SlideShare a Scribd company logo
1 of 45
Is Hyperledger Fabric secure
enough for your Business?
Cybersecurity with Blockchain
HackIT 4.0, Kyiv
Name: Dejan Podgoršek
Company: IBM
Position: IBM Software Channel Technical Leader, CEE
https://www.linkedin.com/in/dejanpodgorsek
/
dejan.podgorsek@si.ibm.com
HackIT 4.0, Kyiv
Is Hyperledger Fabric secure
enough for your Business?
Cybersecurity with Blockchain
HackIT 4.0, Kyiv
Agenda
• About Blockchain
• Why Hyperledger Fabric (HLF) for Business
• Some Use Cases
--------------------------------------------------------------------
• Could Blockchain be a hacker’s dream come true?
• CIA and Blockchain Hyperledger Fabric
&
• How to protect your Blockchain APIs and HLF network
HackIT 4.0, Kyiv
HackIT 4.0, Kyiv
HackIT 4.0, Kyiv
7
What is Blockchain?
• A chain (sequence, typically a hash chain) of blocks of transactions
#234 #235 #236…#1
#0
Genesis
block
datastructure
Node A Node E
Node B Node D
Node C
Node F
Ledger
Ledger
Ledger
Ledger
Ledger
Ledger
Consensus
protocol ensures
ledger replicas
are identical*
network of (potentially)
untrusted nodes
© 2017 IBM Corporation
Functional requirements of blockchain for
business
9
• Append-only
• Shared through
replication
• Permissioned
• Business terms/logic
embedded on
blockchain
• Coded in high-level
programming
languages
• Ledger is the trusted
source of information
• Auditability
• Flexible trust models
• Confidentiality of
business logic, data
• Unlinkability of
transactions
Privacy
Shared ledger Smart
contrac
t
Trus
t
Key differentiating elements between blockchain protocols:
• Permission model (private vs. public)
• Consensus approach
• Smart contracts
• Extensibility & programmability
• APIs
• Scalability & latency
• Resource consumption
Multiple implementations of blockchain related protocols :
• Hyperleger Project @ Linux Foundation
• R3 Corda
• Ethereum
• Ripple
• Stellar
• Factom
• …and many more
There is not one blockchain protocol
10
IBM has a long provenance with
blockchain…
Aug 2015
IBM starts developing first prototype of blockchain technology (Open Blockchain); first client engagements
Feb 2016
IBM becomes a founding member of Linux Foundation Hyperledger; donates code and intellectual property
Jun 2016
IBM opens first blockchain garages for clients; Hyperledger Fabric v0.6 released
Dec 2016
Number of IBM blockchain client engagements now totals over 400
Feb 2017
First early program for Hyperledger Composer run in IBM Hursley
Jul 2017
Hyperledger Fabric v1.0 released
Aug 2017
IBM Blockchain Platform announced
© 2017 IBM Corporation
Premier Members
© 2017 IBM Corporation
members
HackIT 4.0, Kyiv
Overview of Hyperledger Fabric v1 – Design Goals
• Better reflect business processes by specifying who endorses transactions
• Support broader regulatory requirements for privacy and confidentiality
• Scale the number of participants and transaction throughput
• Eliminate non deterministic transactions
• Support rich data queries of the ledger
• Dynamically upgrade the network and chaincode
• Support for multiple credential and cryptographic services for identity
• Support for ”bring your own identity”
Open Governance
Anyone can join or contribute
Built from the ground up for enterprise
With a maturity model to help companies move to production
Performance
Supports up to 1000 tps*
Confidentiality and privacy
Built-in channels for isolation and membership services for signing and
encryption. Supports IBM Blockchain Platform.
Modularity and flexibility
Choice of consensus algorithms and programming languages
HackIT 4.0, Kyiv
Why Hyperledger Fabric?
16
Hyperledger Fabric V1 Architecture
Client
Application
SDK
(HFC)
Membership
Services
Peer
Endorser
Ledger
Committer
A
Chaincode B
!Events
Ordering-Service
O
O O
O

Fabric-CA

External-CA
Hyperledger Fabric Network
optionaloptional
17
Application proposes transaction
Endorsement policy:
• “E0, E1 and E2 must sign”
• (P3, P4 are not part of the policy)
Client application submits a transaction
proposal for Smart Contract A. It must
target the required peers {E0, E1, E2}
Sample transaction: Step 1/7 – Propose transaction
E0
E1
E2
Client
Application
S
D
K
Endorser Ledger
Committing
Peer
Application
Ordering Node
Smart Contract
(Chaincode)
Endorsement
Policy
Key:
Hyperledger Fabric Network
Ordering-Service
O
O O
OP
P4P3
A
B
A
B
A
B
A
D
18
Sample transaction: Step 2/7 – Execute proposal
Endorsers Execute Proposals
E0, E1 & E2 will each execute the
proposed transaction. None of these
executions will update the ledger
Each execution will capture the set of
Read and Written data, called RW sets,
which will now flow in the fabric.
Transactions can be signed & encrypted
Key:
Hyperledger Fabric Network
Ordering-Service
Endorser Ledger
Committing
Peer
Application
Ordering Node
Smart Contract
(Chaincode)
Endorsement
Policy
O
O O
O
E0
E1
E2
P
P4P3
A
B
A
B
A
B
A
D
Client
Application
S
D
K
19
Sample transaction: Step 3/7 – Proposal Response
Application receives responses
RW sets are asynchronously returned to
application
The RW sets are signed by each
endorser, and also includes each record
version number
(This information will be checked much
later in the consensus process)
Key:
Hyperledger Fabric Network
Ordering-Service
Endorser Ledger
Committing
Peer
Application
Ordering Node
Smart Contract
(Chaincode)
Endorsement
Policy
O
O O
O
E0
E1
E2
P
P4P3
A
B
A
B
A
B
A
D
Client
Application
S
D
K
20
Sample transaction: Step 4/7 – Order Transaction
Responses submitted for ordering
Application submits responses as a
transaction to be ordered.
Ordering happens across the fabric in
parallel with transactions submitted by
other applications
(other applications)
Key:
Hyperledger Fabric Network
Ordering-Service
Endorser Ledger
Committing
Peer
Application
Ordering Node
Smart Contract
(Chaincode)
Endorsement
Policy
O
O O
O
E0
E1
E2
P
P4P3
A
B
A
B
A
B
A
D
Client
Application
S
D
K
21
Hyperledger Fabric Network
Ordering-Service
Sample transaction: Step 5/7 – Deliver Transaction
Orderer delivers to committing peers
Ordering service collects transactions
into proposed blocks for distribution to
committing peers. Peers can deliver to
other peers in a hierarchy (not shown)
Different ordering algorithms available:
• SOLO (Single node, development)
• Kafka (Crash fault tolerance)
O
O O
O
*
Key:
Endorser Ledger
Committing
Peer
Application
Ordering Node
Smart Contract
(Chaincode)
Endorsement
Policy
E0
E1
E2
P
P4P3
A
B
A
B
A
B
A
D
Client
Application
S
D
K
22
Hyperledger Fabric Network
Ordering-Service
Sample transaction: Step 6/7 – Validate Transaction
Committing peers validate transactions
Every committing peer validates against
the endorsement policy. Also check RW
sets are still valid for current world state
Validated transactions are applied to the
world state and retained on the ledger
Invalid transactions are also retained on
the ledger but do not update world state
Endorser Ledger
Committing
Peer
Application
Ordering Node
Smart Contract
(Chaincode)
Endorsement
Policy
Key:
O
O O
O
E0
E1
E2
P
P4P3
A
B
A
B
A
B
A
D
Client
Application
S
D
K
* * *
*
*
23
Client
Application
S
D
K
Hyperledger Fabric Network
Ordering-Service
Sample transaction: Step 7/7 – Notify Transaction
Committing peers notify applications
Applications can register to be notified
when transactions succeed or fail, and
when blocks are added to the ledger
Applications will be notified by each peer
to which they are connected!
!
!
!
! !
Key:
Endorser Ledger
Committing
Peer
Application
Ordering Node
Smart Contract
(Chaincode)
Endorsement
Policy
O
O O
O
E0
E1
E2
P
P4P3
A
B
A
B
A
B
A
D
24
Ordering-Service
O
O O
O
Hyperledger Channels
Hyperledger Fabric Network
E0
E1
E2
E3
A
B
A
B
A
B
Peers finally instantiate the Chaincode on the channels they want to transact on:
$ peer chaincode instantiate ... –P ‘policy’
An Endorsement Policy is specified and once instantiated chaincode can process transactions.
HackIT 4.0, Kyiv
Blockchain with Confidentiality, Integrity and
Availability (CIA)
Confidentiality with Hyperledger Fabric
Attribute-based access control
support both chaincode and an entire fabric.
determine whether a user can execute any specific chaincode.
Hyperledger Fabric encryption literary
The smart contract can be configured to encrypt information or a subset of information in the
transaction.
This information will remain encrypted in the ledger with the key only being available to the
peer who is supposed to see and access it.
Chain Business Insights recently released a benchmark
survey of 42 supply chain professionals from companies
of various sizes and revenues, and more than a third of the
respondents indicated that they’re piloting or using
blockchain in their organizations. (A “1” in the chart below
signifies no knowledge of blockchain, whereas a “5”
signifies that the organization is already implementing the
technology.)
35.7% already implementing blockchain
27
Introducing IBM Food Trust
TM
built on Blockchain
technology
The IBM Food Trust solution is a set of modules
providing traceability to improve food transparency
and efficiency
Blockchain is used to create a trusted connection with
shared value for all ecosystem participants, including
end consumers
The solution offers connectors for interoperability and
leveraging existing standards (e.g., GS1)
Enterprise Ready leveraging the IBM Blockchain
Platform to provide enterprise level security and
scalability
28
Where are we on our journey?
Pork
Traceability /
safety
Mango
Traceability /
global trade
Onboarding agriculture,
ingredient suppliers, retailers,
CPGs, QSRs and others
2017 2018
Additional partners joined the IBM
Food Trust™ network, with growing
food data transactionsconducts traceability pilots
2016
Shipping platform: TradeLens
30
© 2017 IBM Corporation
Some examples by (selected) industry
31
Financial Public Sector Retail Insurance Manufacturing
• Trade Finance
• Cross currency
payments
• Mortgages
• Asset
Registration
• Citizen Identity
• Medical records
• Medicine supply
chain
• Supply chain
• Loyalty
programs
• Information
sharing (supplier
– retailer)
• Claims
processing
• Risk provenance
• Asset usage
history
• Claims file
• Supply chain
• Product parts
• Maintenance
tracking
© 2017 IBM Corporation
What makes a good blockchain use case?
Identifying a good blockchain use-case is not always easy!
However there should always be:
1. A business problem to be solved
• That cannot be more efficiently solved with other
technologies
2. An identifiable business network
• With Participants, Assets and Transactions
3. A need for trust
• Consensus, Immutability, Finality or Provenance
© 2017 IBM Corporation
IBM Hyperledger Fabric is built to provide private blockchain
solutions for industries as shown in the following diagram:
Is Hyperledger Fabric secure
enough for your Business?
Cybersecurity with Blockchain
HackIT 4.0, Kyiv
Agenda
• About Blockchain
• Why Hyperledger Fabric (HLF) for Business
• Some Use Cases
--------------------------------------------------------------------
• Could Blockchain be a hacker’s dream come true?
• CIA and Blockchain Hyperledger Fabric
&
• How to protect your Blockchain APIs and HLF network
HackIT 4.0, Kyiv
Motivation #1 = SNOOP
• Hackers love to break into systems and gain access to sensitive
information.
• … a breach will occur at some time & assuming the hacker gets
in.
• Transactions and Smart Contracts are encrypted with best-
in-class cryptography technology, and the information could
only be accessed via the cryptographic keys.
https://www.ibm.com/blogs/insights-on-business/government/hack-blockchain-dont-bother/
Could Blockchain be a hacker’s dream come true, or
just not worth the effort?
HackIT 4.0, Kyiv
Motivation #2 = DISRUPT
• Hackers like to mess up business networks by
• modifying the underlying blockchain fabric (aka plumbing),
• corrupting transactions committed to the blockchain or
• modifying the Smart Contract.
• Hyperledger Fabric is open source.
• Malicious code modification attempts are quickly spotted, never make it to
verified code releases.
• Each block in the blockchain contains a digital fingerprint (#hash) of the contents
of the previous block, so rendering modification is impossible – “immutability”.
• Smart Contracts are also cryptographically protected and rendering modification
is a virtually impossible.
• If one network node is compromised, it would be quickly detected and rectified.
Could Blockchain be a hacker’s dream come true, or
just not worth the effort?
https://www.ibm.com/blogs/insights-on-business/government/hack-blockchain-dont-bother/
HackIT 4.0, Kyiv
Could Blockchain be a hacker’s dream come true, or
just not worth the effort?
Motivation #3 – DENY
• If the hacker can’t disrupt the business network, maybe he can
deny the participants access to their critical information systems.
• Mitigation approaches here are infrastructure dependent, and
protection methods against the many forms of denial of
service attack are well documented.
• The distributed nature of the shared ledger adds to the
overall resilience of the business network.
https://www.ibm.com/blogs/insights-on-business/government/hack-blockchain-dont-bother/
HackIT 4.0, Kyiv
SOLUTION:
Attribute-based access control
support both chaincode and an entire fabric.
determine whether a user can execute any specific chaincode.
Hyperledger Fabric encryption literary:
The smart contract can encrypt information or a subset of
information in the transaction.
This information will remain encrypted in the ledger with the key
only being available to the peer who is supposed to see and
access it.
CIA: Achieving confidentiality with Hyperledger
Fabric
Sources: https://www.packtpub.com/networking-and-servers/hands-cybersecurity-blockchain
http://composer-playground.mybluemix.net/
HackIT 4.0, Kyiv
Integrity is a way of avoiding any tampering of data.
Blockchain uses cryptographic hashing to ensure that the ledger remains tamper-
proof.
It is impossible to get the data back from the hash result or from the
message digest.
In Hyperledger Fabric, Committing a peer always validates the new block
before adding it to the ledger.
In case a peer is hacked means, that the block may get compromised from the
ledger.
SOLUTION:
To verifying chain integrity, each peer periodically validates its
blockchain and asks the peer to recheck whether a broken block is
detected.
Function: CheckChainIntegrity()
CIA: Achieving integrity with Hyperledger Fabric
Source: https://www.packtpub.com/networking-and-servers/hands-cybersecurity-blockchain
HackIT 4.0, Kyiv
Cyberattacks such as DDoS cause huge disruption to internet services and result
in websites becoming inaccessible
The decentralization nature of blockchain makes it harder to disrupt these
applications.
SOLUTION: No single point of failure
Even if one node in the blockchain goes down, the information can be
accessed and used by the rest of the nodes in the network. As all of the
nodes keep the exact copy of the ledger, it will always be up-to-date.
All of the nodes in the network are logically decentralized with their
ledger, and there is a zero probability of system failure.
CIA: Achieving availiability with Hyperledger
Fabric
Source: https://www.packtpub.com/networking-and-servers/hands-cybersecurity-blockchain
API
API
API
How to protect your Blockchain APIs and HLF network
ACME’s Enterprise
API Gateway & Management
(rate limiting, security, monitoring, permissions,
version management, etc)
A mutually beneficial ecosystem of suppliers &
consumers of APIs.
• Suppliers use APIs to securely provide
specific types of access to sensitive data (e.g.
an API to “Track my package” from ACME)
• Consumers call these API’s from their apps
to make them more useful (e.g. E-Retailer
building a package tracking panel into their
Order Status screen)
Order status
Order# 13593
Shipping status
Shipped on: 1/26/16
Currently in: Atlanta, GA
Estimated delivery: 1/31/16
E-Retailer
Mobile app
ACME
Shipping
ACME Firewall
view status at ACME.com
API
Hyperledger
Fabric Network
Ordering
-Service
O
O O
O
Advanced Threat
Detection
Insider Threat
Securing the
Cloud
Risk and Vuln
Management
Critical Data
Protection
Compliance
Incident
Response
How to protect your Blockchain APIs and HLF network
To effectively detect
threat, a broad
range of analytics
capabilities are
required, from
search, correlation
baselining, threat
intelligence,
machine learning,
and cognitive
analytics
Mind:
More than half of
data breaches
are caused by
insiders
SIEM apps/solutions are essential for success
HackIT 4.0, Kyiv
Or just run it on IBM Cloud as IBM Blockchain as a Service
Protect your new business model against malware and insider attacks with the highest
level of blockchain security available.
https://www.ibm.com/blockchain/platform
Blockchain
Cyber security
HackIT 4.0, Kyiv
Sources:
https://developer.ibm.com/technologies/blockchain/
https://www.ibm.com/blogs/insights-on-business/government/hack-blockchain-dont-bother/
https://www.ibm.com/blogs/insights-on-business/government/convergence-blockchain-cybersecurity/
and
https://www.packtpub.com/networking-and-servers/hands-cybersecurity-blockchain

