This paper analyses the various aspects of blockchain architecture, including its structure, purpose, key characteristics, and consensus algorithms. It also discusses the advantages and disadvantages of utilising blockchain architecture and potential improvements.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: BLOCKCHAIN ARCHITECTURE Critical Analysis of Blockchain Architecture Name of the Student Name of the University Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1BLOCKCHAIN ARCHITECTURE I INTRODUCTION A. Background Blockchain technology has become onfthemostemergingtechnologies especiallyinthebusinesstransitionand valuechangeoperation.Thisnew technologyadvancestheassetsexchange operation across the globe while assuring the security,privacyandtheoptimization. Blockchainhassomeremarkablekey propertiesintermsofchangingthe efficiencyoftraditionalcommercialand data processing based operation with its key characteristicsnamelydecentralization, persistency, anonymity and auditability. The majorusageofthistechnologyis cryptocurrency,which allowsthe user to exchangevaluewithsecureandmore utilisable nonphysical units. The strength of this emerging technology is its operational structure and adoptability in any networking platform.TheBlockchainarchitecture emphasise the data structure and distribution schema of the entities within the blockchain networksystem.From2008,blockchain architecturechangesthewayofnetwork based database works while increasing the number of utilisers up to enormous level. Severalnewimplementationsuchas cryptocurrency,Bictonmining,crypto- wallet,Hashcodegeneration,digital signatures and others are becoming more andmorepopular.Alongwiththe advancement of Information Technologies theblockchainhasbecomeintensely connectedwithseveralnewinterventions such as Internet Of Things (IOT), Cloud Computing, Big Data, Software automation, Business Intelligence and others. B. Structure Inthiseraofglobalisedeconomyand digitalisedtechnologiesblockchain architecture will be increasing the potential way of utility. Therefore, the data structure and operational phenomenon of blockchain technologies should be discussed as a part of the evaluation procedure. This paper will focus on the operational structure of the
2BLOCKCHAIN ARCHITECTURE blockchainarchitecturewhileindentifying the key characteristics of the blockchain. This paper will also discuss the advantages aswellasdisadvantagesofutilising blockchain architecture. Along with analysis of the strength and weakness this paper will also discuss the potential improvement as well as the current challenges considering both legal regulations and illegal operations. Afterthattheexistingutilisationof blockchain architecture and other parts of blockchaintechnologywillbediscussed. Afterexploringtheexitingusagethe possiblefuturedirectionwillbealso discussedwhileconsideringthestrength, weakness,opportunitiesandthreats simultaneously. C. Purpose The purpose of this paper is to analyse the variousessentialcomponentsofthe blockchaintechnologyincludingthe architecture, utility, optimisation and others inordertofindthefuturedirectionof improvement.Inthiseraofglobalised economyanddigitalisedtechnologies blockchain architecture will be increasing the potential way of utility. Therefore, the data structure and operational phenomenon ofblockchaintechnologieshavetobe discussedasapartoftheevaluation procedure.Anotheressentialaimofthis paperistoprovideanoverviewof blockchainarchitecturewhilecomparing variousconsensusalgorithmsusedfor operating different blockchain systems. II. Fundamental of Blockchain Architecture Inordertounderstandtheoperational structure of the blockchain technology the fundamental of blockchain architecture has to be explored properly. In this section the reportwilldiscussthestructureofthe blockchainsconsideringitsmajor components. The key characteristics and the utility of Consensus Algorithms have been also analysed. A. Structure of Blockchain
3BLOCKCHAIN ARCHITECTURE The online or offline database network can have three types of structure dependent on the connectivity between different nodes of the network. These three types of networks areCentralisedNetwork,Decentralised Network and Distributed Network. Each of individual network structure has its specific set of merits and demerits [1]. Blockchain is a digital ledger based on distributed network structureoperatedwithspecificdata structure. It comprises of specific in data aboutvarioustransactionsoreventsin linkedandsynchroniseddataset.A particularblockchainisreplicatedand shared among the other participants or user oftheblockchainnetwork.These participants are identified as theNodes or Stationsof theblockchain network. Figure 1: Types of network architecture [1] Insomespecificcases,the blockchainnetworkcanalsousethe decentralised as well as centralised structure to formulate a temporary private network structure. However, the distributed