SlideShare a Scribd company logo
1 of 12
A practical approach to Blockchain implementation
27th January 2019
$Shivanthan Balendra
Head of Cyber Security Center
Batelco - Bahrain
Key Objectives of this presentation
• Lets talk Blockchain
• What is the architecture?
• What are the different types?
• What a common use cases?
• What does it take to build your Blockchain solution?
• Key challenges and security issues?
2
What is Blockchain
“
3
Blockchain (Book)
Block (Page)
Transactions (Text)
Blockchain is a consensus-based secure decentralized public or private
database which stores information immutably over a peer-to-peer
network”. (Distributed Ledger Technology – DLT)
Book Analogy Easily detect
removal of pages
Easily identify
dodgy activity
Impossible to
tamper entries
Key Characteristics of Blockchain
4
Once a transaction is written on Blockchain, it cannot be alteredImmutability1
You don’t have to trust anyone to trust the ledger’s dataTrust in Algorithm2
The transactions are verified by peers together through a
decentralized collaborative algorithms
Decentralized3
Employs cryptographic capabilities for unbreakable
security across hundreds of participating nodes
Confidentiality4
Entries can be verified by any one on the network based on a
consensus algorithm
Auditability5
Blockchain Architecture (RecordsKeeper Reference Model)
Application Layer Tools Applications
Incentive Layer
Consensus Layer
Network Layer
Data Layer
Platforms
Types of Blockchain
6
Blockchain Use cases
7
Election Polling Credentials Verification Legal Agreements
(aka Smart Contracts)
Law Enforcement
For Organizations For Governments Compliance Distributed Cloud Storage
How to build your own Blockchain solution
8
Decide if its suitable for the
problem you are faced with
Suitability Consensus
.
Type
Build API
Decide suitable type
(Private/Public/Hybrid)
01 02
0304
06 0705
Decide most appropriate
mechanism to be used
Decide suitable platform to
implement Blockchain
Platform
Design instance with
attributes to support
Design Instance
Build or customize APIs to
integrate with your systems
User Interface
Develop admin user
interface to interact
An Illustration using the RecordsKeeper platform
9
Challenges and Limitation (not a silver bullet)
10
Add only list. Not a good fit for frequent data update/deleteirreversibility1
Based on a transaction model, storing small pockets of dataLimited Storage2
Technology is fairly immature and often misunderstood with
Bitcoin
Illiteracy3
Higher short term setup costs prevents its widespread useCosts4
High energy consumption and scalability is often deemed
negative.
Naysayers5
Lack of industry standards governing the entire processGovernance6
51% Attack
(Aim to double-spend affect the networks integrity)
A 51% attack consists of a group of miners who
temporarily control over 50% of the network's mining
Hashrate
Current Hashrate - 36.52 Exahashes/s
(36,520,000,000,000,004,000 Hashes per second)
Eclipse Attack
Sybil Attack
Hacking a Public Blockchain - Bitcoin
11
• Targeted at a single party
• Attempts to double-spend coins
• Targeted at the Network
• Impersonates multiple identities.
• Spam the network
• Subvert the network's reputation
Thank you!

More Related Content

What's hot

Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?ITU
 
BlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overviewBlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overviewPad Kankipati
 
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFDEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFGokul Alex
 
Blockchain Challenge - Enrico Ferro - 14/11/18
Blockchain Challenge - Enrico Ferro - 14/11/18Blockchain Challenge - Enrico Ferro - 14/11/18
Blockchain Challenge - Enrico Ferro - 14/11/18The Blockchain Council
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security IntroductionGLC Networks
 
The Future of Security Tokens: Myths and Realities
The Future of Security Tokens: Myths and RealitiesThe Future of Security Tokens: Myths and Realities
The Future of Security Tokens: Myths and RealitiesJesus Rodriguez
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationGokul Alex
 
Flowchain blockchain classroom at Taiwan Tech University
Flowchain blockchain classroom at Taiwan Tech UniversityFlowchain blockchain classroom at Taiwan Tech University
Flowchain blockchain classroom at Taiwan Tech UniversityJollen Chen
 
Blockchain Technology and its Business Application
Blockchain Technology and  its Business ApplicationBlockchain Technology and  its Business Application
Blockchain Technology and its Business ApplicationPritom Chaki
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...eraser Juan José Calderón
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsGokul Alex
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain PresentationZied GUESMI
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorizationPvrtechnologies Nellore
 
Blockchain’s Brave New World
Blockchain’s Brave New WorldBlockchain’s Brave New World
Blockchain’s Brave New WorldITU
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat ModelPeteLind
 
Blockchain Training
Blockchain TrainingBlockchain Training
Blockchain TrainingJiya Verma
 
Blockchain target-share
Blockchain target-shareBlockchain target-share
Blockchain target-sharejoelcrabb
 

What's hot (19)

Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?
 
Cloud security
Cloud securityCloud security
Cloud security
 
BlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overviewBlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overview
 
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFDEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
 
Blockchain Challenge - Enrico Ferro - 14/11/18
Blockchain Challenge - Enrico Ferro - 14/11/18Blockchain Challenge - Enrico Ferro - 14/11/18
Blockchain Challenge - Enrico Ferro - 14/11/18
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
The Future of Security Tokens: Myths and Realities
The Future of Security Tokens: Myths and RealitiesThe Future of Security Tokens: Myths and Realities
The Future of Security Tokens: Myths and Realities
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital Transformation
 
Flowchain blockchain classroom at Taiwan Tech University
Flowchain blockchain classroom at Taiwan Tech UniversityFlowchain blockchain classroom at Taiwan Tech University
Flowchain blockchain classroom at Taiwan Tech University
 
Blockchain Technology and its Business Application
Blockchain Technology and  its Business ApplicationBlockchain Technology and  its Business Application
Blockchain Technology and its Business Application
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and Algorithms
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
 
Blockchain’s Brave New World
Blockchain’s Brave New WorldBlockchain’s Brave New World
Blockchain’s Brave New World
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat Model
 
Blockchain Training
Blockchain TrainingBlockchain Training
Blockchain Training
 
Blockchain target-share
Blockchain target-shareBlockchain target-share
Blockchain target-share
 
Blockchain Ecosystem
Blockchain EcosystemBlockchain Ecosystem
Blockchain Ecosystem
 

Similar to A Practical Approach to Blockchain

InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
 
How to Build Your Blockchain Project with Chainstack
How to Build Your Blockchain Project with ChainstackHow to Build Your Blockchain Project with Chainstack
How to Build Your Blockchain Project with ChainstackChainstack
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxMohamedMansour421585
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on AzureNuri Cankaya
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET Journal
 
Comprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsComprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsSoluLab1231
 
6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now101 Blockchains
 
Blockchain with HyperLedger (Public version)
Blockchain with HyperLedger (Public version)Blockchain with HyperLedger (Public version)
Blockchain with HyperLedger (Public version)Benjamin Fuentes
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureEC-Council
 
InfiniteChain White Paper
InfiniteChain White Paper InfiniteChain White Paper
InfiniteChain White Paper InfiniteChain
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
Cse white paper (2)
Cse white paper (2)Cse white paper (2)
Cse white paper (2)thanhcrypto
 

Similar to A Practical Approach to Blockchain (20)

InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
How to Build Your Blockchain Project with Chainstack
How to Build Your Blockchain Project with ChainstackHow to Build Your Blockchain Project with Chainstack
How to Build Your Blockchain Project with Chainstack
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptx
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
Blockchain Security
Blockchain SecurityBlockchain Security
Blockchain Security
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
 
Comprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security ToolsComprehensive List Of Blockchain Security Tools
Comprehensive List Of Blockchain Security Tools
 
6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
 
Blockchain with HyperLedger (Public version)
Blockchain with HyperLedger (Public version)Blockchain with HyperLedger (Public version)
Blockchain with HyperLedger (Public version)
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security Architecture
 
Zero trust architecture and MIS.pdf
Zero trust architecture and MIS.pdfZero trust architecture and MIS.pdf
Zero trust architecture and MIS.pdf
 
InfiniteChain White Paper
InfiniteChain White Paper InfiniteChain White Paper
InfiniteChain White Paper
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Cse white paper (2)
Cse white paper (2)Cse white paper (2)
Cse white paper (2)
 
CSE30 White Paper
CSE30 White PaperCSE30 White Paper
CSE30 White Paper
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

A Practical Approach to Blockchain

  • 1. A practical approach to Blockchain implementation 27th January 2019 $Shivanthan Balendra Head of Cyber Security Center Batelco - Bahrain
  • 2. Key Objectives of this presentation • Lets talk Blockchain • What is the architecture? • What are the different types? • What a common use cases? • What does it take to build your Blockchain solution? • Key challenges and security issues? 2
  • 3. What is Blockchain “ 3 Blockchain (Book) Block (Page) Transactions (Text) Blockchain is a consensus-based secure decentralized public or private database which stores information immutably over a peer-to-peer network”. (Distributed Ledger Technology – DLT) Book Analogy Easily detect removal of pages Easily identify dodgy activity Impossible to tamper entries
  • 4. Key Characteristics of Blockchain 4 Once a transaction is written on Blockchain, it cannot be alteredImmutability1 You don’t have to trust anyone to trust the ledger’s dataTrust in Algorithm2 The transactions are verified by peers together through a decentralized collaborative algorithms Decentralized3 Employs cryptographic capabilities for unbreakable security across hundreds of participating nodes Confidentiality4 Entries can be verified by any one on the network based on a consensus algorithm Auditability5
  • 5. Blockchain Architecture (RecordsKeeper Reference Model) Application Layer Tools Applications Incentive Layer Consensus Layer Network Layer Data Layer Platforms
  • 7. Blockchain Use cases 7 Election Polling Credentials Verification Legal Agreements (aka Smart Contracts) Law Enforcement For Organizations For Governments Compliance Distributed Cloud Storage
  • 8. How to build your own Blockchain solution 8 Decide if its suitable for the problem you are faced with Suitability Consensus . Type Build API Decide suitable type (Private/Public/Hybrid) 01 02 0304 06 0705 Decide most appropriate mechanism to be used Decide suitable platform to implement Blockchain Platform Design instance with attributes to support Design Instance Build or customize APIs to integrate with your systems User Interface Develop admin user interface to interact
  • 9. An Illustration using the RecordsKeeper platform 9
  • 10. Challenges and Limitation (not a silver bullet) 10 Add only list. Not a good fit for frequent data update/deleteirreversibility1 Based on a transaction model, storing small pockets of dataLimited Storage2 Technology is fairly immature and often misunderstood with Bitcoin Illiteracy3 Higher short term setup costs prevents its widespread useCosts4 High energy consumption and scalability is often deemed negative. Naysayers5 Lack of industry standards governing the entire processGovernance6
  • 11. 51% Attack (Aim to double-spend affect the networks integrity) A 51% attack consists of a group of miners who temporarily control over 50% of the network's mining Hashrate Current Hashrate - 36.52 Exahashes/s (36,520,000,000,000,004,000 Hashes per second) Eclipse Attack Sybil Attack Hacking a Public Blockchain - Bitcoin 11 • Targeted at a single party • Attempts to double-spend coins • Targeted at the Network • Impersonates multiple identities. • Spam the network • Subvert the network's reputation

Editor's Notes

  1. Book example Quran.. Blockchain is a distributed database existing on various computers at the same time. It is a decentralized ledger tracking digital assets on P2P network. Blockchain is related to cryptocurrency, but its not cryptocurrency. It’s a technology that allows a distributed ledger to be shared across a P2P network. Transactions are digital assets, which can be a representation of something physical which is a house or a car or Digital such as virtual currency or data.
  2. Has not been established in a certain defined way because of the non standard nature of the technology. It’s a 5 layer approach. Starting at the bottom…Base layer.. Similar to a database Core to the data within the system. Which cryptography, hashing algorithms, size of the data blocks etc.. Network layer – networking between your blockchain. Connects the different nodes to each other. Consensus Layer – whether you opt for proof of work or proof of stake.. Incentive layer – its function does not affect the functioning of the blockchain. Its not a requirement within a blockchain. Any change you make within this layer doesn’t affect the blockchain at all. Smart Contract layer.. Similar to the 7 layers of the OSI model for network communication.. Data - It’s the base layer where all the cryptographic algorithms & protocols are present Network - peer-to-peer connections and also validates relay network and node validation. Consensus - POW, POS, DPOS etc and it also consist of the user and mining permissions. Insensitive - No have direct impact on blockchain but responsible for miner reward distribution and transaction fees Application - Front end, helps to interact with blockchain
  3. Private v/s public – like internet and intranet. Private is permission based, read can be public and write can be only granted to authorized nodes.. Consensus can be regulated and appointed to a few nodes. (most suitable for public sector use).. Scalability issue - Transactions per second/block size limitations etc.. block creation time of 10 minutes and the block size limit Transaction processing capacity maximum is estimated between 3.3 and 7 transactions per second Privacy issues - In fact, there are many ways a person’s identity could potentially be exposed in bitcoin transactions. Bitcoin have to divulge their personal information to that exchange to create an account.
  4. Election - fraudulent data to be entered into the system.. Transparency – Tamper proof… Auditability - every record, or vote, receives a date, timestamp, and hash of the previous block.. Accessibility - elections could be safely conducted online Credentials verification – Verifying qualifications, college degrees etc.. Cannot happen overnight.. Require a robust DLT ecosystem, with participation from every sector of society Legal agreements – smart contracts - By leveraging new technology, a legal service or law firm can implement a variety of contracts as self-executing programs on a blockchain. (Real Estate Deeds, Rental Contracts, Trusts Powers of Attorney, Sales Contracts) Law enforcement - blockchain holds the potential to completely transform how law enforcement stores, shares, and secures its data
  5. GDPR – Right to be forgotten.. Not possible without the implementation of additional capabilities/controls/measure Design - what things are you looking for inside your Blockchain) – Permissions, Assets, Key Management, Address formats etc
  6. Data storage – BC is a transaction based model meant for storing transactions in the form of hashes. It is not meant for storing data. Current block size is 1 Mb, with SegWit you can go up to 4 MB and the current size of the bitcoin blockchain is 200Gb.
  7. Hashrate - number of double SHA-256 computations performed in one second in the bitcoin network for cryptocurrency mining. Eclipse - An eclipse attack is particular useful when a payer has sent some bitcoins to you in some transaction, then decides to also doublespend the same bitcoins. The doublespender (or payer) will use the eclipse attack to prevent you from knowing that there is also a doublespend transaction Sybil -