SlideShare a Scribd company logo
1 of 2
Types of Blockchain – Public, Private and Permissioned
There isa greatinterestinBlockchainnowadays.AsBlockchain –the underlyingtechnologybehind
Bitcoin– has slowlystartedgainingpopularity,organisationsacrossthe worldhave started
expressingtheirdesirestohave aBlockchainbaseddatabase systemfortheirdailyoperations.
A Blockchainisnothingmore thana database.Blockchainoffersmanyadvantagesascomparedto
otherdatabases.Ithas a decentralisedstructure withnosingle pointof failure andthe datastored
on the Blockchainiscompletelytamperproof.Also,dataonce storedona Blockchainwill alwaysbe
storedthere andall the detailsof transferandstorage are visible toeveryone connectedtothe
networkandto anyone notconnectedtothe networkwhowishestoverifysuchdetails.
PublicBlockchain
In a PublicBlockchain,anyone canreadandwrite the data storedon the Blockchainasit is
accessible toeveryoneinthe world.A personcanbecome a memberof the Blockchainnetworkand
can store,sendand receive dataafterdownloadingthe requiredsoftware onhisdevice.
A PublicBlockchainiscompletelydecentralisedasthe permissionstoreadand write dataontothe
Blockchainare sharedequallybyall the connectedusers,whocome toa consensusbefore anydata
isstoredon the database.A PublicBlockchainisbasedonacompletelytrust-lesssystemwhere no
useris givenspecial privilegesonanydecision.
The most commonimplementationsof aPublicBlockchainare BitcoinandEthereumwhere the
publicnature of Blockchainallows usersfromvariousbackgroundstocome ona commonplatform
for makingtransactionsandeliminatesthe needforthirdpartyvendorsbymakingtransactions
directbetweenusers.
As itis decentralised,aPublicBlockchainisalsomathematicallyveryhard tohack as the cost of
hackingbecomestoohighfora systemwhere everynodeconnectedissyncedwith the entire
Blockchaindatabase andmore importantly,once ahack isdiscovered,the value of the hackedcoins
woulddiminishexponentially –thusincurringhuge lossesonthe hacker(he hadto investa lotof
hardware to overtake the networkhashrate)
Since all transactionsina publicBlockchainneedtobe verifiedbythousandsof users,the
transactionverificationprocesscanbecome verytime consuming. The userspaya largeramountof
transactionfee here ascomparedto the Private andPermissionedBlockchain.
Private Blockchain
In a PublicBlockchain,here the permissionstowrite dataontothe Blockchainare controlledbyone
organisationwhichishighlytrustedbythe otherusers.Thisorganisationmay/maynotallow usersto
have access toread the data, as publicreadabilitymightnotbe necessaryinmostcases.Insome
situations,the organisationmightwantthe publictoauditthe data.Limited/restrictedread
permissionsalsoprovide agreaterlevelof privacytothe users,a feature notavailable inPublic
Blockchains.
The organisationincontrol hasthe powertochange the rulesof a Private Blockchainandmayalso
decline transactionsbasedontheirestablishedrulesandregulations.
In a Private Blockchain,the transactionsare quickerastheycanbe verifiedbe asmall numberof
devices.Thus,the userspaylesseramountsof transactionfeessince the numberof people verifying
the transactionisfewerthanin a PublicBlockchain.
Also,the devicesare verywell connectedandanyfaultscanbe fixedbyhumanintervention,which
can be easilyapprovedbythe userssince the userstrustthe single organisationincontrol of the
Blockchain.
PermissionedBlockchain
A PermissionedBlockchainisatype of Private Blockchainandsharesmanyfeaturesof the latter.A
PermissionedBlockchainprovidesahybridbetweenthe ‘low-trust’providedbyPublicBlockchains
and the ‘single highly-trustedentity’modelof Private Blockchains.PopularlycalledaConsortium
Blockchain,itisone where insteadof allowinganypersonwithaninternetconnectiontoparticipate
inthe verificationof the transaction processorallowingasingle companytohave full control,afew
selectednodesare predetermined.
For example –imagine aconsortiumof 10 companies,eachof whichoperatesadevice connectedto
the Blockchainnetwork.If company‘2’onlytradesand sharesitsinvoiceswith‘3’,‘4’and ‘5’ there is
no needforthe othercompaniestobe giventhe permissionstoreadthe shareddata.
Althoughsome degree of decentralisationismaintainedintheirstructure,the participantshave the
powerto grant read/write permissionstootherparticipants,leadingtothe ‘PartiallyDecentralised’
designof PermissionedBlockchains.
The transactionsare quickto verifyinaPermissionedBlockchain asthere are a handful of verifiers,
withthe transactionfee miniscule thusincreasingthe overallefficiencyof transactions.Like Private
Blockchains,the PermissionedBlockchainsmaintainthe privacyof auser’sdata,without
consolidatingpowerwitha single organisation.
WhichBlockchain is the bestfor you?
There isno Blockchainthatcan be recommendedtoeveryone.Eachtype has itspros andcons. The
mainconcernssurroundingPublicBlockchainsare privacyandscalability.Bothcanbe mitigatedto
some extentbutare not completelysolvedatpresent.
Similarly,Private Blockchainshave asingle pointof failure andbringingvariousorganisationstouse
a commonmodel remainsaconcern.
Both the modelsare neededinvariousindustriesandconstant developmentsare beingdone on
boththe PublicandPrivate models.So,whichmodel thatwouldsuityouthe best?Well,thatclearly
dependsonthe type of data beingstored,andwhoall will needthe accesstoreadand write data on
the Blockchainandwhetherall these participantsneedtobe givensame ordifferentprivilegesof
readingandwritingonthe database in concern.