network increases the accessibility of the data while reducingthefalsedatainsertionor alternation.InBlockchainnetwork architecture,thestationsornodesare connected with each other in a distributed manner that allows them to validate a new information before incorporate it in the main block chain database. Figure 2: Sequence of blocks in block chain [5] Blockchain is a chain of sequentially storedblocks. Each of these boxes holds a completelistoftransactionrecordslike conventional public or private ledger. When the new records has to be inserted in the records through a particular station, it is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4BLOCKCHAIN ARCHITECTURE recordedinanewblockcreatedafter approvalfromtheothersectionsofthe network [6]. In this way the old records remainunchangedandunforgeable.The newblockscontainstheaddressofthe previousblockwhichcontaintheolder record. The address of the block is encrypted in aHashaddress, which can be decrypted through authorised permission. Blockchain hasadoptedthisinformationhandling strategyfromtheancientuseof Cryptography.The structure of the block is subdivided into 2 sections namely the block headerandTransactioncounter.The transactioncantersstorethetransaction record and the header block stores the record and block properties including parent block Hash address, nBits, Nonce and others. Figure 3: Structure of the Block [3] Hash codeis the most essential part of the block chain technology which ensure the security of the blocks address. The Hash code is a encrypted code that consists of the location of the blockchain as well as the addressofthetargetblockswithits sequence. As discussed earlier the purpose of the blockchain architecture is to maintain a secure and distributed ledger. When an new transaction needs initiation the sender nodeorstationrequesttheblockchain network to initiate the transaction process. Inthisphasesenderappliesforthe transactionwiththePublickeyofthe receiver.This publickey consists of the encryptedblockchainaddress.After analysing the authenticity of the proposer after comparing with the Private key from thereceiverside,theconnectednodes initiate the new block developing procedure. In this phase the new block with transaction records is added in the next position of the last block of the target blockchain.
5BLOCKCHAIN ARCHITECTURE Figure 4: Process of Block chain based transaction [2] Each and every Node or Station has a particular user access id that contains the address of a particular blockchain sequence. This key is known as thePublic Key,which is known by the users who want to make value transactions with the Key holder. Each user has aPrivate Key, which defines the securityofthetransactionprocess.This private key give the access to the key holder toreadhisorherinformationfromthe particular block. Using this Private Key to authorised the accessibility is also known as Digital Signature. Digital signature allows a transition process to secure and to be peer to peer.Peer To Peer connectionallows the usertocompleteatransactionprocess without allowing any third party access on the information of the data. Peer To Peer connection is also used in online monitory transactions though banks. B. Key Characteristics Because of the unique data handling system and network structure the blockchain has some unique characteristics that defines itsutilityaswellaspropertiesof functionalities.Distributivedatastructure, Persistenttransactionsupport,Anonymity andAuditabilityaresomeofthemost significant characteristics of the Blockchain Architecture and Blockchain technology. Intraditionalcentralisednetwork system a transaction requires to be permitted through the central trusted agency, which was known as the centre of the network system. As a result it increasesthe cost while making the performance bottlenecks at the central servers. On the other hand, the decentralised mode, no specific third party is neededtoauthenticatethetransaction systeminblockchain.Inthissystem, Consensus algorithms are used to maintain
6BLOCKCHAIN ARCHITECTURE theconsistencyofthedatawithinthe distributed network structure of Blockchain technology. Persistencyisanotherunique characteristicoftheBlockchainnetwork architecture.Throughthisblockchain system,theexecutedtransactionsis validated quickly. In case of any invalid or duplicate transactions, the linked miners or nodes would not permit this transaction to be happened or stored as a record [3]. At the same time, because of block based record storing system it is not possible to drop or delete or even rollback transactionsonce they are recorded in the data storing system of blockchain. As an additional benefit in the Blockchain system, it can immediately identifyanyinvalidBlocksthatcontain invalidtransactionsorduplicateorfalse record. EnhancedPrivacyis another unique characteristicoftheBlockchainnetwork architecture.Duringthetransaction procedure, each active user