SlideShare a Scribd company logo
1 of 26
Download to read offline
Blockchain Technology
Introduction
Dr. Ramchandra Mangrulkar
Pre-requisite : Knowledge of
Information Security
Network Fundamentals
2/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Objectives
To understand emerging abstract models for Blockchain Technology and
its relevance with cryptography.
To Identify major research challenges and technical gaps existing between
theory and practice in crypto currency domain.
To provides conceptual understanding of the function of Blockchain as a
method of securing distributed ledgers, how consensus on their contents
is achieved, and the new applications that they enable.
Apply hyperledger Fabric and Etherum platform to implement the Block
chain Application.
3/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Outcomes : On completion of the course,
learner will be able to :
Acquire the basic knowledge of Blockchain technology.
Analyze various algorithms used in Blockchain.
Introduce about cryptocurrency and various regulations.
Aware about privacy and security issues in Blockchain.
Design and understand various applications using Blockchain and case
studies.
4/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Unit 1
Figure – Unit 1
5/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Blockchain
Blockchain is a digital, decentralized public ledger database where blocks are
linked cryptographically, and transactions are digitally signed and managed
using consensus model.
Blockchain is a shared, immutable ledger that facilitates the process of
recording transactions and tracking assets in a business network. An asset can
be tangible (a house, a car, cash, land) or intangible (intellectual property,
patents, copyrights, branding).
Blockchain is Distributed, Immutable Ledger which is completely Transparent.
6/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Blockchain is Disruption Technology
Disruption Technology 1
Figure – Music Journey
1. Disruptive technology is a technology that affects the way businesses, consumers, or
industries function.
7/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Blockchain Framework
Framework
8/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Block is... 2 3
Box / Container
A block is actually the building block or the key element of a blockchain.
Blocks contain transactions.
The number of transactions is limited by the block size and gas limit.
Generally, the block contains more than 500 transactions.
A block also consists of some metadata. This metadata is stored in the
header of the blockchain.
But data can be store anywhere
2. A genesis block is defined as the first block of a blockchain. For example, in the Bitcoin
blockchain, the genesis block represents the first block ever mined by its creator Satoshi
Nakamoto. This block, which contains 50 BTC, was mined over the course of six days in 2009.
This block is sometimes called block 0
3. https://en.bitcoin.it/wiki/Genesis_block
9/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Structure of Block
10/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Practical Block 4
4. https://www.blockchain.com/btc/block/752841
11/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Ledger is...
Encrypted form of Data
Military Grade of Encryption
Next to Impossible to Decryption
But data can be store anywhere
Ledger is a kind of Table (e.g. excel)
Ledger is store in the form of Blocks
Data can be used / mis used / abuse this data (Wrong Intention)
12/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Understanding Definition : Ledger
13/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Understanding Definition : Distributed, Transparent
14/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Distributed ...
Data can be used / misused / abuse this data (Wrong Intention)
To maintain Sanity of Data it is distributed
Amongst the members
Decentralization / Democracy
Sometime called as Node
Distributed among the nodes
15/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Transaction ...
Data need to Flow or Scale
X− > X + Y − > X + Y + Z
Network are permitted / public
Data added through Transactions
One node to many or Peer to Peer
Members started exchanging data ; everyone has the copy of same data
Transparency
Everyone has view and Access of Data
16/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Confirmation ...
Members can confirm data through validating the transactions
e.g. Voting (Voted in favor) called confirmation
Confirmation or Consensus
Members confirm right set of data
17/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Proof of Work ...
When Majority Confirm the Tx
Written proof about the Tx, called Proof of Work
Rest group members have validated.
Validated data and verified that data is not counterfeit
18/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Block Awards ...
Majority Participated in this Proof of Work
Nodes will get Rewarded (Block Rewards)
Because, every node contributes time,value,efforts to this ecosystem
19/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Why Blockchain
https://www.statista.com/topics/5122/blockchain/
#topicHeader__wrapper
20/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Why Blockchain
21/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Why Blockchain
22/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Applications of Blockchain
Product Tracking https://www.ledgerinsights.com/
switzerlands-largest-supermarket-blockchain-traceability/
Food Tracability https://www.ledgerinsights.com/
blockchain-food-traceability-nestle-carrefour-ibm/,
https://www.ledgerinsights.com/
supermarket-albert-heijn-blockchain-food-traceability/
Healthcare https://www.digitalauthority.me/resources/
blockchain-in-healthcare/
.
.
.
.
.
.
Smart Contract https://www.goodfirms.co/directory/services/
list-blockchain-technology-companies/
smart-contract-development
23/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Blockchain in Supply Chain Management
24/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Leaders
Ratan Tata https://timesofstartups.com/blockchain/
us-based-bitcoin-startup-abra-gets-funding-from-ratan-tata-ame
https://www.shippingandfreightresource.com/
indian-coffee-goes-the-blockchain-route/
https://analyticsindiamag.com/
reliance-industries-investment-in-blockchain-startup/
https://telecom.economictimes.indiatimes.com/news/
reliance-jio-to-install-worlds-largest-blockchain-network-sett
70641247
25/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
References
https://www.statista.com/topics/5122/blockchain/
#dossierContents__outerWrapper
https://www.cbinsights.com/research/
what-is-blockchain-technology/
26/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai

More Related Content

Similar to Blockchain#1.pdf

Blockchain_Technology.pptx
Blockchain_Technology.pptxBlockchain_Technology.pptx
Blockchain_Technology.pptxAmol997624
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET Journal
 
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...eraser Juan José Calderón
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET Journal
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptxJackTheMan1
 
1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.ppt1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.pptbansalvvinayak832
 
Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance VIJAY MUTHU
 
Blockchain Technology Overview
Blockchain Technology OverviewBlockchain Technology Overview
Blockchain Technology OverviewIRJET Journal
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek Jaiswal
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologySyedMahammad1
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyMahammad Syed
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techIT Strategy Group
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudShikhaKonda
 
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdfHow Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdfPeeterParkar
 
The Nuts and Bolts of Blockchain
The Nuts and Bolts of BlockchainThe Nuts and Bolts of Blockchain
The Nuts and Bolts of BlockchainCILIP
 
Blockchain Technology by : Ali H.Ahmed
Blockchain Technology  by :  Ali H.AhmedBlockchain Technology  by :  Ali H.Ahmed
Blockchain Technology by : Ali H.Ahmedalihassaah1994
 

Similar to Blockchain#1.pdf (20)

Blockchain_Technology.pptx
Blockchain_Technology.pptxBlockchain_Technology.pptx
Blockchain_Technology.pptx
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
 
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
Blockchain Computing: Prospects and Challenges for Digital Transformation  Pr...
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptx
 
1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.ppt1910990335_ppt on blockchain and its issue.ppt
1910990335_ppt on blockchain and its issue.ppt
 
Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
 
Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance
 
Blockchain Technology Overview
Blockchain Technology OverviewBlockchain Technology Overview
Blockchain Technology Overview
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
 
BLOCKCHAIN.pptx
 BLOCKCHAIN.pptx BLOCKCHAIN.pptx
BLOCKCHAIN.pptx
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia tech
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The Cloud
 
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdfHow Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
 
The Nuts and Bolts of Blockchain
The Nuts and Bolts of BlockchainThe Nuts and Bolts of Blockchain
The Nuts and Bolts of Blockchain
 
Blockchain Technology by : Ali H.Ahmed
Blockchain Technology  by :  Ali H.AhmedBlockchain Technology  by :  Ali H.Ahmed
Blockchain Technology by : Ali H.Ahmed
 
blockchain
blockchainblockchain
blockchain
 
Blockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptxBlockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptx
 

More from Dr. Ramchandra Mangrulkar

Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Dr. Ramchandra Mangrulkar
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Dr. Ramchandra Mangrulkar
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityDr. Ramchandra Mangrulkar
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part IDr. Ramchandra Mangrulkar
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity ManagementDr. Ramchandra Mangrulkar
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityDr. Ramchandra Mangrulkar
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityDr. Ramchandra Mangrulkar
 
Lecture #3: Defense Strategies and Techniques: Part II
 Lecture #3: Defense Strategies and Techniques: Part II Lecture #3: Defense Strategies and Techniques: Part II
Lecture #3: Defense Strategies and Techniques: Part IIDr. Ramchandra Mangrulkar
 

More from Dr. Ramchandra Mangrulkar (20)

Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
 
Lecture #3: Defense Strategies and Techniques: Part II
 Lecture #3: Defense Strategies and Techniques: Part II Lecture #3: Defense Strategies and Techniques: Part II
Lecture #3: Defense Strategies and Techniques: Part II
 

