SlideShare a Scribd company logo
B L O C K C H A I N P E R S P E C T I V E S
I D E N T I T Y, P R I VA C Y, I N T E G R I T Y, C O N F I D E N T I A L I T Y A N D S E C U R I T Y
B L O C K C H A I N C A N P R O T E C T T H E I D E N T I T Y O F T H E T R A N S A C T I N G PA R T I E S
T H R O U G H T H E U S E O F P U B L I C A N D P R I VAT E K E Y C RY P T O G R A P H Y
S E C U R I T Y A N D P R I VA C Y P R O T E C T I O N I N B L O C K C H A I N !
B L O C K C H A I N I S D E S I G N E D T O P R O T E C T T H E I M M U TA B I L I T Y
A N D F I N A L I T Y I N T R A N S A C T I O N S A N D I D E N T I T I E S
S E C U R I T Y A N D P R I VA C Y P R O T E C T I O N I N B L O C K C H A I N !
E M E R G I N G B L O C K C H A I N
S E C U R I T Y H A R D E N I N G
T E C H N I Q U E S
• Zero Knowledge Proofs
• Key Obfuscations
• Ring Signatures
• Transfer Functions
• Deterministic Wallets
B L O C K C H A I N C A N D E C E N T R A L I S E A N D M I T I G AT E
T H E R I S K I N T H E C U R R E N T C E N T R A L I S E D S Y S T E M S .
B L O C K C H A I N F O R P R I VA C Y A N D S E C U R I T Y E N F O R C E M E N T
B L O C K C H A I N C A N P R O T E C T T H E E N D P O I N T S A N D D E V I C E S T H R O U G H
S M A R T L O C K S A N D T H E C O M B I N AT I O N O F P U B L I C A N D P R I VAT E K E Y
C RY P T O G R A P H Y A P P L I E D T H R O U G H C RY P T O G R A P H I C H A S H F U N C T I O N S
B L O C K C H A I N F O R P R I VA C Y A N D S E C U R I T Y E N F O R C E M E N T
C O N T E N T S E C U R I T Y
C L O U D S E C U R I T Y
N E T W O R K S E C U R I T Y
D E V I C E S E C U R I T Y
D ATA S E C U R I T Y
D ATA G O V E R N A N C E
A S P E C T S O F S E C U R I T Y
I D E N T I T Y P R O T E C T I O N
D ATA P R O T E C T I O N
D E V I C E P R O T E C T I O N
T R A N S A C T I O N A N O N Y M I T Y
E N T I T L E M E N T S
A S P E C T S O F P R I VA C Y
B L O C K C H A I N S E C U R I T Y
A R C H I T E C T U R E - D E S I G N
C O N S I D E R AT I O N S
• System Architecture
• Layers and Tiers
• On Chain and Off Chain components
• Type of Ledger Access Control
• Type of Consensus Protocol
• Stakeholders
P O LY S WA R M
C E R T C O I N
G U A R D T I M E
M O B I L E C O I N
H A C K E N . I O
Q U A N T S TA M P
B L O C K C H A I N B A S E D
C Y B E R S E C U R I T Y C O M PA N I E S
P O LY S WA R M
In the PolySwarm marketplace,
decentralising threat detection
allows people from all over the
world to participate. Being
rewarded for submitting correct
assertions also encourages experts
to continue learning and
innovating, allowing us to
continually provide high-value
cyber security.
C E R T C O I N
the creators of CertCoin have
found a way to decentralize the
certificate management process,
removing middle-man authorities,
and leveraging the distributed
nature of the blockchain to create
an auditable certification ledger,
available to the public, without a
single point of failure
G U A R D T I M E
Keyless Signature Structure (KSI) is the focus
for GuardTime, who first began their work by
helping the Estonian Government create a
verifiable security system.
Now, they work in a variety of industries to
replace key-based data authentication by
storing hashes of original files, data and the
like on blockchain. When running hashing
algorithms, they’re able to verify other copies
of this information and compare results,
allowing for quick discovery of
manipulations.
M O B I L E C O I N
MobileCoin’s goal: to create a streamlined,
private digital currency that’s both easy to use
and allows for quick transactions from any
mobile device.
With a focus on privacy and ease-of-use,
MobileCoin is using nodes to manage both the
ledger and transaction validation. These operate
on a fully updated copy of each currency’s
blockchain, and will also handle all key
management for users, ensuring total privacy,
ease-of-use and speed. Finally, the nodes work in
conjunction with the SGX enclaves to bolster
security:
Q U A N T S TA M P
Quantstamp is the first scalable
security audit protocol, used to
uncover vulnerabilities in Ethereum
smart contracts.
In addition to security, Quantstamp is
focused on making their service cost
effective as well, which they believe is
critical to the success of smart
contract use in many industries.
G D P R A N D
B L O C K C H A I N
• It is difficult to identify the processor
of personal data
• Information, including personal data
is accessible to everyone
• It is impossible to rectify / delete
information contained on a
Blockchain
G D P R A N D
B L O C K C H A I N
• No personal data should be put on
Blockchain directly
• Metadata Management
• Tracking Consent through provenance
• Ensuring Deletion Request fulfilment
• Consent Driven Smart Contracts
• Consent Voting Consensus
P R O M I S I N G S TA R T U P S
• Block Armour
• Civic
• Datum
• Evernym
• GemOS
• Gladius
• Gospel Technology
• Ledger
• MaidSafe
• NuCypher
• Nuggets
• Obsidian Platform
B L O C K C H A I N S E C U R I T Y
A R C H I T E C T U R E -
I M P L E M E N TAT I O N P O V
• Blockchain as a Business Architecture
• Blockchain as an Application
Architecture
• Blockchain as a Platform Architecture
• Blockchain as an Integration
Architecture
• Blockchain as an Infrastructure
Architecture
B L O C K C H A I N - O F F
C H A I N C O M P O N E N T
V U L N E R A B I L I T I E S
• Oracles acting as an appointed trusted
source providing real data to a blockchain
• Applications that connect to the
Blockchain via APIs
• IoT Devices feeding data into an Oracle
or an application
• Inter-node messages that are not
recorded on the ledger
• Third Party Wallets and dApps
B L O C K C H A I N -
S M A R T C O N T R A C T
V U L N E R A B I L I T I E S
• Reentry Attacks
• Trace Attacks
• Overflow and Underflows
• Visibility Modifiers
• Delegate Calls
Blockchain Technology : Privacy Perspectives and Security Concerns