More Related Content

What's hot

What's hot (20)

Blockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxBlockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptx
 
BLOCKCHAIN
BLOCKCHAINBLOCKCHAIN
BLOCKCHAIN
 
Unlocking Blockchain’s Potential
Unlocking Blockchain’s PotentialUnlocking Blockchain’s Potential
Unlocking Blockchain’s Potential
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basics
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for LibrariesBlockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for Libraries
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Blockchain use cases
Blockchain use casesBlockchain use cases
Blockchain use cases
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Smart Contract & Ethereum
Smart Contract & EthereumSmart Contract & Ethereum
Smart Contract & Ethereum
 
Blockchain
BlockchainBlockchain
Blockchain
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?
 
Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart Contract
 

Viewers also liked

Corum group: Paris Presentation
Corum group: Paris PresentationCorum group: Paris Presentation
Corum group: Paris PresentationYoussef Rahoui
 
Paper Godsdienstpedagogiek Over Interreligieuze Vooroordelen
Paper Godsdienstpedagogiek Over Interreligieuze VooroordelenPaper Godsdienstpedagogiek Over Interreligieuze Vooroordelen
Paper Godsdienstpedagogiek Over Interreligieuze VooroordelenChester Vacquier
 
Latlon Technologies - Official Presentation
Latlon Technologies - Official Presentation Latlon Technologies - Official Presentation
Latlon Technologies - Official Presentation Mohan Kumar
 
A regional Open Education agenda for the South Mediterranean
A regional Open Education agenda for the South MediterraneanA regional Open Education agenda for the South Mediterranean
A regional Open Education agenda for the South MediterraneanFabio Nascimbeni
 
Corum annual report 2017
Corum annual report 2017Corum annual report 2017
Corum annual report 2017Youssef Rahoui
 
BITCOIN UNLIMITED 51 PERCENT ATTACK COULD CUT PRICE IN HALF: INVESTOR BLOG
BITCOIN UNLIMITED 51 PERCENT ATTACK COULD CUT PRICE IN HALF: INVESTOR BLOGBITCOIN UNLIMITED 51 PERCENT ATTACK COULD CUT PRICE IN HALF: INVESTOR BLOG
BITCOIN UNLIMITED 51 PERCENT ATTACK COULD CUT PRICE IN HALF: INVESTOR BLOGSteven Rhyner
 
GIVE BACK HACK COLUMBUS 2017
GIVE BACK HACK COLUMBUS 2017 GIVE BACK HACK COLUMBUS 2017
GIVE BACK HACK COLUMBUS 2017 Dan Rockwell
 