is able to interact with the blockchain through a temporarily generatedaccessibilityaddress.This temporary address helps the user to hide the real identity to anyone, even to the miners whoareoperatingthroughtheseparate connected Nodes or Stations.However, it has to be also considered that the blockchain is not able to completely ensure the privacy preservationbecauseofitstheintrinsic constraint within the network system. Blockchain is widely used for non physical value transaction. This value units arealsoknownascryptocurrency[5]. Bitcoin, Litecoin, Monero are some of the well known cryptocurrency used across the globe. Among all these Cryptocurrencies , Bitcoinisthemostpopularone.Inthe databasearchitectureoftheBitcoin, blockchain stores record data that include theuserbalances,UnspentTransaction, Outputof previous transaction and other essential information. After the first time recordoflatesttransactionintothe blockchain,thestateoftransactionsare switchedby thesystemfrom unspentto spent.Throughthisspecificwayof
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7BLOCKCHAIN ARCHITECTURE operation,thetransactiondetailsandits validity can be tracked and verified easily. Anotheressentialcharacterofthe Blockchain systems is itspolymorphism. Thischaracteristicallowstheblockchain system to be utilised though three types of architecturenamelypublicblockchain, privateblockchainandconsortium blockchain. In public blockchain, everyone could take part in the consensus process and all available records are visible to the public. On the contrary, in consortium blockchain, only a group of previously chosen nodes are capabletoparticipateintheconsensus process of the transactionsystem and in block creation operation. In case of private blockchain,thenodeswithspecific authorisation can have the accessibility to join the consensus process. C. Consensus Algorithms Inblockchainarchitecture,the process of reaching consensus among the untrustworthy nodes can be understood by the transformation problem of well-known ByzantineGenerals(BG)Problem.For reaching to a secured consensus system in distributed environment, is very challenging as well as complex process [8]. Being a distributednetworksystem,itisa challenging operation for any blockchain. Therefore,inblockchainnetwork architecture, no particular central node is present to ensure the authentication and to control the Consensus system. To resolve thisissue,somespecificprotocolsare required to ensure the consistency of ledgers in different nodes. In the following section themajorstrategiesofConsensus Algorithms have been presented. PoW(Proof of work) is a specific consensus strategy, which is used mainly as a major part of the Blockchain technology. In the decentralised network of blockchain, inordertostoreaparticulartransaction recordaspecificnodeisrequiredtobe selected[2].Themostsimplewayto execute this process is random selection of the proof node. In PoW system, each node
8BLOCKCHAIN ARCHITECTURE of the blockchain network calculates a hash value of the block header which can be used as a viable block in the next transaction recording.Inthisdistributednetwork, blockswithvalidheadercouldbe simultaneouslygeneratedwithindifferent individual nodes. In this fast paced process, a lot of computer calculations is required by Miners do to find the appropriate Header Hash for the next node in PoW.Therefore, it is clear that this PoW system requires too muchresourcesintermsoftimeand manpower.Todiminishtheloss,some specific PoW protocols have been designed inwhichthesystemcanhavesome additional application. PoS or Proof of stakeis a less resource consuming process and alternative to PoW. In this consensus, the Miners need to prove their ownership on the total value of the currency. In practical situation, it has been seen that people with less currencies would likely to attack the Blockchain network [3]. PoS Consensus uses a specific mathematical equation that seeks for the lowest hash value through various combination of the stake size. PBFTorPracticalbyzantinefault toleranceis a replication algorithm, which is used handle and overcome the byzantine fault. In this PBFT consensus, a new block isidentifiedinaroundbasedselection system where in each round, a primary key isselectedabidingbysomeconstrains. PBFT is able to handle up to one third of the malicious and corrupted byzantine replicas. Therefore,likeaconsensusalgorithm, HyperledgerFabricutilisesthePBFT system.Theprimarykeyiscompletely responsible for ordering the transaction. DPOSorDelegatedproofofstakeis representativedemocraticconisation process. In this DPOS consensus system, the associated stakeholders chose their delegates for generating and validating the particular blocks through election [7]. Very limited number of nodes for the block validation, the validation procedure usually takes long time.Thisprocessleadstothequick confirmation system for transaction period.
9BLOCKCHAIN ARCHITECTURE Rippleisanotherconsensusalgorithm, which uses sub-networks within the larger Blockchain network collectively trusted by other nodes. Nodes can be divided into two types namely server and Client. Server is there for executing consensus process and client for the monetary transaction, in which everyserverhasandUniqueNodeList (UNL).Ontheotherhand,another byzantineconsensusalgorithmis Tendermint. In this system, a new block is slectedthroughaselectionround.A proposerisselectedforbroadcastingan unconfirmed block of this selection round. III. ADVANTAGES AND CHALLENGES A. Scalability The blockchain is becoming bulky because of the increasing amount of transactions in every day. All transactions have to be stored by each node has in order to validate them on the blockchain. The reason behind this is they have to validate the source node of the existing transaction to find that unspent or not.Atthesametime,becauseofthe specific restriction on the size of the block andthetimeintervalforgeneratinga completely new block, a Bitcoin blockchain is able to process only 7 transactions in each second. As a result, this limitation hinders the blockchain system to fulfil the increasing requirement of processing huge number of transactions in a small amount of time [6]. Ontheotherhand,becauseofthevery limitedstoringcapacityofblocks,many small transactions use to be delayed. In this situation, most of the miners prefer only the transactionswith high transactionfee. In ordertoavoidthisdiscrepancies Redesigning blockchain strategy has been developedandtheBitcoin-NG(Next Generation) has been developed [1]. The main concept behind the Bitcoin-NG is to separate the conventional data block into two parts where one part is key block for leaderelectionandanotherpartis microblocktostorethedetailsofthe transaction. As a result, this protocol divides time into different epochs. In every epoch,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10BLOCKCHAIN ARCHITECTURE every active miners have to hash in order to generate a key block. After the generation of the key block, the particular node who has successfullygeneratedthemicroblocks becomestheleader.Besides,Bitcoin-NG can hold and extend the heaviest and longest chain where the microblocks cannot carry anyweight.Throughthisstrategy, blockchaincanberedesignedwhile enhancing the compatibility between size of the block and network security. B. Privacy Leakage Blockchain technology is able to secure the privacy to some extent through its public key and private key based operation. Users can use the blockchain to transact their value through private key and public key without exposingtheirrealidentityduring transaction.At thesametime,itisalso proven, that blockchain cannot completely ensure privacy of the user during transaction because the publicly visible values of the transactions and the balance details of the publickey[9].IfrequiredtheBitcoin transactions of a user can be tracked through linking the transaction history, in order to revealthe detailedinformationabout the usernode.Severalmethodshavebeen presented as the process of linking the user pseudonyms to IP addresses even at when the user is logged out from the Network Address Translation (NAT) or firewalls [4]. Atthesametime,eachclientcanbe uniquely identified by a set of nodes with which it is connected andthe origin of a transaction can be found. Multiple methods aretheretoimproveanonymityof blockchain namely Mixing and Anonymous. C. Selfish Mining From the last 5 to 10 years it has beenfoundthat,Blockchainisbeing attackedmultipletimebythecolluding selfish miners. The blockchain network can become exposed even if a very minimum segment of the hashing power is utilised unethically.In selfish miningtactics,the minersusetokeeptheirminedblocks hiddenwithoutbringingoutamongthe
11BLOCKCHAIN ARCHITECTURE entire blockchain network. The private block chainisonlyrevealedtosomespecific authenticatedminers.Sincethistypeof private block chain is longer than the usual publicchain,allminerscanadmitthe privatechain.Asaresult,beforethe publishmentofthisprivateblockchain, honest miners use to west their resources on a useless branch while at the same time selfish miners mine their preserved private chain without any competitors [8]. Hence, selfish miners get more revenue than the honest miners do. On the other hand, in stubbornmining,minerscanbeableto amplify the gain by composing non-trivially mining attacks on the secured network-level eclipse attacks. This situation can enable the stubborn miners to mine the blocks when the private chain is even completely lost. It can causefurtherdiscrepancyinmonetary transaction on this virtual platform. IV. APPLICATION OF BLOCK CHAIN ARCHITECTURE