Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Flowchain blockchain classroom at Taiwan Tech University

29 views

Published on

Flowchain: Theory of Blockchains

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Flowchain blockchain classroom at Taiwan Tech University

  1. 1. Flowchain Getting Started 
Theory of Blockchains By Jollen Flowchain CEO 2019/9/25 FLOWCHAIN The Group Discussion #1
  2. 2. PreviousHash Timestamp MerkleRoot Nonce Block #11211 PreviousHash Timestamp MerkleRoot Nonce Block #11212 PreviousHash Timestamp MerkleRoot Nonce Block #11213 Hash computation proofs of work (PoW) are used in Bitcoin for block generation, as such, miners must complete a proof of work which covers all of the data in the block.
  3. 3. 3 Private key Public key Encrypted transaction # Hash Time stamp Description Block Miner Block appended Blockchain A user signs a transaction by its private key and broadcasts to its peers. A miner packs valid transactions into a block and broadcasts back to the network. A block is appended only if a) the block is validated after distributed strict cryptographic rules b) hash matching with previous block. Fig. 2. An illustration of blockchain working methodology. Based on the data management and the type of applicatio blockchain can classified either as private (permission) or p lic (permissionless). Both classes are decentralized and prov a certain level of immunity against faulty or malicious us for the ledger. The main differences between private and pu blockchains lie in the execution of the consensus protocol, maintenance of the ledger, and the authorization to join to P2P network. Detailed examples of these classes are illustra in [24]. In the context of IoT, blockchains can be classi based on authorization and authentication. As shown in Fig in a private blockchain, the centralized trusted authority manages the authentication and authorization process sele the miners. On the other hand, in a public blockchain general, permissionless), there is no intervention of any th party for the miner selection and joining for a new user to blockchain network. Recently, there is a huge amount of investment from industries [25], [26] as well as a significant interest fr academia to solve major research challenges in blockch technologies. For example, the consensus protocols are major building blocks of the blockchain technologies, thus, threats targeting the consensus protocols become a signific research issue in the blockchain. Furthermore, blockch forks bring threats to the blockchain consensus protoc Moreover, it is observed that the vulnerability is about 5 for a new blockchain [27]. At the same time, maintena of several blockchains requires a significant amount of po consumption [28]. A. Related Surveys and Our Contributions There are related survey papers [7], [29], [30], [31], [2 Reference: Mohamed Amine Ferrag, Abdelouahid Derhab, Leandros Maglaras, Mithun Mukherjee, Helge Janicke, "Privacy-preserving Schem for Fog-based IoT Applications: Threat models Solutions and Challenges", Smart Communications in Network Technologies (SaCoNe 2018 International Conference on, pp. 37-42, 2018. Satoshi Nakamoto https://en.bitcoin.it/wiki/Main_Page
  4. 4. P2P Payment System 4 A B
  5. 5. [1] Barski, Conrad, and Chris Wilmer. “The Blockchain Lottery: How Miners Are Rewarded - CoinDesk.” CoinDesk RSS. CoinDesk, 23 Nov. 2014. Web. 03 May 2016. [2] https://www.ft.com/content/eb1f8256-7b4b-11e5-a1fe-567b37f80b64#axzz3qe4rV5dH
  6. 6. Mining & Miner 6 Source & Credit: https://financialtribune.com/articles/sci-tech/82494/websites-borrowing-visitors-cpus-to-mine-virtual-coins
  7. 7. ASIC Miner / GPU Miner (礦機) 7
  8. 8. Mining Farm (礦場) 8 Source & Credit: https://arabbit.net/
  9. 9. Exchange / Trade 9 Source: http://scambroker.com/whaleclub/
  10. 10. Distributed Ledgers
  11. 11. Trust Authentication prove to me that you are who you say you are Identification prove to me that you have the rights necessary to do what you ask Flowchain DISTRIBUTED LEDGERS FOR AIOT
  12. 12. Authentication Identification Authentication Token Flowchain DISTRIBUTED LEDGERS FOR AIOT
  13. 13. Authentication Token Flowchain DISTRIBUTED LEDGERS FOR AIOT
  14. 14. The Blockchain 101 Describing the blockchain, token, distributed ledgers, Interoperability, PKI, and Internet of Trust. Group Discussion #1 Flowchain DISTRIBUTED LEDGERS FOR AIOT

×