Professional Documents
Culture Documents
Block Chain Mebrate
Block Chain Mebrate
DEPARTMENT
OF
INFORMATION
SYSTEMS
SEMINAR
ON BLOCK-
CHAIN
TECHNOLO
GY
NAME:MEBRATE GETNET
ID:1651/10
Submitted to Mr.Tilahun M.
We would like to thank guide to Advisor Mr.Abdureman Abdi for sparing his precious time,
cooperating making suggestion and creative and guiding us through out. Working with him is a
good learning experience which will always be remembered. I also grateful to his sparing valuable
time and providing with the required material and information for study. Without his constructive
comments and valuable suggestions, this study could not have reached this stage.
i|Page
Abstract
This report focuses on explaining the block chain technology and its application Fields. I
distinguish between multiple types of block chains and explain the two biggest platforms, namely
Bitcoin and Ethereum. While introducing those two platforms we explain the most important
technology and algorithms used such as proof of work concept. Some of the security issues and
solutions are also covered. I conclude with some concrete Ethereum based applications that
demonstrate the usage of block chain technology beyond cryptocurrency and illustrate current
developments in this field.
ii | P a g e
Table of contents
Contents
Acknowledgment...............................................................................................................................................i
Abstract.............................................................................................................................................................ii
1. Introduction...................................................................................................................................................1
2. General motivation........................................................................................................................................2
3. Goal of the paper...........................................................................................................................................2
4. Overview about the previous technology......................................................................................................2
5. Literature Review..........................................................................................................................................2
6. Detailed description about Blockchain Technology.....................................................................................3
6.1. Blockchain Origin and Genesis..................................................................................................................4
6.2. Blockchain Timeline and Trend.................................................................................................................5
7. How does a Blockchain work?......................................................................................................................5
8.Advantages & disadvantages of Block-chain technology..............................................................................7
8.1. Advantage..................................................................................................................................................7
8.2. Disadvantage..............................................................................................................................................8
9.Steps to develop a successful Block-chain application..................................................................................8
10. Blockchain features.....................................................................................................................................9
1.1. Application areas......................................................................................................................................10
1.2. Examples of Blockchain Technology......................................................................................................11
13. The Block-chain & Enhanced security.....................................................................................................12
13.1. Identity management..............................................................................................................................13
13.2. Intellectual Property Protection(IPP).....................................................................................................14
14. Evaluation of results..................................................................................................................................14
15. Conclusion................................................................................................................................................15
Reference........................................................................................................................................................17
iii | P a g e
1. Introduction
In the simplest terms, Block-chain can be described as a data structure that holds transactional
records and while ensuring security, transparency, and decentralization. A Block-chain is a
distributed ledger technology that is completely open to any and everyone on the network. Once
information is stored on a block-chain, it is extremely difficult to change or alter it.
Each transaction on a Block-chain is secured with a digital signature that proves its authenticity.
Due to the use of encryption and digital signatures, the data stored on the Block-chain is tamper
proof and cannot be changed. Block-chain technology allows all the network participants to reach
an agreement, commonly known as consensus. All the data stored on a Block-chain is recorded
digitally and has a common history which is available for all the network participants. This way,
the chances of any fraudulent activity or duplication of transactions is eliminated without the need
of a third-party.
In order to understand Block-chain better, consider an example where you are looking for an
option to send some money to your friend who lives in a different location. A general option that
you can normally use can be a bank or via a payment transfer application like PayPal. This option
involves third parties in order to process the transaction due to which an extra amount of your
money is deducted as transferring fee. Moreover, in cases like these, you cannot ensure the
security of your money as it is highly possible that a hacker might disrupt the network and steal
your money. In both the cases, it is the customer who suffers. This is where Block-chain comes in.
Instead of using a bank for transferring money, if we use a Block-chain in such cases, the process
becomes much easier and secure. There is no extra fee involved as the funds are directly
processed by you thus, eliminating the need for a third party. Moreover, the Block-chain
database is decentralized and is not limited to any single location meaning that all the
information and records kept on the Block-chain are public and decentralized. Since the
information is not stored in a single place, there’s no chance of corruption of the information by
any hacker.
1|Page
2. General motivation
The need for decentralization is the key motivation behind the blockchain technology, and
decentralization is achieved by distributing the computation tasks to all the nodes of the blockchain
network. Decentralization solves several problems of traditional systems; the single point of failure
is one such problem.
But not all DLTs are blockchains, and understanding the differences may help entrepreneurs and
business leaders determine which solution is best for them. “If one understands the differences, they
will be able to better understand if DLT is of potential use in a given application area and, if yes,
whether blockchain is the preferred method of distributed ledger organization,” says George
Giaglis, director of the Institute for the Future at the University of Nicosia.
5. Literature Review
This section will present the current literature and state of the art in the area of blockchain. This
literature overview have been gathered using both academic search engines such Google Scholar
and IEEExplore. The articles have been found on search and indexing terms such as: blockchain,
blockchain applications, blockchain survey, blockchain consensus, bitcoin, bitcoin survey, etc. The
articles found in these searches have been limited to only include the most cited articles, which for
example included articles with more than 70 citations as of December 2018 according to Google
Scholar.
2|Page
research area. The paper itself is short and does not include so many details. It primarily presents
the overall idea and structure. Details on the solution, the specific technologies, and the exact
properties on how the bitcoin system would be implemented is not included. Another interesting
note, is that Satoshi Nakamoto never mentions the term blockchain specifically in his paper. But
he does talk about chains of
blocks, proof-of-work chains, and lengths of chains.
Blockchain revolution: how the technology behind bitcoin is changing money, business,
and the world D. Tapscott, A. Tapscott, 2016, [21], cited by 439
This book is also well cited but has a quite different wiring perspective compared to the other
books and articles. This book focuses on the revolution that blockchain technology brings,
explaining the change, transformation, and digitization coming with blockchain technologies. The
book primarily explains this from a business and economics perspective, using many historical
quotes to put the blockchain revolution into historical context. But also highlight the importance of
individuals, technology, and economic forces. Finally, the book ends with a look into different
promises and perils of using the technology, including privacy, leadership, and future challenges.
3|Page
6. Detailed description about Blockchain Technology
This section will provide an overview of the blockchain technology as a way to introduce the
theory and research area. A blockchain is an immutable ledger since once data have been added to
the chain it cannot be changed. This process is based on cryptographic hashes that overlap the
blocks and since it has this overlap, the data is chained together. Hence, the name blockchain, i.e. a
chain of blocks. These blocks can also contain additional information which then becomes
immutable as well. Which is the primary property that blockchain technology is used for.
Where the index and timestamp is only for the ordering. The data is the data that will be stored in
the blockchain and will become immutable once the blocks are chained together. The previous
hash is the link to the previous block. In the genesis block the previous hash is 0, otherwise it is set
to the hash of the previous block. The nonce is not mandatory of all types of blockchains, but it is
used to adjust the difficulty of the hashing. Basically, the final hash should have a predefined
number of leading zeroes to be accepted. Finally, the hash field is the hash of the entire block,
including the index, data, previous hash, nonce, etc. And it is this hash and the previous hash that
makes it into a chain. If any single piece of data is changed in any block, it can easily be detected
and the chain becomes broken. For example if a malicious user tries to change the data in a stored
block. For example a change in block 0 from ”Some Data” to ”Some Data!”, the resulting hash
will become something completely else and therefore not correspond to previous hash of the block
2. Hence, the change will easily be detected by all other users and the edited block will be
discarded. Thus, ensuring the immutability of the blockchain.
Other notable early supporters and developers were Wei Dai, Nick Szabo, and Gavin Andresen.
The author Satoshi Nakamoto is however presumed to be a pseudonym for what is yet an
unidentified person or persons. It is known that Nakamoto was responsible for creating the
majority of the official bitcoin software and was active in making modifications and posting
4|Page
technical information on the official bitcoin forums. However, the true identify is still unknown.
