This document discusses the need for new off-chain storage solutions for blockchains. Existing data stores have issues like access control, security, performance and scalability that make them unsuitable for shared, immutable blockchain data. Calculations show blockchain storage needs are small but associated off-chain data storage grows rapidly with increased transactions. New purpose-built off-chain storage is required to securely and uniformly handle this shared data accessed by blockchain applications and business networks.
Matching Identity Management Solutions to Self-Sovereign Identity PrinciplesTommy Koens
We created an analysis of near 50 (blockchain based) digital identity management solutions, and matched these against Self Sovereign Identity (SSI) management principles, and additional requirements.
An interesting way to reach consensus is that by means of trusted hardware, for example Intel’s Software Guard Extension (SGX). In this paper we explore how SGX can be applied to reach consensus in a distributed network. Furthermore, we discuss some of its applications, and its pros and cons.
Protecting Global Records Sharing with Identity Based Access Control ListEditor IJCATR
Generally, the information is stored in the database. Protecting sensitive information are encrypted before outsourcing to a
service provider. We send the request to service provider through SQL queries. The query expressiveness is limited by means of any
software-based cryptographical constructs then deployed, for server-side query working on the encrypted data.Data sharing in the
service provider is emerging as a promising technique for allowing users to access data. The growing number of customers who stores
their data in service provider is increasingly challenging users’ privacy and the security of data. The TrustedDB an outsourced
database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints by leveraging
server-hosted. Tamper-proof believed hardware in crucial query processing levels, thereby removing any limits on the type of
supported queries. It focuses on providing a dependable and secure data sharing service that allows users dynamic access to their
information. TrustedDB is constructed and runs on hardware, and its performance and costs are evaluated here.
Benchmark and comparison between hyperledger and MySQLTELKOMNIKA JOURNAL
In this paper, we report the benchmarking results of Hyperledger, a Distributed Ledger, which is the derivation Blockchain Technology. Method to evaluate Hyperledger in a limited infrastructure is developed. Themeasured infrastructure consists of 8 nodes with a load of up to 20000 transactions/second. Hyperledger consistently runs all evaluation, namely, for 20,000 transactions, the run time 74.30s, latency 73.40ms latency, and 257 tps. The benchmarking of Hyperledger shows better than a database system in a high workload scenario. We found that the maximum size data volume in one transaction on the Hyperledger network is around ten (10) times of MySQL. Also, the time spent on processing a single transaction in the blockchain network is 80-200 times faster than MySQL. This initial analysis can provide an overview for practitioners in making decisions about the adoption of blockchain technology in their IT systems.
Matching Identity Management Solutions to Self-Sovereign Identity PrinciplesTommy Koens
We created an analysis of near 50 (blockchain based) digital identity management solutions, and matched these against Self Sovereign Identity (SSI) management principles, and additional requirements.
An interesting way to reach consensus is that by means of trusted hardware, for example Intel’s Software Guard Extension (SGX). In this paper we explore how SGX can be applied to reach consensus in a distributed network. Furthermore, we discuss some of its applications, and its pros and cons.
Protecting Global Records Sharing with Identity Based Access Control ListEditor IJCATR
Generally, the information is stored in the database. Protecting sensitive information are encrypted before outsourcing to a
service provider. We send the request to service provider through SQL queries. The query expressiveness is limited by means of any
software-based cryptographical constructs then deployed, for server-side query working on the encrypted data.Data sharing in the
service provider is emerging as a promising technique for allowing users to access data. The growing number of customers who stores
their data in service provider is increasingly challenging users’ privacy and the security of data. The TrustedDB an outsourced
database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints by leveraging
server-hosted. Tamper-proof believed hardware in crucial query processing levels, thereby removing any limits on the type of
supported queries. It focuses on providing a dependable and secure data sharing service that allows users dynamic access to their
information. TrustedDB is constructed and runs on hardware, and its performance and costs are evaluated here.
