Blockchain technology is a type of distributed database that achieves consensus in an open network without a central authority. However, blockchain may not always be needed, as other distributed database solutions can often achieve the same goals more efficiently. The unique property of blockchain is enabling consensus in a permissionless network, but for permissioned networks a traditional distributed database may suffice. While blockchain technology has potential benefits, its applications are currently limited to scenarios where no trusted third party is available. Other existing distributed database technologies can often meet use case needs without blockchain's limitations.
Matching Identity Management Solutions to Self-Sovereign Identity PrinciplesTommy Koens
We created an analysis of near 50 (blockchain based) digital identity management solutions, and matched these against Self Sovereign Identity (SSI) management principles, and additional requirements.
An interesting way to reach consensus is that by means of trusted hardware, for example Intel’s Software Guard Extension (SGX). In this paper we explore how SGX can be applied to reach consensus in a distributed network. Furthermore, we discuss some of its applications, and its pros and cons.
The basic idea of decentralization is to distribute control and authority to the peripheries of an organization instead of one central body being in full control of the organization.
Introduction
Business blockchain requirements vary. Some uses require rapid network consensus
systems and short block confirmation times before being added to the chain. For others,
a slower processing time may be acceptable in exchange for lower levels of required
trust. Scalability, confidentiality, compliance, workflow complexity, and even security
requirements differ drastically across industries and uses. Each of these requirements, and
many others, represent a potentially unique optimization point for the technology.
For these reasons, Hyperledger incubates and promotes a range of business blockchain
technologies including distributed ledgers, smart contract engines, client libraries, graphical
interfaces, utility libraries, and sample applications. Hyperledger’s umbrella strategy
encourages the re-use of common building blocks via a modular architectural framework.
This enables rapid innovation of distributed ledger technology (DLT), common functional
modules, and the interfaces between them. The benefits of this modular approach include
extensibility, flexibility, and the ability for any component to be modified independently
without affecting the rest of the system.
Matching Identity Management Solutions to Self-Sovereign Identity PrinciplesTommy Koens
We created an analysis of near 50 (blockchain based) digital identity management solutions, and matched these against Self Sovereign Identity (SSI) management principles, and additional requirements.
An interesting way to reach consensus is that by means of trusted hardware, for example Intel’s Software Guard Extension (SGX). In this paper we explore how SGX can be applied to reach consensus in a distributed network. Furthermore, we discuss some of its applications, and its pros and cons.
The basic idea of decentralization is to distribute control and authority to the peripheries of an organization instead of one central body being in full control of the organization.
Introduction
Business blockchain requirements vary. Some uses require rapid network consensus
systems and short block confirmation times before being added to the chain. For others,
a slower processing time may be acceptable in exchange for lower levels of required
trust. Scalability, confidentiality, compliance, workflow complexity, and even security
requirements differ drastically across industries and uses. Each of these requirements, and
many others, represent a potentially unique optimization point for the technology.
For these reasons, Hyperledger incubates and promotes a range of business blockchain
technologies including distributed ledgers, smart contract engines, client libraries, graphical
interfaces, utility libraries, and sample applications. Hyperledger’s umbrella strategy
encourages the re-use of common building blocks via a modular architectural framework.
This enables rapid innovation of distributed ledger technology (DLT), common functional
modules, and the interfaces between them. The benefits of this modular approach include
extensibility, flexibility, and the ability for any component to be modified independently
without affecting the rest of the system.
Benchmark and comparison between hyperledger and MySQLTELKOMNIKA JOURNAL
In this paper, we report the benchmarking results of Hyperledger, a Distributed Ledger, which is the derivation Blockchain Technology. Method to evaluate Hyperledger in a limited infrastructure is developed. Themeasured infrastructure consists of 8 nodes with a load of up to 20000 transactions/second. Hyperledger consistently runs all evaluation, namely, for 20,000 transactions, the run time 74.30s, latency 73.40ms latency, and 257 tps. The benchmarking of Hyperledger shows better than a database system in a high workload scenario. We found that the maximum size data volume in one transaction on the Hyperledger network is around ten (10) times of MySQL. Also, the time spent on processing a single transaction in the blockchain network is 80-200 times faster than MySQL. This initial analysis can provide an overview for practitioners in making decisions about the adoption of blockchain technology in their IT systems.