Probably made because the bitcoin creators were afraid of convictions and trials, especially in
USA. Since the U.S. Mint had informed in 2006 that the circulation of medallions such as the
Liberty Dollar as legal tender, is considered a federal crime and they had also seized a large
amount of liberty dollars in 2007 as well as made formal criminal charges against its inventor
Bernard von NotHaus in 2009. Meaning that the bitcoin inventors could easily face similar threats.
A number of people have been suspected to be Satoshi Nakamoto, including the previously
mentioned developers Wei Dai, Nick Szabo, and Hal Finney. But all have denied these
accusations. Nakamoto’s involvement with the bitcoin code development does not appear after
2010, and in April 2011 Nakamoto communicated with one of the other bitcoin contributors saying
that he had moved on to other things. But the bitcoin blockchain clearly states in the ledger that he
amassed over 980000 bitcoins for his mining efforts in the early days of bitcoin. Meaning that he
theoretically is one of the 250 most wealthiest persons in the world if he were to monetize these
assets . This is, however, very unlikely. Since if these bitcoins ever were to be monetized, his real
identity would become known and the actual bitcoin price would drop significantly because of the
unstable market forces this would create. Hence, the real identity of Satoshi Nakamoto still
remains unknown and that is probably for the best for ensuring the credibility and stability of the
bitcoin market.
Most of Satoshi Nakamotos emails, forum posts, etc. have been saved for historical and archival
purposes Prior to the release of bitcoin there were a number of related digital cash technologies
published. For example the issuer based ecash protocols by David Chaum and Stefan Brands.
Hashcash, a proof-of-work scheme for spam control by Adam Back . Wei Dai’s b-money and Nick
Szabo’s bit gold. As well as, Hal Finney’s reusable proof of work using hashcash as its proof of
work algorithm. One can also argue that the AbsoluteProof system can also be seen as a very early
blockchain, since it is based on basic mechanics by Haber and Stornetta. In which AbsoluteProof
have published a hash of their AbsoluteProof database every week since 1995 in the New York
Times magazine, ensuring the immutability of their database.
5|Page
websites. Since this, there has been numerous other publications made on the topic in Swedish
media.
A Block-chain is a chain of blocks that contain data or information. Despite being discovered
earlier, the first successful and popular application of the Block-chain technology came into
being in the year 2009 by Satoshi Nakamoto. He created the first digital crypto-currency called
Bit-coin through the use of Block-chain technology. Let’s understand how a Block-chain
actually works.
Each block in a Block-chain network stores some information along with the hash of its previous
block. A hash is a unique mathematical code which belongs to a specific block. If the
information inside the block is modified, the hash of the block will be subject to modification
too. The connection of blocks through unique hash keys is what makes Block-chain secure.
While transactions take place on a block-chain, there are nodes on the network that validate these
transactions. In Bit coin block-chain, these nodes are called as miners and they use the concept of
proof-of-work in order to process and validate transactions on the network.
6|Page
In order for a transaction to be valid, each block must refer to the hash of its preceding block.
The transaction will take place only and only if the hash is correct. If a hacker tries to attack The
network and change information of any specific block, the hash attached to the block will also
get modified.
The breach will be detected as the modified hash will not match with the original one. This
ensures that the Block-chain is unalterable as if any change which is made to the chain of blocks
will be reflected throughout the entire network and will be detected easily.
A Block-chain network makes use of public and private keys in order to form a digital
signature ensuring security and consent.
Once the authentication is ensured through these keys, the need for authorization arises.
Block-chain allows participants of the network to perform mathematical verification and
reach a consensus to agree on any particular value.
While making a transfer, the sender uses their private key and announces the transaction
information over the network. A block is created containing information such as digital
signature, time stamp, and the receiver’s public key.
This block of information is broadcasted through the network and the validation process
starts.
Miners all over the network start solving the mathematical puzzle related to the
transaction in order to process it. Solving this puzzle requires the miners to invest their
computing power.