Recently uploaded

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

Blockchain#1.pdf

  • 2. Pre-requisite : Knowledge of Information Security Network Fundamentals 2/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 3. Objectives To understand emerging abstract models for Blockchain Technology and its relevance with cryptography. To Identify major research challenges and technical gaps existing between theory and practice in crypto currency domain. To provides conceptual understanding of the function of Blockchain as a method of securing distributed ledgers, how consensus on their contents is achieved, and the new applications that they enable. Apply hyperledger Fabric and Etherum platform to implement the Block chain Application. 3/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 4. Outcomes : On completion of the course, learner will be able to : Acquire the basic knowledge of Blockchain technology. Analyze various algorithms used in Blockchain. Introduce about cryptocurrency and various regulations. Aware about privacy and security issues in Blockchain. Design and understand various applications using Blockchain and case studies. 4/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 5. Unit 1 Figure – Unit 1 5/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 6. Blockchain Blockchain is a digital, decentralized public ledger database where blocks are linked cryptographically, and transactions are digitally signed and managed using consensus model. Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. An asset can be tangible (a house, a car, cash, land) or intangible (intellectual property, patents, copyrights, branding). Blockchain is Distributed, Immutable Ledger which is completely Transparent. 6/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 7. Blockchain is Disruption Technology Disruption Technology 1 Figure – Music Journey 1. Disruptive technology is a technology that affects the way businesses, consumers, or industries function. 7/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 8. Blockchain Framework Framework 8/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 9. Block is... 2 3 Box / Container A block is actually the building block or the key element of a blockchain. Blocks contain transactions. The number of transactions is limited by the block size and gas limit. Generally, the block contains more than 500 transactions. A block also consists of some metadata. This metadata is stored in the header of the blockchain. But data can be store anywhere 2. A genesis block is defined as the first block of a blockchain. For example, in the Bitcoin blockchain, the genesis block represents the first block ever mined by its creator Satoshi Nakamoto. This block, which contains 50 BTC, was mined over the course of six days in 2009. This block is sometimes called block 0 3. https://en.bitcoin.it/wiki/Genesis_block 9/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 10. Structure of Block 10/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 11. Practical Block 4 4. https://www.blockchain.com/btc/block/752841 11/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 12. Ledger is... Encrypted form of Data Military Grade of Encryption Next to Impossible to Decryption But data can be store anywhere Ledger is a kind of Table (e.g. excel) Ledger is store in the form of Blocks Data can be used / mis used / abuse this data (Wrong Intention) 12/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 13. Understanding Definition : Ledger 13/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 14. Understanding Definition : Distributed, Transparent 14/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 15. Distributed ... Data can be used / misused / abuse this data (Wrong Intention) To maintain Sanity of Data it is distributed Amongst the members Decentralization / Democracy Sometime called as Node Distributed among the nodes 15/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 16. Transaction ... Data need to Flow or Scale X− > X + Y − > X + Y + Z Network are permitted / public Data added through Transactions One node to many or Peer to Peer Members started exchanging data ; everyone has the copy of same data Transparency Everyone has view and Access of Data 16/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 17. Confirmation ... Members can confirm data through validating the transactions e.g. Voting (Voted in favor) called confirmation Confirmation or Consensus Members confirm right set of data 17/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 18. Proof of Work ... When Majority Confirm the Tx Written proof about the Tx, called Proof of Work Rest group members have validated. Validated data and verified that data is not counterfeit 18/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 19. Block Awards ... Majority Participated in this Proof of Work Nodes will get Rewarded (Block Rewards) Because, every node contributes time,value,efforts to this ecosystem 19/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 21. Why Blockchain 21/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 22. Why Blockchain 22/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 23. Applications of Blockchain Product Tracking https://www.ledgerinsights.com/ switzerlands-largest-supermarket-blockchain-traceability/ Food Tracability https://www.ledgerinsights.com/ blockchain-food-traceability-nestle-carrefour-ibm/, https://www.ledgerinsights.com/ supermarket-albert-heijn-blockchain-food-traceability/ Healthcare https://www.digitalauthority.me/resources/ blockchain-in-healthcare/ . . . . . . Smart Contract https://www.goodfirms.co/directory/services/ list-blockchain-technology-companies/ smart-contract-development 23/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 24. Blockchain in Supply Chain Management 24/26 07.09.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai