SlideShare a Scribd company logo
Group Members:
Ghazanfar Perdakh (2015-CS-13)
Afraz Khan (2015-CS-27)
Ali Abid (2015-CS-60)
Hassan Tariq (2015-CS-67)
Supervisor:
“Dr. Awais Hassan”
Overview
Problem Statement
Existing Systems
Solution
Methodology
Facial Recognition
Block Chain
Practical Demo
References
Problem Statement
The information security is becoming a big challenge in the current digital
age. For surveillance and timely alert generation of threat, A hidden Army of
Bots is required to protect data, assets and defense installation.
 Organizational Security.
 Centralised Database.
 Increase in piracy threats and illegal use of
confidential data.
Existing System
Systems like Kaspersky ant-viruses, Engine Firewall, McAfee Total
Protection, centralized servers etc. In these we can find many system handling
many security and external threads by following various techniques. They all
provide security up to some extent yet unfortunately even in presence of these
system we get hacked up and loss our confidential information.
Drawbacks:
 Centralized network of simple server client communication.
 All Data residing on single place.
 Simple firewall protection services.
Too expensive for more reliable services.
Army Of Hidden Bots
Army of Hidden Bots Act as a reliable solution of any organizational
threats. Because they act as a distributed network of different blocks connected
together in the manner of Block chain. We find this solution promising our need
because.
 Give rise of Block chain as distributed network.
 Meeting the new standards of protection.
 More than simple firewall protection services.
 Cheap and more reliable services.
Proof Of Concept
Implementation of blockchain on multiple computers.
Communication between python and node.js
Face recognition on each system.
Communication between node.js and python.
Transfer of image from one system to another system.
Working Methodology
Access
Request
Communicate with Network
For Authorization
Peer - 1
If Recognized then Access Granted
Access
Granted
Peer - 2
Block Chain Network
Facial Recognition
Facial Recognition works in 3 phases as :
 Data Gathering
 Training of the Recognizer.
 Facial recognition using recognizer.
Recognition Technique(LBPH):
LBPH(LBPH (LOCAL BINARY PATTERNS HISTOGRAMS) is the most fast and yet efficient
technique for facial recognition by converting each image into a binary pattern. This technique
analyzed each dataset image independently and develop its trainer and characterize each
image in the dataset locally using the Open recognizer. We use it because of.
 Simpler and fast working.
 Evaluate the result to each of the images in the dataset.
 Utilize less processing power.
 Open source collaborative effort to advance cross-industry blockchain technologies
 Hosted by Linux Foundation
 Has a global collaboration with finance, banking, supply chain, manufacturing and te
chnology companies
 Works to standardize the protocols
 Launched in 2015
 Goal is to “Create an enterprise grade, open source distributed ledger framework a
nd code base"
Hyperledger:
• Private and Permissioned Blockchain
• Nodes are run by known whitelisted organizations
• High transaction throughput performance
• Privacy and confidentiality of transactions and data pertaining to business
transactions
• No 51% attack
• PBFT consensus mechanism used
• No mining is involved - but basics of blockchain is followed
○ It has block immutability
○ Eliminating double spending
Hyperledger Fabric :
• Based on docker architecture
• Docker is sort of like VM
• Docker container , Docker images and Docker hub
Architecture
• Fabric-CA (Certificate Authority)
• Fabric Peers
• Fabric Orderers
Fabric components:
• Peer is where the Ledger is present
• It also maintains the world state
• Peer can add or query the data from the ledger
• We can have more than one peer - On production we need more than one
• All peers synchronize - Once connected to the network
• Couchdb is used as database
Fabric Peers:
• Ordering service is the heart of the consensus process
• Anything that has to be committed needs to be processed through the ordering servi
ce
• Ordering service creates the Blocks
• This sends the block to the peer to update
Fabric Orderers:
• Define policies around the execution of transactions
• Define which peers need to agree on the results of a transaction before it can be
added to the ledger (endorsing peers)
• Peers A, B, C, and F must all endorse transactions of type T
• A majority of peers in the channel must endorse transactions of type U
• At least 3 peers of A, B, C, D, E, F, G must endorse transactions of type V
Endorsement Policy:
19
20
21
22
23
24
25
• Built in Javascript
• Works on top of fabric
• Model your business blockchain network
• Deploy Smart contracts / chaincode on fabric network
• Generate REST APIs for interacting with your blockchain network
• Generate a skeleton Angular application.
• Generates playground to test business logic
Hyperledger Composer:
Smart contract / chaincode
• Docker swarm mode
• Direct communication
How fabric is deployed on multiple machines?:
References
LBPH
https://en.wikipedia.org/wiki/Local_binary_patterns
The Project repository
https://github.com/AfrazKhan4183/An-Army-of-Hidden-Bots/tree/master/Trojan Computing/Backdoor-
Python3