Upon solving the puzzle first, the miner receives rewards in the form of Bitcoins. Such
kind of problems is referred to as proof-of-work mathematical problems.
Once the majority of nodes in the network come to a consensus and agree to a common
solution, the block is time stamped and added to the existing block-chain . This block can
contain anything from money to data to messages.
After the new block is added to the chain, the existing copies of Block-chain are updated
for all the nodes on the network.
7|Page
authorization to enforce the constraints.
Empowered users : Users are in control of all their information and transactions.
High quality of data :Block-chain data is complete, consistent, timely, accurate, and
widely available.
Process integrity :Users can trust that transactions will be executed exactly as the protocol
commands removing the need for a trusted third party.
8.2. Disadvantage
Performance :Because of the nature of block-chain, it will always be slower than
centralized databases. When a transaction is being processed, a Block-chain has to do all
the same things just like a regular database do, but it carries three additional burdens as
well:
The size of the block :Each transaction or “block” added to the chain increases the size of
the database. As every node has to maintain the chain to run, the computing requirements
increase with each use. For large public implementations of Block-chain.
Network speed/cost :Block-chain networks require Nodes to run. But as many of the
networks are new, they lack the number of Nodes to facilitate widespread usage. This
lack of resource manifests as:
Higher costs- as Nodes seek higher rewards for completing Transactions in a Supply and
Demand scenario
Slower transactions- as Nodes prioritize Transactions with higher rewards, backlogs of
transactions build up
Wasteful :Every Node runs the Block-chain in order to maintain Consensus across the
block-chain. This gives extreme levels of fault tolerance, ensures zero downtime, and
makes data stored on the Block-chain forever unchangeable and censorship-resistant. But
all this is wasteful, as each Node repeats a task to reach Consensus burning electricity and
time on the way.
9. Steps to develop a successful Block-chain application
a. Identify the Problem and Goal: Before we go deeper into the Block-chain
development process, firstly it is essential to define a problem statement. At this
step, you should know what all problems a proposed solution is expected to solve.
Cloud storage:-Cloud storage will be another application that businesses can take
advantage of. Store, which at the time of this article is still in beta-testing, is one such
company that’s offering secure cloud storage while decreasing dependency.
Voting:-Block-chain can also be applied in tallying votes such as in government
elections. Moscow had tested block-chains effectiveness in a local election. In the end, it
all boils down to integrity and transparency, which Block-chain can deliver. As a result,
instances of fraud and result manipulation can be lessened.
Accounting:-Since Block-chain acts as a virtual ledger that is transparent and keeps
everything in order, it can also be used for accounting purposes, according to
Entrepreneur. Block-chain limits the chance of committing human errors which could
10 | P a g e
prove to be costly in the accounting industry.
Logistics:-The application of Block-chain technology to facilitate data sharing across
multiple participants in logistics chains, enabling the Physical Internet.
Agriculture and Food:-Application of Block-chain technology to the agri-food domain,
focusing on certification, and the use of Block-chain in agricultural supply chains.
Projects: Block-chain s in agri-food.
Law Enforcement:-Strategic and tactic advice to law enforcement, as well as training
focused against criminal and other illegal use of Block-chain technologies. Projects: Dark
web Training.
11 | P a g e
IV. Matchpool: The Matchpool platform incentivizes ‘matchmakers’ to connect
members of communities such as Airbnb, Uber or dating services. Matchpool uses
cryptocurrency payments as a means for incentivizing the communities, to provide
value to the rest of the network. Guppy tokens, also known as GUP, are used to
make payments inside the Matchpool app. Guppy tokens can be purchased and
earned on the platform or traded on exchanges.
V. SimplyVital Health: The healthcare industry struggles to share data due to privacy
and security issues as well as the added cost of aligning different technologies.
Delivering better health data management, SimplyVital Health uses Blockchain to
allow patients and providers to access, share and even move their healthcare data.
The platform assures safe and secure coordination and communication with other
providers and creates a trusted audit trail.