A. Financial services Blockchaintechnologyhasbeenwidely applied for financial transaction also known ascryptocurrency.Nowadays, cryptocurrenciesisoneofthemost emergingfinancialtransactionbased technologicalsystems [6]. One of the most valuable opportunity for the adaptation of blockchain in commercial operations is the facility of quick and efficient cross-border transactions.Blockchaintechnologyis capable to develop and maintain borderless network architecture through the globe that can be used for cross-border transactions withease.UtilisingtheBlockchain technology can eliminate the use of third party agents in the commercial transactional ecosystem that can also remove the burden of extra transaction cost. B. Business and Industry Along with the increment of rapid utilisation of Internet of Things (IoT) has several advantages in terms of delivering an inter-connectionbetweenobjectsand humans[5].Thisphenomenonhelpsto
12BLOCKCHAIN ARCHITECTURE develope-businessarchitecturedeveloped for IoT environment.In this system, the DistributedAutonomousCorporation (DAC) can be used as an entity that gives automated transaction services even in the absence of human intervention. It also based on autonomously peer to peer transaction due to the blockchain technology. At the sametime,Manyglobalbusiness organisations can adopt Bitcoin and IoTcoin asthevaluechangeunitsandcurrency system. In agri-food supply chain, the RFID identificationsystemandblockchain technology can be used together in order to increase the efficiency significantly [2]. On theotherhand,thecloudcomputingis utilisedasfogcomputingoredge computing,hasbeenusedtodevelopa transparentandfairvaluechangeand transactionsystemusingBitcoinvalue change and blockchain architecture. C. Healthcare Blockchain has a huge potential to address theinteroperabilityissuesintheexisting healthcare systems. Blockchain can allow the stakeholders of the healthcare service namelyhealthcareentities,medical researcherandothersinordertoshare electronic health record (EHR) through a secured platform. Sharing of HER allows the healthcare system to improve the overall quality of medical care while enhancing the recommended options for doctors. Besides, tohavebetteraccessoftheseissues,a healthcare data gateway (HDG) can be made based on the blockchain storage platform [7]. This operational data architecture helps to design new system to prioritize patient urgencythroughMedRec.MedRecis basicallyadistributedledgerprotocol, which can use public key cryptography to create a new blockchain when required. The particular blockchain can be replicated and distributedacrosseachnodeinthe healthcarenetwork.Besides,blockchain technology is also used to access control on automaticsystemwhiletrackingspecific tasksincludingappendinganewrecord, change in viewership rights and others D. Governance
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13BLOCKCHAIN ARCHITECTURE A government system has to handle verities of duties and responsibilities that must be executed properly for the benefit of thepeople.Inthisstructuredwayof executionthedataprocessing,record maintaining, financial transaction and others have a huge role that play as the skeleton of the governmentsystem.In thissituation, Blockchain technology can play a vital role in government system through its advanced record management and transaction handling system. Blockchains can also be utilised in identitymanagementsystems,document processing,financialsecurityandpublic service operations and transmitting sensitive information[4].Utilisingtheblockchain technology in government, a huge number oftheseprocessesthatusuallyrequires countless work force, money and time, can be executed through the digital ledger of block chain with spontaneous smart contract protocols.Asaresultofthisaccurate, efficient,quickandflawlessworking process more mission can be accomplished in less time while having a high satisfaction and support from the citizen. V. POSSIBLE FUTURE DIRECTION A. Blockchain testing Recentlyvarioustypesof blockchains have been innovated that have over 700 listed cryptocurrencies [5]. Any blockchaindevelopercanfalsifythe performance of their dishonestly, to attract investorsforgeneratehugeprofit completelyunethically.Apartfromthat, beforecombiningaparticularproposed blockchainintobusiness,theutilityand compatibility of blockchain need to be tested to satisfy the requirements. Therefore, it is clear that blockchain testing mechanism is essentialformaintainthequalityand tangibilityoftheblockchaintechnology. The process of blockchain testing has two phases, namelystandardization phaseand testing phase. The authority and the users has to mutually agreed upon the criteria of theblockchainintheStandardisephase.
