SlideShare a Scribd company logo
1 of 34
Group Members:
Ghazanfar Perdakh (2015-CS-13)
Afraz Khan (2015-CS-27)
Ali Abid (2015-CS-60)
Hassan Tariq (2015-CS-67)
Supervisor:
“Dr. Awais Hassan”
Overview
Problem Statement
Existing Systems
Solution
Methodology
Facial Recognition
Block Chain
Practical Demo
References
Problem Statement
The information security is becoming a big challenge in the current digital
age. For surveillance and timely alert generation of threat, A hidden Army of
Bots is required to protect data, assets and defense installation.
 Organizational Security.
 Centralised Database.
 Increase in piracy threats and illegal use of
confidential data.
Existing System
Systems like Kaspersky ant-viruses, Engine Firewall, McAfee Total
Protection, centralized servers etc. In these we can find many system handling
many security and external threads by following various techniques. They all
provide security up to some extent yet unfortunately even in presence of these
system we get hacked up and loss our confidential information.
Drawbacks:
 Centralized network of simple server client communication.
 All Data residing on single place.
 Simple firewall protection services.
Too expensive for more reliable services.
Army Of Hidden Bots
Army of Hidden Bots Act as a reliable solution of any organizational
threats. Because they act as a distributed network of different blocks connected
together in the manner of Block chain. We find this solution promising our need
because.
 Give rise of Block chain as distributed network.
 Meeting the new standards of protection.
 More than simple firewall protection services.
 Cheap and more reliable services.
Proof Of Concept
Implementation of blockchain on multiple computers.
Communication between python and node.js
Face recognition on each system.
Communication between node.js and python.
Transfer of image from one system to another system.
Working Methodology
Access
Request
Communicate with Network
For Authorization
Peer - 1
If Recognized then Access Granted
Access
Granted
Peer - 2
Block Chain Network
Facial Recognition
Facial Recognition works in 3 phases as :
 Data Gathering
 Training of the Recognizer.
 Facial recognition using recognizer.
Recognition Technique(LBPH):
LBPH(LBPH (LOCAL BINARY PATTERNS HISTOGRAMS) is the most fast and yet efficient
technique for facial recognition by converting each image into a binary pattern. This technique
analyzed each dataset image independently and develop its trainer and characterize each
image in the dataset locally using the Open recognizer. We use it because of.
 Simpler and fast working.
 Evaluate the result to each of the images in the dataset.
 Utilize less processing power.
 Open source collaborative effort to advance cross-industry blockchain technologies
 Hosted by Linux Foundation
 Has a global collaboration with finance, banking, supply chain, manufacturing and te
chnology companies
 Works to standardize the protocols
 Launched in 2015
 Goal is to “Create an enterprise grade, open source distributed ledger framework a
nd code base"
Hyperledger:
• Private and Permissioned Blockchain
• Nodes are run by known whitelisted organizations
• High transaction throughput performance
• Privacy and confidentiality of transactions and data pertaining to business
transactions
• No 51% attack
• PBFT consensus mechanism used
• No mining is involved - but basics of blockchain is followed
○ It has block immutability
○ Eliminating double spending
Hyperledger Fabric :
• Based on docker architecture
• Docker is sort of like VM
• Docker container , Docker images and Docker hub
Architecture
• Fabric-CA (Certificate Authority)
• Fabric Peers
• Fabric Orderers
Fabric components:
• Peer is where the Ledger is present
• It also maintains the world state
• Peer can add or query the data from the ledger
• We can have more than one peer - On production we need more than one
• All peers synchronize - Once connected to the network
• Couchdb is used as database
Fabric Peers:
• Ordering service is the heart of the consensus process
• Anything that has to be committed needs to be processed through the ordering servi
ce
• Ordering service creates the Blocks
• This sends the block to the peer to update
Fabric Orderers:
• Define policies around the execution of transactions
• Define which peers need to agree on the results of a transaction before it can be
added to the ledger (endorsing peers)
• Peers A, B, C, and F must all endorse transactions of type T
• A majority of peers in the channel must endorse transactions of type U
• At least 3 peers of A, B, C, D, E, F, G must endorse transactions of type V
Endorsement Policy:
19
20
21
22
23
24
25
• Built in Javascript
• Works on top of fabric
• Model your business blockchain network
• Deploy Smart contracts / chaincode on fabric network
• Generate REST APIs for interacting with your blockchain network
• Generate a skeleton Angular application.
• Generates playground to test business logic
Hyperledger Composer:
Smart contract / chaincode
• Docker swarm mode
• Direct communication
How fabric is deployed on multiple machines?:
References
LBPH
https://en.wikipedia.org/wiki/Local_binary_patterns
The Project repository
https://github.com/AfrazKhan4183/An-Army-of-Hidden-Bots/tree/master/Trojan Computing/Backdoor-
Python3