VI. De Beers: Five leading diamond manufacturers have been working with De Beers
during the development of Tracr, the first Blockchain platform that securely tracks a
diamond across the full value chain from mine to cutter, polisher and right through
to the jeweler. Where once there was a trust and traceability risk, due to lack of
transparency, this industry platform will deliver peace of mind with auditability,
tamper-proof records and data authenticity.
VII. Circle: Circle is a peer-to-peer payments technology. With a suite of financial
products including Poloniex, Circle Invest and Circle Trade, the crypto finance
company operates Circle Pay as a bitcoin wallet service to buy and sell bitcoins.
Investments of some $250M USD are behind company, backed by the likes of
Goldman Sachs, Breyer Capital, Accel and more. Poloniex is one of the world’s
largest crypto exchanges. Unlike existing systems that are closed and proprietary,
Circle uses open, Blockchain-based standards and protocols to build products, such
as the remittance and messaging application that exists to serve the
VIII. Ubiquity: The Blockchain-secured platform for real estate recordkeeping, Ubiquity
provides a secure, user-friendly experience to record property information with a
clean record of ownership. The Patent Pending API and SaaS Platform allows a
client to input their data and store it on a blockchain of their choice, for an accurate
and secure audit of all records.
IX. MediLedger: Blockchain has the power to revolutionize the pharmaceutical
industry. The MediLedger Project is supported by a working group of members
including drug distributors and Big Pharma companies. The open, decentralized
network records an indelible record of transactions and data to demonstrate
regulatory adherence and improve security. Live in the U.S., MediLedger meets the
emerging needs of the prescription medicine supply chain by redefining the
potential of blockchain for the pharmaceutical sector.
X. Guts: A transparent ticketing ecosystem that relies on Blockchain technology,
GUTS eliminates ticket fraud and exorbitant prices. The service assures that tickets
are sold for a fair price and also makes the process simple and secure. The digital
12 | P a g e
smart ticket is powered by blockchain technology with a self-updating, rotating QR
code that claims to make fraud impossible. Ticket prices are locked and linked to a
unique mobile phone number.
chain. Bit-coins sent across the network gets recorded as belonging to that address. The “private
key” is like a password that gives its owner access to their Bit-coin or other digital assets. Store
your data on the Block-chain and it is incorruptible. This is true, although protecting your digital
assets will also require safeguarding of your private key by printing it out, creating what’s
referred to as a paper wallet.
13 | P a g e
The world is getting more digitized with every passing day. Consider financial transactions
happening online for instance, you can easily login with your credentials and security pin in
order to access your funds. However, in this case, no one can ensure the identity of the person
taking out the money. If your username and password are hacked by someone, there’s no way to
secure your money.
The need of the hour is to have a system that manages individual identification on the web. The
distributed ledger technology used in block-chains offers you advanced methods of public private
encryption using which, you can prove your identity and digitize your documents. This unique
secure identity can work as a savior for you while conducting any financial transactions or any
online interactions on a shared economy. Moreover, the gap between different government bodies
and private organizations can be filled through a universal online identity solution that Block-
chain can provide.
Digital content or information can easily be reproduced and distributed with the aid of the
internet. Due to this, people from all around the world hold the power to copy, replicate and use
it without giving credits to the actual producer of the content. There are copyright laws to protect
such issues but in the current scenario, these laws aren’t appropriately defined according to
common global standards. Meaning that any law which is valid in the US might not stand true in
Australia.
Even if there’s any copyright applied to any intellectual property, people easily lose control over
their data and suffer on financial terms. With the aid of Block-chain technology, all the
copyrights can be stored in the form of smart contracts which will enable automation in
businesses along with the increase in online sale thus, eliminating the redistribution risk.
Block-chain for IP registry will help the authors, owners or users to get clarity of copyright.
Once they register their work online, they’ll own the evidence which will be tamper-proof. As
Block-chain is immutable in nature, any entry once stored on the Block-chain cannot be changed
or modified. The owner of the work will have the overall authority over the ownership as well as
the distribution of the content.
