to ensure that the resulting contract
acts exactly as intended given any input or event.
AND ENFORCE AGREED Misconfigured smart contracts are virtually
CONDITIONS impossible to cancel (unless they have been designed
for renegotiation from the start), which considerably
AUTOMATICALLY increases the demands of deploying a smart contract.

4 ERICSSON TECH NOLOGY REVIEW ✱ APRIL 4, 2019


BLOCKCHAINS AND ONLINE TRUST ✱

Hashgraphs TEEs MAY OFFER A


The drawbacks of the PoW consensus algorithm
used by public blockchains (in terms of delay,
BREAKTHROUGH IN
throughput, energy efficiency and transaction costs) TERMS OF CONSENSUS
have inspired the development of other technologies
targeting the challenge of distributed trust.
ALGORITHMS
Hashgraphs are one such example. Hashgraphs underlying operating system layers, effectively in
reorganize the transaction blocks from a chain of isolation from any attacks originating from hacking
blocks to a directed acyclic graph of blocks, which or exploiting operating system software. The
enables new blocks to be added to the system without technology was initially launched for some chipsets in
waiting for all previous blocks to be organized. the early 2000s but has only recently reached wide-scale
The organization of blocks enables multiple lines deployment in device, desktop and server hardware.
of transactions to be run in parallel, and in theory From a public blockchain perspective, TEEs may
allows for a system that has considerably lower offer a breakthrough in terms of consensus
delays and higher throughput compared with a algorithms. A key feature of modern TEEs is the
conventional blockchain. Hashgraphs also try to ability to attest the code running inside the enclave
replace the computationally expensive PoW through a hardware-supported asymmetric key
consensus algorithms with other approaches to exchange. The ability to execute trusted and
increase the throughput and energy efficiency of the verifiable code on otherwise compromised systems
system. Smart contracts can run on hashgraphs in a lays the foundation for a new generation of consensus
way that is similar to how they run on blockchains. algorithms, anchoring the trust in the signature of the
Hashgraphs represent a bold technological leap code being executed rather than in the work being
that strives to overcome all the drawbacks of public carried out or the identity of the node owner. Early
blockchains. However, current hashgraph results of this development in public blockchains show
technologies are not open and available in the same considerably increased transaction speeds and reduced
way as public blockchain technologies are, which energy consumption. The implications are yet to be
arguably makes them better suited to solve different fully determined for private blockchains that rely on
use cases that are closer to those of private classical distributed system algorithms for consensus.
blockchains. Some hashgraph technologies are also
designed around patented algorithms and built-in Use cases and applications
claims to parts of the revenue, which goes against the At Ericsson, we believe that a robust blockchain
original intention of blockchain to create a foundation can increase ecosystem involvement and
decentralized and democratic infrastructure. enable new business models for revenue generation.
In light of this, we have been testing the application
Trusted Execution Environments of blockchain technology in the realm of
A Trusted Execution Environment (TEE) is telecommunication for some time, and we have
established within an individual device by using an identified three use cases that are particularly
enclave – a hardware-protected part of the CPU promising in terms of services with monetization
chipset that operates on encrypted memory and potential. One is called the smart contract platform,
storage for security purposes. This approach enables the second is known as ID brokering, and the third is
the execution of selected software in isolation from the a Nubo-based virtual services marketplace.

APRIL 4, 2019 ✱ ERICSSON TECHNOLOGY REVIEW 5


✱ BLOCKCHAINS AND ONLINE TRUST

With data clearing house Without data clearing house


(blockchain enabled)

Operator A Operator B Operator A Operator B


Roaming
settlement via data
Roaming
clearing house
settlement based
on blockchain
and smart
contracts