More Related Content

What's hot

Pintrace: Distributed tracing @Pinterest
Pintrace: Distributed tracing @PinterestPintrace: Distributed tracing @Pinterest
Pintrace: Distributed tracing @Pinterest
Suman Karumuri
 
Pintrace: Distributed tracing@Pinterest
Pintrace: Distributed tracing@PinterestPintrace: Distributed tracing@Pinterest
Pintrace: Distributed tracing@Pinterest
Suman Karumuri
 
Hard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach PlacesHard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach Places
Mike Crabb
 
Decoupled APIs through Microservices
Decoupled APIs through MicroservicesDecoupled APIs through Microservices
Decoupled APIs through Microservices
David Simons
 
ICOFR - Complete
ICOFR - CompleteICOFR - Complete
ICOFR - CompleteLutfi Hedir
 
Statistical Programming with JavaScript
Statistical Programming with JavaScriptStatistical Programming with JavaScript
Statistical Programming with JavaScript
David Simons
 
TDD Using the SOLID Principles
TDD Using the SOLID PrinciplesTDD Using the SOLID Principles
TDD Using the SOLID PrinciplesJenna Pederson
 
Bristol Uni - Use Cases of NoSQL
Bristol Uni - Use Cases of NoSQLBristol Uni - Use Cases of NoSQL
Bristol Uni - Use Cases of NoSQL
David Simons
 