14 | P a g e
3) Safety and Security, and
4) Aesthetics.
The survey was circulated to a total of 64 respondents and utilized the five-level Likert Scale. In
terms of efficiency, 54.89% of the respondents strongly agrees, 39.06% agrees, and 6.25% are
undecided that using an electronic and automated system from purchase posting up to the issuance
of contract is efficient. Meanwhile, 71.87% of the respondents strongly agrees, 25% agrees, and
3.13% are undecided that time is saved by using the online platform. 71.87% of the respondents
strongly agrees, 18.75% agrees, and 9.38% are undecided that the bidding processes were
conducted correctly and according to the indicated timeframe.
In terms of safety and security, the result shows that 82.81% of the respondents strongly agrees,
4.61% agrees, and 12.5% are undecided that blockchain notarization features for a tamper-proof
contract and bid receipt is useful in securing digital documents. 67.19% of the respondents
strongly agrees, 23.43% agrees, and 9.38% are undecided that the file auditing feature for checking
the legitimacy of the file is effective. 71.87% of the respondents strongly agrees, 25% agrees, and
3.13% are undecided that transactions conducted are completely immutable. 84.37% of the
respondents strongly agrees, and 15.63% agrees that the presence of a Know-Your-Customer
verification feature for checking the identity of the user is an effective way of ensuring that the
participants of the platform is legitimate.
15. Conclusion
The Block-chain (or distributed ledger technology) is a hot topic for discussion - it has the
potential to revolutionize domestic and international transactions - but of course also comes with
its disadvantages.
The Block-chain was invented in the context of the digital currency, Bit-coin (which by now, most
people have heard of). The Block-chain is a public ledger of all the Bit-coin transactions, which
continues to grow exponentially. Block-chain allows parties to transact securely in the absence of
a third party intermediary and it is clear that some businesses recognize the potential savings
connected to Block-chain or other distributed ledger technology.
So how does it work? Thousands of computers around the world are connected to the Block
chain, each holding a copy of the Block-chain history record. There is no official copy and no
computer is seen as more valid than another - they each mutually verify the ledger and there is no
centralized authority (such as a government or a bank). This decentralization is one of the
revolutionary aspects of the technology.
"Mining nodes" are computers connection to the Block-chain; they race to validate transactions,
create new blocks and have these accepted by the network. The successful computer (or owner
15 | P a g e
thereof) is rewarded in Bit-coin. Once accepted, each new block is sealed permanently and
contains a link to a chain of prior blocks, making the chain more secure. Blocks can be added to
the ledger but cannot be removed or corrupted.
The enhanced security of distributed ledger technology can benefit many - including (perhaps
surprisingly) banks and financial institutions. For example, the system can facilitate the effective
and secure transfer of ownership of digital assets (such as shares and bonds). Also, you can
permanently embed information and data (not just financial data) into the Block-chain. The open
ledger nature of the Block-chain means that financial institutions may be able to monitor a
customer's payment history more accurately, in the context of making a decision to lend. From a
customer's perspective, the Block-chain represents a more transparent system with the internal
mechanisms not subject to "behind closed door" processes.
There has been inevitable criticism about the public nature of the Block-chain and its
encroachment on individual privacy. Block-chain technology has also been criticized as a forum
for use in illegal activities, and in particular the transfer of the proceeds of crime. There has been
some question as to the potential applications of such technology beyond Bit-coin mining. Its
distributed and decentralized nature makes it inherently more cumbersome than some other
software’s especially as the "chains" grow in size. Organizations will have to give considerable
thought to where and how to apply the Block-chain. Nevertheless, the technology and/or its
derivatives represent a real opportunity to all those connected with the future of business.
16 | P a g e
Reference
⮚ https://hackernoon.com/block-chain-technology-introduction-meaning-and-applications
edbd6759a2b2
⮚ https://www.ashfords.co.uk/news-and-events/general/the-block-chain
⮚ https://block-chain technologycom.wordpress.com/2016/11/21/advantages-disadvantages/
17 | P a g e