The Best Practices in Program Portfolio Evaluation - Competitive Intensity
The Best Practices in Program Portfolio Evaluation - Competitive IntensityThe Best Practices in Program Portfolio Evaluation - Competitive Intensity
The Best Practices in Program Portfolio Evaluation - Competitive IntensityGray Associates, Inc
 
OEF presentation Open Education week 2017
OEF presentation Open Education week 2017OEF presentation Open Education week 2017
OEF presentation Open Education week 2017Fabio Nascimbeni
 
The Ultimate Blogging Guide
The Ultimate Blogging GuideThe Ultimate Blogging Guide
The Ultimate Blogging GuideHardeep Asrani
 
The Biggest Digital Marketing Mistakes Every Startup Makes | Marketing Fails
The Biggest Digital Marketing Mistakes Every Startup Makes | Marketing FailsThe Biggest Digital Marketing Mistakes Every Startup Makes | Marketing Fails
The Biggest Digital Marketing Mistakes Every Startup Makes | Marketing FailsSOURABH KUMAR PANDEY
 
DMU Social Media for Researchers (DTP)
DMU Social Media for Researchers (DTP)DMU Social Media for Researchers (DTP)
DMU Social Media for Researchers (DTP)Richard Hall
 
Apresentação sobre Hitsy
Apresentação sobre HitsyApresentação sobre Hitsy
Apresentação sobre HitsyMarcella Farias
 
Afterworkshop #2 : Inspiration des meilleures interfaces UI Design
Afterworkshop #2 : Inspiration des meilleures interfaces UI DesignAfterworkshop #2 : Inspiration des meilleures interfaces UI Design
Afterworkshop #2 : Inspiration des meilleures interfaces UI DesignNewflux UX/UI News
 
How To Cut Time From Your Hiring Process
How To Cut Time From Your Hiring ProcessHow To Cut Time From Your Hiring Process
How To Cut Time From Your Hiring ProcessSpark Hire, Inc.
 
Lars Aaes - SXSW hos 23/Komfo/Dansk Markesføring
Lars Aaes - SXSW hos 23/Komfo/Dansk Markesføring Lars Aaes - SXSW hos 23/Komfo/Dansk Markesføring
Lars Aaes - SXSW hos 23/Komfo/Dansk Markesføring Lars Aaes
 
Hot Tips to find the Best Talent in 2017
Hot Tips to find the Best Talent in 2017Hot Tips to find the Best Talent in 2017
Hot Tips to find the Best Talent in 2017HireRight
 

Viewers also liked (20)

Corum group: Paris Presentation
Corum group: Paris PresentationCorum group: Paris Presentation
Corum group: Paris Presentation
 
Paper Godsdienstpedagogiek Over Interreligieuze Vooroordelen
Paper Godsdienstpedagogiek Over Interreligieuze VooroordelenPaper Godsdienstpedagogiek Over Interreligieuze Vooroordelen
Paper Godsdienstpedagogiek Over Interreligieuze Vooroordelen
 
Latlon Technologies - Official Presentation
Latlon Technologies - Official Presentation Latlon Technologies - Official Presentation
Latlon Technologies - Official Presentation
 
A regional Open Education agenda for the South Mediterranean
A regional Open Education agenda for the South MediterraneanA regional Open Education agenda for the South Mediterranean
A regional Open Education agenda for the South Mediterranean
 
Corum annual report 2017
Corum annual report 2017Corum annual report 2017
Corum annual report 2017
 
People Operations
People Operations People Operations
People Operations
 
Startup notes
Startup notesStartup notes
Startup notes
 
A11y presentation-2017
A11y presentation-2017A11y presentation-2017
A11y presentation-2017
 
BITCOIN UNLIMITED 51 PERCENT ATTACK COULD CUT PRICE IN HALF: INVESTOR BLOG
BITCOIN UNLIMITED 51 PERCENT ATTACK COULD CUT PRICE IN HALF: INVESTOR BLOGBITCOIN UNLIMITED 51 PERCENT ATTACK COULD CUT PRICE IN HALF: INVESTOR BLOG
BITCOIN UNLIMITED 51 PERCENT ATTACK COULD CUT PRICE IN HALF: INVESTOR BLOG
 