More Related Content

What's hot

Hyperledger fabric 20180528
Hyperledger fabric 20180528Hyperledger fabric 20180528
Hyperledger fabric 20180528Arnaud Le Hors
 
Hyperledger Composer
Hyperledger ComposerHyperledger Composer
Hyperledger ComposerRihusoft
 
Hyperledger community update Feb 20, 2018
Hyperledger community update Feb 20, 2018Hyperledger community update Feb 20, 2018
Hyperledger community update Feb 20, 2018Arnaud Le Hors
 
Introduction of Hyperledger Fabric & Composer
Introduction of Hyperledger Fabric & Composer Introduction of Hyperledger Fabric & Composer
Introduction of Hyperledger Fabric & Composer Dr. Ketan Parmar
 
Hyperledger Fabric - Blockchain, sushi and supply chain
Hyperledger Fabric - Blockchain, sushi and supply chain    Hyperledger Fabric - Blockchain, sushi and supply chain
Hyperledger Fabric - Blockchain, sushi and supply chain Grant Steinfeld
 
Hyperledger community update February 2018
Hyperledger  community update   February 2018Hyperledger  community update   February 2018
Hyperledger community update February 2018Christopher Ferris
 
MeetUp: Kerberos - Protocol for Authentication & Authorization @Criteo
MeetUp: Kerberos - Protocol for Authentication & Authorization @CriteoMeetUp: Kerberos - Protocol for Authentication & Authorization @Criteo
MeetUp: Kerberos - Protocol for Authentication & Authorization @CriteoGilles Legoux
 
IBM presents: Hyperledger Fabric Hands On Workshop - part 1
IBM presents: Hyperledger Fabric Hands On Workshop - part 1IBM presents: Hyperledger Fabric Hands On Workshop - part 1
IBM presents: Hyperledger Fabric Hands On Workshop - part 1Grant Steinfeld
 
Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618Arnaud Le Hors
 
Hyperledger Overview - 20181024
Hyperledger Overview - 20181024Hyperledger Overview - 20181024
Hyperledger Overview - 20181024Arnaud Le Hors
 
Hyperledger community update 201805
Hyperledger community update 201805Hyperledger community update 201805
Hyperledger community update 201805Arnaud Le Hors
 
Blockchain, 
Hyperledger fabric & Hyperledger cello
Blockchain, 
Hyperledger fabric & Hyperledger celloBlockchain, 
Hyperledger fabric & Hyperledger cello
Blockchain, 
Hyperledger fabric & Hyperledger celloSahdev Zala
 
Hyperledger Fabric and Tools
Hyperledger Fabric and ToolsHyperledger Fabric and Tools
Hyperledger Fabric and ToolsRihusoft
 
Hyperledger Composer architecture
Hyperledger Composer architectureHyperledger Composer architecture
Hyperledger Composer architectureSimon Stone
 
Bitmark and Hyperledger Workshop: the Digital Assets and Property
Bitmark and Hyperledger Workshop: the Digital Assets and PropertyBitmark and Hyperledger Workshop: the Digital Assets and Property
Bitmark and Hyperledger Workshop: the Digital Assets and PropertyJollen Chen
 
Tech Job Conference: Software Engineer @Criteo
Tech Job Conference: Software Engineer @CriteoTech Job Conference: Software Engineer @Criteo
Tech Job Conference: Software Engineer @CriteoGilles Legoux
 

What's hot (20)

Hyperledger fabric 20180528
Hyperledger fabric 20180528Hyperledger fabric 20180528
Hyperledger fabric 20180528
 
Hyperledger Composer
Hyperledger ComposerHyperledger Composer
Hyperledger Composer
 
Hyperledger community update Feb 20, 2018
Hyperledger community update Feb 20, 2018Hyperledger community update Feb 20, 2018
Hyperledger community update Feb 20, 2018
 
Introduction of Hyperledger Fabric & Composer
Introduction of Hyperledger Fabric & Composer Introduction of Hyperledger Fabric & Composer
Introduction of Hyperledger Fabric & Composer
 
IBM Blockchain Overview
IBM Blockchain OverviewIBM Blockchain Overview
IBM Blockchain Overview
 
Hyperledger Fabric
Hyperledger FabricHyperledger Fabric
Hyperledger Fabric
 
Hyperledger Fabric - Blockchain, sushi and supply chain
Hyperledger Fabric - Blockchain, sushi and supply chain    Hyperledger Fabric - Blockchain, sushi and supply chain
Hyperledger Fabric - Blockchain, sushi and supply chain
 
Hyperledger community update February 2018
Hyperledger  community update   February 2018Hyperledger  community update   February 2018
Hyperledger community update February 2018
 
MeetUp: Kerberos - Protocol for Authentication & Authorization @Criteo
MeetUp: Kerberos - Protocol for Authentication & Authorization @CriteoMeetUp: Kerberos - Protocol for Authentication & Authorization @Criteo
MeetUp: Kerberos - Protocol for Authentication & Authorization @Criteo
 
IBM presents: Hyperledger Fabric Hands On Workshop - part 1
IBM presents: Hyperledger Fabric Hands On Workshop - part 1IBM presents: Hyperledger Fabric Hands On Workshop - part 1
IBM presents: Hyperledger Fabric Hands On Workshop - part 1
 
Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618
 
Hyperledger Overview - 20181024
Hyperledger Overview - 20181024Hyperledger Overview - 20181024
Hyperledger Overview - 20181024
 
Hyperledger
HyperledgerHyperledger
Hyperledger
 
Hyperledger community update 201805
Hyperledger community update 201805Hyperledger community update 201805
Hyperledger community update 201805
 
Blockchain, 
Hyperledger fabric & Hyperledger cello
Blockchain, 
Hyperledger fabric & Hyperledger celloBlockchain, 
Hyperledger fabric & Hyperledger cello
Blockchain, 
Hyperledger fabric & Hyperledger cello
 
Hyperledger
HyperledgerHyperledger
Hyperledger
 
Hyperledger Fabric and Tools
Hyperledger Fabric and ToolsHyperledger Fabric and Tools
Hyperledger Fabric and Tools
 
Hyperledger Composer architecture
Hyperledger Composer architectureHyperledger Composer architecture
Hyperledger Composer architecture
 
Bitmark and Hyperledger Workshop: the Digital Assets and Property
Bitmark and Hyperledger Workshop: the Digital Assets and PropertyBitmark and Hyperledger Workshop: the Digital Assets and Property
Bitmark and Hyperledger Workshop: the Digital Assets and Property
 
Tech Job Conference: Software Engineer @Criteo
Tech Job Conference: Software Engineer @CriteoTech Job Conference: Software Engineer @Criteo
Tech Job Conference: Software Engineer @Criteo
 

Similar to Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?