How Consumers use Digital Technology
How Consumers use Digital TechnologyHow Consumers use Digital Technology
How Consumers use Digital Technology
Hannah Frazer-Morris
 
The Tragic Flaws of Neural Networks | Jack Fitzpatrick
The Tragic Flaws of Neural Networks | Jack FitzpatrickThe Tragic Flaws of Neural Networks | Jack Fitzpatrick
The Tragic Flaws of Neural Networks | Jack Fitzpatrick
Jack Fitzpatrick
 

What's hot (12)

Pintrace: Distributed tracing @Pinterest
Pintrace: Distributed tracing @PinterestPintrace: Distributed tracing @Pinterest
Pintrace: Distributed tracing @Pinterest
 
BS portfolio
BS portfolioBS portfolio
BS portfolio
 
FSLSO QTR
FSLSO QTRFSLSO QTR
FSLSO QTR
 
Pintrace: Distributed tracing@Pinterest
Pintrace: Distributed tracing@PinterestPintrace: Distributed tracing@Pinterest
Pintrace: Distributed tracing@Pinterest
 
Hard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach PlacesHard to Reach Users in Easy to Reach Places
Hard to Reach Users in Easy to Reach Places
 
Decoupled APIs through Microservices
Decoupled APIs through MicroservicesDecoupled APIs through Microservices
Decoupled APIs through Microservices
 
ICOFR - Complete
ICOFR - CompleteICOFR - Complete
ICOFR - Complete
 
Statistical Programming with JavaScript
Statistical Programming with JavaScriptStatistical Programming with JavaScript
Statistical Programming with JavaScript
 
TDD Using the SOLID Principles
TDD Using the SOLID PrinciplesTDD Using the SOLID Principles
TDD Using the SOLID Principles
 
Bristol Uni - Use Cases of NoSQL
Bristol Uni - Use Cases of NoSQLBristol Uni - Use Cases of NoSQL
Bristol Uni - Use Cases of NoSQL
 
How Consumers use Digital Technology
How Consumers use Digital TechnologyHow Consumers use Digital Technology
How Consumers use Digital Technology
 
The Tragic Flaws of Neural Networks | Jack Fitzpatrick
The Tragic Flaws of Neural Networks | Jack FitzpatrickThe Tragic Flaws of Neural Networks | Jack Fitzpatrick
The Tragic Flaws of Neural Networks | Jack Fitzpatrick
 

Similar to Blockchain Technology : Privacy Perspectives and Security Concerns

Digital Data Commons - Emergence of AI Blockchain Convergence
Digital Data Commons - Emergence of AI Blockchain ConvergenceDigital Data Commons - Emergence of AI Blockchain Convergence
Digital Data Commons - Emergence of AI Blockchain Convergence
Gokul Alex
 
Santander Presentation - Global Digital Innovation
Santander Presentation - Global Digital InnovationSantander Presentation - Global Digital Innovation
Santander Presentation - Global Digital Innovation
Lisa Cheng
 
The Blockchain: an Enterprise Play
The Blockchain: an Enterprise PlayThe Blockchain: an Enterprise Play
The Blockchain: an Enterprise Play
Lisa Cheng
 
Switching horses midstream - From Waterfall to Agile
Switching horses midstream - From Waterfall to AgileSwitching horses midstream - From Waterfall to Agile
Switching horses midstream - From Waterfall to Agile
Doc Norton
 
Taipei – 加速、整合、自動化
Taipei – 加速、整合、自動化Taipei – 加速、整合、自動化
Taipei – 加速、整合、自動化
Christina Lin
 
The Digital Transformation: A New World Order
The Digital Transformation: A New World OrderThe Digital Transformation: A New World Order
The Digital Transformation: A New World Order
AMA Iowa (American Marketing Association Iowa Chapter)
 
Competency-Based Learning and Learning Relationship Management #LRM
Competency-Based Learning and Learning Relationship Management #LRMCompetency-Based Learning and Learning Relationship Management #LRM
Competency-Based Learning and Learning Relationship Management #LRM
Gunnar Counselman
 