GIVE BACK HACK COLUMBUS 2017
GIVE BACK HACK COLUMBUS 2017 GIVE BACK HACK COLUMBUS 2017
GIVE BACK HACK COLUMBUS 2017
 
The Best Practices in Program Portfolio Evaluation - Competitive Intensity
The Best Practices in Program Portfolio Evaluation - Competitive IntensityThe Best Practices in Program Portfolio Evaluation - Competitive Intensity
The Best Practices in Program Portfolio Evaluation - Competitive Intensity
 
OEF presentation Open Education week 2017
OEF presentation Open Education week 2017OEF presentation Open Education week 2017
OEF presentation Open Education week 2017
 
The Ultimate Blogging Guide
The Ultimate Blogging GuideThe Ultimate Blogging Guide
The Ultimate Blogging Guide
 
The Biggest Digital Marketing Mistakes Every Startup Makes | Marketing Fails
The Biggest Digital Marketing Mistakes Every Startup Makes | Marketing FailsThe Biggest Digital Marketing Mistakes Every Startup Makes | Marketing Fails
The Biggest Digital Marketing Mistakes Every Startup Makes | Marketing Fails
 
DMU Social Media for Researchers (DTP)
DMU Social Media for Researchers (DTP)DMU Social Media for Researchers (DTP)
DMU Social Media for Researchers (DTP)
 
Apresentação sobre Hitsy
Apresentação sobre HitsyApresentação sobre Hitsy
Apresentação sobre Hitsy
 
Afterworkshop #2 : Inspiration des meilleures interfaces UI Design
Afterworkshop #2 : Inspiration des meilleures interfaces UI DesignAfterworkshop #2 : Inspiration des meilleures interfaces UI Design
Afterworkshop #2 : Inspiration des meilleures interfaces UI Design
 
How To Cut Time From Your Hiring Process
How To Cut Time From Your Hiring ProcessHow To Cut Time From Your Hiring Process
How To Cut Time From Your Hiring Process
 
Lars Aaes - SXSW hos 23/Komfo/Dansk Markesføring
Lars Aaes - SXSW hos 23/Komfo/Dansk Markesføring Lars Aaes - SXSW hos 23/Komfo/Dansk Markesføring
Lars Aaes - SXSW hos 23/Komfo/Dansk Markesføring
 
Hot Tips to find the Best Talent in 2017
Hot Tips to find the Best Talent in 2017Hot Tips to find the Best Talent in 2017
Hot Tips to find the Best Talent in 2017
 

Similar to Types of blockchain

What is blockchain for beginner
What is blockchain for beginner What is blockchain for beginner
What is blockchain for beginner CryptoReachApp
 
BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.Rajasekhar364622
 
What Is a Consortium Blockchain.pptx
What Is a Consortium Blockchain.pptxWhat Is a Consortium Blockchain.pptx
What Is a Consortium Blockchain.pptxdanishshah40
 
Types of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdfTypes of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdfTusharVerma933268
 
How to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfHow to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfStephenAmell4
 
BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptjishnub8
 
How Blockchain Development Can Revolutionize Your Digital Strategy.pdf
How Blockchain Development Can Revolutionize Your Digital Strategy.pdfHow Blockchain Development Can Revolutionize Your Digital Strategy.pdf
How Blockchain Development Can Revolutionize Your Digital Strategy.pdfPixel Softwares
 
Different types of crypto blockchains you must know - WazirX.pptx
Different types of crypto blockchains you must know - WazirX.pptxDifferent types of crypto blockchains you must know - WazirX.pptx
Different types of crypto blockchains you must know - WazirX.pptxIza Setia
 
Blockchain-comparisons
Blockchain-comparisonsBlockchain-comparisons
Blockchain-comparisonsSteve Hodgkiss
 
The Truth About Blockchain.pdf
The Truth About Blockchain.pdfThe Truth About Blockchain.pdf
The Truth About Blockchain.pdfMavie Crypto
 
Blockchain&Crypto.pptx
Blockchain&Crypto.pptxBlockchain&Crypto.pptx
Blockchain&Crypto.pptxRafayNaveed4
 
The Three Types of Blockchains
The Three Types of BlockchainsThe Three Types of Blockchains
The Three Types of BlockchainsDucatus Global
 
Blockchain In-Depth Tutorial for Beginners
Blockchain In-Depth Tutorial for BeginnersBlockchain In-Depth Tutorial for Beginners
Blockchain In-Depth Tutorial for BeginnersSimplilearn
 
Guide to blockchain technology
Guide to blockchain technologyGuide to blockchain technology
Guide to blockchain technologyAnisha Sachit
 

Similar to Types of blockchain (20)

What is blockchain for beginner
What is blockchain for beginner What is blockchain for beginner
What is blockchain for beginner
 
BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.
 
BLOCKCHAIN.pptx
BLOCKCHAIN.pptxBLOCKCHAIN.pptx
BLOCKCHAIN.pptx
 
blockchain.pdf
blockchain.pdfblockchain.pdf
blockchain.pdf
 
What Is a Consortium Blockchain.pptx
What Is a Consortium Blockchain.pptxWhat Is a Consortium Blockchain.pptx
What Is a Consortium Blockchain.pptx
 
Define blockchain
Define blockchainDefine blockchain
Define blockchain
 
Types of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdfTypes of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdf
 
How to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfHow to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdf
 
BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.ppt
 
How Blockchain Development Can Revolutionize Your Digital Strategy.pdf
How Blockchain Development Can Revolutionize Your Digital Strategy.pdfHow Blockchain Development Can Revolutionize Your Digital Strategy.pdf
How Blockchain Development Can Revolutionize Your Digital Strategy.pdf
 
Different types of crypto blockchains you must know - WazirX.pptx
Different types of crypto blockchains you must know - WazirX.pptxDifferent types of crypto blockchains you must know - WazirX.pptx
Different types of crypto blockchains you must know - WazirX.pptx
 
Blockchain-comparisons
Blockchain-comparisonsBlockchain-comparisons
Blockchain-comparisons
 
The Truth About Blockchain.pdf
The Truth About Blockchain.pdfThe Truth About Blockchain.pdf
The Truth About Blockchain.pdf
 
Blockchain&Crypto.pptx
Blockchain&Crypto.pptxBlockchain&Crypto.pptx
Blockchain&Crypto.pptx
 
The Three Types of Blockchains
The Three Types of BlockchainsThe Three Types of Blockchains
The Three Types of Blockchains
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain In-Depth Tutorial for Beginners
Blockchain In-Depth Tutorial for BeginnersBlockchain In-Depth Tutorial for Beginners
Blockchain In-Depth Tutorial for Beginners
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
 
Blockchain
BlockchainBlockchain
Blockchain
 
Guide to blockchain technology
Guide to blockchain technologyGuide to blockchain technology
Guide to blockchain technology
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Types of blockchain