Wwc developing hyperledger applications v4
Wwc  developing hyperledger applications v4Wwc  developing hyperledger applications v4
Wwc developing hyperledger applications v4LennartF
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored IBM Sverige
 
Distributed:Health Code Camp Hyperledger
Distributed:Health Code Camp HyperledgerDistributed:Health Code Camp Hyperledger
Distributed:Health Code Camp HyperledgerTracy Kuhrt
 
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발 [Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발 Yunho Maeng
 
Blockchain, Hyperledger and the Oracle Blockchain Platform
Blockchain, Hyperledger and the Oracle Blockchain PlatformBlockchain, Hyperledger and the Oracle Blockchain Platform
Blockchain, Hyperledger and the Oracle Blockchain PlatformJuarez Junior
 
Hyperledger & blockchain meetup - Milano 23.10.2019
Hyperledger & blockchain meetup - Milano 23.10.2019Hyperledger & blockchain meetup - Milano 23.10.2019
Hyperledger & blockchain meetup - Milano 23.10.2019Carlo Ferrarini
 
IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0Matt Lucas
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for BusinessAhmad Gohar
 
How to Build a Decentralized Blockchain App with the Oracle Blockchain Platform
How to Build a Decentralized BlockchainApp with the Oracle Blockchain PlatformHow to Build a Decentralized BlockchainApp with the Oracle Blockchain Platform
How to Build a Decentralized Blockchain App with the Oracle Blockchain PlatformJuarez Junior
 
Introduction to Hyperledger Composer
Introduction to Hyperledger ComposerIntroduction to Hyperledger Composer
Introduction to Hyperledger ComposerSimon Stone
 
Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar] Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar] Kaleido
 
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsGluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsDuncan Johnston-Watt
 
Hyperledger community update 20180528
Hyperledger community update 20180528Hyperledger community update 20180528
Hyperledger community update 20180528Arnaud Le Hors
 
Oracle Blockchain Experience Day
Oracle Blockchain Experience DayOracle Blockchain Experience Day
Oracle Blockchain Experience DayJuarez Junior
 
hyperledger-chaincode & hyperl fabric.pptx
hyperledger-chaincode & hyperl fabric.pptxhyperledger-chaincode & hyperl fabric.pptx
hyperledger-chaincode & hyperl fabric.pptxdeepaksingh160910
 
blockchain unit 3
blockchain unit 3blockchain unit 3
blockchain unit 3Rohit Verma
 
Wwc developing hyperledger applications v4
Wwc  developing hyperledger applications v4Wwc  developing hyperledger applications v4
Wwc developing hyperledger applications v4LennartF
 
Wwc developing hyperledger applications v2
Wwc  developing hyperledger applications v2Wwc  developing hyperledger applications v2
Wwc developing hyperledger applications v2LennartF
 
Ibm blockchain - Hyperledger 15.02.18
Ibm blockchain - Hyperledger 15.02.18Ibm blockchain - Hyperledger 15.02.18
Ibm blockchain - Hyperledger 15.02.18TelecomValley
 

Similar to Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business? (20)

Wwc developing hyperledger applications v4
Wwc  developing hyperledger applications v4Wwc  developing hyperledger applications v4
Wwc developing hyperledger applications v4
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Distributed:Health Code Camp Hyperledger
Distributed:Health Code Camp HyperledgerDistributed:Health Code Camp Hyperledger
Distributed:Health Code Camp Hyperledger
 
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발 [Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
 
Blockchain, Hyperledger and the Oracle Blockchain Platform
Blockchain, Hyperledger and the Oracle Blockchain PlatformBlockchain, Hyperledger and the Oracle Blockchain Platform
Blockchain, Hyperledger and the Oracle Blockchain Platform
 
Hyperledger & blockchain meetup - Milano 23.10.2019
Hyperledger & blockchain meetup - Milano 23.10.2019Hyperledger & blockchain meetup - Milano 23.10.2019
Hyperledger & blockchain meetup - Milano 23.10.2019
 
IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
 
How to Build a Decentralized Blockchain App with the Oracle Blockchain Platform
How to Build a Decentralized BlockchainApp with the Oracle Blockchain PlatformHow to Build a Decentralized BlockchainApp with the Oracle Blockchain Platform
How to Build a Decentralized Blockchain App with the Oracle Blockchain Platform
 
Introduction to Hyperledger Composer
Introduction to Hyperledger ComposerIntroduction to Hyperledger Composer
Introduction to Hyperledger Composer
 
Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar] Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar]
 
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsGluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
 
Hyperledger community update 20180528
Hyperledger community update 20180528Hyperledger community update 20180528
Hyperledger community update 20180528
 
Oracle Blockchain Experience Day
Oracle Blockchain Experience DayOracle Blockchain Experience Day
Oracle Blockchain Experience Day
 
Hyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community UpdateHyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community Update
 
hyperledger-chaincode & hyperl fabric.pptx
hyperledger-chaincode & hyperl fabric.pptxhyperledger-chaincode & hyperl fabric.pptx
hyperledger-chaincode & hyperl fabric.pptx
 
blockchain unit 3
blockchain unit 3blockchain unit 3
blockchain unit 3
 
Wwc developing hyperledger applications v4
Wwc  developing hyperledger applications v4Wwc  developing hyperledger applications v4
Wwc developing hyperledger applications v4
 
Wwc developing hyperledger applications v2
Wwc  developing hyperledger applications v2Wwc  developing hyperledger applications v2
Wwc developing hyperledger applications v2
 
Ibm blockchain - Hyperledger 15.02.18
Ibm blockchain - Hyperledger 15.02.18Ibm blockchain - Hyperledger 15.02.18
Ibm blockchain - Hyperledger 15.02.18
 

More from Hacken_Ecosystem

Peter Todd - Hardware Wallets - Threats and Vulnerabilities
Peter Todd - Hardware Wallets - Threats and VulnerabilitiesPeter Todd - Hardware Wallets - Threats and Vulnerabilities
Peter Todd - Hardware Wallets - Threats and VulnerabilitiesHacken_Ecosystem
 
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT TechniquesSeyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT TechniquesHacken_Ecosystem
 
Walter Belgers - Lockpicking and IT security
Walter Belgers - Lockpicking and IT securityWalter Belgers - Lockpicking and IT security
Walter Belgers - Lockpicking and IT securityHacken_Ecosystem
 
Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Hacken_Ecosystem
 
Tomi Wen - The Blockchain Built for Real World Apps
Tomi Wen - The Blockchain Built for Real World AppsTomi Wen - The Blockchain Built for Real World Apps
Tomi Wen - The Blockchain Built for Real World AppsHacken_Ecosystem
 
Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?
Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?
Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?Hacken_Ecosystem
 
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...Hacken_Ecosystem
 
John Graham-Cumming - Helping to build a better Internet
John Graham-Cumming - Helping to build a better InternetJohn Graham-Cumming - Helping to build a better Internet
John Graham-Cumming - Helping to build a better InternetHacken_Ecosystem
 
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...Hacken_Ecosystem
 
Max Keidun - How to build a Bitcoin exchange and not burn in hell
Max Keidun - How to build a Bitcoin exchange and not burn in hellMax Keidun - How to build a Bitcoin exchange and not burn in hell
Max Keidun - How to build a Bitcoin exchange and not burn in hellHacken_Ecosystem
 
Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”
Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”
Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”Hacken_Ecosystem
 
Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings...
Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings...Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings...
Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings...Hacken_Ecosystem
 
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""Hacken_Ecosystem
 

More from Hacken_Ecosystem (13)

Peter Todd - Hardware Wallets - Threats and Vulnerabilities
Peter Todd - Hardware Wallets - Threats and VulnerabilitiesPeter Todd - Hardware Wallets - Threats and Vulnerabilities
Peter Todd - Hardware Wallets - Threats and Vulnerabilities
 
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT TechniquesSeyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
 
Walter Belgers - Lockpicking and IT security
Walter Belgers - Lockpicking and IT securityWalter Belgers - Lockpicking and IT security
Walter Belgers - Lockpicking and IT security
 
Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?
 
Tomi Wen - The Blockchain Built for Real World Apps
Tomi Wen - The Blockchain Built for Real World AppsTomi Wen - The Blockchain Built for Real World Apps
Tomi Wen - The Blockchain Built for Real World Apps
 
Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?
Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?
Renaud Lifchitz - Blockchain decentralized apps: the future of malwares?
 
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
 
John Graham-Cumming - Helping to build a better Internet
John Graham-Cumming - Helping to build a better InternetJohn Graham-Cumming - Helping to build a better Internet
John Graham-Cumming - Helping to build a better Internet
 
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...
 
Max Keidun - How to build a Bitcoin exchange and not burn in hell
Max Keidun - How to build a Bitcoin exchange and not burn in hellMax Keidun - How to build a Bitcoin exchange and not burn in hell
Max Keidun - How to build a Bitcoin exchange and not burn in hell
 
Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”
Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”
Ryan Stortz & Sophia D'Antoine - “EVM2VEC: Bug Discovery in Smart Contracts”
 
Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings...
Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings...Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings...
Brian Gorenc on the topic “Modern Day Entomology - Examing the Inner Workings...
 
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI""
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?

