Professional Documents
Culture Documents
Seminar
Seminar
Example : Bitcoin work just like the internet makes email possible.
The immutability of the ledger means you can always trust it to be accurate.
This blocks over time, forms a chain of transactions. Hence the word blockchain.
TYPES OF BLOCKCHAIN
Public Blockchain
In a public blockchain, a user can become a member of the blockchain network. This means they
can store, send and receive data after downloading the required software on their device. Allowing
anyone to read and write the data stored on the blockchain as it is accessible to everyone in the world.
A public blockchain is completely decentralized. The permissions to read and write data onto the
blockchain are shared equally by all connected users, who come to a consensus before any data is
stored on the database.
The most popular example of a public blockchain is Bitcoin. The digital currency allows users to
use a platform for making transactions directly between them.
TYPES OF BLOCKCHAIN
Private Blockchain
In a private blockchain, permission to write, send and receive data is controlled by one organization.
Private blockchains are typically used within an organization with only a few specific users allowed
to access it and carry out transactions.
The organization in control has the power to change the rules of a private blockchain and may also
decline transactions based on their established rules and regulations.
Instead of allowing any user to participate in the verification of the transaction process or on the
other side just allowing one single company to have full control, in a consortium blockchain a few
selected parties are predetermined. It only allows a limited number of users the permission to
participate in the consensus process.
For example, imagine a group or network of ten banks, each of which is connected to the
blockchain network. In this example, we could imagine that for a block to be valid, seven of the ten
banks have to agree.
KEY TERMS IN BLOCKCHAIN
Mining
Mining means adding transaction records to the blockchain ledger after confirming the validity of
the transactions. It involves using complex hardware to perform mathematical calculations in order to
verify transactions.
Computer Miners verify the validity of transactions and only then, put them into a secure block.
These blocks are combined to form a blockchain that represent in-sync information among all blocks.
After creating a new hash for every secure block, miners are rewarded with incentives like bitcoins
and collecting transaction fees for every transaction that they confirm.
KEY TERMS IN BLOCKCHAIN
Proof of Work (POW)
A Proof of Work is a requirement that expensive computations be performed in order to facilitate
transactions. POW exists to enable trustless consensus. A hashed block is considered as a POW.
Nodes
Nodes are distributed computers in the network that all have a copy of the entire blockchain.
As new users enter the blockchain network, copies of the blockchain and the access to it is
distributed.
The data is replicable, synchronized and shared across all the nodes in the across multiple networks.
The data is not controlled by a singular node or network.
KEY TERMS IN BLOCKCHAIN
Smart Contract
A smart contract is a digital agreement stored on the blockchain that is unalterable, once signed. It
defines certain logic operations that have to be fulfilled in order to perform tasks such as deposit
money or data.
As an example: Conditions of releasing money to a third party delivery team- Suppose a sender
wants to send goods to the receiver using a third party, but wants to pay money for delivery only after
the delivery is successful.
Then, a smart contract could be as follows: The sender pays the shipment money on the day of
loading of goods. The smart contract will hold payment to the delivery team until the recipient
confirms to the sender, the receipt of goods. Only then will the smart contract release the payment and
automatically transfer the money to the delivery team.
BUILDING CONSENSUS
A consensus mechanism is a fault-tolerant
mechanism that is used in computer and blockchain
systems to achieve the necessary agreement on a
single data value or a single state of the network
among distributed processes or multi-agent systems,
such as with crypto currencies.
If something is published on a
public blockchain, all
participants become witnesses.
They would also take care of hardware upgrades and so forth. This is known as a “bare metal”
environment. There is strong coupling between the physical hardware and the deployed software, since
one strongly depends on the other. Here, the unit of deployment was an actual server.
EVOLUTION OF SERVERS
VIRTUAL MACHINES
The next type of deployment to later emerge was a virtual machine. Now, instead of deploying
right to a given piece of hardware, developers were able to target a simulated server. This led to a
lot of flexibility with upgrades and migrations, as well as not having to worry about small
hardware variations. This made deployments a lot more repeatable and flexible.
However, virtual machines still had some limitations and overhead. For better or for worse,
they pretended to be actual servers and this wasn’t always needed. Here, the unit of deployment is
the virtual machine.
EVOLUTION OF SERVERS
CONTAINERS
The follow-up to virtual machines was containerized deployment. This is when various
containerization technologies like Docker, OpenVZ, LXC, FreeBSD zones, and Solaris jails were
born.
These technologies enabled a system administrator to “section off” an operating system and
have different applications running on the same system without them interfering with each
other. It also let developers have a lightweight environment that closely matched the production
environment, leading to more consistent operations between environments.
A serverless application operates in stateless compute containers that are fully managed
by the cloud provider, event-triggered, and ephemeral.