Blockchain technology has changed the revolution of data storage and privacy. Decentralized data storage technique in Blockchain introduced the dependent ledger system. The main motive of Blockchain is to avoid the third party authorization and validation process and intermediaries. This research process shows the different areas where Blockchain can be implemented and some guidelines. And what are the factors need to be considered while deploying the distributed ledgers. Nitin | Dr. Lakshmi J. V. N | Sharique Raza "A Study on Applications of Blockchain" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33693.pdf Paper Url: https://www.ijtsrd.com/computer-science/other/33693/a-study-on-applications-of-blockchain/nitin
Bitcoin has been a hot topic in the technology industry since its boom in 2017. The underlying technology of bitcoin is the blockchain that has impressed many of the onlookers due to its transparency and usability in this globalized world. In cryptocurrencies, a ledger is operated which contains all the data regarding the transactions and contracts that are to be executed. These ledgers are maintained on multiple nodes around the world. Every node has to maintain a full copy of the ledger which currently is 15 GB for bitcoin. As more and more transactions are carried on the blockchain, this approach becomes slow. Scaling is the only solution to counter this problem, that's where the sharding technology comes into play. In sharding, rather than each node maintaining the full ledger, the ledger is divided or sharded into multiple fragments. So, in short, each node consists of a small part of the ledger rather than the whole ledger which is easy to maintain and in turn helps in scaling the blockchain. So rather than a full blockchain, we have shard chains that consist of multiple node or validator networks which are then assigned multiple tasks like verifying transactions or operations.
CHAPTER 12 Integrating Non-Blockchain Apps with Ethereum EstelaJeffery653
CHAPTER 12 Integrating Non-Blockchain Apps with Ethereum 205
Chapter 12
Integrating Non-
Blockchain Apps
with Ethereum
Although you can build entirely blockchain-based applications, it is far more likely that your applications will be a combination of traditional and blockchain components. You learn in Chapter 3 that some use cases lend
themselves well to blockchain apps but others do not. In this book, we chose to
highlight one use case, supply chain, because blockchain offers clear advantages
over traditional methods. However, even a comprehensive supply chain applica-
tion will likely run partially as a traditional application and partially on the
blockchain.
Many emerging blockchain apps consist of core components that operate as smart
contracts and other components that operate as traditional applications that
interact with users and provide supporting functionality. This hybrid approach to
application development requires the capability to integrate the two different
development models. In other words, to develop hybrid applications that run par-
tially on the blockchain, you need to know how to design them to talk with each
other and operate seamlessly.
IN THIS CHAPTER
» Exploring differences between
blockchain and databases
» Identifying differences between
blockchain and traditional
applications
» Integrating traditional applications
with Ethereum
» Testing and deploying integrated
blockchain apps
206 PART 4 Testing and Deploying Ethereum Apps
Distributed application design and development isn’t new. In fact, some of the
difficulties with distributed applications led to the need for technologies like
blockchain. Remember that blockchain technology doesn’t solve all application
problems, but it does have its place. Now that you know how to develop dApps for
the Ethereum blockchain, in this chapter you learn how to integrate your smart
contracts with applications that do not include blockchain technology. The capa-
bility to integrate blockchain and non-blockchain applications makes it possible
to develop applications that use the right technology for a wide range of needs.
Comparing Blockchain and
Database Storage
In Chapter 2, you learn about some of the differences between storing data in a
blockchain and a database. Both technologies can store data, but clear differences
exist between the two. One of the first obstacles you might encounter when asked
to integrate blockchain with an existing application is determining what data you
should migrate to the blockchain.
Traditional applications store most of their data in a database. Databases provide
fast access to shared data. Blockchains can also provide access to shared data, but
they may not be as fast as a database. As you learn in Chapter 2, there are other
differences as well. It is important that you understand the relative strengths of
each data storage technique to make good design decisions for integrating block-
ch ...
Distributed shared memory
General architecture
Design and Implementation of issues of DSM
Granularity
Factors Influencing Block size Selection
Consistency Model
Replacement strategy
Which block be replace
where to place a replace block
thrashing
heterogeneous DSM
Issues
Deadlock
In this paper we explore the issue of store determination in a portable shared specially appointed system. In our vision reserve determination ought to fulfill the accompanying prerequisites: (i) it ought to bring about low message overhead and (ii) the data ought to be recovered with least postponement. In this paper, we demonstrate that these objectives can be accomplished by part the one bounce neighbors into two sets in view of the transmission run. The proposed approach lessens the quantity of messages overflowed into the system to discover the asked for information. This plan is completely circulated and comes requiring little to no effort as far as store overhead. The test comes about gives a promising outcome in view of the measurements of studies.