Benchmark and comparison between hyperledger and MySQLTELKOMNIKA JOURNAL
In this paper, we report the benchmarking results of Hyperledger, a Distributed Ledger, which is the derivation Blockchain Technology. Method to evaluate Hyperledger in a limited infrastructure is developed. Themeasured infrastructure consists of 8 nodes with a load of up to 20000 transactions/second. Hyperledger consistently runs all evaluation, namely, for 20,000 transactions, the run time 74.30s, latency 73.40ms latency, and 257 tps. The benchmarking of Hyperledger shows better than a database system in a high workload scenario. We found that the maximum size data volume in one transaction on the Hyperledger network is around ten (10) times of MySQL. Also, the time spent on processing a single transaction in the blockchain network is 80-200 times faster than MySQL. This initial analysis can provide an overview for practitioners in making decisions about the adoption of blockchain technology in their IT systems.
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework i.e SecCloudPro which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity i.e bandwidth.
The Fabric platform is intended as a foundation for developing blockchain applications, products or solutions. The fabric is a Private and Permissioned system which delivers a high degree of confidentiality, resiliency, flexibility, and scalability. It adopted a modular architecture and supports pluggable implementations of different components like consensus, membership services etc. Like other blockchain technologies, Fabric has a ledger, smart contracts, and it is a system by which participants manage their transactions. The smart contract in the fabric is known as chaincode and it is in the chaincode the business logic is embedded. The following features impart high degree of security and privacy for the fabric framewor
Details in how InfiniteChain is the most practical solution to connect your centralized environment with public blockchain. Ethereum-based InfiniteChain addresses the blockchain bottleneck of privacy, transaction speed and block bloat.
Blockchain is the currently the hottest tech buzzword. Yet is it just hype or is it that fundamental piece of tech that will it truly change the world we live in, much like the internet did 25 years ago?
This presentation initially explains the fundamentals of blockchain and how it enables a new breed of business models.
Then we will then delve into how you can have a blockchain app on Azure, followed by a demo.
The presention describes analyses Microsoft's strategy with blockchain and how they are working on enabling Azure support to a number of DLTs including Ethereum, Hyperledger Fabric, R3 Corda, Quorum and Chain Core by offering easy-to-deploy templates for these ledgers. And more importantly how Microsoft is integrating these DLTs to the existing rich Azure ecosystem to enable the building of truly scalable, distributed enterprise applications using cryptlets and the Coco Framework.
- Analyze the strength and weakness of public blockchain and the goal of private blockchain.
- Explains the core architectural features, mechanisms and provisioning process of Hyperledger Fabric.
Blockchain technology has changed the revolution of data storage and privacy. Decentralized data storage technique in Blockchain introduced the dependent ledger system. The main motive of Blockchain is to avoid the third party authorization and validation process and intermediaries. This research process shows the different areas where Blockchain can be implemented and some guidelines. And what are the factors need to be considered while deploying the distributed ledgers. Nitin | Dr. Lakshmi J. V. N | Sharique Raza "A Study on Applications of Blockchain" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33693.pdf Paper Url: https://www.ijtsrd.com/computer-science/other/33693/a-study-on-applications-of-blockchain/nitin
Top 20 interview questions for blockchain & supply chain professionalBlockchain Council
Blockchain acts as a ledger where data is stored digitally and is time-stamped. Businesses can make use of these records to track the data and its provenance. Hence, it becomes beneficial for companies dealing with supply chain management. Some of the common records that can be stored on DLT are :
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...eraser Juan José Calderón
Blockchain Computing: Prospects and Challenges for Digital Transformation . Professor Syed Akhter Hossain.
Abstract:
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating parties within a computing framework. Each transaction of the chain in the public ledger is verified by consensus of a majority of the participants in the system and its constituents. Once recorded, information can never be erased and neither altered. The blockchain contains a certain and verifiable record of every single transaction ever made during the business operations. In general sense, the blockchain could be described simply as being a way of storing the information of a transaction, between multiple parties in a trustable way. Recording, sharing, storing and redistributing contents in a secure and decentralized way. Being owned, run and monitored by everybody and without anyone controlling it. Besides, avoiding any kind of modifications or abuses from a central authority. Blockchain technology is non-controversial and has worked flawlessly over the last few years and is being successfully applied to both financial and non-financial world applications and listed as as the most important invention since the Internet itself. Besides, digital transformation is taking off as rapid agent for change as part of the global business convergence. In this article, detail of blockchain technologies is presented from the pe
Un contrato inteligente es una representación digital de un contrato, cuyas cláusulas se ejecutan automáticamente cuando se cumplen sus condiciones, sin necesidad de un intermediario. Debido a su potencial, instituciones de muy diversos ámbitos están explorando las posibilidades que les ofrece la aplicación de esta tecnología, encontrándose con un problema recurrente: la elevada curva de aprendizaje del diseño y creación de contratos inteligentes, tanto para los profesionales de las áreas de negocio, como para los desarrolladores no familiarizados con esta tecnología. En este seminario, tras analizar la situación actual en cuanto a la existencia de herramientas o soluciones para la definición de contratos inteligentes, se presenta una propuesta basada en la aplicación de técnicas y principios de la Ingeniería Dirigida por Modelos.