  • 1. Is Hyperledger Fabric secure enough for your Business? Cybersecurity with Blockchain HackIT 4.0, Kyiv
  • 2. Name: Dejan Podgoršek Company: IBM Position: IBM Software Channel Technical Leader, CEE https://www.linkedin.com/in/dejanpodgorsek / dejan.podgorsek@si.ibm.com HackIT 4.0, Kyiv
  • 3. Is Hyperledger Fabric secure enough for your Business? Cybersecurity with Blockchain HackIT 4.0, Kyiv Agenda • About Blockchain • Why Hyperledger Fabric (HLF) for Business • Some Use Cases -------------------------------------------------------------------- • Could Blockchain be a hacker’s dream come true? • CIA and Blockchain Hyperledger Fabric & • How to protect your Blockchain APIs and HLF network
  • 7. 7
  • 8. What is Blockchain? • A chain (sequence, typically a hash chain) of blocks of transactions #234 #235 #236…#1 #0 Genesis block datastructure Node A Node E Node B Node D Node C Node F Ledger Ledger Ledger Ledger Ledger Ledger Consensus protocol ensures ledger replicas are identical* network of (potentially) untrusted nodes
  • 9. © 2017 IBM Corporation Functional requirements of blockchain for business 9 • Append-only • Shared through replication • Permissioned • Business terms/logic embedded on blockchain • Coded in high-level programming languages • Ledger is the trusted source of information • Auditability • Flexible trust models • Confidentiality of business logic, data • Unlinkability of transactions Privacy Shared ledger Smart contrac t Trus t
  • 10. Key differentiating elements between blockchain protocols: • Permission model (private vs. public) • Consensus approach • Smart contracts • Extensibility & programmability • APIs • Scalability & latency • Resource consumption Multiple implementations of blockchain related protocols : • Hyperleger Project @ Linux Foundation • R3 Corda • Ethereum • Ripple • Stellar • Factom • …and many more There is not one blockchain protocol 10
  • 11. IBM has a long provenance with blockchain… Aug 2015 IBM starts developing first prototype of blockchain technology (Open Blockchain); first client engagements Feb 2016 IBM becomes a founding member of Linux Foundation Hyperledger; donates code and intellectual property Jun 2016 IBM opens first blockchain garages for clients; Hyperledger Fabric v0.6 released Dec 2016 Number of IBM blockchain client engagements now totals over 400 Feb 2017 First early program for Hyperledger Composer run in IBM Hursley Jul 2017 Hyperledger Fabric v1.0 released Aug 2017 IBM Blockchain Platform announced
  • 12. © 2017 IBM Corporation Premier Members
  • 13. © 2017 IBM Corporation members
  • 14. HackIT 4.0, Kyiv Overview of Hyperledger Fabric v1 – Design Goals • Better reflect business processes by specifying who endorses transactions • Support broader regulatory requirements for privacy and confidentiality • Scale the number of participants and transaction throughput • Eliminate non deterministic transactions • Support rich data queries of the ledger • Dynamically upgrade the network and chaincode • Support for multiple credential and cryptographic services for identity • Support for ”bring your own identity”
  • 15. Open Governance Anyone can join or contribute Built from the ground up for enterprise With a maturity model to help companies move to production Performance Supports up to 1000 tps* Confidentiality and privacy Built-in channels for isolation and membership services for signing and encryption. Supports IBM Blockchain Platform. Modularity and flexibility Choice of consensus algorithms and programming languages HackIT 4.0, Kyiv Why Hyperledger Fabric?
  • 16. 16 Hyperledger Fabric V1 Architecture Client Application SDK (HFC) Membership Services Peer Endorser Ledger Committer A Chaincode B !Events Ordering-Service O O O O  Fabric-CA  External-CA Hyperledger Fabric Network optionaloptional
  • 17. 17 Application proposes transaction Endorsement policy: • “E0, E1 and E2 must sign” • (P3, P4 are not part of the policy) Client application submits a transaction proposal for Smart Contract A. It must target the required peers {E0, E1, E2} Sample transaction: Step 1/7 – Propose transaction E0 E1 E2 Client Application S D K Endorser Ledger Committing Peer Application Ordering Node Smart Contract (Chaincode) Endorsement Policy Key: Hyperledger Fabric Network Ordering-Service O O O OP P4P3 A B A B A B A D
  • 18. 18 Sample transaction: Step 2/7 – Execute proposal Endorsers Execute Proposals E0, E1 & E2 will each execute the proposed transaction. None of these executions will update the ledger Each execution will capture the set of Read and Written data, called RW sets, which will now flow in the fabric. Transactions can be signed & encrypted Key: Hyperledger Fabric Network Ordering-Service Endorser Ledger Committing Peer Application Ordering Node Smart Contract (Chaincode) Endorsement Policy O O O O E0 E1 E2 P P4P3 A B A B A B A D Client Application S D K
  • 19. 19 Sample transaction: Step 3/7 – Proposal Response Application receives responses RW sets are asynchronously returned to application The RW sets are signed by each endorser, and also includes each record version number (This information will be checked much later in the consensus process) Key: Hyperledger Fabric Network Ordering-Service Endorser Ledger Committing Peer Application Ordering Node Smart Contract (Chaincode) Endorsement Policy O O O O E0 E1 E2 P P4P3 A B A B A B A D Client Application S D K
  • 20. 20 Sample transaction: Step 4/7 – Order Transaction Responses submitted for ordering Application submits responses as a transaction to be ordered. Ordering happens across the fabric in parallel with transactions submitted by other applications (other applications) Key: Hyperledger Fabric Network Ordering-Service Endorser Ledger Committing Peer Application Ordering Node Smart Contract (Chaincode) Endorsement Policy O O O O E0 E1 E2 P P4P3 A B A B A B A D Client Application S D K
  • 21. 21 Hyperledger Fabric Network Ordering-Service Sample transaction: Step 5/7 – Deliver Transaction Orderer delivers to committing peers Ordering service collects transactions into proposed blocks for distribution to committing peers. Peers can deliver to other peers in a hierarchy (not shown) Different ordering algorithms available: • SOLO (Single node, development) • Kafka (Crash fault tolerance) O O O O * Key: Endorser Ledger Committing Peer Application Ordering Node Smart Contract (Chaincode) Endorsement Policy E0 E1 E2 P P4P3 A B A B A B A D Client Application S D K
  • 22. 22 Hyperledger Fabric Network Ordering-Service Sample transaction: Step 6/7 – Validate Transaction Committing peers validate transactions Every committing peer validates against the endorsement policy. Also check RW sets are still valid for current world state Validated transactions are applied to the world state and retained on the ledger Invalid transactions are also retained on the ledger but do not update world state Endorser Ledger Committing Peer Application Ordering Node Smart Contract (Chaincode) Endorsement Policy Key: O O O O E0 E1 E2 P P4P3 A B A B A B A D Client Application S D K * * * * *
  • 23. 23 Client Application S D K Hyperledger Fabric Network Ordering-Service Sample transaction: Step 7/7 – Notify Transaction Committing peers notify applications Applications can register to be notified when transactions succeed or fail, and when blocks are added to the ledger Applications will be notified by each peer to which they are connected! ! ! ! ! ! Key: Endorser Ledger Committing Peer Application Ordering Node Smart Contract (Chaincode) Endorsement Policy O O O O E0 E1 E2 P P4P3 A B A B A B A D
  • 24. 24 Ordering-Service O O O O Hyperledger Channels Hyperledger Fabric Network E0 E1 E2 E3 A B A B A B Peers finally instantiate the Chaincode on the channels they want to transact on: $ peer chaincode instantiate ... –P ‘policy’ An Endorsement Policy is specified and once instantiated chaincode can process transactions.
  • 25. HackIT 4.0, Kyiv Blockchain with Confidentiality, Integrity and Availability (CIA) Confidentiality with Hyperledger Fabric Attribute-based access control support both chaincode and an entire fabric. determine whether a user can execute any specific chaincode. Hyperledger Fabric encryption literary The smart contract can be configured to encrypt information or a subset of information in the transaction. This information will remain encrypted in the ledger with the key only being available to the peer who is supposed to see and access it.