Introduction to Information Technology 2
Introduction to Information Technology 2Introduction to Information Technology 2
Introduction to Information Technology 2
dmeekis
 
Solving Real Business Problems with the Blockchain
Solving Real Business Problems with the Blockchain Solving Real Business Problems with the Blockchain
Solving Real Business Problems with the Blockchain
MecklerMedia
 
Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0
JoleneVickers
 
Welcome to ZOCCAM
Welcome to ZOCCAMWelcome to ZOCCAM
Welcome to ZOCCAM
JoleneVickers
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
University of Hertfordshire
 
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Kancil San
 
IMPLEMENTING AI & MACHINE LEARNING INTO ACCOUNTING
IMPLEMENTING AI & MACHINE LEARNING INTO ACCOUNTINGIMPLEMENTING AI & MACHINE LEARNING INTO ACCOUNTING
IMPLEMENTING AI & MACHINE LEARNING INTO ACCOUNTING
Nishant Kadian
 
Credit Cards Tech and Threats: How Hackers Pay With Your Money [Stefano Amore...
Credit Cards Tech and Threats: How Hackers Pay With Your Money [Stefano Amore...Credit Cards Tech and Threats: How Hackers Pay With Your Money [Stefano Amore...
Credit Cards Tech and Threats: How Hackers Pay With Your Money [Stefano Amore...
Stefano Amorelli
 
Organizacion de las Tic - PÚBLICO
Organizacion de las Tic - PÚBLICOOrganizacion de las Tic - PÚBLICO
Organizacion de las Tic - PÚBLICO
Francisco Morante Martínez
 
iOS quick grab on XCTest XCUITest
iOS quick grab on XCTest XCUITestiOS quick grab on XCTest XCUITest
iOS quick grab on XCTest XCUITest
DucCongNguyen1
 
AUA Data Science Meetup
AUA Data Science MeetupAUA Data Science Meetup
AUA Data Science Meetup
David Gevorkyan
 
Arte Online Madrid 2017: "Tecnología web para el mundo del arte" por Joe Elliot
Arte Online Madrid 2017: "Tecnología web para el mundo del arte" por Joe ElliotArte Online Madrid 2017: "Tecnología web para el mundo del arte" por Joe Elliot
Arte Online Madrid 2017: "Tecnología web para el mundo del arte" por Joe Elliot
TheArtMarket
 
Blockchain. The silent revolution.
Blockchain. The silent revolution.Blockchain. The silent revolution.
Blockchain. The silent revolution.
AURACHAIN
 

Similar to Blockchain Technology : Privacy Perspectives and Security Concerns (20)

Digital Data Commons - Emergence of AI Blockchain Convergence
Digital Data Commons - Emergence of AI Blockchain ConvergenceDigital Data Commons - Emergence of AI Blockchain Convergence
Digital Data Commons - Emergence of AI Blockchain Convergence
 
Santander Presentation - Global Digital Innovation
Santander Presentation - Global Digital InnovationSantander Presentation - Global Digital Innovation
Santander Presentation - Global Digital Innovation
 
The Blockchain: an Enterprise Play
The Blockchain: an Enterprise PlayThe Blockchain: an Enterprise Play
The Blockchain: an Enterprise Play
 
Switching horses midstream - From Waterfall to Agile
Switching horses midstream - From Waterfall to AgileSwitching horses midstream - From Waterfall to Agile
Switching horses midstream - From Waterfall to Agile
 
Taipei – 加速、整合、自動化
Taipei – 加速、整合、自動化Taipei – 加速、整合、自動化
Taipei – 加速、整合、自動化
 
The Digital Transformation: A New World Order
The Digital Transformation: A New World OrderThe Digital Transformation: A New World Order
The Digital Transformation: A New World Order
 
Competency-Based Learning and Learning Relationship Management #LRM
Competency-Based Learning and Learning Relationship Management #LRMCompetency-Based Learning and Learning Relationship Management #LRM
Competency-Based Learning and Learning Relationship Management #LRM
 