MongoDB .local Toronto 2019: Keep your Business Safe and Scaling Holistically...MongoDB
Learn how MongoDB on LinuxONE and IBM Cloud Hyper Protect Services can be used to manage highly sensitive and confidential data – pervasively encrypting and securing your environments, consolidating thousands of database instances while serving hundreds of billions of queries a day. At the end of this session you will better understand how managing and scaling large amounts of critical business data can be achieved easily with automatic pervasive encryption of code and data in-flight and at-rest.
If you're a Developer, Architect, DBA or a Business Stakeholder, and your organization is using or planning to use MongoDB on-premise or in the cloud, this session will help you to gain insights into the best way to run MongoDB to keep your business safe and scaling holistically.
Over the last few years, enterprises have come to realize how blockchain, the technology that powers public networks such as Bitcoin and Ethereum, can be used to streamline their own business processes. However, they have also found that most existing blockchain protocols fail to meet several key enterprise requirements—including acceptable transaction throughput and latency, confidentiality, effective governance, and computational efficiency (i.e., the energy cost for mining/proof of work). Efforts to adapt existing public blockchain protocols or to create new protocols to meet these needs have generally traded one required enterprise attribute for another—such as improved confidentiality at the cost of greater complexity or lower performance.
The Coco Framework is an open-source system that enables high-scale, confidential blockchain networks that meet all key enterprise requirements—providing a means to accelerate production enterprise adoption of blockchain technology. Coco achieves this by re-evaluating existing assumptions for public blockchain protocols in the context of a confidential consortium, where nodes and actors (including voting members and other non-voting participants) are explicitly declared and controlled. Based on this new set of requirements, Coco brings together the power of existing blockchain protocols, trusted execution environments, distributed systems, and cryptography to enable enterprise-ready blockchain networks that deliver: • Throughput and latency approaching database speeds. • Richer, more flexible, business-specific confidentiality models. • Network policy management through distributed governance. • Support for non-deterministic transactions. • Reduced energy consumption.
Block chain 101 what it is, why it mattersPaul Brody
The Blockchain is an important new technology, but it is shrouded in mystery: what does it do? Why is it such a big deal? How is it related to bitcoin? In this short presentation (with attached video), I attempt to answer those questions.
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework i.e SecCloudPro which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity i.e bandwidth.
The Fabric platform is intended as a foundation for developing blockchain applications, products or solutions. The fabric is a Private and Permissioned system which delivers a high degree of confidentiality, resiliency, flexibility, and scalability. It adopted a modular architecture and supports pluggable implementations of different components like consensus, membership services etc. Like other blockchain technologies, Fabric has a ledger, smart contracts, and it is a system by which participants manage their transactions. The smart contract in the fabric is known as chaincode and it is in the chaincode the business logic is embedded. The following features impart high degree of security and privacy for the fabric framewor
Details in how InfiniteChain is the most practical solution to connect your centralized environment with public blockchain. Ethereum-based InfiniteChain addresses the blockchain bottleneck of privacy, transaction speed and block bloat.
Blockchain is the currently the hottest tech buzzword. Yet is it just hype or is it that fundamental piece of tech that will it truly change the world we live in, much like the internet did 25 years ago?
This presentation initially explains the fundamentals of blockchain and how it enables a new breed of business models.
Then we will then delve into how you can have a blockchain app on Azure, followed by a demo.
The presention describes analyses Microsoft's strategy with blockchain and how they are working on enabling Azure support to a number of DLTs including Ethereum, Hyperledger Fabric, R3 Corda, Quorum and Chain Core by offering easy-to-deploy templates for these ledgers. And more importantly how Microsoft is integrating these DLTs to the existing rich Azure ecosystem to enable the building of truly scalable, distributed enterprise applications using cryptlets and the Coco Framework.