14BLOCKCHAIN ARCHITECTURE After the creation of each blockchain, it can be tested through utilising the criteria chart agreedmutuallyinordertotestthe functionality of the particular blockchain as per the developer’s claims. Similarly in the testing phase, the testers need to perform withdifferentcriteriasupportedbythe platformintegrityandaccuracy measurement. B. De-centralization ThedesignofBlockchain Architecture is based on distributed network system. However, there is a trend within the global miners to centralised the Blockchain network in the mining pool by rewriting the linkandstationaddresses.This centralisationcanbedestructiveforthe securityoftheprivacyassuranceof blockchainbasednetworksystem. Surprisingly, the top 5 bitcoin mining pools have the ownership of more than 51% of the total hash power across the global Bitcoin network[2].Atthesametime,through strategy of selfish mining, pools, which have more than 25% of total computing power, are able to generate more revenue. On the other hand, rational miners or honest miners may become attracted to the selfish pool. After this, with higher number of selfish miner the pool could easily overshoot the 51% of the total ownership power in global Blockchain network. For preventing these situations, strategic methods are required, to make the Blockchain Network completely decentralised and distributed. C. Big data analytics Blockchaincanbestructurally combined with big data in order to increase theefficiencyandutilisationoboth technologies.Theseutilisationscanbe categorisedintotwodifferenttypeof operationsnamelydatamanagementand dataanalytics.Indatamanagement operation, blockchain could be used to store data, which would be securely distributed within the network [7]. Blockchain is also able to maintain the originality of the data. As an example, if a particular blockchain is
15BLOCKCHAIN ARCHITECTURE usedtostorethehealthrelateddetailed informationofthepatients.Thestored information in blockchain cannot be altered ofdeletedandevenstolen.Fordata analytics process, and data transactions the blockchain technology could be used as a integrated system in big data analytics. As an example, the user trading patterns can be extracted and stored in a cloud network. By analysing this data, the users can predict the potential trading behaviours of their partners very easily. VI. CONCLUSION The purpose of this paper was to analyse the various essential components of theblockchaintechnologyincludingthe architecture, utility, optimisation and others inordertofindthefuturedirectionof improvement.From the discussion it has been found that, Blockchain technology has become on f the most emerging technologies especiallyinthebusinesstransitionand valuechangeoperation.Thisnew technologyadvancestheassetsexchange operation across the globe while assuring the security, privacy and the optimization. It has been also found that blockchain architecture changes the way of network based database workswhileincreasingthenumberof utilisers up to enormous level. Several new implementationsuchascryptocurrency, Bictonmining,crypto-wallet,Hashcode generation, digital signatures and others are becoming more and more popular. It has been found from the above discussion that the address of the block is encrypted in a Hash address, which can be decryptedthroughauthorisedpermission known as Privet Key. Consensus is specific wayofoperationthroughwhichthe transaction details and its validity could be easilyverifiedandtracked.Consensus Algorithms is the problem solving approach oftheConsensusrelatedproblemin Blockchainoperation.Alongwiththe popularity of using Internet of Things (IoT), it has brought many advantages that enhance theaccessibilityandtheutilityofthe network based database system. It has been
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16BLOCKCHAIN ARCHITECTURE found that Blockchain can become useless becauseofunethicaloperationofselfish miners. However, with appropriate problem solvingstrategyanddecentralisationthe blockchainarchitecturecanbeusedin financial service, health services, business operations and even in Government system. Apartfromthat,Blockchaincanbe structurally combined with big data in order to increase the efficiency and utilisation o both technologies.
17BLOCKCHAIN ARCHITECTURE REFERENCE: [1] V. Dhillon, D. Metcalf, and M. Hooper, “FoundationsofBlockchain,”Blockchain Enabled Applications, pp. 15–24, 2017. [2] Z. Zheng, S. Xie, H. Dai, X. Chen, and H.Wang,“AnOverviewofBlockchain Technology: Architecture, Consensus, and FutureTrends,”2017IEEEInternational Congress on Big Data (BigData Congress), 2017. [3] X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch, L. Bass, C. Pautasso, and P. Rimba, “A Taxonomy of Blockchain-Based Systems forArchitectureDesign,”2017IEEE InternationalConferenceonSoftware Architecture (ICSA), 2017. [4]C.D.Clack,“ABlockchainGrand Challenge:SmartFinancial Derivatives,”Frontiers in Blockchain, vol. 1, 2018. [5]I.Eyal,“BlockchainTechnology: TransformingLibertarianCryptocurrency DreamstoFinanceandBanking Realities,”Computer, vol. 50, no. 9, pp. 38– 49, 2017. [6] H. Hassani, X. Huang, and E. Silva, “Big-Crypto:BigData,Blockchainand Cryptocurrency,”BigDataandCognitive Computing, vol. 2, no. 4, p. 34, 2018. [7] S. Corbet, C. J. Larkin, B. M. Lucey, and L.Yarovaya,“Kodakcoin:ABlockchain RevolutionorExploitingaPotential Cryptocurrency Bubble?,”SSRN Electronic Journal, 2018. [8] V. Dhillon, D. Metcalf, and M. Hooper, “RecentDevelopmentsin Blockchain,”BlockchainEnabled Applications, pp. 151–181, 2017. [9] M. V. Rijmenam, “Blockchain and Fair Trade,”Blockchain, pp. 114–124. [10]V.Morabito,“BlockchainValue System,”BusinessInnovationThrough Blockchain, pp. 21–39, 2017.