  • 1. Types of Blockchain – Public, Private and Permissioned There isa greatinterestinBlockchainnowadays.AsBlockchain –the underlyingtechnologybehind Bitcoin– has slowlystartedgainingpopularity,organisationsacrossthe worldhave started expressingtheirdesirestohave aBlockchainbaseddatabase systemfortheirdailyoperations. A Blockchainisnothingmore thana database.Blockchainoffersmanyadvantagesascomparedto otherdatabases.Ithas a decentralisedstructure withnosingle pointof failure andthe datastored on the Blockchainiscompletelytamperproof.Also,dataonce storedona Blockchainwill alwaysbe storedthere andall the detailsof transferandstorage are visible toeveryone connectedtothe networkandto anyone notconnectedtothe networkwhowishestoverifysuchdetails. PublicBlockchain In a PublicBlockchain,anyone canreadandwrite the data storedon the Blockchainasit is accessible toeveryoneinthe world.A personcanbecome a memberof the Blockchainnetworkand can store,sendand receive dataafterdownloadingthe requiredsoftware onhisdevice. A PublicBlockchainiscompletelydecentralisedasthe permissionstoreadand write dataontothe Blockchainare sharedequallybyall the connectedusers,whocome toa consensusbefore anydata isstoredon the database.A PublicBlockchainisbasedonacompletelytrust-lesssystemwhere no useris givenspecial privilegesonanydecision. The most commonimplementationsof aPublicBlockchainare BitcoinandEthereumwhere the publicnature of Blockchainallows usersfromvariousbackgroundstocome ona commonplatform for makingtransactionsandeliminatesthe needforthirdpartyvendorsbymakingtransactions directbetweenusers. As itis decentralised,aPublicBlockchainisalsomathematicallyveryhard tohack as the cost of hackingbecomestoohighfora systemwhere everynodeconnectedissyncedwith the entire Blockchaindatabase andmore importantly,once ahack isdiscovered,the value of the hackedcoins woulddiminishexponentially –thusincurringhuge lossesonthe hacker(he hadto investa lotof hardware to overtake the networkhashrate) Since all transactionsina publicBlockchainneedtobe verifiedbythousandsof users,the transactionverificationprocesscanbecome verytime consuming. The userspaya largeramountof transactionfee here ascomparedto the Private andPermissionedBlockchain. Private Blockchain In a PublicBlockchain,here the permissionstowrite dataontothe Blockchainare controlledbyone organisationwhichishighlytrustedbythe otherusers.Thisorganisationmay/maynotallow usersto have access toread the data, as publicreadabilitymightnotbe necessaryinmostcases.Insome situations,the organisationmightwantthe publictoauditthe data.Limited/restrictedread permissionsalsoprovide agreaterlevelof privacytothe users,a feature notavailable inPublic Blockchains. The organisationincontrol hasthe powertochange the rulesof a Private Blockchainandmayalso decline transactionsbasedontheirestablishedrulesandregulations. In a Private Blockchain,the transactionsare quickerastheycanbe verifiedbe asmall numberof devices.Thus,the userspaylesseramountsof transactionfeessince the numberof people verifying the transactionisfewerthanin a PublicBlockchain.
  • 2. Also,the devicesare verywell connectedandanyfaultscanbe fixedbyhumanintervention,which can be easilyapprovedbythe userssince the userstrustthe single organisationincontrol of the Blockchain. PermissionedBlockchain A PermissionedBlockchainisatype of Private Blockchainandsharesmanyfeaturesof the latter.A PermissionedBlockchainprovidesahybridbetweenthe ‘low-trust’providedbyPublicBlockchains and the ‘single highly-trustedentity’modelof Private Blockchains.PopularlycalledaConsortium Blockchain,itisone where insteadof allowinganypersonwithaninternetconnectiontoparticipate inthe verificationof the transaction processorallowingasingle companytohave full control,afew selectednodesare predetermined. For example –imagine aconsortiumof 10 companies,eachof whichoperatesadevice connectedto the Blockchainnetwork.If company‘2’onlytradesand sharesitsinvoiceswith‘3’,‘4’and ‘5’ there is no needforthe othercompaniestobe giventhe permissionstoreadthe shareddata. Althoughsome degree of decentralisationismaintainedintheirstructure,the participantshave the powerto grant read/write permissionstootherparticipants,leadingtothe ‘PartiallyDecentralised’ designof PermissionedBlockchains. The transactionsare quickto verifyinaPermissionedBlockchain asthere are a handful of verifiers, withthe transactionfee miniscule thusincreasingthe overallefficiencyof transactions.Like Private Blockchains,the PermissionedBlockchainsmaintainthe privacyof auser’sdata,without consolidatingpowerwitha single organisation. WhichBlockchain is the bestfor you? There isno Blockchainthatcan be recommendedtoeveryone.Eachtype has itspros andcons. The mainconcernssurroundingPublicBlockchainsare privacyandscalability.Bothcanbe mitigatedto some extentbutare not completelysolvedatpresent. Similarly,Private Blockchainshave asingle pointof failure andbringingvariousorganisationstouse a commonmodel remainsaconcern. Both the modelsare neededinvariousindustriesandconstant developmentsare beingdone on boththe PublicandPrivate models.So,whichmodel thatwouldsuityouthe best?Well,thatclearly dependsonthe type of data beingstored,andwhoall will needthe accesstoreadand write data on the Blockchainandwhetherall these participantsneedtobe givensame ordifferentprivilegesof readingandwritingonthe database in concern.