Operator C

Operator C

Figure 1 Roaming clearance and settlement, with and without third-party support

Smart contract platform for services providers blockchain solution that includes smart contracts
The smart contract platform is an innovation (for example, Hyperledger Fabric chain code).
platform driven by Ericsson that allows operators The smart contract platform can take advantage
who are innovating with us to explore blockchain of core attributes of blockchain’s shared ledger
and smart-contract technology to offer new approach to provide trust, security and transparency
services, evaluate platform business opportunities across the participating ecosystem. Smart contracts
and address internal efficiencies to reduce can be used to support the following three main
the cost of doing business. One interesting groups of services:
use case for the platform is its application to
roaming clearance and settlement services [1] ❭❭ roaming management, including agreement
as depicted in Figure 1. definition and archiving
The handling of roaming subscribers today ❭❭ data clearing, such as billing record creation,
relies on trusted third parties (data clearing conversion services and fraud management
companies, for example) to manage the clearing ❭❭ financial clearing and settlement services
processes and settlement related to billing. for voice, SMS, MMS and data transactions.
The smart contract platform roaming settlement
application replaces these (often expensive) third The insights from smart contract platform experiments
parties with a trusted, distributed and decentralized will validate the key technical properties where trust

6 ERICSSON TECH NOLOGY REVIEW ✱ APRIL 4, 2019


BLOCKCHAINS AND ONLINE TRUST ✱

can be distributed and govern in a decentralized The ID brokering concept is based on


manner and through data integrity and transparency three key aspects:
supported between the counterparties.
1. the self-sovereignty of ID domains, where
ID brokering devices are provisioned with any secure ID
We have designed and implemented a decentralized technology deemed appropriate, and where the
system for ID brokering based on a concept that ID secret is securely stored in a TEE
creates trust relations between digital identities 2. authentication utilizes the trust relation
and the systems that handle them. The system expressed in a blockchain-based backend,
capitalizes on the strength of blockchains to where instantaneous access rights for specific
express and manage trust relations in industry- devices in specific networks are managed
wide solutions and creates a unified mechanism 3. the blockchain backend enables the system to
for ID management across underlying reach a shared consensus on a global scale, as
heterogeneous ID technologies. no single party is the main controller or
ID brokering makes it easy to establish encrypted
beneficiary of the system.
and trusted connectivity for IoT devices that are
on the move, or for personal devices that are carried Ericsson demonstrated an ID brokering
across different administrative network domains. implementation – in this case a custom layer on top of
For example, by allowing device IDs to act as digital Hyperledger Fabric using blockchains and TEEs – at
passports and registering the (non-sensitive) Mobile World Congress in 2017. In it, each IoT device
passport IDs of devices when booking a trip, the is represented by a node, belongs to a domain, and
networks the devices pa ss through (including has relations with owners expressed by links, as
airports, hotels and conference facilities) can use illustrated in Figure 2. With this approach, we
their own trusted IDs to grant secure internet emphasize the decentralized nature of applications
access without manual authentication. enabled by the blockchain. Each domain owner

Blockchain

Domain D1 Domain D2 Domain D3

Owner1
Owner 1 Owner2
Owner2 Owner3
Owner3

User3
User1D1D1 User2
User2D1D1 User3
User3D1
D1
OwnerD2
D3
User1
User1D3D3 User2
User2D3
D3

Figure 2 ID domain creation and ID crosslinking with the support of blockchain

APRIL 4, 2019 ✱ ERICSSON TECHNOLOGY REVIEW 7


✱ BLOCKCHAINS AND ONLINE TRUST

Web3
ABI
Quorum

Saranyu Bulk
Nubo portal service
tenant
REST usage data
Tenant Cassandra

Saranyu
Dapp
Saranyu Service
Settlement Saranyu
service manager
processor tenant Non-multi-
REST Service REST
REST tenant
manager
services

Saranyu
Service service
provider REST Multi-tenant
services

Figure 3 Nubo virtual services marketplace architecture

has full sovereignty of their domain, and shared market of network services where the set of
context of the blockchain enables a domain to components can be composed specifically for each
interact and to grant and revoke access dynamically. tenant. With slicing and virtualization of network
The ID brokering solution shares the concept of components in 5G, we envision that future 5G
self-sovereignty with the Sovrin system [2], and is operator services are likely to have similar
oblivious to the specific ID technologies used for characteristics, with a tailored composition of
authentication and ID provisioning. Since 2017, services for each network slice.
we have been working on ID brokering and its We designed the Nubo virtual services
coexistence with public key infrastructure solutions. marketplace to meet the specific requirements of
virtualization use cases. Its architecture is illustrated
Nubo virtual services marketplace in Figure 3. The Nubo marketplace is made up of
New 5G features enable operator networks to be buyers of virtualized services, referred to as “tenants”,
virtually segmented into different logical networks and the sellers of those services, referred to as
(slices) similarly to how network resources in cloud “service providers”. The tenants can be individual
infrastructure can provide different virtual networks users, enterprise customers or even operators. A
for different tenants. The rise of virtual network blockchain with smart contracts provides the tenants
functions – that is, virtualized and software-based with the basic trust platform for price discovery on
routers or firewalls – has created the foundation for a the services. Nubo’s tenant and service management