More Related Content

What's hot

A Practical Approach to Blockchain
A Practical Approach to BlockchainA Practical Approach to Blockchain
A Practical Approach to BlockchainShivanthan Balendra
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorialLen Bass
 
blockchain workshop - blockchain and oabcs - solutions
blockchain workshop - blockchain and oabcs - solutionsblockchain workshop - blockchain and oabcs - solutions
blockchain workshop - blockchain and oabcs - solutionsJuarez Junior
 
The Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsThe Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsSrinath Perera
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011Donald E. Hester
 
Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersMukesh Singh
 
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in GovernmentWSO2
 
OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenIDFoundation
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Denodo
 
Training Webinar: Cover your bases - a security webinar
Training Webinar: Cover your bases - a security webinarTraining Webinar: Cover your bases - a security webinar
Training Webinar: Cover your bases - a security webinarOutSystems
 
Monitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentMonitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentThousandEyes
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Dock 365
 
The Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYCThe Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYCPatrick Sklodowski
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudHostway|HOSTING
 

What's hot (20)

A Practical Approach to Blockchain
A Practical Approach to BlockchainA Practical Approach to Blockchain
A Practical Approach to Blockchain
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
blockchain workshop - blockchain and oabcs - solutions
blockchain workshop - blockchain and oabcs - solutionsblockchain workshop - blockchain and oabcs - solutions
blockchain workshop - blockchain and oabcs - solutions
 
The Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsThe Role of Blockchain in Future Integrations
The Role of Blockchain in Future Integrations
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for Developers
 
Cloud & Software Terms Defined
Cloud & Software Terms DefinedCloud & Software Terms Defined
Cloud & Software Terms Defined
 
Hyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for BusinessHyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for Business
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
 
OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model
 
Microservices Architecture
Microservices ArchitectureMicroservices Architecture
Microservices Architecture
 
Training Webinar: Cover your bases - a security webinar
Training Webinar: Cover your bases - a security webinarTraining Webinar: Cover your bases - a security webinar
Training Webinar: Cover your bases - a security webinar
 
Monitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentMonitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint Agent
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
The Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYCThe Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYC
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
 

Similar to Hyperledger Blockchain

CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICEForgeRock
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Zeeve
 
Service Mesh CTO Forum (Draft 3)
Service Mesh CTO Forum (Draft 3)Service Mesh CTO Forum (Draft 3)
Service Mesh CTO Forum (Draft 3)Rick Hightower
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverableSarmad Ibrahim
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreJonathan Habicht
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to executionAlgoSec
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structurekasthurimukila
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Hacken_Ecosystem
 
Blockchain for Enterprises
Blockchain for EnterprisesBlockchain for Enterprises
Blockchain for EnterprisesHimanshu Pandey
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for BusinessAhmad Gohar
 
Bit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyBit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyMohammad Salehin
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumRick Hightower
 
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONSTOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONSBlockScience
 
Introduction to Puppet Enterprise - Jan 30, 2019
Introduction to Puppet Enterprise - Jan 30, 2019Introduction to Puppet Enterprise - Jan 30, 2019
Introduction to Puppet Enterprise - Jan 30, 2019Puppet
 
IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0Matt Lucas
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...LeMeniz Infotech
 
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203Arnaud Le Hors
 
2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservicedevopsdaysaustin
 

Similar to Hyperledger Blockchain (20)

CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICE
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Service Mesh CTO Forum (Draft 3)
Service Mesh CTO Forum (Draft 3)Service Mesh CTO Forum (Draft 3)
Service Mesh CTO Forum (Draft 3)
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyre
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structure
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
 
Blockchain for Enterprises
Blockchain for EnterprisesBlockchain for Enterprises
Blockchain for Enterprises
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
 
Bit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyBit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currency
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO Forum
 
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONSTOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
 
Introduction to Puppet Enterprise - Jan 30, 2019
Introduction to Puppet Enterprise - Jan 30, 2019Introduction to Puppet Enterprise - Jan 30, 2019
Introduction to Puppet Enterprise - Jan 30, 2019
 
IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
 
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
 
2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice
 

More from Afraz Khan

KNN Algorithm using C++
KNN Algorithm using C++KNN Algorithm using C++
KNN Algorithm using C++Afraz Khan
 
Dr Abdul Qadder Khan & Islamic bomb
Dr Abdul Qadder Khan & Islamic bombDr Abdul Qadder Khan & Islamic bomb
Dr Abdul Qadder Khan & Islamic bombAfraz Khan
 
State of health in pakistan
State of health in pakistanState of health in pakistan
State of health in pakistanAfraz Khan
 
Expository paragraph
Expository paragraphExpository paragraph
Expository paragraphAfraz Khan
 

More from Afraz Khan (7)

Self reliance
Self relianceSelf reliance
Self reliance
 
Case tools
Case toolsCase tools
Case tools
 
KNN Algorithm using C++
KNN Algorithm using C++KNN Algorithm using C++
KNN Algorithm using C++
 
