Survey of Blockchain Technology and Smart Contract Implementations

Verified

Added on  2021/04/24

|22
|6926
|37
Report
AI Summary
This report provides a comprehensive survey of blockchain technology and its implementations, focusing on its application in business organizations and the utilization of encrypting transactional processes. The paper delves into the digital technology of blockchain systems as they are applied to smart contracts, highlighting the importance of transparency and trust among different nodes. It explores the evolution from public to private blockchains to address privacy concerns, along with software protocols like "Zero Knowledge Proof" and Zcash. The report analyzes the operational processing of transactions, including issues related to international payments and information leakage. It also examines the integration of cultural, social, and economic factors to evaluate risks and the use of blockchain technology in various banking sectors for secure transactions. The report highlights the advantages of blockchain technology, including its use in supply chain management, product quality analysis, and batch processing. Finally, the report provides a detailed description of the working of blockchain technology, covering both public and private blockchains, and methods used for transaction processing. It examines the role of digital signatures and the challenges associated with ensuring the chronological linking of blocks.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head:BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
Blockchain technology and implementations
Name of the student:
Name of the university:
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
Survey of existing blockchain technology and implementations
1. Abstract
Blockchain technology is an invention that is used primarily for most economic
transactions, applications and recording economic transactions at a required location. This paper
is based on a comprehensive survey of the implementation of the improved technology and the
utilization of encrypting transactional processes in business organizations. Also, this paper
provides details about the digital technology of blockchain systems as they are applied to smart
contracts. Transparency of information involved in different blockchain transactions is usually
based on the trust among different nodes as anyone with computer and internet connection can
access such information(Adams, 2016). However, to avoid leakage and misuse of information
arising out of lack of trust, private blockchains have come into existence, where the authorisation
to access the relevant information is restricted.
However, privacy issues still persist and, in this direction, different software protocols
such as “Zero Knowledge Proof”, Zcash have been deployed to counter such challenges. This
paper provides detailed description of these protocols in blockchain along with the privacy and
confidentiality issues faced by the concerned parties. The survey will allow the study of some
research papers in forming an inference on the operational processing of the transactions. The
slackness in the operation is dependent on the use of blockchain technology. Blockchain
technology has been used significantly in the cryptographies of Bitcoins. However, this
technology has been facing issues of international payments and information leakage.
This paper survey will highlight some of these issues and propose the integration of an
effective operational deployment. The use of successive factors includes cultural and social
aspects. Examples of these are power dynamics, privacy concerns and information flow. These
are done to make investigation on different risks. It also involves economic factors like
confronting with non-physical currencies. Moreover, this includes various levels of ceaselessness
and corporation that take place among technologists, regulators, and market participants.
Utilization of these successive factors in the integration will be based on the analysis of various
factors of supportive and effective evaluation process. Various banking sectors have been using
blockchain technology for safe transaction.
Keywords: Blockchain, Language Industry, Smart Contract,
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
2.0 Introduction of Blockchain technology and Smart contracts
While blockchain is a digital technology that combines cryptographic data management,
incentive mechanisms and networking for supporting the recording execution and checking of
transactions between the concerned parties, a blockchain ledger comprises of lists or blocks
pertaining to the relevant transaction (Peters & Panayi, 2016). Originally, this technology
emerged as a support to various kinds of digital currency. However, blockchain has now
established itself as basic computational platform meant for executing small transactions called
as "Smart contracts"(Kosba et al., 2016). Accordingly, a blockchain is a form of distributive data
base as blockchain transactions can support different services such as notarization, registration,
voting, payments and escrow among other things.
Conventionally, certain third-party service providers such as banks, financial institutions,
legal firms and government authorities provide such services. However, the blockchain software
has now become reliable to provide an alternative to these providers. A blockchain ledger
comprises of a list or a chain of groups, referred to as blocks. The process involves addition of an
intended transaction to the “transaction pool” that would be recorded on the ledger. The
processing nodes that reside within a given blockchain community check the integrity of the
related transactions and subsequently record them by forming new blocks on the relevant ledger.
While different geographically-distributed nodes replicate the ledger contents, such processing
nodes are responsible to operate the blockchain system in a joint manner without being centrally
controlled by any third party. Hence, this technology offers a shared platform where majority of
such nodes jointly operate the relevant blockchain, thus replacing the need for trusting and
central a third party.
2.1 Advantages of using Blockchain technology
The Blockchain is the process by which the transactional information blocks of the
business organization is concatenated by using encryption technology (Coblenz, 2017). The use
of the technology is also used for storing the information provided in the bank’s information
system profusely. The use of encryption in the distributed system would provide the ease of
preventing the bad elements for infiltrating the system for extracting the information and
modifying it. The blockchain methods are helpful for listing the deployment of the improved
operational development. The integration of the activities is aligned with the formation of the
supportive development factors (Hull, 2017). The analysis would align the functional
deployment of operations. The alignment of the operations is aligned for the deployment of
improved operational development. The allowance of the integrations had provided the
development of the security for the analysis of the integration management. The deployment of
the operations is helpful for forming the security of the information stored in the development of
the improved functional development. The analysis had shown that the improved functional
analysis had been helpful of the system for listing the deployment of the improved functional
alignment (Hull et al., 2016). The blockchain industry is aligned for forming the development of
the cryptography alignment of the integration management of the functions.
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
The alignment of the cryptography is helpful for the management of the successive
development for the options like Ethereum, Bitcoin, Koilion, and Ripple (Matsuo, 2017). The
smart contracts are helpful for listing the deployment of the improved operations. The funding
mechanism is applied for carrying out the deployment of the activities for the alignment of the
operations. The use of the successive factors of the integration would be based on the analysis of
the various factors of supportive and effective evaluation process (Bartoletti & Pompianu, 2017).
The various banking sectors have been using the technology of blockchain for their safe and
sound transactions and processes. The system alignment is formed for listing the management of
the simulation for the development model. The operations had deployed for the alignment of the
operations and supporting the formation of the system development operations. The use of the
blockchain is helpful for forming the alignment of the supportive development model. The
blockchain methods are helpful for listing the deployment of the improved operational
development (Rifi et al., 2017). The integration of the activities is aligned with the formation of
the supportive development factors.
Many scholars like Brunnler, Flumini andStuder (2018), have pointed out that the
Blockchain can be helpful for the process of supply chain management. The technology of
blockchain can be used for tracking orders, their sources, quality, and quantity also. The
blockchain offers the traceability and cost efficiency for the supply chain management system. It
is very helpful for bringing transparency in business to business (B2B) operations. The
operations of transfer and production had deployed for the alignment of the operations and
supporting the formation of the system development operations. According to the scholars like
Qi et al., (2017), the technology of the blockchain is helpful for analysing the quality of products
and goods. The analysis would align the functional deployment of operations. The alignment of
the operations is aligned for the deployment of improved operational development. The
allowance of the integrations had provided the development of the security for the analysis of the
integration management. The process of evaluation of the quality of the products can be checked
with the help of blockchain technology. The technology is also helpful for leading the product or
good to its origin for ensuring that the operations are successive and helpful for the development
of the implementation of the operations (Tang & Kostic, 2017). The analysis had also provided
scope for the safety of the products and batch processing for the goods.
2.2 Working of Blockchain
2.2.1 General working
After its original use for digital currencies such as Bitcoin, this technology is useful in
diverse platforms to serve different purposes. While blockchains can act like any traditional
database for representing information or transactions in many organizations within an industry,
these also can provide additional information that would have varied organizational and technical
consequences. Accordingly, there are distinct types of blockchains that serve varied purposes.
These are broadly categorized as “public blockchains” and “private or permissioned
blockchains” (Hernandez, 2017). While public blockchains allow for unrestricted public
participation in their use and operation, private blockchains are operated through private
computer networks that has strong access controls, usually operated through a nominated
administrator who has far more administrative controls. Accordingly, the software used for
running private blockchains may differ from that used in public blockchains. In this direction,
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
certain industrial groups such as Ripple, R3CEV and Hyperledger are presently engaged in the
development of specialized software for running private blockchains. While such technical
solutions support only limited number of processing-nodes, which may not be the limitation in
public blockchains networking, these platforms do result in provision of higher confidentiality
and security.
While “Nakamoto Consensus” that allows the processing nodes to treat the longest book
history as an authoritative history is followed by public blockchains, private blockchains use
replication algorithms to ensure greater guarantee about the transaction completion process. For
example, Byzantine fault tolerance principle is used here instead of “Nakamoto Consensus”,
which is prevalent in public blockchains. In addition, the admittance of processing nodes is
controlled through the administrator in case of permissioned blockchain networks, while anyone
can become a miner (processing node) in public blockchain system. (Chen et al, 2017)
2.2.2Detailed working
As currently the financial institutions serve as tested third party responsible for
processing and mediating a financial transaction done through internet commerce, certain on-line
frauds are possible that need mediation into such transactions by the concerned institutions. This
process is certainly going to increase the transaction costs.Various cryptocurrencies are giving
rise to high benefits for worldwide business in terms of accepting BitCoin payment. These
accepting of payments from are done on the behalf of merchants. Moreover, it has been offering
option of converting payments to dollars and other types of traditional currencies very quickly.
The process insulated merchants from the volatility. Bitcoin network has seemed to move higher
and higher since the past few years. In this way, various types of bitcoins are responsible to raise
their transaction fees as per the response in the marketplace.
Accordingly, cryptographic proof is used in such transactions to avoid any trust in third
parties. This requires digital signatures. While the sender uses a private key to send such data,
the receiver can get it using the public key. In addition, the digital signatures of the sender are
verified using the private key of the sender. This method has found wide use in transaction of
digital currencies such as bitcoin.
The following diagram provides an idea about the working of blockchains system
involving the cryptocurrency transactions.
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
(Source: Scet.berkeley.edu)
The above being blockchain system adopted by digital currency Bitcoin does not
guarantee the sequence received by a node to be in the same order as they have been generated in
the particular transaction. Accordingly, the blockchain technology solved this problem by
chronological linking of blocks in the proper linear manner where each block has the hash
belonging to previous block. However, the validation issues remain with such arrangement as
well (blockchain, nd).
2.3 Methods used in Blockchain
As transparency was the original idea of this technology, it facilitates that no single entity
could control the network while anyone has the permission to write into and modify the network
as a validator. However, in many financial transactions, such arrangement is not favored as
confidentiality and privacy overweigh the transparency and decentralization features of this
technology. Accordingly, certain systems developed for such purpose comprise of having single
validator, also called a block generator who collects the proposed transactions and validates
them after batching them together to form a new block. To avoid dependence solely on mutual
trust, certain other legal recourses are available that can preserve confidentiality and privacy
while achieving network stability, capability and speed.
In addition, cryptographic techniques and encryption systems are used by blockchain
solutions to solve the confidentiality issues. In this area, advanced techniques providing
crytographic solutions, using mathematically proven guarantees, are employed for solving issues
related to privacy of transactions and data. While encryption is a technique that disguises the
plain text, it uses the encryption algorithm, with unique key. Such key is needed for the
decryption of the relevant message to reproduce the original text.
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
However, as blockchains need not to share any information about the change of state
related to it, this should happen legally. In order to achieve this, “Zero Knowledge Proofs” use
certain types of crytographic techniques that employ specific kind of homomorphic encryption.
The purpose of adopting this technique involves separation of information needed for reaching a
concolusive and valid state of affairs. In addition, such technique must ensure that the statement
is true as proven by the honest prover and verified by the verifier who is following the proper
protocol. However, there remains a small probability involving a cheating prover that can
convince the verifier about truth of this statement. The “zero knowledge” feature ensures that a
transcript is produced which reflects the interaction between a cheating verifier and an honest
prover through the use of some kind of simulator. Certain tehnological solutions such as zk-
SNARKs offer this type of zero knowledge proof. However, another technique, called Zcash is a
replicated ledger that uses a permissionless encrypted information for recording private data
within a public blockchain.
According to Andrew Miller (The trend, 2016), Hawk, which is another cryptography
model aiming at preserving privacy does not record the financial transactions within the
blockchain system and this program hides from public all data while keeping its code of contract
as private along with keeping the money as well as data sent and received as private. All
information except the required proof is visible in such program. In addition, it tackles various
issues related to privacy and validity in a manner that is similar to Zcash. (The trend, 2016)
While proprties of permissioned blockchains include public verifiability that allows
anyone to verify the correctness of the system, it requires data transparency and updation of the
state. As trust forms the basis of this system, a trust anchor is nominated, who can have the
authority to allow access to the system while revoking the write and read access to the system, if
needed. However, the problem of exposed data to all users in the network prevail between the
transparency and privacy and it may be easier to achieve privacy in centralized system, as public
verifiability is not needed in such a system(Wust & Gerveis, nd).
3.0Difference between public and private blockchain systems
When there is a need for the network to be decentralized, the public chain system is most
suitable, while it ensures total transparency of the relevant ledger as well as anonymity. The
public blockchain system sets up blocks of different peer-to-peer transactions. The verification is
done for each transaction before it is synced with each node associated with the system.
Thereafter the relevant transaction is recorded in the system. The next transaction can move
forward only after this verification and synchronization takes place. As everyone can become a
node in public system, the only requirement for setting up a node is the availability of internet
connection and a computer. Due to this feature, it is called a public blockchain system. As access
is allowed to everyone for public block chain history, the system functions slowly as compared
to a private blockchain system. In addition, it consumes enormous energy, as electricity demand
increases with addition of a new node. However, public blockchains offer advantages of
preserving anonymity while each transaction remains public.
In private blockchain system, each transaction needs complete verification. The company
running the system can write and verify every transaction, while it can also choose to permit or
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
hold the “read” access to transactions. While this provides more privacy as compared to the
public blockchains, the decentralized security cannot be offered by the private blockchains. As
the power consolidation remains with only one company, there is the possibility of misusing
such power.
An attempt to resolve this issue, a consortium blockchain platform or permissioned is
available that is only partly private. In such a system, certain pre-determined selected nodes are
authorized to verify the transactions. Accordingly, a consortium blockchain can provide full
benefits, such as transaction privacy and efficiency, that are available in private blockchains
while the authorization power will not remain with any single company or node. At the same
time, it is not fully public as access to everyone with internet connection and computer is not
possible in this situation. (Thompson, 2015)
Document Page
Running head:BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
4.0Comparision of functionality and capability in existing blockchains
Bitcoin Ethereum IBM Open
Blockchain
Intel Sawtooth
Lake
BlockStream
sidechain
Elements
Eris Hyperledger
Fabric
Currency Crypto
Currency
Crypto
Currency
No Currency No Currency Mini Cypto
Currency
No Currency As a native
currency is
required for chain
network, one can
develop their
individual native
currency under
chaincode.
Flexibility in
development
Fairly
Flexible
Very Flexible Not Flexible Not Flexible Very Flexible Not Flexible The fully
supported first
chaincode of the
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
hyperledger fabric
is Golang. It has
been also
supporting
JavaScript.
Support and
Documentation
Well Well Well Well Poor Well Regarding
documentation
and support there
are two leading
methods. The first
one is stateless
UTXO model and
the next one is
account model.
Consensus
Mechanism
Pow Pow - Ethash BFT & SIEVE BFT & PoET Centralized
federated
Component
Dependent
The first
mechanism is to
code distinct
contracts to
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
standalone
examples of
chaincode. Next,
the second way is
to utilize
chaincode for
creating
decentralized
applications.
Speed Moderate High Moderate High Moderate High The speed can be
enhanced through
managing the
decentralized
applications
collectively.
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
Usability of bitcoin is the user experience. It has been referring to the ease of access and use of website and product. Designing
of bitcoins, helps the users to determine the level of usability though these bitcoins are unusable One of the main problems for new
technologies like crypto-currencies is efficiently that are presented to the users. It has been mapped towards current mental models
that have been balancing its security and ease of use. In the present scenario of block-chains, the challenge has been specifically more
acute. This is because the stakes has been high and those patterns are comparatively new. Security in terms of bitcoins has been
defending information and resources against various external and internal, accidental and malicious threats. Defense mechanisms for
this security include response, prevention and detection towards threats using security policies, software tools and various IT services.
Blocks of bitcoins consists of transitions over bitcoin network. This on chain processing capacity of bitcoin netwrok gets
restricted because of many factors. These factors include average block creation tie of 10 minutes and limiting the block size. In this
case firstly, blockchain technologies are related to the high complexity and array of largely-specialized terms. Then there is the
network growth of users that has been huge and constantly rising. This facilitates the stringer reaction for attacks. Next, there are risks
of error taking pace due to various involvements of different kinds human factors. Further, bitcoins and other blockchains are related
with considerable security flaw. Lastly, during the initial years after the launch of Bitcoin, the transactions of digital currency have
been nearly free.