8 ERICSSON TECH NOLOGY REVIEW ✱ APRIL 4, 2019


BLOCKCHAINS AND ONLINE TRUST ✱

microservice (known as Saranyu) utilizes the J.P. consortia, and even permissionless blockchains.
Morgan Quorum blockchain, which supports smart Consequently, blockchain standardization is
contracts written in Solidity. underway and several industry consortia have
Tenants and services have contract accounts on formed to strive for interoperability and harmonized
the blockchain, which govern their interaction with processes. Ericsson is contributing to the
the marketplace and each other. Services list their standardization process through our active
resource offerings on the blockchain through involvement in the GSMA and all major telecom
Saranyu in the form of a JSON (JavaScript Object and ICT standardization bodies, as well as by
Notation) document describing the attributes of the becoming a founding member in an ETSI
resources. Attributes can be quota limited or have (European Telecommunications Standards
charges associated with them. Tenants request the Institute) working group on permission
delegation of resources and must cryptographically distributed ledgers.
sign the JSON document, indicating that they With respect to collaboration, the EU and
commit to abide by the charging and quota several national governments are currently
advertised in the resource offerings. sponsoring academic and industrial collaboration
Services record tenant usage and send usage for blockchain research and business acceleration.
records to Saranyu, which Saranyu stores in the Ericsson has chosen to participate in the EU H2020-
Cassandra distributed database, depositing a signed IoT SOFIE (Secure Open Federation for Internet
hash of the record into the blockchain to ensure the Everywhere) project 2018-2020 together with
records are not changed. Periodically, Saranyu runs several industry-leading companies and academic
a billing cycle in which tenant charges for services institutions to research blockchain interoperability
are totaled up and submitted to a settlement across siloed IoT applications, including the
processor, which can be a credit card processor or a demonstration of results through several live pilots.
cryptocurrency account. We are also collaborating directly with global
Nubo can also support cloud compute/ technology companies in the areas of trusted
networking/storage services as well as serverless computing and blockchains.
functions or distributed operating system types of
services. A prototype of Nubo was developed at
Ericsson in 2018, featuring an experimental THE MASS ADOPTION
cryptocurrency charging system that charged for OF BLOCKCHAINS WILL
services using a private Ethereum account deployed
in the Ericsson Research Data Center in Lund, REQUIRE BOTH TECHNICAL
Sweden. Services listed included the Nefele Cloud AND BUSINESS-MODEL
3.0 distributed operating system, the Ethereum
serverless function system, and the University of INTEROPERABILITY
California, Berkeley, RISELab artificial intelligence
execution environment Ray. Conclusion
Ericsson sees significant value in blockchains as a
Standardization and external collaboration trust enabler and potential disruptor that can enable
The mass adoption of blockchains will require both completely new business models in the digital asset
technical and business-model interoperability market. The use cases we have evaluated for private
between organizations, permissioned blockchain blockchains so far, both in-house and together with

APRIL 4, 2019 ✱ ERICSSON TECHNOLOGY REVIEW 9


✱ BLOCKCHAINS AND ONLINE TRUST

OUR NEXT STEPS Our next steps will include further exploration of
the potential of public blockchains and hashgraphs.
WILL INCLUDE FURTHER While we are keen to accelerate our blockchain
EXPLORATION OF THE efforts from exploration to commodification and
mass adoption, we recognize that a number of
POTENTIAL OF PUBLIC fundamental issues must be resolved before
BLOCKCHAINS AND we get there. Appropriate governance models
around blockchain consortia must be established,
HASHGRAPHS for example, along with technology and business
model interoperability. The questions of how to
global telco and enterprise customers, have achieved create a viable platform business and how to
promising results. To date, we have demonstrated ensure that contracts act on trustworthy data
the value of blockchain for roaming settlement and must also be answered. We will continue to work
other use cases such as IoT data monetization, supply on these aspects in close collaboration with our
chain management, handling of privacy-sensitive customers and other industry stakeholders
data, license management and ID management. through standardization and joint innovation.