Introduction to Information Technology 2
Introduction to Information Technology 2Introduction to Information Technology 2
Introduction to Information Technology 2
 
Solving Real Business Problems with the Blockchain
Solving Real Business Problems with the Blockchain Solving Real Business Problems with the Blockchain
Solving Real Business Problems with the Blockchain
 
Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0
 
Welcome to ZOCCAM
Welcome to ZOCCAMWelcome to ZOCCAM
Welcome to ZOCCAM
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
 
IMPLEMENTING AI & MACHINE LEARNING INTO ACCOUNTING
IMPLEMENTING AI & MACHINE LEARNING INTO ACCOUNTINGIMPLEMENTING AI & MACHINE LEARNING INTO ACCOUNTING
IMPLEMENTING AI & MACHINE LEARNING INTO ACCOUNTING
 
Credit Cards Tech and Threats: How Hackers Pay With Your Money [Stefano Amore...
Credit Cards Tech and Threats: How Hackers Pay With Your Money [Stefano Amore...Credit Cards Tech and Threats: How Hackers Pay With Your Money [Stefano Amore...
Credit Cards Tech and Threats: How Hackers Pay With Your Money [Stefano Amore...
 
Organizacion de las Tic - PÚBLICO
Organizacion de las Tic - PÚBLICOOrganizacion de las Tic - PÚBLICO
Organizacion de las Tic - PÚBLICO
 
iOS quick grab on XCTest XCUITest
iOS quick grab on XCTest XCUITestiOS quick grab on XCTest XCUITest
iOS quick grab on XCTest XCUITest
 
AUA Data Science Meetup
AUA Data Science MeetupAUA Data Science Meetup
AUA Data Science Meetup
 
Arte Online Madrid 2017: "Tecnología web para el mundo del arte" por Joe Elliot
Arte Online Madrid 2017: "Tecnología web para el mundo del arte" por Joe ElliotArte Online Madrid 2017: "Tecnología web para el mundo del arte" por Joe Elliot
Arte Online Madrid 2017: "Tecnología web para el mundo del arte" por Joe Elliot
 
Blockchain. The silent revolution.
Blockchain. The silent revolution.Blockchain. The silent revolution.
Blockchain. The silent revolution.
 

More from Gokul Alex

Blockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A ReviewBlockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A Review
Gokul Alex
 
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFDEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
Gokul Alex
 
Digital Innovation and Dynamics of Entrepreneurship
Digital Innovation and Dynamics of Entrepreneurship Digital Innovation and Dynamics of Entrepreneurship
Digital Innovation and Dynamics of Entrepreneurship
Gokul Alex
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An Introduction
Gokul Alex
 
R3Corda - Architecture Overview - Concepts and Components
R3Corda - Architecture Overview - Concepts and ComponentsR3Corda - Architecture Overview - Concepts and Components
R3Corda - Architecture Overview - Concepts and Components
Gokul Alex
 
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsCovid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Gokul Alex
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
Gokul Alex
 
Creative Careers for Post Pandemic Times
Creative Careers for Post Pandemic TimesCreative Careers for Post Pandemic Times
Creative Careers for Post Pandemic Times
Gokul Alex
 
Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020
Gokul Alex
 
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Gokul Alex
 
A Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic ConceptsA Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic Concepts
Gokul Alex
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital Transformation
Gokul Alex
 
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Gokul Alex
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies
Gokul Alex
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
Gokul Alex
 
Quantum Computing - A History in the Making
Quantum Computing - A History in the Making Quantum Computing - A History in the Making
Quantum Computing - A History in the Making
Gokul Alex
 
Future of Education through Exponential and Emerging Technologies
Future of Education through Exponential and Emerging TechnologiesFuture of Education through Exponential and Emerging Technologies
Future of Education through Exponential and Emerging Technologies
Gokul Alex
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
Gokul Alex
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business Models
Gokul Alex
 
Blockchain and Cryptography - A Primer
Blockchain and Cryptography - A PrimerBlockchain and Cryptography - A Primer
Blockchain and Cryptography - A Primer
Gokul Alex
 

More from Gokul Alex (20)

Blockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A ReviewBlockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A Review
 
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFDEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
 
Digital Innovation and Dynamics of Entrepreneurship
Digital Innovation and Dynamics of Entrepreneurship Digital Innovation and Dynamics of Entrepreneurship
Digital Innovation and Dynamics of Entrepreneurship
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An Introduction
 
R3Corda - Architecture Overview - Concepts and Components
R3Corda - Architecture Overview - Concepts and ComponentsR3Corda - Architecture Overview - Concepts and Components
R3Corda - Architecture Overview - Concepts and Components
 
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsCovid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Creative Careers for Post Pandemic Times
Creative Careers for Post Pandemic TimesCreative Careers for Post Pandemic Times
Creative Careers for Post Pandemic Times
 
Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020
 
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
 
A Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic ConceptsA Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic Concepts
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital Transformation
 
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Quantum Computing - A History in the Making
Quantum Computing - A History in the Making Quantum Computing - A History in the Making
Quantum Computing - A History in the Making
 
Future of Education through Exponential and Emerging Technologies
Future of Education through Exponential and Emerging TechnologiesFuture of Education through Exponential and Emerging Technologies
Future of Education through Exponential and Emerging Technologies
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business Models
 
Blockchain and Cryptography - A Primer
Blockchain and Cryptography - A PrimerBlockchain and Cryptography - A Primer
Blockchain and Cryptography - A Primer
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Blockchain Technology : Privacy Perspectives and Security Concerns