Scalability is the attribute describing ability of bitcoins to grow and manage its rise in demand. Bitcoin is scalable in nature. It
is more adaptable towards the change in demands or needs of the users. At present, every blockchain consensus protocols can adapt to
change in needs. It denotes that all the nodes that are participating completely within the network should process all transactions.
Recalling of the blockchains comprises of one inherent critical characteristic. It is called decentralization. This indicates that all the
single nodes that are present over the networks must process all transaction. Besides, they must maintain a copy of the complete state.
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
4.1Blockchain-based platforms comparison table "Challenges"
Bitcoin Ethereum IBM Open
Blockchain
Intel Sawtooth
Lake
BlockStream
sidechain
Elements
Eris Hyperledger
Fabric
Usability User-based User-based Code-based Transaction-
based
Sidechain-based Code- based Chaincodes are
able to write and
read any byte
arrays. They can
execute arbitrary
logics that can
impose in future
languages.
Security Very secure Fairly secure Very secure Not secure Not secure Secure Regarding
security, as
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
block chains are
created, they
need to remove
cumbersome,
slow and costly
middle steps.
Limitations
and
Availability
Available
through mining
and other means
Available only
through
mining
Unavailable Unavailable Available but
dependent
Available The
Hyperledger
Composer is
unable to exploit
every features of
Hyperledger
fabric. However,
it has been
changing rapidly
and intends to
stay at any
limits.
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
Scalability Fairly scalable Fairly Scalable Scalable Fairly scalable Fairly Scalable Scalable Here, the
Hyperledger
Fabric can be
said to be
scalable, since it
is built on
modular
architecture.
Here the
transaction is
separated into
three phases.
They are
distributed logic
processing,
transaction
ordering along
with transaction
Document Page
BLOCKCHAIN TECHNOLOGY AND IMPLEMENTATIONS
commitment and
validation.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Running head:BLOCKCHAIN TECHNOLOGY AND SMART CONTRACT
5.0 Security and Confidentiality of Blockchain
While section 4 details about the existing solutions towards blockchains privacy, it is
essential to understand the difference between privacy and confidentiality as well as annonymity. As
privacy relates to the right of any company to retain their data while not having their action
monitored or recorded anywhere, several methods can ensure such feature within a blockchain
system. Being anonymous without revealing the identity is one such method. The zero knowledge
proofs ensure that the transaction amount as well as addresses of receipeint and sender are obscured.
However, the zero knowledge snarks do not function well in dealing with the complex blockchain
functions and this remains a limitation to this soloution which needs resolution. Yet another solution
comprises of not posting any sensitive information regarding the relevant transactions on particular
blockchain.
Use of “State Channels” is helpful in retaining privacy as it allows the recording and
execution of transaction between two parties on an off-chain platform. The reference for such
transactions is recorded on relevant blockchain system after their successful completion. However,
such transactions are useful through State Channels only for smaller payments involving frequent
sending and reciept of payments between two parties. The system does not help in case large amount
transactions are involved.
The encryption is another method to keep the data hidden from others while the transaction
happens between the two parties. As encryption is done using an insecure medium, certain questions
are bound to arise about the vulnarabiliy of data to be stored in this manner on long-term basis with
chances of its access by anyone through forceful decryption of data, if needed. However, companies
have deployed strong firewalls as best security to avoid anyone stealing the relevant data.
On the other hand, confidentiality relates to sharing of sensitive information, by mutual
consent, between the two concerned parties (Smolenski, 2017).
The security features of blockchains are determined below.
Blockchain technology has been depending highly on the ledger. It has been occurring many
times to track every financial transaction. Here the ledgers are decentralized. Different incredibly
sophisticated and coordinated attacks are needed on numerous devices to gain the kind of access to
the main ledger. These attacks are done on a single device at the same time.