More Related Content

What's hot

A Practical Approach to Blockchain
A Practical Approach to BlockchainA Practical Approach to Blockchain
A Practical Approach to Blockchain
Shivanthan Balendra
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
Len Bass
 
blockchain workshop - blockchain and oabcs - solutions
blockchain workshop - blockchain and oabcs - solutionsblockchain workshop - blockchain and oabcs - solutions
blockchain workshop - blockchain and oabcs - solutions
Juarez Junior
 
The Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsThe Role of Blockchain in Future Integrations
The Role of Blockchain in Future Integrations
Srinath Perera
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
Yusuf Hadiwinata Sutandar
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
Donald E. Hester
 
Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for Developers
Mukesh Singh
 
Cloud & Software Terms Defined
Cloud & Software Terms DefinedCloud & Software Terms Defined
Cloud & Software Terms Defined
Namtek Consulting Services
 
Hyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for BusinessHyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for Business
Cloud Standards Customer Council
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
Courion Corporation
 
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
WSO2
 
OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenIDFoundation
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model
Denodo
 
Microservices Architecture
Microservices ArchitectureMicroservices Architecture
Microservices Architecture
Alessandro Giorgetti
 
Training Webinar: Cover your bases - a security webinar
Training Webinar: Cover your bases - a security webinarTraining Webinar: Cover your bases - a security webinar
Training Webinar: Cover your bases - a security webinar
OutSystems
 
Monitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentMonitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint Agent
ThousandEyes
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Proofpoint
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
Dock 365
 
The Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYCThe Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYC
Patrick Sklodowski
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
Hostway|HOSTING
 

What's hot (20)

A Practical Approach to Blockchain
A Practical Approach to BlockchainA Practical Approach to Blockchain
A Practical Approach to Blockchain
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
blockchain workshop - blockchain and oabcs - solutions
blockchain workshop - blockchain and oabcs - solutionsblockchain workshop - blockchain and oabcs - solutions
blockchain workshop - blockchain and oabcs - solutions
 
The Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsThe Role of Blockchain in Future Integrations
The Role of Blockchain in Future Integrations
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for Developers
 
Cloud & Software Terms Defined
Cloud & Software Terms DefinedCloud & Software Terms Defined
Cloud & Software Terms Defined
 
Hyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for BusinessHyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for Business
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
 
OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenID Foundation Research & Education Working Group Update - October 22, 2018
OpenID Foundation Research & Education Working Group Update - October 22, 2018
 
Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model Accelerate Self-service Analytics with Universal Semantic Model
Accelerate Self-service Analytics with Universal Semantic Model
 
Microservices Architecture
Microservices ArchitectureMicroservices Architecture
Microservices Architecture
 
Training Webinar: Cover your bases - a security webinar
Training Webinar: Cover your bases - a security webinarTraining Webinar: Cover your bases - a security webinar
Training Webinar: Cover your bases - a security webinar
 
Monitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentMonitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint Agent
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
The Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYCThe Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYC
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
 

Similar to Hyperledger Blockchain

CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICE
ForgeRock
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Zeeve
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
BiswaranjanSwain19
 
Service Mesh CTO Forum (Draft 3)
Service Mesh CTO Forum (Draft 3)Service Mesh CTO Forum (Draft 3)
Service Mesh CTO Forum (Draft 3)
Rick Hightower
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
Sarmad Ibrahim
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyre
Jonathan Habicht
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
AlgoSec
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structure
kasthurimukila
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Hacken_Ecosystem
 
Blockchain for Enterprises
Blockchain for EnterprisesBlockchain for Enterprises
Blockchain for Enterprises
Himanshu Pandey
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
Ahmad Gohar
 
Bit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyBit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currency
Mohammad Salehin
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO Forum
Rick Hightower
 
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONSTOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
BlockScience
 
Introduction to Puppet Enterprise - Jan 30, 2019
Introduction to Puppet Enterprise - Jan 30, 2019Introduction to Puppet Enterprise - Jan 30, 2019
Introduction to Puppet Enterprise - Jan 30, 2019
Puppet
 
IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0
Matt Lucas
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
LeMeniz Infotech
 
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Arnaud Le Hors
 
2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice
devopsdaysaustin
 

Similar to Hyperledger Blockchain (20)

CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICE
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Service Mesh CTO Forum (Draft 3)
Service Mesh CTO Forum (Draft 3)Service Mesh CTO Forum (Draft 3)
Service Mesh CTO Forum (Draft 3)
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyre
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structure
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
 
Blockchain for Enterprises
Blockchain for EnterprisesBlockchain for Enterprises
Blockchain for Enterprises
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
 
Bit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyBit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currency
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO Forum
 
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONSTOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
 
Introduction to Puppet Enterprise - Jan 30, 2019
Introduction to Puppet Enterprise - Jan 30, 2019Introduction to Puppet Enterprise - Jan 30, 2019
Introduction to Puppet Enterprise - Jan 30, 2019
 
IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
 
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
 
2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice
 

More from Afraz Khan

Self reliance
Self relianceSelf reliance
Self reliance
Afraz Khan
 
Case tools
Case toolsCase tools
Case tools
Afraz Khan
 
KNN Algorithm using C++
KNN Algorithm using C++KNN Algorithm using C++
KNN Algorithm using C++
Afraz Khan
 
Dr Abdul Qadder Khan & Islamic bomb
Dr Abdul Qadder Khan & Islamic bombDr Abdul Qadder Khan & Islamic bomb
Dr Abdul Qadder Khan & Islamic bomb
Afraz Khan
 
State of health in pakistan
State of health in pakistanState of health in pakistan
State of health in pakistan
Afraz Khan
 
Expository paragraph
Expository paragraphExpository paragraph
Expository paragraph
Afraz Khan
 
Secant Method
Secant MethodSecant Method
Secant Method
Afraz Khan
 

More from Afraz Khan (7)

Self reliance
Self relianceSelf reliance
Self reliance
 
Case tools
Case toolsCase tools
Case tools
 
KNN Algorithm using C++
KNN Algorithm using C++KNN Algorithm using C++
KNN Algorithm using C++
 
Dr Abdul Qadder Khan & Islamic bomb
Dr Abdul Qadder Khan & Islamic bombDr Abdul Qadder Khan & Islamic bomb
Dr Abdul Qadder Khan & Islamic bomb
 
State of health in pakistan
State of health in pakistanState of health in pakistan
State of health in pakistan
 
Expository paragraph
Expository paragraphExpository paragraph
Expository paragraph
 
Secant Method
Secant MethodSecant Method
Secant Method
 

Recently uploaded

Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 

Recently uploaded (20)

Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 

Hyperledger Blockchain

  • 1.
  • 2. Group Members: Ghazanfar Perdakh (2015-CS-13) Afraz Khan (2015-CS-27) Ali Abid (2015-CS-60) Hassan Tariq (2015-CS-67) Supervisor: “Dr. Awais Hassan”
  • 3. Overview Problem Statement Existing Systems Solution Methodology Facial Recognition Block Chain Practical Demo References
  • 4. Problem Statement The information security is becoming a big challenge in the current digital age. For surveillance and timely alert generation of threat, A hidden Army of Bots is required to protect data, assets and defense installation.  Organizational Security.  Centralised Database.  Increase in piracy threats and illegal use of confidential data.
  • 5. Existing System Systems like Kaspersky ant-viruses, Engine Firewall, McAfee Total Protection, centralized servers etc. In these we can find many system handling many security and external threads by following various techniques. They all provide security up to some extent yet unfortunately even in presence of these system we get hacked up and loss our confidential information. Drawbacks:  Centralized network of simple server client communication.  All Data residing on single place.  Simple firewall protection services. Too expensive for more reliable services.
  • 6. Army Of Hidden Bots Army of Hidden Bots Act as a reliable solution of any organizational threats. Because they act as a distributed network of different blocks connected together in the manner of Block chain. We find this solution promising our need because.  Give rise of Block chain as distributed network.  Meeting the new standards of protection.  More than simple firewall protection services.  Cheap and more reliable services.
  • 7. Proof Of Concept Implementation of blockchain on multiple computers. Communication between python and node.js Face recognition on each system. Communication between node.js and python. Transfer of image from one system to another system.
  • 8. Working Methodology Access Request Communicate with Network For Authorization Peer - 1 If Recognized then Access Granted Access Granted Peer - 2 Block Chain Network
  • 9. Facial Recognition Facial Recognition works in 3 phases as :  Data Gathering  Training of the Recognizer.  Facial recognition using recognizer.
  • 10. Recognition Technique(LBPH): LBPH(LBPH (LOCAL BINARY PATTERNS HISTOGRAMS) is the most fast and yet efficient technique for facial recognition by converting each image into a binary pattern. This technique analyzed each dataset image independently and develop its trainer and characterize each image in the dataset locally using the Open recognizer. We use it because of.  Simpler and fast working.  Evaluate the result to each of the images in the dataset.  Utilize less processing power.
  • 11.  Open source collaborative effort to advance cross-industry blockchain technologies  Hosted by Linux Foundation  Has a global collaboration with finance, banking, supply chain, manufacturing and te chnology companies  Works to standardize the protocols  Launched in 2015  Goal is to “Create an enterprise grade, open source distributed ledger framework a nd code base" Hyperledger:
  • 12.
  • 13. • Private and Permissioned Blockchain • Nodes are run by known whitelisted organizations • High transaction throughput performance • Privacy and confidentiality of transactions and data pertaining to business transactions • No 51% attack • PBFT consensus mechanism used • No mining is involved - but basics of blockchain is followed ○ It has block immutability ○ Eliminating double spending Hyperledger Fabric :
  • 14. • Based on docker architecture • Docker is sort of like VM • Docker container , Docker images and Docker hub Architecture
  • 15. • Fabric-CA (Certificate Authority) • Fabric Peers • Fabric Orderers Fabric components:
  • 16. • Peer is where the Ledger is present • It also maintains the world state • Peer can add or query the data from the ledger • We can have more than one peer - On production we need more than one • All peers synchronize - Once connected to the network • Couchdb is used as database Fabric Peers:
  • 17. • Ordering service is the heart of the consensus process • Anything that has to be committed needs to be processed through the ordering servi ce • Ordering service creates the Blocks • This sends the block to the peer to update Fabric Orderers:
  • 18. • Define policies around the execution of transactions • Define which peers need to agree on the results of a transaction before it can be added to the ledger (endorsing peers) • Peers A, B, C, and F must all endorse transactions of type T • A majority of peers in the channel must endorse transactions of type U • At least 3 peers of A, B, C, D, E, F, G must endorse transactions of type V Endorsement Policy:
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. • Built in Javascript • Works on top of fabric • Model your business blockchain network • Deploy Smart contracts / chaincode on fabric network • Generate REST APIs for interacting with your blockchain network • Generate a skeleton Angular application. • Generates playground to test business logic Hyperledger Composer:
  • 27. Smart contract / chaincode
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. • Docker swarm mode • Direct communication How fabric is deployed on multiple machines?:
  • 33.