  • 1. B L O C K C H A I N P E R S P E C T I V E S I D E N T I T Y, P R I VA C Y, I N T E G R I T Y, C O N F I D E N T I A L I T Y A N D S E C U R I T Y
  • 2. B L O C K C H A I N C A N P R O T E C T T H E I D E N T I T Y O F T H E T R A N S A C T I N G PA R T I E S T H R O U G H T H E U S E O F P U B L I C A N D P R I VAT E K E Y C RY P T O G R A P H Y S E C U R I T Y A N D P R I VA C Y P R O T E C T I O N I N B L O C K C H A I N !
  • 3. B L O C K C H A I N I S D E S I G N E D T O P R O T E C T T H E I M M U TA B I L I T Y A N D F I N A L I T Y I N T R A N S A C T I O N S A N D I D E N T I T I E S S E C U R I T Y A N D P R I VA C Y P R O T E C T I O N I N B L O C K C H A I N !
  • 4. E M E R G I N G B L O C K C H A I N S E C U R I T Y H A R D E N I N G T E C H N I Q U E S • Zero Knowledge Proofs • Key Obfuscations • Ring Signatures • Transfer Functions • Deterministic Wallets
  • 5. B L O C K C H A I N C A N D E C E N T R A L I S E A N D M I T I G AT E T H E R I S K I N T H E C U R R E N T C E N T R A L I S E D S Y S T E M S . B L O C K C H A I N F O R P R I VA C Y A N D S E C U R I T Y E N F O R C E M E N T
  • 6. B L O C K C H A I N C A N P R O T E C T T H E E N D P O I N T S A N D D E V I C E S T H R O U G H S M A R T L O C K S A N D T H E C O M B I N AT I O N O F P U B L I C A N D P R I VAT E K E Y C RY P T O G R A P H Y A P P L I E D T H R O U G H C RY P T O G R A P H I C H A S H F U N C T I O N S B L O C K C H A I N F O R P R I VA C Y A N D S E C U R I T Y E N F O R C E M E N T
  • 7. C O N T E N T S E C U R I T Y C L O U D S E C U R I T Y N E T W O R K S E C U R I T Y D E V I C E S E C U R I T Y D ATA S E C U R I T Y D ATA G O V E R N A N C E A S P E C T S O F S E C U R I T Y
  • 8. I D E N T I T Y P R O T E C T I O N D ATA P R O T E C T I O N D E V I C E P R O T E C T I O N T R A N S A C T I O N A N O N Y M I T Y E N T I T L E M E N T S A S P E C T S O F P R I VA C Y
  • 9. B L O C K C H A I N S E C U R I T Y A R C H I T E C T U R E - D E S I G N C O N S I D E R AT I O N S • System Architecture • Layers and Tiers • On Chain and Off Chain components • Type of Ledger Access Control • Type of Consensus Protocol • Stakeholders
  • 10. P O LY S WA R M C E R T C O I N G U A R D T I M E M O B I L E C O I N H A C K E N . I O Q U A N T S TA M P B L O C K C H A I N B A S E D C Y B E R S E C U R I T Y C O M PA N I E S
  • 11. P O LY S WA R M In the PolySwarm marketplace, decentralising threat detection allows people from all over the world to participate. Being rewarded for submitting correct assertions also encourages experts to continue learning and innovating, allowing us to continually provide high-value cyber security.
  • 12. C E R T C O I N the creators of CertCoin have found a way to decentralize the certificate management process, removing middle-man authorities, and leveraging the distributed nature of the blockchain to create an auditable certification ledger, available to the public, without a single point of failure
  • 13. G U A R D T I M E Keyless Signature Structure (KSI) is the focus for GuardTime, who first began their work by helping the Estonian Government create a verifiable security system. Now, they work in a variety of industries to replace key-based data authentication by storing hashes of original files, data and the like on blockchain. When running hashing algorithms, they’re able to verify other copies of this information and compare results, allowing for quick discovery of manipulations.
  • 14. M O B I L E C O I N MobileCoin’s goal: to create a streamlined, private digital currency that’s both easy to use and allows for quick transactions from any mobile device. With a focus on privacy and ease-of-use, MobileCoin is using nodes to manage both the ledger and transaction validation. These operate on a fully updated copy of each currency’s blockchain, and will also handle all key management for users, ensuring total privacy, ease-of-use and speed. Finally, the nodes work in conjunction with the SGX enclaves to bolster security:
  • 15. Q U A N T S TA M P Quantstamp is the first scalable security audit protocol, used to uncover vulnerabilities in Ethereum smart contracts. In addition to security, Quantstamp is focused on making their service cost effective as well, which they believe is critical to the success of smart contract use in many industries.
  • 16. G D P R A N D B L O C K C H A I N • It is difficult to identify the processor of personal data • Information, including personal data is accessible to everyone • It is impossible to rectify / delete information contained on a Blockchain
  • 17. G D P R A N D B L O C K C H A I N • No personal data should be put on Blockchain directly • Metadata Management • Tracking Consent through provenance • Ensuring Deletion Request fulfilment • Consent Driven Smart Contracts • Consent Voting Consensus
  • 18. P R O M I S I N G S TA R T U P S • Block Armour • Civic • Datum • Evernym • GemOS • Gladius • Gospel Technology • Ledger • MaidSafe • NuCypher • Nuggets • Obsidian Platform
  • 19. B L O C K C H A I N S E C U R I T Y A R C H I T E C T U R E - I M P L E M E N TAT I O N P O V • Blockchain as a Business Architecture • Blockchain as an Application Architecture • Blockchain as a Platform Architecture • Blockchain as an Integration Architecture • Blockchain as an Infrastructure Architecture
  • 20. B L O C K C H A I N - O F F C H A I N C O M P O N E N T V U L N E R A B I L I T I E S • Oracles acting as an appointed trusted source providing real data to a blockchain • Applications that connect to the Blockchain via APIs • IoT Devices feeding data into an Oracle or an application • Inter-node messages that are not recorded on the ledger • Third Party Wallets and dApps
  • 21. B L O C K C H A I N - S M A R T C O N T R A C T V U L N E R A B I L I T I E S • Reentry Attacks • Trace Attacks • Overflow and Underflows • Visibility Modifiers • Delegate Calls