Benchmark and comparison between hyperledger and MySQLTELKOMNIKA JOURNAL
In this paper, we report the benchmarking results of Hyperledger, a Distributed Ledger, which is the derivation Blockchain Technology. Method to evaluate Hyperledger in a limited infrastructure is developed. Themeasured infrastructure consists of 8 nodes with a load of up to 20000 transactions/second. Hyperledger consistently runs all evaluation, namely, for 20,000 transactions, the run time 74.30s, latency 73.40ms latency, and 257 tps. The benchmarking of Hyperledger shows better than a database system in a high workload scenario. We found that the maximum size data volume in one transaction on the Hyperledger network is around ten (10) times of MySQL. Also, the time spent on processing a single transaction in the blockchain network is 80-200 times faster than MySQL. This initial analysis can provide an overview for practitioners in making decisions about the adoption of blockchain technology in their IT systems.
Blockchain technology has changed the revolution of data storage and privacy. Decentralized data storage technique in Blockchain introduced the dependent ledger system. The main motive of Blockchain is to avoid the third party authorization and validation process and intermediaries. This research process shows the different areas where Blockchain can be implemented and some guidelines. And what are the factors need to be considered while deploying the distributed ledgers. Nitin | Dr. Lakshmi J. V. N | Sharique Raza "A Study on Applications of Blockchain" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33693.pdf Paper Url: https://www.ijtsrd.com/computer-science/other/33693/a-study-on-applications-of-blockchain/nitin
Bitcoin has been a hot topic in the technology industry since its boom in 2017. The underlying technology of bitcoin is the blockchain that has impressed many of the onlookers due to its transparency and usability in this globalized world. In cryptocurrencies, a ledger is operated which contains all the data regarding the transactions and contracts that are to be executed. These ledgers are maintained on multiple nodes around the world. Every node has to maintain a full copy of the ledger which currently is 15 GB for bitcoin. As more and more transactions are carried on the blockchain, this approach becomes slow. Scaling is the only solution to counter this problem, that's where the sharding technology comes into play. In sharding, rather than each node maintaining the full ledger, the ledger is divided or sharded into multiple fragments. So, in short, each node consists of a small part of the ledger rather than the whole ledger which is easy to maintain and in turn helps in scaling the blockchain. So rather than a full blockchain, we have shard chains that consist of multiple node or validator networks which are then assigned multiple tasks like verifying transactions or operations.
CHAPTER 12 Integrating Non-Blockchain Apps with Ethereum EstelaJeffery653
CHAPTER 12 Integrating Non-Blockchain Apps with Ethereum 205
Chapter 12
Integrating Non-
Blockchain Apps
with Ethereum
Although you can build entirely blockchain-based applications, it is far more likely that your applications will be a combination of traditional and blockchain components. You learn in Chapter 3 that some use cases lend
themselves well to blockchain apps but others do not. In this book, we chose to
highlight one use case, supply chain, because blockchain offers clear advantages
over traditional methods. However, even a comprehensive supply chain applica-
tion will likely run partially as a traditional application and partially on the
blockchain.
Many emerging blockchain apps consist of core components that operate as smart
contracts and other components that operate as traditional applications that
interact with users and provide supporting functionality. This hybrid approach to
application development requires the capability to integrate the two different
development models. In other words, to develop hybrid applications that run par-
tially on the blockchain, you need to know how to design them to talk with each
other and operate seamlessly.
IN THIS CHAPTER
» Exploring differences between
blockchain and databases
» Identifying differences between
blockchain and traditional
applications
» Integrating traditional applications
with Ethereum
» Testing and deploying integrated
blockchain apps
206 PART 4 Testing and Deploying Ethereum Apps
Distributed application design and development isn’t new. In fact, some of the
difficulties with distributed applications led to the need for technologies like
blockchain. Remember that blockchain technology doesn’t solve all application
problems, but it does have its place. Now that you know how to develop dApps for
the Ethereum blockchain, in this chapter you learn how to integrate your smart
contracts with applications that do not include blockchain technology. The capa-
bility to integrate blockchain and non-blockchain applications makes it possible
to develop applications that use the right technology for a wide range of needs.
Comparing Blockchain and
Database Storage
In Chapter 2, you learn about some of the differences between storing data in a
blockchain and a database. Both technologies can store data, but clear differences
exist between the two. One of the first obstacles you might encounter when asked
to integrate blockchain with an existing application is determining what data you
should migrate to the blockchain.
Traditional applications store most of their data in a database. Databases provide
fast access to shared data. Blockchains can also provide access to shared data, but
they may not be as fast as a database. As you learn in Chapter 2, there are other
differences as well. It is important that you understand the relative strengths of
each data storage technique to make good design decisions for integrating block-
ch ...