- Analyze the strength and weakness of public blockchain and the goal of private blockchain.
- Explains the core architectural features, mechanisms and provisioning process of Hyperledger Fabric.
Blockchain technology has changed the revolution of data storage and privacy. Decentralized data storage technique in Blockchain introduced the dependent ledger system. The main motive of Blockchain is to avoid the third party authorization and validation process and intermediaries. This research process shows the different areas where Blockchain can be implemented and some guidelines. And what are the factors need to be considered while deploying the distributed ledgers. Nitin | Dr. Lakshmi J. V. N | Sharique Raza "A Study on Applications of Blockchain" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33693.pdf Paper Url: https://www.ijtsrd.com/computer-science/other/33693/a-study-on-applications-of-blockchain/nitin
Top 20 interview questions for blockchain & supply chain professionalBlockchain Council
Blockchain acts as a ledger where data is stored digitally and is time-stamped. Businesses can make use of these records to track the data and its provenance. Hence, it becomes beneficial for companies dealing with supply chain management. Some of the common records that can be stored on DLT are :
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...eraser Juan José Calderón
Blockchain Computing: Prospects and Challenges for Digital Transformation . Professor Syed Akhter Hossain.
Abstract:
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating parties within a computing framework. Each transaction of the chain in the public ledger is verified by consensus of a majority of the participants in the system and its constituents. Once recorded, information can never be erased and neither altered. The blockchain contains a certain and verifiable record of every single transaction ever made during the business operations. In general sense, the blockchain could be described simply as being a way of storing the information of a transaction, between multiple parties in a trustable way. Recording, sharing, storing and redistributing contents in a secure and decentralized way. Being owned, run and monitored by everybody and without anyone controlling it. Besides, avoiding any kind of modifications or abuses from a central authority. Blockchain technology is non-controversial and has worked flawlessly over the last few years and is being successfully applied to both financial and non-financial world applications and listed as as the most important invention since the Internet itself. Besides, digital transformation is taking off as rapid agent for change as part of the global business convergence. In this article, detail of blockchain technologies is presented from the pe
Un contrato inteligente es una representación digital de un contrato, cuyas cláusulas se ejecutan automáticamente cuando se cumplen sus condiciones, sin necesidad de un intermediario. Debido a su potencial, instituciones de muy diversos ámbitos están explorando las posibilidades que les ofrece la aplicación de esta tecnología, encontrándose con un problema recurrente: la elevada curva de aprendizaje del diseño y creación de contratos inteligentes, tanto para los profesionales de las áreas de negocio, como para los desarrolladores no familiarizados con esta tecnología. En este seminario, tras analizar la situación actual en cuanto a la existencia de herramientas o soluciones para la definición de contratos inteligentes, se presenta una propuesta basada en la aplicación de técnicas y principios de la Ingeniería Dirigida por Modelos.
MongoDB .local Toronto 2019: Keep your Business Safe and Scaling Holistically...MongoDB
Learn how MongoDB on LinuxONE and IBM Cloud Hyper Protect Services can be used to manage highly sensitive and confidential data – pervasively encrypting and securing your environments, consolidating thousands of database instances while serving hundreds of billions of queries a day. At the end of this session you will better understand how managing and scaling large amounts of critical business data can be achieved easily with automatic pervasive encryption of code and data in-flight and at-rest.
If you're a Developer, Architect, DBA or a Business Stakeholder, and your organization is using or planning to use MongoDB on-premise or in the cloud, this session will help you to gain insights into the best way to run MongoDB to keep your business safe and scaling holistically.
Over the last few years, enterprises have come to realize how blockchain, the technology that powers public networks such as Bitcoin and Ethereum, can be used to streamline their own business processes. However, they have also found that most existing blockchain protocols fail to meet several key enterprise requirements—including acceptable transaction throughput and latency, confidentiality, effective governance, and computational efficiency (i.e., the energy cost for mining/proof of work). Efforts to adapt existing public blockchain protocols or to create new protocols to meet these needs have generally traded one required enterprise attribute for another—such as improved confidentiality at the cost of greater complexity or lower performance.