Again, chain itself is another tenet of security. Here the ledger exists as a long chain of
sequential blocks. Structurally, every record dates back to all the way the system launches. It
indicates that individuals trying to change any transaction must first have to change every
transaction. It has been leading up to that transaction and is done with utmost accuracy. It makes the
process of hypothetical tampering much more complex. Moreover, it also raises the overall system
security.
Further, it takes two users to agree upon the common fact that the transaction is sound. In
most of the current day payment processing system, there are only few links present in the
verification chain. Within block chain model, numerous amounts of different nodes are present.
Document Page
1BLOCKCHAIN TECHNOLOGY AND SMART CONTRACT
They have been working independently for verifying transactions. As the nodes deny agreeing with
the transaction, the whole process gets cancelled. The system keeps the ledger organized and makes
that nearly impossible to undertake any fraudulent transition.
Cryptographic keys that are used in blockchain exchanges are also giving rise to various
challenges of current cybersecurity. Every cryptographic sequence is complex and long. Further, it is
virtually impossible to decipher that there is still any authorization over that. Here, the two-key
system makes transactions more secure. This is done without sacrificing transparency. In this way
the system is made an unique one.
6.0Approach to resolve confidentiality issues in blockchain
As confidentility relates to providing permissions for access to sensitive information, the
current online internet environment requires authorization at every step to access any data. Google
documents is a simple example, in this direction, where the creator has rights to grant editing
permission to selected users after creating the relevant document. Following is a sketch of
“Lightstreams”, which is based on Ethereum Client (Geth) but with significant changes to ensure
security of smart contracts.
(Source:Hackernoon.com)
While any Ethereum Smart Contract stores the relevant information in the blockchain
alongwith the related instruction code, there can be a change in the state of transactions due to
transmission of such information as it goes public with access to every node on the network.
However, this issue can be resolved through creation of a distributed secure vault, within a new
protocol, for storing the information related to relevant smart contracts. This will enable the
transmision of only the reference address message that is stored in the vault while nodes and parties
Document Page
2BLOCKCHAIN TECHNOLOGY AND SMART CONTRACT
permitted to access the information can read full history related to contract’s state changes as stored
in the vault. This will include creation of required protocol. (Smolenski, 2017)
According to former executive reponsible for financial markets and banking at IBM, Richard
Brown (Allison, 2017), Corda approach can further resolve the security issues at IBM, which uses
Hyperledger Fabric for its blockchain technology. Under this approach the data distribution is
selected as all information regarding indidual deals, loan agreement, trade and balance shall be sent
only to those who require to receive it, while such information will also be limited to the amount of
history, which is needed by the receiver. (Allison, 2017)
7.0Blockchain Implementations andapplications
Cryptocurrency Digital
Identity
Distributed
cloud storage
Decentralized
notary
Smart
contracts
Digital
voting
Business
transactions
Flexibility Very Flexible Flexible Very Flexible Very Flexible Flexible Very
flexible
Setting Scale
Of Blockchain
Efficiency High High High Low High High Addressing
threats to
digital
transformation
Security Very secure Secure secure Not secure Not secure Secure Blockchain as
integration
going beyond
consumer
Speed Fast Fair Very Fast Fairly Fast Fast Very Fast Setting Scale
Of Blockchain
Read
Permission
Public Restricted Public Public Public Restricted Setting the
Scale Of
Blockchain
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
3BLOCKCHAIN TECHNOLOGY AND SMART CONTRACT
8.0Disadvantages of Using Blockchain technology
Most of the scholars like Tasca, Thanabalasingham and Tessone, (2017), have considered the
basic function of the blockchain to be limited to the funding application. The accounting processing
is largely revoked by the use of the blockchain mechanism and it ensure that there is very few or no
probability for any error. The blockchain technology ensures that the operations are aligned
successfully. The study had also shown that the record kept through blockchain minimizes the scope
of threat on information and the human errors too. The smart contracts are helpful for listing the
deployment of the improved operations. The funding mechanism is applied for carrying out the
deployment of the activities for the alignment of the operations. The system alignment is formed for
listing the management of the simulation for the development model.