Ephemeral
Serverless are designed to spin up quickly, do their work and then shut down again. They do not linger
unused. As long as the task is performed the underlying containers are scrapped.
Scalable by default
With stateless functions multiple containers can be initialized, allowing as many functions to be run (in
parallel, if necessary) as needed to continually service all incoming requests.
Data are the most critical unit in the world. Storing, processing, analyzing data is a significant
task, and new technologies are growing to make the task as easy as possible.
SOLUTION
Blockchain based data transfer
framework to securely transfer data
between the serverless
SOLUTION
The data of various forms which needs high security are grouped in a data block.
The data are further divided into small chunks called shards.
Each shards will be sent to different serverless framework to maintain the decentralization of
data.
Furthermore, the shards are individually encrypted using ECCST algorithm so that they can be
securely transmitted to the serverless framework .
SOLUTION
After the encrypted shared data securely reaches the serverless framework, then it is decrypted
using ECCST algorithm to extract the actual data.
Now the extracted data will be saved in the blockchain technology of the serverless framework
which will be further maintained and scaled by the cloud provider.
SYMMETRIC KEY VS ASYMMETRIC KEY ENCRYPTION
Symmetric Key Encryption Asymmetric Key Encryption
It only requires a single key for both It requires two keys, a public key and a private
encryption and decryption. key, one to encrypt and the other one to
decrypt.
The size of cipher text is the same or smaller The size of cipher text is the same or larger
than the original plain text. than the original plain text.
The encryption process is very fast. The encryption process is slow.
It is used when a large amount of data is It is used to transfer small amounts of data.
required to transfer.
It only provides confidentiality. It provides confidentiality, authenticity, and
non-repudiation.
The length of key used is 128 or 256 bits
The length of key used is 2048 or higher
Security is less as only one key is used for It is more secure as two keys are used here- one
both encryption and decryption purpose. for encryption and the other for decryption.
Examples: 3DES, AES, DES and RC4 Examples: Diffie-Hellman, ECC, El Gamal,
DSA and RSA
ECCST
ECC and CST algorithm rule combine to form ECCST .
In ECCST based primarily secure data sharing state the key is mainly produced and the data is
encrypted utilizing ECCST algorithm rule.
Keys are produced or created using Elliptic curve cryptography from elliptic curves over finite
field .
Encryption and decryption process are carry out through Cyclic Shift transposition algorithmic
rule.
KEY GENERATION IN ECCST
In ECC algorithm keys are produced for encryption and decryption process . ECC is a quick
process for key production and still supports extreme level security or safety.
Keys generated in ECC is exchanged by the system with the CSTA encryption method.
This algorithm provides high security in encryption and does not allows unauthorized users to
decrypt it .
Then for encryption the key generated is shared at the destination end.
In this algorithm the plain text(ordinary readable form) is converted into cipher text or vice
versa by performing shifting and partitioning operations .
KEY GENERATION IN ECCST
Equation of elliptical curve = y2 = x3 + ax +b
Let G be a point whose is order is large.
Let A is the sender and B is the receiver.
Sender (A)
Secret code(Private) generated by A = nA
Calculated Public Key PA = nA * G
Receiver (B)
Secret Code (Private) generated by B = nB
Calculated Public Key PB = nB * G
Final Key Generated By Sender (A) kA = nA * PB
Final Key Generated By Receiver (B) kB = nB * PA
Hence kA = kB
ECCST FLOW
ECCST ENCRYPTION ALGORITHM
Input : The file is in form of matrix format
Start:
1.The cubic equation for real numbers in an elliptic curve is determined in the following
equation:
2.Then the finite prime field(key) is generated using the following equation:
C2 = Y3 + aX +b(modP) where 4a3 + 27b2 ≠ 0 AND a , b belongs to Integers AND P is any Prime
Number.
ECCST ENCRYPTION ALGORITHM
3.For Encryption process:
Start:
The smaller the key will be , the less time it will take for encryption and
decryption process .
CONCLUSIONS
8. Li R, Song T, Mei B, Li H, Cheng X, Sun L. Blockchain for large-scale internet of things data
storage and protection. IEEE Transactions on Services Computing. 2018 Jul 5;12(5):762-71.
9. Banerjee M, Lee J, Choo KK. A blockchain future for internet of things security: a position
paper. Digital Communications and Networks. 2018 Aug 1;4(3):149-60.
10. Dorri A, Kanhere SS, Jurdak R. Towards an optimized blockchain for IoT. In2017 IEEE/ACM
Second International Conference on Internet-of-Things Design and Implementation (IoTDI) 2017
Apr 18 (pp. 173-178). IEEE.
THANK YOU