Distributed shared memory
General architecture
Design and Implementation of issues of DSM
Granularity
Factors Influencing Block size Selection
Consistency Model
Replacement strategy
Which block be replace
where to place a replace block
thrashing
heterogeneous DSM
Issues
Deadlock
In this paper we explore the issue of store determination in a portable shared specially appointed system. In our vision reserve determination ought to fulfill the accompanying prerequisites: (i) it ought to bring about low message overhead and (ii) the data ought to be recovered with least postponement. In this paper, we demonstrate that these objectives can be accomplished by part the one bounce neighbors into two sets in view of the transmission run. The proposed approach lessens the quantity of messages overflowed into the system to discover the asked for information. This plan is completely circulated and comes requiring little to no effort as far as store overhead. The test comes about gives a promising outcome in view of the measurements of studies.
Comparative study on Cache Coherence Protocolsiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Data Deduplication: Venti and its improvementsUmair Amjad
Data is the primary thing which is available in digital form everywhere. To store this massive data, the storage methodology should be efficient as well as intelligent enough to find the redundant data to save. Data deduplication techniques are widely used by storage servers to eliminate the possibilities of storing multiple copies of the data. Deduplication identifies duplicate data portions going to be stored in storage systems also removes duplication in existing stored data in storage systems. Hence yield a significant cost saving. This paper is about data deduplication, taking Venti as base case discussed it in detail and also identify area of improvements in Venti which are addressed by other papers.
Details in how InfiniteChain is the most practical solution to connect your centralized environment with public blockchain. Ethereum-based InfiniteChain addresses the blockchain bottleneck of privacy, transaction speed and block bloat.
A consortium blockchain is a group of multiple financial institutions where each financial institution has its private blockchain. Read more about what is a consortium blockchain
How Drupal & Blockchain Are Changing The Perception Of Decentralized Architec...Shefali Shetty
Have you ever thought about integrating Drupal CMS with Blockchain? Imagine two completely different architectures coming together to build a powerful system.
How Drupal & Blockchain Are Changing The Perception Of Decentralized Architec...Shefali Shetty
Have you ever thought about integrating Drupal CMS with Blockchain? Imagine two completely different architectures coming together to build a powerful system.
Distribution transparency and Distributed transactionshraddha mane
Distribution transparency and Distributed transaction.deadlock detection .Distributed transaction and their types and threads and processes and their difference.
decentralized cloud storage and blockchian.pdfqitchain.net
Decentralized Cloud Storage and Blockchain
What is Decentralization?
Decentralization is an ideology that advocates for a liberal style of administration in which no single authority has absolute power over all aspects of life. In a decentralized storage system, users may save their files without depending on large data hubs like the cloud.
Decentralization in data storage has gained recognition because of its user-friendly and trustable features like privacy and security. Decentralized data centers rely on a peer-to-peer network of users who each store small, encrypted chunks of the overall data. In this way, a reliable data storage and sharing system has been created that can be founded on blockchain or any other peer-to-peer network.
Decentralized cloud storage is a storage system in which data is saved on various computers or servers. It’s a decentralized P2P (peer-to-peer) cloud storage system.
Qitchain QTC is a Decentralized Cloud Storage technology that is both efficient and unique. The advantage of adopting such storage is that it can perform all of the tasks of a decentralized web, including security, privacy, no single point of failure, and cost-effectiveness.
The process of moving authority from a central government to a more decentralized and “liberal” framework is known as decentralization. Files are encrypted, fragmented, and disseminated throughout a global network rather than being kept in centralized data centers.
Decentralized storage is becoming more popular than centralized cloud storage for a variety of reasons.
Data breaches in centralized cloud storage have occurred in recent years, as have data outages, storage costs have increased, and most crucially, there is a lack of ownership. As a result, there was a compelling need to fix these concerns. These issues can be solvable via a decentralized storage system.
Read more here QITCHAIN: DECENTRALIZED SEARCH ENGINE
Decentralized Storage: How it Works
As in a decentralized storage system, the data is not stored on a single place but on multiple nodes. Client’s data is encrypted. It stores multiple copies of the same piece of data in separate locations. The users who have the encryption key are only allowed to access or read the file. This secure storage system motivates users to participate, host and hold servers in the system. Numerous small entities contribute to the network by generating storage space and computing power.
An extra blanket of protection and security is added via ‘Sharding’ process. Sharding refers to the process of distributing data over a network of nodes. Decentralized locations store the data and distribute it. Interlopers who try to break into these places will find encrypted data blocks. Furthermore, they will only be able to get a portion of the information, not the complete file. To sum it up, blockchain-based decentralized storage systems ensure high level of data security which no other storage system can provide.
CARBON NEUTRAL ENCRYPTED DIGITAL cu
The blockchain is a distributed ledger technology that underlies cryptocurrencies like Bitcoin and platforms like Ethereum. It provides a way to record and transfer data that is transparent, safe, auditable, and resistant to outages.
Source of Information: https://goo.gl/tt3EaV
Similar to The need for blockchain technology (20)
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Knowledge engineering: from people to machines and back
The need for blockchain technology
1. The Need for Blockchain Technology.
Tommy Koens
ING - DLT team
Abstract. Blockchain technology has mushroomed a global rethinking
of business problems and the creation of new opportunities. However,
blockchain technology may not always be the answer to those problems
and opportunities. In essence, this technology is a distributed database
that achieves a single feat: reaching consensus in an open network that is
not limited by the number of participants. In this article we argue that,
despite the ingenious work of blockchain technology, its application so far
is limited to scenarios where no trusted third party can be present. From
both an industry and government perspective, other existing, tested, and
proven solutions in the distributed database domain are readily available,
without the limitations that blockchain technology currently holds.
1 Introduction
Recent reports show that both industry [15] and governments [19] are looking
at the possibilities of blockchain technology [17]. Although some advocate that
blockchain technology will change the world [11], others [18] state that blockchain
technology is just a hype. However, the question if blockchain technology actually
is needed remains an interesting one. In this paper we aim to answer that question
and, additionally, add fuel for thought on the need for blockchain technology.
We do this by first abstracting from blockchain technology which is, in essence, a
distributed database. We have a look at the domain of distributed databases and
some of its typical properties in Section 2. Then in Section 3 we have a look at
distributed ledger technology. In Section 4 we discuss the benefit of blockchain
technology, and discuss the need for distributed ledger technology. Finally, in
Section 5 we conclude this work.
2 On Distributed Databases
To understand where to place distributed ledger technology in the domain of
databases, we first will discuss the concept of distributed databases.
Distributed databases allow for dispersion of data across multiple geographi-
cally located computers. Typically, a distributed database is identified by having
multiple storage devices that are not connected to a single processor. This is
called a loosely coupled system. This is in contrast to a tightly coupled system
such as a database, where there is a strong link between a processor and the
storage device. An example of a tightly coupled system is the SQL database
2. 2
that is stored on my hard disk which is located in my laptop, together with its
processor. On the other hand, company X may be located in multiple countries.
In Japan, company X maintains a Human Resource database, in Germany a
Sales database, and in Australia another Sales database. These databases are
connected by a database management system that allows for updates on each
database. This is an example of a loosely coupled system, since none of the
storage devices located in different sites share the same processor.
2.1 Distributed Database Types
In principle, two types of distributed databases exist, homogeneous distributed
databases, and heterogeneous distributed databases. Within a homogeneous dis-
tributed database each site that stores the database has identical software. Each
site is aware of the other sites, and all agree on processing user requests.
In a heterogeneous distributed database at least one of the database uses a
different schema and software. Here, a database schema defines how data in the
database is organized. In case of a different schema, this may run into problems
when querying the database. In the case of company X mentioned above, if a
set of data is labeled ’Products’ in Australia and ’Produkte’ in Germany, an
ambiguous query for a total overview of sold products may return only half of
the desired result.
2.2 Database mirroring, replication and fragmentation
We now have a look at the purposes of having a distributed database and the
techniques that achieve this purpose.
Database mirroring involves one or more identical copies of a database that
resides on nodes in different locations. At any given time, only one copy of the
database is available for nodes. This one copy is referred to as the principle
database, whereas its copies are referred to as the mirror databases. Mirroring
is useful, for example, in maintaining a backup. In case the principle databases
crashes, the mirror database may still provide the data needed.
Database replication refers to the frequent copying of data from one database
to other databases. Note that all databases may be used by individual nodes at
a given moment, which is a significant difference from database mirroring. The
main goal of data replication is to ensure that all nodes have the same view of
the information available. Typically, three types of replication can be performed.
First, copying the entire content from one database to another at frequent in-
tervals is called snapshot replication. Second, data from two or more databases
is merged into a single database. This is called merging replication. Third, after
nodes receive an initial copy of the database, transactional replication updates
all databases periodically when data changes.
Database fragmentation, in principle, fragments the database into chunks of
data which are stored at nodes. The entire database can be reconstructed from
these chunks. This may be useful if, for example, a database is very large and
therefore is distributed over several drives. Another purpose for fragmentation
3. 3
is that only part of the database needs to be queried by specific applications.
Querying only a subset of the database speeds up the search process.
2.3 Reaching consensus
In all three replication types a single challenge stands, namely, how do all par-
ticipants reach consensus on the state of the database? Consensus is reached
when all participants agree on a single state of the database. In a network where
a single node determines the next state, reaching consensus is not much of a
challenge, because the master-node dictates the next ledger state. However, in a
network without such a node, reaching consensus becomes much harder, as all
nodes must agree, ultimately, on the same state. The main problem of consensus
(from a computer science perspective) is to have a distributed set of nodes to
agree on a common value. For example, when a database is mirrored, all nodes
that store a copy of the database must agree on the same state of the database.
This may not always be the case, as nodes may crash, transactions may not be
received, or a malicious actor may try to disrupt nodes from reaching consensus.
In an important work, Fischer Lynch and Patterson [7] state that in an
asynchronous setting where only one node might crash, it is impossible that
a distributed algorithm solves the consensus problem. Indeed, under their as-
sumptions made, no algorithm can reach consensus in bounded time. However,
in practice, consensus can be achieved, since the assumptions made rarely occur.
Consensus in distributed network is reached by so-called consensus algo-
rithms. A recent paper [2] provides an extensive list of such algorithms. This
paper, however, does not list all types and variants of consensus mechanisms. In
practice, over a 100 types of consensus algorithms exist for distributed databases.
To name a few consensus algorithms:
– PAXOS - Named after a fictional legislative consensus system on the Greek
island [13], PAXOS is a crash tolerant consensus protocol. It allows for nodes
to rejoin the protocol after the node has crashed.
– PBFT - Practical Byzantine Fault Tolerant (PBFT) [4] allows for reach-
ing consensus in an untrusted network by transaction voting, as long as a
majority of nodes follows the protocol. This protocol allows for Byzantine
behavior, where nodes may crash, may collude, or messages may be forced.
– PoW - Proof of Work (PoW) [14] is used in many cryptocurrencies, including
Bitcoin and Ethereum. Its main idea is to frequently elect a leader who then
may propose state changes to the database. Note that PoW is, like PBFT,
Byzantine fault tolerant.
3 Distributed Ledger Technology
Having discussed some of the concepts of distributed databases, their purpose
and how consensus is achieved, we now will have a look at distributed ledger
technology. A distributed ledger is a state of data that is shared, and replicated
4. 4
amongst its participants without having a central party managing the ledger.
From a content perspective, the ledger may consist of accounts that hold a token
of value. A well-known example is Bitcoin, where the state of accounts represents
the number of bitcoins that are in possession of the account owner. In princi-
ple, there exists three types of distributed ledgers, public permissionless ledgers,
public permissioned ledgers, and permissioned private ledgers. Here, ’public’ usu-
ally implies that anyone can read the ledger, whereas ’private’ means that only
a few, selected, known participants can read from the ledger. ’Permissionless’
means that anyone may join the network and participate in the consensus pro-
cess, whereas ’permissioned’ implies that both joining the network as well as
taking part in the consensus process is limited to only a few known participants.
3.1 Public Permissionless Ledgers
Within a permissionless distributed ledger there exists no central party that
validates new ledger state updates. Instead, all participants join in participating
in the consensus process, to reach a new state of the ledger. Typically, state
updates is done by voting where, in principle, each participant may vote once per
ledger state update. The main challenge here is to reach consensus amongst the
participants on new ledger states without a central party, and without a single
party introducing thousands of nodes. This so-called Sybil attack [6], allows for
an adversary to deploy twice as many nodes (plus one) than the entire network
consists of. This allows an adversary to out-vote the entire network, and single-
handedly determine the next ledger state. Note that this is an unwanted scenario,
as the initial aim was to have no central party proposing ledger states.
In 2009 Bitcoin was proposed by its pseudonymous author Satoshi Nakamoto
[14]. More important, in this work [14] a technology is proposed to to solve the
consensus problem in a public, permissionless network: blockchain technology. In
short, consensus is achieved by all parties participating in the consensus process
through a lottery. You may win the lottery when you can proof that you have
solved a difficult cryptographic puzzle. On average, every ten minutes a puzzle
is solved and new lottery ticket is created. With this ticket, a participant may
propose a new state of the ledger. As a participant has performed some work (i.e.
solving a cryptographic puzzle), this process is called Proof-of-Work (PoW). Note
that ledger states are proposed in blocks. A block is a set of unique transactions
that have not been seen before and marked as valid. As every new block points
to the previous found block, a chain of blocks is created, hence blockchain.
Indeed, blockchain technology has a single unique property over other DLTs,
namely, it allows for reaching consensus in an open network that is not limited
by the number of participants [16]. However, this currently comes at a cost.
The throughput in public blockchain technology is low compared to centralized
payment providers. For example, Bitcoin in practice processes 4 transactions
per second. In contrast, VISA can process over 50.000 transactions per second.
Also, the decentralized nature of public blockchains may limit public adoption.
Central banks may offer compensation when a bank account has been emptied by
someone other than its owner. Skimming, someone stealing your PIN code and
5. 5
emptying your account, are good examples where third party covers your losses.
Also, when you loose your PIN code, you can request a new one at your bank,
and regain access to your account. Currently, decentralized payment systems,
however, have no proper decentralized way of dealing with stolen tokens. Losing
your key, in principle, implies losing access to your funds.
3.2 Public Permissioned Distributed Ledgers
Within a permissioned distributed ledger, a database (the ledger) is shared
amongst participants where at least one or more parties determine who may
join the network. Blockchain technology could play a role here, depending on
the number of participants that are involved in the consensus process. If more
than 20 participants are involved in the consensus process, blockchain technology
(or any of the upcoming technologies, like Hashgraph [9]) may offer a solution.
Again, key here is the number of participants that are involved in the consen-
sus process. In all other cases, other distributed technologies can be used. For
example, consensus algorithms such as PBFT [3] and RBFT [1] may be used to
reach consensus. There appears to be no need to achieve consensus by proposing
blocks, and creating a blockchain, as consensus algorithms such a PBFT can
process much more transactions per second than PoW.
3.3 Private Permissioned Distributed Ledgers
A private permissioned distributed ledger allows for reaching consensus within
a selected group of participants. Additionally, not every participant (nor those
that do not participate) may read every part of the ledger. Typically, scenarios
where transaction throughput and more importantly, privacy, plays an impor-
tant role, these types of ledgers are applied. For example, ING uses a technology
developed by R3 called Corda [5]. Here, a selected group of nodes called valida-
tors is trusted. This group validate transactions and propose new state updates.
However, if a transaction occurs between party A and B, only these two parties
and the validators know of the transaction. All other participants (e.g. party C,
D and E) are not aware of this transaction, which introduces some privacy on
transactions. Note that Corda does not use blockchain technology as, indeed,
there is no need for it.
4 Do You Need Blockchain Technology?
Blockchain technology seems to have sparked the rethinking of existing pro-
cess problems. Again, this does not imply that blockchain technology is the
answer to the problems being addressed. At this point, the unique selling point
of blockchain technology is that it achieves eventual consensus on the state of
the ledger in a permissionless environment [16].
A recent work by W¨ust and Gervais [20] aims at providing a framework that
allows for deciding the appropriateness of blockchain technology. Based on six use
6. 6
case properties, their model aims to answer if, and if so, which type of blockchain
technology is appropriate for a particular use case. However, their model, in
principle suggests either using blockchain technology, or not using blockchain
technology. In fact, the model fails to mention alternative solutions, such as a
distributed database. However, the use case properties in their model are an
indication of the core elements of use cases where distributed ledger technology
may be appropriate. We extend their model by adding another possible solution,
that of a distributed database. We list the use case properties and compare these
with the distributed ledger technologies, see Table 1.
Table 1. Comparing distributed databases
Use case properties Database type
Permissioned,
priv. blockchain
Permissioned,
pub. blockchain
Permissionless,
pub. blockchain
Distributed
database
Store state? x x x x
Multiple writers? x x x x
Writers known? x x x
Writers trusted?
Public verifiability? x x
Can use a TTP? x x x
First, we observe that a private permissioned distributed blockchain matches
the same use case properties as a distributed database. Note that blockchain
technology still has some issues, such as scalability [12], privacy [10], and central-
ization [8]. Therefore, it would make more sense to apply a distributed database
instead of a private permissioned blockchain.
Second, as argued by Perlman [16], the novel part of blockchain technology
(as used in, for example, Bitcoin) is having a consortium of unknown participants
to reach consensus. As we can see from Table 1, none of the other distributed
database types offer such a solution. More important, this gives rise to the argu-
ment that a public permissioned blockchain is only suitable for use cases where
you can not use a Trusted Third Party (TTP).
Third, most of the use case properties are focused on the technology itself.