References
1. Monitor Deloitte, Blockchain @ Telco: How blockchain can impact the telecommunications industry
and its relevance to the C-Suite, 2016, available at: https://www2.deloitte.com/content/dam/Deloitte/za/
Documents/technology-media-telecommunications/za_TMT_Blockchain_TelCo.pdf
2. White paper, Evernym in cooperation with the Sovrin Foundation, What Goes on the Ledger?, September
2018, available at: https://sovrin.org/wp-content/uploads/2018/10/What-Goes-On-The-Ledger.pdf

Further reading
❭❭ Ericsson, blog, Secure brokering of digital identities, available at:
https://www.ericsson.com/en/blog/2017/7/secure-brokering-of-digital-identities
❭❭ Ericsson, blog, Smart contracts for identities, available at:
https://www.ericsson.com/en/blog/2017/10/smart-contracts-for-identities
❭❭ Ericsson, blog, Secure IoT identities, available at:
https://www.ericsson.com/en/blog/2017/3/secure-iot-identities

10 ERICSSON TECH NOLOGY REVIEW ✱ APRIL 4, 2019


BLOCKCHAINS AND ONLINE TRUST ✱

connection with containers a principal researcher from


the authors

and secure enclaves. 2008 to 2018. He earned a


Ph.D. in systems engineering
Mikael Jaatinen from the University of
◆ is a security specialist at Arizona in Tucson, the US,
Business Area Technologies in 1984, holds 21 patents
and is the author of three
books and many papers.
He currently works as a
Daniel Bergström senior principal architect worked in many different
◆ is a senior researcher for Equinix in Sunnyvale, areas, including speech
in distributed computing California. and channel coding, VoIP
at Ericsson Research. He prototyping, WebRTC and
joined Ericsson in 2014 DevOps. He holds an M.Sc. in
and works with all things computer science from Luleå
distributed. His current focus University of Technology.
is on secure infrastructures and New Businesses. He
for artificial intelligence joined Ericsson in 1996
workloads. He holds a Ph.D. and has been working
in computing science from with blockchains since
Umeå University, Sweden. 2014. He holds an M.Sc. in
computer science from Åbo
Akademi University in Turku,
Finland. Jaatinen is currently Jonas Lundberg
responsible for work ◆ joined Ericsson in 1997
packages in the blockchain and currently serves as a
project SOFIE and with senior researcher at Ericsson
artificial intelligence/ Research. His research Gaspar Wosa
machine learning-based interests include distributed ◆ currently serves as
security analytics. computing and blockchain innovation manager at
technology, and his current Ericsson ONE in Business
Ben Smeets focus is blockchain platforms Area Technologies and
◆ is a senior expert in trusted for rapid prototyping. New Businesses. He joined
computing at Ericsson Lundberg holds an M.Sc. in Ericsson in 1997 and his
Research. He holds a Ph.D. computer science from Luleå primary interest at present
in information theory from University of Technology, is the business model
Lund University, Sweden, Sweden. impact of blockchain and
where he also serves as smart contracts. He holds a
a professor. He joined Nicklas Sandgren B.Sc. in telecommunication
Ericsson in 1998, working on ◆ is a senior researcher engineering from
security solutions for mobile in the field of distributed Polytechnic University of
phone platforms. Smeets is James Kempf computing at Ericsson Indonesia and an MBA from
currently working on trusted ◆ worked for Ericsson Research. He joined IPMI International Business
computing technologies in Research in Silicon Valley as Ericsson in 1998 and has School in Kalibata, Indonesia.

APRIL 4, 2019 ✱ ERICSSON TECHNOLOGY REVIEW 11


ISSN 0014-0171
284 23-3327 | Uen

© Ericsson AB 2019
Ericsson
SE-164 83 Stockholm, Sweden
Phone: +46 10 719 0000

You might also like