Hence, from the study of Kosba et al., (2016), it can be said that the innovation of the
blockchain is useful for dissecting the nature of items and products. The innovation of blockchain
can be utilized for following requests, their sources, quality, and amount moreover. The blockchain
offers the traceability and cost productivity for the store network administration framework. It is
extremely useful for getting straightforwardness B2B business activities. The tasks of exchange and
creation had conveyed for the arrangement of the activities and supporting the arrangement of the
framework improvement tasks. The innovation is additionally useful for driving the item or great to
its birthplace for guaranteeing that the activities are progressive and accommodating for the
advancement of the usage of the tasks. Kim, Laskowski and Nan (2018) have pointed that the
examination had likewise given degree to the wellbeing of the items and bunch preparing for the
products. The bookkeeping preparing is generally disavowed by the utilization of the blockchain
system and it guarantee that there is not very many or no likelihood for any mistake. The blockchain
innovation guarantees that the tasks are adjusted effectively. The examination had likewise
demonstrated that the record kept through blockchain limits the extent of danger on data and the
human blunders as well.
8.1Implementations comparison table "Challanges":
Document Page
4BLOCKCHAIN TECHNOLOGY AND SMART CONTRACT
The use of blockchain can find its use in the technologies of Digital Identity and Digital
Voting in the near future,
Digital Identity: The most crucial impact of the use of the blockchain in the future would be
its application for storing digital identification verification. The problem of security of the digital
identity would be solved as its misuse had become one of the most prominent issues in the current
world. The digital identity using blockchain can be secured for banking, national security,
healthcare, online retailing, and citizenship.
Digital Voting: The blockchain can be implied for digital voting schemes as it would
provide secure and safe electoral voting for the candidates. The implication of the blockchain would
also allow the voter for ensuring that his/her vote has been casted to the desired candidate. However,
this information would be protected from rest of the people due to the application of the blockchain.
The distributed digital voting of the candidates would represent a method for enfranchising non-
participants.
Cryptocurren
cy
Digital
Identity
Distribut
ed cloud
storage
Decentraliz
ed notary
Smart
contracts
Digital
voting
Business
transactions
Immutability Impossible to
tamper
Impossibl
e to
tamper
Could be
tampered
Could be
tampered
Impossibl
e to
tamper
Impossibl
e to
tamper
Setting Scale Of
Blockchain
Limitations
and
Availability
Available
through
mining and
other means
Available Unavailab
le
Unavailable Available
but
dependen
t
Available Blockchain as
integration going
beyond consumer
Scalability Scalable Scalable Scalable Fairly
scalable
Fairly
Scalable
Scalable Addressing threats
to digital
transformation
Usability User-based User-
based
Code-
based
Transaction-
based
Side
chain-
based
User-
based
Addressing threats
to digital
transformation
Acceptability Not yet
globally
acceptable
Globally
acceptab
le
Globally
acceptabl
e
Not yet
globally
acceptable
Globally
acceptab
le
Not yet
globally
acceptab
le
Addressing threats
to digital
transformation
Document Page
5BLOCKCHAIN TECHNOLOGY AND SMART CONTRACT
9.1 Conclusion
It can be concluded from the study that the use of the blockchain technology is progressing
and its diverse applications are being found out. The deployment of the operations is helpful for
forming the security of the information stored in the development of the improved functional
development. The analysis had also shown that the improved technological development had been
helpful of the system for listing the deployment of the improved functional alignment. The
blockchain industry is aligned for forming the development of the cryptography alignment of the
integration management of the functions. The alignment of the cryptography is helpful for the
management of the successive development for the options like Ethereum, Bitcoin, Koilion, and
Ripple. However, the confidentiality issues remain regarding the access of information being given
to general public or the selected few. While public blockchians are based on decentralized
distribution network where anyone can have access to the information, private blockchains are
mostly used by individual parties finalizing a deal under the smart contracts. The information access
is allowed to the relevant parties only. In addition, certain specialized software such as Hyperledger
Fiber, Ripple and R3CE is deployed to counter the privacy issues. However, the blockchain working
is based on the assumption that dealing parties cannot be trusted regarding use of the sensitive
infortmation. In addition, cryptographic techniques along with ”Zero Knowledge Proofs”,
zkSNARKS and Zcash protocol software is available to solve the conidentiaility issues. “State
Channels” is yet another software used to counter such issues. However, development of specialized
protocols involving creation of secure vaults to store sensitive information can further resolve the
privacy issues while Corda approach ensures that information is received by only those who need it.
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]