However, there could be other use case properties that drive blockchain tech-
nology. There is unpublished work on this, which we expect to appear later this
year.
5 Conclusion
The global interest in blockchain technology shows that, indeed, there is a need
and room for improvement in existing or new (business) processes in which dis-
tributed ledgers play an important role. As we discussed in the previous section,
blockchain technology is a type of database within the domain of distributed
database technologies. In fact, the domain of distributed databases is large, and
7. REFERENCES 7
many solutions are available. Blockchain technology is and should not be the
default solution, as other distributed database technologies can achieve most of
its feats. These technologies should be explored as well when addressing business
problems, since these solutions overcome the drawbacks of blockchain technol-
ogy. If you are going to change your (business) processes or create new ones, you
might as well want to do it with the appropriate technology.
Acknowledgements
We would like to thank Jochem Kleine, Stijn Meijer, Han Voorbraak, and Cees
van Wijk for reviewing the initial versions of this paper. We also would like to
thank ING’s distributed ledger team for sparking the discussion on (the need
for) blockchain technology.
References
[1] Pierre-Louis Aublin, Sonia Ben Mokhtar, and Vivien Qu´ema. “Rbft: Re-
dundant byzantine fault tolerance”. In: Distributed Computing Systems
(ICDCS), 2013 IEEE 33rd International Conference on. IEEE. 2013, pp. 297–
306.
[2] Shehar Bano et al. “Consensus in the Age of Blockchains”. In: arXiv
preprint arXiv:1711.03936 (2017).
[3] Miguel Castro and Barbara Liskov. “Practical Byzantine fault tolerance
and proactive recovery”. In: ACM Transactions on Computer Systems
(TOCS) 20.4 (2002), pp. 398–461.
[4] Miguel Castro, Barbara Liskov, et al. “Practical Byzantine fault toler-
ance”. In: OSDI. Vol. 99. 1999, pp. 173–186.
[5] Corda. Web page. url: https://github.com/corda/corda.
[6] John R Douceur. “The sybil attack”. In: International workshop on peer-
to-peer systems. Springer. 2002, pp. 251–260.
[7] Michael J Fischer, Nancy A Lynch, and Michael S Paterson. “Impossibility
of distributed consensus with one faulty process”. In: Journal of the ACM
(JACM) 32.2 (1985), pp. 374–382.
[8] Adem Efe Gencer et al. “Decentralization in Bitcoin and Ethereum Net-
works”. In: arXiv preprint arXiv:1801.03998 (2018).
[9] Hashgraph Consensus: Fair, Fast, Byzantine Fault Tolerance. url: https:
//www.swirlds.com/whitepapers/.
[10] Daira Hopwood et al. Zcash protocol specification. Tech. rep. Tech. rep.
2016-1.10. Zerocoin Electric Coin Company, 2016.
[11] How blockchains could change the world. Web page. url: https://www.
mckinsey.com/industries/high-tech/our-insights/how-blockchains-
could-change-the-world.
[12] Eleftherios Kokoris-Kogias et al. “OmniLedger: A Secure, Scale-Out, De-
centralized Ledger.” In: IACR Cryptology ePrint Archive 2017 (2017),
p. 406.
8. 8 REFERENCES
[13] Leslie Lamport. “The part-time parliament”. In: ACM Transactions on
Computer Systems (TOCS) 16.2 (1998), pp. 133–169.
[14] S. Nakamoto. “Bitcoin: A Peer-to-Peer Electronic Cash System”. In: (2008).
https://bitcoin.org/bitcoin.pdf Accessed 20 Jun 2017.
[15] Nearly 6 in 10 large corporations considering blockchain deployment. url:
https://www.juniperresearch.com/press/press-releases/6-in-
10-large-corporations-considering-blockhain.
[16] Radia Perlman. “Blockchain: Hype or Hope?” In: ;login: 42.2 (2017), pp. 68–
72.
[17] SelfKey Self-Sovereign Identity Network. Web page. url: https://selfkey.
org/.
[18] Top Trends in the Gartner Hype Cycle for Emerging Technologies, 2017.
Web page. url: https://www.gartner.com/smarterwithgartner/top-
trends-in-the-gartner-hype-cycle-for-emerging-technologies-
2017/.
[19] Will blockchain transform the public sector? Web page. url: https://
www2 . deloitte . com / insights / us / en / industry / public - sector /
understanding-basics-of-blockchain-in-government.html.
[20] Karl W¨ust and Arthur Gervais. “Do you need a Blockchain?” In: IACR
Cryptology ePrint Archive 2017 (2017), p. 375.