The Coco Framework is an open-source system that enables high-scale, confidential blockchain networks that meet all key enterprise requirements—providing a means to accelerate production enterprise adoption of blockchain technology. Coco achieves this by re-evaluating existing assumptions for public blockchain protocols in the context of a confidential consortium, where nodes and actors (including voting members and other non-voting participants) are explicitly declared and controlled. Based on this new set of requirements, Coco brings together the power of existing blockchain protocols, trusted execution environments, distributed systems, and cryptography to enable enterprise-ready blockchain networks that deliver: • Throughput and latency approaching database speeds. • Richer, more flexible, business-specific confidentiality models. • Network policy management through distributed governance. • Support for non-deterministic transactions. • Reduced energy consumption.
Block chain 101 what it is, why it mattersPaul Brody
The Blockchain is an important new technology, but it is shrouded in mystery: what does it do? Why is it such a big deal? How is it related to bitcoin? In this short presentation (with attached video), I attempt to answer those questions.
CHAPTER 12 Integrating Non-Blockchain Apps with Ethereum EstelaJeffery653
CHAPTER 12 Integrating Non-Blockchain Apps with Ethereum 205
Chapter 12
Integrating Non-
Blockchain Apps
with Ethereum
Although you can build entirely blockchain-based applications, it is far more likely that your applications will be a combination of traditional and blockchain components. You learn in Chapter 3 that some use cases lend
themselves well to blockchain apps but others do not. In this book, we chose to
highlight one use case, supply chain, because blockchain offers clear advantages
over traditional methods. However, even a comprehensive supply chain applica-
tion will likely run partially as a traditional application and partially on the
blockchain.
Many emerging blockchain apps consist of core components that operate as smart
contracts and other components that operate as traditional applications that
interact with users and provide supporting functionality. This hybrid approach to
application development requires the capability to integrate the two different
development models. In other words, to develop hybrid applications that run par-
tially on the blockchain, you need to know how to design them to talk with each
other and operate seamlessly.
IN THIS CHAPTER
» Exploring differences between
blockchain and databases
» Identifying differences between
blockchain and traditional
applications
» Integrating traditional applications
with Ethereum
» Testing and deploying integrated
blockchain apps
206 PART 4 Testing and Deploying Ethereum Apps
Distributed application design and development isn’t new. In fact, some of the
difficulties with distributed applications led to the need for technologies like
blockchain. Remember that blockchain technology doesn’t solve all application
problems, but it does have its place. Now that you know how to develop dApps for
the Ethereum blockchain, in this chapter you learn how to integrate your smart
contracts with applications that do not include blockchain technology. The capa-
bility to integrate blockchain and non-blockchain applications makes it possible
to develop applications that use the right technology for a wide range of needs.
Comparing Blockchain and
Database Storage
In Chapter 2, you learn about some of the differences between storing data in a
blockchain and a database. Both technologies can store data, but clear differences
exist between the two. One of the first obstacles you might encounter when asked
to integrate blockchain with an existing application is determining what data you
should migrate to the blockchain.
Traditional applications store most of their data in a database. Databases provide
fast access to shared data. Blockchains can also provide access to shared data, but
they may not be as fast as a database. As you learn in Chapter 2, there are other
differences as well. It is important that you understand the relative strengths of
each data storage technique to make good design decisions for integrating block-
ch ...
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...pchutichetpong
M Capital Group (“MCG”) expects to see demand and the changing evolution of supply, facilitated through institutional investment rotation out of offices and into work from home (“WFH”), while the ever-expanding need for data storage as global internet usage expands, with experts predicting 5.3 billion users by 2023. These market factors will be underpinned by technological changes, such as progressing cloud services and edge sites, allowing the industry to see strong expected annual growth of 13% over the next 4 years.
Whilst competitive headwinds remain, represented through the recent second bankruptcy filing of Sungard, which blames “COVID-19 and other macroeconomic trends including delayed customer spending decisions, insourcing and reductions in IT spending, energy inflation and reduction in demand for certain services”, the industry has seen key adjustments, where MCG believes that engineering cost management and technological innovation will be paramount to success.
MCG reports that the more favorable market conditions expected over the next few years, helped by the winding down of pandemic restrictions and a hybrid working environment will be driving market momentum forward. The continuous injection of capital by alternative investment firms, as well as the growing infrastructural investment from cloud service providers and social media companies, whose revenues are expected to grow over 3.6x larger by value in 2026, will likely help propel center provision and innovation. These factors paint a promising picture for the industry players that offset rising input costs and adapt to new technologies.