Dr Abdul Qadder Khan & Islamic bomb
Dr Abdul Qadder Khan & Islamic bombDr Abdul Qadder Khan & Islamic bomb
Dr Abdul Qadder Khan & Islamic bomb
 
State of health in pakistan
State of health in pakistanState of health in pakistan
State of health in pakistan
 
Expository paragraph
Expository paragraphExpository paragraph
Expository paragraph
 
Secant Method
Secant MethodSecant Method
Secant Method
 

Recently uploaded

What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 

Recently uploaded (20)

What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 

Hyperledger Blockchain

  • 1.
  • 2. Group Members: Ghazanfar Perdakh (2015-CS-13) Afraz Khan (2015-CS-27) Ali Abid (2015-CS-60) Hassan Tariq (2015-CS-67) Supervisor: “Dr. Awais Hassan”
  • 3. Overview Problem Statement Existing Systems Solution Methodology Facial Recognition Block Chain Practical Demo References
  • 4. Problem Statement The information security is becoming a big challenge in the current digital age. For surveillance and timely alert generation of threat, A hidden Army of Bots is required to protect data, assets and defense installation.  Organizational Security.  Centralised Database.  Increase in piracy threats and illegal use of confidential data.
  • 5. Existing System Systems like Kaspersky ant-viruses, Engine Firewall, McAfee Total Protection, centralized servers etc. In these we can find many system handling many security and external threads by following various techniques. They all provide security up to some extent yet unfortunately even in presence of these system we get hacked up and loss our confidential information. Drawbacks:  Centralized network of simple server client communication.  All Data residing on single place.  Simple firewall protection services. Too expensive for more reliable services.
  • 6. Army Of Hidden Bots Army of Hidden Bots Act as a reliable solution of any organizational threats. Because they act as a distributed network of different blocks connected together in the manner of Block chain. We find this solution promising our need because.  Give rise of Block chain as distributed network.  Meeting the new standards of protection.  More than simple firewall protection services.  Cheap and more reliable services.
  • 7. Proof Of Concept Implementation of blockchain on multiple computers. Communication between python and node.js Face recognition on each system. Communication between node.js and python. Transfer of image from one system to another system.
  • 8. Working Methodology Access Request Communicate with Network For Authorization Peer - 1 If Recognized then Access Granted Access Granted Peer - 2 Block Chain Network
  • 9. Facial Recognition Facial Recognition works in 3 phases as :  Data Gathering  Training of the Recognizer.  Facial recognition using recognizer.
  • 10. Recognition Technique(LBPH): LBPH(LBPH (LOCAL BINARY PATTERNS HISTOGRAMS) is the most fast and yet efficient technique for facial recognition by converting each image into a binary pattern. This technique analyzed each dataset image independently and develop its trainer and characterize each image in the dataset locally using the Open recognizer. We use it because of.  Simpler and fast working.  Evaluate the result to each of the images in the dataset.  Utilize less processing power.
  • 11.  Open source collaborative effort to advance cross-industry blockchain technologies  Hosted by Linux Foundation  Has a global collaboration with finance, banking, supply chain, manufacturing and te chnology companies  Works to standardize the protocols  Launched in 2015  Goal is to “Create an enterprise grade, open source distributed ledger framework a nd code base" Hyperledger:
  • 12.
  • 13. • Private and Permissioned Blockchain • Nodes are run by known whitelisted organizations • High transaction throughput performance • Privacy and confidentiality of transactions and data pertaining to business transactions • No 51% attack • PBFT consensus mechanism used • No mining is involved - but basics of blockchain is followed ○ It has block immutability ○ Eliminating double spending Hyperledger Fabric :
  • 14. • Based on docker architecture • Docker is sort of like VM • Docker container , Docker images and Docker hub Architecture
  • 15. • Fabric-CA (Certificate Authority) • Fabric Peers • Fabric Orderers Fabric components:
  • 16. • Peer is where the Ledger is present • It also maintains the world state • Peer can add or query the data from the ledger • We can have more than one peer - On production we need more than one • All peers synchronize - Once connected to the network • Couchdb is used as database Fabric Peers:
  • 17. • Ordering service is the heart of the consensus process • Anything that has to be committed needs to be processed through the ordering servi ce • Ordering service creates the Blocks • This sends the block to the peer to update Fabric Orderers:
  • 18. • Define policies around the execution of transactions • Define which peers need to agree on the results of a transaction before it can be added to the ledger (endorsing peers) • Peers A, B, C, and F must all endorse transactions of type T • A majority of peers in the channel must endorse transactions of type U • At least 3 peers of A, B, C, D, E, F, G must endorse transactions of type V Endorsement Policy:
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. • Built in Javascript • Works on top of fabric • Model your business blockchain network • Deploy Smart contracts / chaincode on fabric network • Generate REST APIs for interacting with your blockchain network • Generate a skeleton Angular application. • Generates playground to test business logic Hyperledger Composer:
  • 27. Smart contract / chaincode
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. • Docker swarm mode • Direct communication How fabric is deployed on multiple machines?:
  • 33.