  • 26. Chain Business Insights recently released a benchmark survey of 42 supply chain professionals from companies of various sizes and revenues, and more than a third of the respondents indicated that they’re piloting or using blockchain in their organizations. (A “1” in the chart below signifies no knowledge of blockchain, whereas a “5” signifies that the organization is already implementing the technology.) 35.7% already implementing blockchain
  • 27. 27 Introducing IBM Food Trust TM built on Blockchain technology The IBM Food Trust solution is a set of modules providing traceability to improve food transparency and efficiency Blockchain is used to create a trusted connection with shared value for all ecosystem participants, including end consumers The solution offers connectors for interoperability and leveraging existing standards (e.g., GS1) Enterprise Ready leveraging the IBM Blockchain Platform to provide enterprise level security and scalability
  • 28. 28 Where are we on our journey? Pork Traceability / safety Mango Traceability / global trade Onboarding agriculture, ingredient suppliers, retailers, CPGs, QSRs and others 2017 2018 Additional partners joined the IBM Food Trust™ network, with growing food data transactionsconducts traceability pilots 2016
  • 30. 30
  • 31. © 2017 IBM Corporation Some examples by (selected) industry 31 Financial Public Sector Retail Insurance Manufacturing • Trade Finance • Cross currency payments • Mortgages • Asset Registration • Citizen Identity • Medical records • Medicine supply chain • Supply chain • Loyalty programs • Information sharing (supplier – retailer) • Claims processing • Risk provenance • Asset usage history • Claims file • Supply chain • Product parts • Maintenance tracking
  • 32. © 2017 IBM Corporation What makes a good blockchain use case? Identifying a good blockchain use-case is not always easy! However there should always be: 1. A business problem to be solved • That cannot be more efficiently solved with other technologies 2. An identifiable business network • With Participants, Assets and Transactions 3. A need for trust • Consensus, Immutability, Finality or Provenance
  • 33. © 2017 IBM Corporation IBM Hyperledger Fabric is built to provide private blockchain solutions for industries as shown in the following diagram:
  • 34. Is Hyperledger Fabric secure enough for your Business? Cybersecurity with Blockchain HackIT 4.0, Kyiv Agenda • About Blockchain • Why Hyperledger Fabric (HLF) for Business • Some Use Cases -------------------------------------------------------------------- • Could Blockchain be a hacker’s dream come true? • CIA and Blockchain Hyperledger Fabric & • How to protect your Blockchain APIs and HLF network
  • 35. HackIT 4.0, Kyiv Motivation #1 = SNOOP • Hackers love to break into systems and gain access to sensitive information. • … a breach will occur at some time & assuming the hacker gets in. • Transactions and Smart Contracts are encrypted with best- in-class cryptography technology, and the information could only be accessed via the cryptographic keys. https://www.ibm.com/blogs/insights-on-business/government/hack-blockchain-dont-bother/ Could Blockchain be a hacker’s dream come true, or just not worth the effort?
  • 36. HackIT 4.0, Kyiv Motivation #2 = DISRUPT • Hackers like to mess up business networks by • modifying the underlying blockchain fabric (aka plumbing), • corrupting transactions committed to the blockchain or • modifying the Smart Contract. • Hyperledger Fabric is open source. • Malicious code modification attempts are quickly spotted, never make it to verified code releases. • Each block in the blockchain contains a digital fingerprint (#hash) of the contents of the previous block, so rendering modification is impossible – “immutability”. • Smart Contracts are also cryptographically protected and rendering modification is a virtually impossible. • If one network node is compromised, it would be quickly detected and rectified. Could Blockchain be a hacker’s dream come true, or just not worth the effort? https://www.ibm.com/blogs/insights-on-business/government/hack-blockchain-dont-bother/
  • 37. HackIT 4.0, Kyiv Could Blockchain be a hacker’s dream come true, or just not worth the effort? Motivation #3 – DENY • If the hacker can’t disrupt the business network, maybe he can deny the participants access to their critical information systems. • Mitigation approaches here are infrastructure dependent, and protection methods against the many forms of denial of service attack are well documented. • The distributed nature of the shared ledger adds to the overall resilience of the business network. https://www.ibm.com/blogs/insights-on-business/government/hack-blockchain-dont-bother/
  • 38. HackIT 4.0, Kyiv SOLUTION: Attribute-based access control support both chaincode and an entire fabric. determine whether a user can execute any specific chaincode. Hyperledger Fabric encryption literary: The smart contract can encrypt information or a subset of information in the transaction. This information will remain encrypted in the ledger with the key only being available to the peer who is supposed to see and access it. CIA: Achieving confidentiality with Hyperledger Fabric Sources: https://www.packtpub.com/networking-and-servers/hands-cybersecurity-blockchain http://composer-playground.mybluemix.net/
  • 39. HackIT 4.0, Kyiv Integrity is a way of avoiding any tampering of data. Blockchain uses cryptographic hashing to ensure that the ledger remains tamper- proof. It is impossible to get the data back from the hash result or from the message digest. In Hyperledger Fabric, Committing a peer always validates the new block before adding it to the ledger. In case a peer is hacked means, that the block may get compromised from the ledger. SOLUTION: To verifying chain integrity, each peer periodically validates its blockchain and asks the peer to recheck whether a broken block is detected. Function: CheckChainIntegrity() CIA: Achieving integrity with Hyperledger Fabric Source: https://www.packtpub.com/networking-and-servers/hands-cybersecurity-blockchain
  • 40. HackIT 4.0, Kyiv Cyberattacks such as DDoS cause huge disruption to internet services and result in websites becoming inaccessible The decentralization nature of blockchain makes it harder to disrupt these applications. SOLUTION: No single point of failure Even if one node in the blockchain goes down, the information can be accessed and used by the rest of the nodes in the network. As all of the nodes keep the exact copy of the ledger, it will always be up-to-date. All of the nodes in the network are logically decentralized with their ledger, and there is a zero probability of system failure. CIA: Achieving availiability with Hyperledger Fabric Source: https://www.packtpub.com/networking-and-servers/hands-cybersecurity-blockchain
  • 41. API API API How to protect your Blockchain APIs and HLF network ACME’s Enterprise API Gateway & Management (rate limiting, security, monitoring, permissions, version management, etc) A mutually beneficial ecosystem of suppliers & consumers of APIs. • Suppliers use APIs to securely provide specific types of access to sensitive data (e.g. an API to “Track my package” from ACME) • Consumers call these API’s from their apps to make them more useful (e.g. E-Retailer building a package tracking panel into their Order Status screen) Order status Order# 13593 Shipping status Shipped on: 1/26/16 Currently in: Atlanta, GA Estimated delivery: 1/31/16 E-Retailer Mobile app ACME Shipping ACME Firewall view status at ACME.com API Hyperledger Fabric Network Ordering -Service O O O O
  • 42. Advanced Threat Detection Insider Threat Securing the Cloud Risk and Vuln Management Critical Data Protection Compliance Incident Response How to protect your Blockchain APIs and HLF network To effectively detect threat, a broad range of analytics capabilities are required, from search, correlation baselining, threat intelligence, machine learning, and cognitive analytics Mind: More than half of data breaches are caused by insiders SIEM apps/solutions are essential for success
  • 43. HackIT 4.0, Kyiv Or just run it on IBM Cloud as IBM Blockchain as a Service Protect your new business model against malware and insider attacks with the highest level of blockchain security available. https://www.ibm.com/blockchain/platform