According to M Capital Group: “Specifically, the long-term cost-saving opportunities available from the rise of remote managing will likely aid value growth for the industry. Through margin optimization and further availability of capital for reinvestment, strong players will maintain their competitive foothold, while weaker players exit the market to balance supply and demand.”
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
3. Why new off-chain storage is needed for blockchains
1
Contents
Why new off-chain storage is required for blockchains...................................................... i
Contents............................................................................................................................ 1
List of figures..................................................................................................................... 3
Introduction ....................................................................................................................... 4
1 What a blockchain is, and what it is not ................................................................ 4
1.1 Costs of blockchain technologies .............................................................. 4
1.1.1 Hyperledger costs.....................................................................................4
1.1.2 Non-permissioned blockchain costs .........................................................5
1.1.3 Results......................................................................................................5
1.2 What then is Offchain Data?...................................................................... 5
1.3 All of this data must be shared .................................................................. 5
1.4 On-chain storage calculations ................................................................... 6
1.4.1 On-chain blockchain assumptions ............................................................6
1.4.2 Calculation ................................................................................................6
2 The issues with using existing data stores ............................................................ 7
2.1 Access issues............................................................................................ 7
2.2 Security issues .......................................................................................... 7
2.3 Cryptographic issues................................................................................. 7
2.4 Performance issues................................................................................... 7
2.5 Success issues.......................................................................................... 7
4. 2
2.5.1 Off-chain data assumptions ......................................................................8
2.5.2 Calculation ................................................................................................8
2.5.3 Storage required to save documents........................................................8
2.6 New businesses ........................................................................................ 9
2.7 New business processes require new data organization .......................... 9
2.8 GDPR and granulation of data .................................................................. 9
3 The solution........................................................................................................... 9
5. Why new off-chain storage is needed for blockchains
3
List of figures
Figure 1: Example blockchain structure............................................................................................ 4
Figure 2: Cost per month for blockchains......................................................................................... 5
Figure 3: Example off-chain data...................................................................................................... 5
Figure 4: Example blockchain data flows ......................................................................................... 6
6. 4
INTRODUCTION
In pursuing the storage point of view for blockchain technology, the test team has come up against a
recurrent theme. This recurrent theme is that no new storage is needed for off-chain data as most
companies are already using the data to be utilized by the blockchain. Because the companies are
already using the data, it already exists somewhere in their storage environment and only needs to
be referenced by the blockchain application programming interface (API). This paper examines this
to see if it is valid.
1 What a blockchain is, and what it is not
A blockchain is a distributed ledger that is utilized by a consortium of related users. These users
might be a group of banks, a group of lending institutions, or a polyglot of food providers. Each will
have a full copy of the distributed ledger with its links to any off-chain data. The off-chain data must
be sharable and accessible for the concept of a distributed ledger to work.
Figure 1: Example blockchain structure
1.1 Costs of blockchain technologies
The same calculation to deliver the amount of storage can also be applied to the cost of various
blockchain technologies. Using published cost per transaction data for bitcoin and Ethereum, you
can compare this to a five-node IBM Hyperledger system.
1.1.1 Hyperledger costs
The current base enterprise-level cost for an IBM Hyperledger is USD 1000 per month plus an
additional USD 1000 per active node bringing the cost to USD 6000 per month. This does not
include other software as a service (SaaS) costs that the project may incur as those will vary
between projects.
7. Why new off-chain storage is needed for blockchains
5
1.1.2 Non-permissioned blockchain costs
At the time of this writing, the cost per transaction for bitcoin is USD 1.30 per transaction. However,
this might change based on the cost of the underlying bitcoin cryptocurrency. The cost per Ethereum
transaction is USD 0.25 per transaction, and this again depends on the cost of the underlying Ether
cryptocurrency.
1.1.3 Results
The costs for non-permissioned blockchain vary by transaction rate and the current value of the
underlying cryptocurrency. The cost of the permissioned blockchain such as Hyperledger vary by
number of nodes and the amount of SaaS used in the application. This results in a fixed cost per
month for permissioned blockchain, but costs per month for non-permissioned could vary widely.
Based on these charges per transaction, the cost for using the various blockchain platforms at the
current cost per transaction is easily calculated.
Figure 2: Cost per month for blockchains
As shown in Figure 2, the cost of the various non-permissioned blockchains such as bitcoin and
Ethereum get excessive beyond, or even at, a low transaction per second rates.
1.2 What then is Offchain Data?
Off-chain data is any non-transactional data that is too large to be stored in the blockchain efficiently,
or, requires the ability to be changed or deleted. Figure 3 shows examples of offchain data types.
Figure 3: Example off-chain data
1.3 All of this data must be shared
For example, a blockchain is not a silo application where business A sees only business A’s data.
This is where the belief that data reuse from existing systems seems to have root. To be on the
blockchain, or referenced by the blockchain, the data must be shared among other members of the
consortium. Figure 4 is a graphic representation of an extended data set of offchain data on various
peer-nodes.
8. 6
Figure 4: Example blockchain data flows
1.4 On-chain storage calculations
Given a basic understanding of storage and some basic understanding of how blockchain stores
data, you can derive a back-of-the-envelope calculation on how much storage is required for
Hyperledger blockchain.
1.4.1 On-chain blockchain assumptions
The following assumptions are made in the on-chain storage calculations:
1. All calculations will be in actual bytes, that is 1024 is 1 KB.
2. All hyperledger blocks are 1 megabyte (MB)
3. Only hash, signature, or key data is stored in the blockchain
4. The company works 8 hour per day
5. The company has roughly 240 processing days per year and the number of transactions per
second is averaged over those days only (allows for holidays and weekends.)
6. Currently bitcoin is storing about 1400 basic transactions per MB block. Hyper ledger has
larger headers and a more robust transaction size so 1000 transactions per block was
selected. Blockchain transactions currently run about 5 KB each which equates to 205 TPS.
1.4.2 Calculation
Using the above assumptions, the calculation to find out the amount of storage required per TPS
becomes:
(1 TPS/1000 TB)*1024 KB*3500 sec/hr*8 hr/day*240 days/year=
7,077,888 KB of data per transaction per year
9. Why new off-chain storage is needed for blockchains
7
6,912 MB = 6.75 GB = .00659 TB/transaction/yr
Because the transaction sizes might change according to the type of transaction being stored in the
blockchain, the chart has been prepared using various transaction sizes.
2 The issues with using existing data stores
There are several key issues with using existing data stores with new blockchain-based projects.
2.1 Access issues
What would happen if instead of providing an isolated data store that holds the off-chain reference
data, each of the consortium members had to provide links to their existing data stores? Each
consortium member would have to finance the programming of the various data connectors,
encryption, and security applications needed. While it might be perfectly okay for fellow consortium
members to see document XYZ, it is not for them to possibly see document ZZX which is not on the
blockchain.
2.2 Security issues
When using existing data stores, there is a high probability of accidental disclosure of confidential
data. You must also consider that the very shared nature of the blockchain environment might lead
to deliberate hacking into the consortium members individual data stores by a malicious actor
facilitated by the blockchain access paths.
2.3 Cryptographic issues
Even if an existing data store could be used, it needs to be modified to store the required hash,
cryptographic codes, and keys needed to provide proof to the blockchain that the data has not been
modified since last access. For already active data stores that are modified frequently, this
recalculation and storing of hash and cryptographic keys could become onerous.
2.4 Performance issues
Another issue with using existing data stores is the problem with getting uniform response times from
multiple, independent, data stores using different database technologies, storage hardware, and
server capabilities across the consortium. A unification of hardware, software, and data store
technology is required at the consortium level to meet the needed service levels.
2.5 Success issues
Sometimes, a project’s biggest problem is that it succeeds too well. A recent blockchain
development in the Hyperledger environment went live and it exceeded its planned growth by 300%
leading to performance and storage issues. The need for successful projects to have elastic storage
(that is scalable and secure) is clear. If existing data stores are used, how will the success of a
blockchain application that is parasitic on a data store affect the existing application and its
performance? How will the influx of new data, possibly not linked in the same manner as far as
foreign keys and other relationships affect the existing data store? These questions must be
10. 8
addressed before they cause existing applications to fail or give incorrect results caused by the
encroachment of the blockchain data.
Let’s look at a simple calculation to see what the effect on storage volume of a successful blockchain
project using offchain storage would entail. Our definition of success would be an increase in the
transactions per second, so going from 1 to 10 to 100 or higher means the project is more
successful. For this example, we will assume that every third transaction results in the generation of
an offchain document. We will use an average document size, so the type of document doesn’t
matter for this example. We will also assume that the business is not a 24x7 operation open 364
days a year, however, it is a simple extrapolation should you iwsh to see the results form that type of
operation.
Because non-transaction data, such as pictures, contracts, PDF, personal information and so on
should not be stored in the actual blockchain, some form of off-chain or sideDB storage is required.
Generally, off-chain data is unstructured. A hash or signature for the off-chain item is generated and
that is what is stored in the blockchain. The actual item is either stored in the cloud or in near-cloud
storage. It is expected that the required storage for off-chain data will exceed the needs of
blockchain storage.
2.5.1 Off-chain data assumptions
The following assumptions are made in the off-chain storage calculations:
1. Each transaction does not produce a document. For calculation, a ratio of three
transactions for each document is used so a figure of 0.3 is used.
2. 8 hours per day is the workday.
3. 240 days per year are actual processing days.
4. Indexing and other storage requirements are not included.
2.5.2 Calculation
Using the assumptions made in the previous section, the calculation becomes:
1 TPS*0.3 doc/transaction*3600 sec/hr*8 hr/day*240 day/yr=DPY (documents per year)
= 0.3*3600*8*240=814,301 DPY for 1 TPS
2.5.3 Storage required to save documents
According to current references, 1,000,000 documents (of mixed formats) requires 333 GB of
storage. This means, 814,301 documents will require:
1000000X/(333*814301) = GB/year/TPS
X = (333*814,301)/1,000,000
= 271 GB/TPS/year = 0.264 TiB/year/TPS
So, as expected, you can see that if the transactions produce one document for every three
transactions recorded, as the transactions per second increase, the storage required soon exceeds
those required for the primary blockchain by a couple orders of magnitude.
11. Why new off-chain storage is needed for blockchains
9
2.6 New businesses
All new disruptive technologies bring new businesses. New businesses do not have existing data
stores. So new storage is required for them to participate in the blockchain revolution.
2.7 New business processes require new data organization
Blockchain business application solutions often lead to re-engineering of business processes. For example,
in payments (multi-industry), the business workflow might change to take advantage of the potential
streamlining available in a blockchain community of participants. This could significantly transform an
institution's payment systems, many of which have been in place for decades. Re-engineering may also be
required to meet new performance standards, such as near real-time objectives. Most of the existing data
stores are based (usually loosely) on the relational model of interrelated tables of data connected by
primary and secondary key values. The tables are arranged in a way that the current application can
quickly and easily access it. The blockchain requires a different form of data model which is more
data warehouse-like than relational where the blockchain acts as the central fact table and the off-
chain storage acts as the dimension table. The blockchain only stores the facts (totals, aggregations,
transaction details), that result from or generate the intersection of data (documents, pictures, PDF
files, tabular data) stored offchain. This new data organization requirement results in inefficiencies,
need for re-organization, and changes to the way existing data stores store information.
2.8 GDPR and granulation of data
General Data Protection Regulation (GDPR) in Europe and companies doing business in Europe will
also drive the need for new off-chain storage in blockchain applications. It is recommended to store
sensitive information offchain so that you can delete if need be.
3 The solution
The only way to fully, uniformly, and securely control access to off-chain data and mitigate all of the
issues mentioned earlier, is to create a shared network of storage and server resources that is
designed to provide the required security and shared environment for the blockchain consortium
members. Each time a data object is accessed it must be verified using stored hash values proving
that it is the same object as the one that was stored initially. Each object should be stored in more
than one data store to make sure that loss of one node does not result in significant data loss as
long as the node is down. Also, once a node rejoins the consortium after recover, a mechanism to
synchronize the off-chain references and rebalance the off-chain data is also be required. These
requirements and few others drive the need for new blockchain dedicated off-chain storage assets
and new storage access paradigms.
The storage calculations show that unless the blockchain is being used for low volume,
cryptocurrency-based transactions, it is recommended that a permissioned blockchain (such as IBM
Hyperledger) with a fixed price per month be utilized.
13. Why new off-chain storage is needed for blockchains
11
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in
the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in
this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks
owned by IBM at the time this information was published. Such trademarks may also be registered or common law
trademarks in other countries. A current list of IBM trademarks is available on the web at "Copyright and trademark
information" at http://www.ibm.com/legal/copytrade.shtml.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
Other company, product, or service names may be trademarks or service marks of others.