Blockchain for real world applications
"Distributed Ledger Technology (DLT) is a technical infrastructure and protocol that allows simultaneous access, verification and updating of records in an irreversible manner over a network spanning multiple entities or locations. It can be a Blockchain, Directed Acylic Graph, Hashgraph, Holoc...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons
[2023]
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009755210406719 |
Tabla de Contenidos:
- Intro
- Blockchain for Real World Applications
- Contents
- Illustrations
- Foreword
- Preface
- 1 Introduction
- 2 Distributed Ledger Technology
- 2.1 Different Types of Distributed Ledger Technology
- 2.1.1 Blockchain
- 2.1.2 Directed Acyclic Graph
- 2.1.3 Hashgraph
- 2.1.4 Holochain
- 2.1.5 Tempo (Radix)
- 2.2 Chronological Evolution
- 2.2.1 Blockchain 1.0
- 2.2.2 Blockchain 2.0
- 2.2.3 Blockchain 3.0
- 2.2.4 Blockchain 4.0
- 2.3 Blockchain Architecture
- 2.3.1 Block
- 2.3.2 Hash Function
- 2.3.3 Encryption
- 2.3.3.1 Problems
- 2.3.4 Keys: Public and Private
- 2.3.5 Decentralized Identifier
- 3 Blockchain Ecosystem
- 3.1 Working of Blockchain
- 3.2 Key Characteristics
- 3.2.1 Decentralization
- 3.2.2 Persistence
- 3.2.3 Anonymity
- 3.2.4 Auditability
- 3.3 Unspent Transaction Output
- 3.4 Classification of Blockchain on Access Management
- 3.4.1 Public Blockchain
- 3.4.2 Private Blockchain
- 3.4.3 Consortium Blockchain
- 3.5 Consensus
- 3.5.1 Proof-of-Work
- 3.5.2 Proof-of-Stake
- 3.5.3 Peercoin
- 3.5.4 Practical Byzantine Fault Tolerance
- 3.5.5 Delegated Proof-of-Stake
- 3.5.6 Ripple
- 3.5.7 Tendermint
- 3.5.8 Consensus Algorithms: A Comparison
- 3.5.8.1 Node Identity Management
- 3.5.8.2 Energy Saving
- 3.5.8.3 Tolerated Power of Adversary
- 3.5.9 Advances in Consensus Algorithms
- 3.6 Payment Verification in Blockchain
- 3.6.1 Simple Payment Verification
- 3.6.1.1 Key Features
- 3.6.2 Full Payment Verification
- 3.6.2.1 Key Features
- 3.7 Hashgraph
- 3.7.1 Elements of Hashgraph
- 3.7.2 Diagrammatic Representation
- 3.7.3 How Does Hashgraph Work?
- 3.8 Scalability
- 4 Transactions in Bitcoin Blockchain
- 4.1 Coinbase Transactions
- 4.1.1 Structure
- 4.1.2 Key Features of Coinbase Transactions
- 4.1.3 Computation of Transaction Value
- 4.2 Transactions Involving Fiat Currency.
- 4.2.1 Cryptocurrency Exchanges
- 4.2.2 Bitcoin Debit Card
- 4.2.3 Bitcoin ATMs
- 4.2.4 Metal Pay
- 4.2.5 Peer-to-Peer Exchanges
- 4.3 Top Fiat Currencies for Bitcoin Transactions
- 4.3.1 US Dollar
- 4.3.2 Japanese Yen
- 4.3.3 Euro
- 4.3.4 Korean Won
- 4.3.5 Chinese Yuan
- 4.3.6 Indian National Rupee
- 4.4 Price Determination for Bitcoin in Transactions
- 4.4.1 Cost of Mining Bitcoin
- 4.4.2 Market Supply and Demand
- 4.4.3 Bitcoin Rewards
- 4.4.4 Exchanges
- 4.4.5 Competing Cryptocurrencies
- 4.4.6 Regulatory Provisions
- 4.4.7 Internal Governance
- 4.4.8 Value of Bitcoin
- 4.4.9 Can the Bitcoin Price Be Zero?
- 4.4.10 Why Is Bitcoin's Price Volatile?
- 4.5 Controlling Transaction Costs in Bitcoin
- 4.5.1 History of Bitcoin Cash
- 4.5.2 Concerns about Bitcoin Cash
- 4.5.3 Bitcoin Cash Core Features
- 4.5.4 Utility of Bitcoin Cash
- 4.5.5 Advancements over Bitcoin
- 4.5.5.1 Maximum Block Size
- 4.5.5.2 Cost Efficiency
- 4.5.5.3 Smart Contract Support
- 4.5.5.4 Issue of Token
- 4.5.5.5 Nonfungible Tokens
- 4.5.5.6 No Replacement-by-Fee
- 4.5.5.7 Schnorr Signatures
- 4.5.5.8 Difficulty Adjustment Algorithm
- 4.5.6 Bitcoin Cash - Ease of Use
- 4.5.7 Challenges to Bitcoin Cash
- 5 Ethereum and Hyperledger Fabric
- 5.1 Early Attempts to Program Cryptocurrencies
- 5.2 Smart Contracts
- 5.3 Working of Ethereum
- 5.3.1 Gas
- 5.3.2 Ether
- 5.4 Hyperledger
- 5.5 Working of Hyperledger
- 5.5.1 Components
- 5.5.2 Workflow
- 5.5.2.1 Proposal
- 5.5.2.2 Endorsement
- 5.5.2.3 Transmission to Ordering Service
- 5.5.2.4 Updating the Ledger
- 5.5.3 Industrial Applications of Hyperledger Fabric
- 5.5.3.1 Production
- 5.5.3.2 B2B Contract
- 5.5.3.3 Supply Chain
- 5.5.3.4 Asset Depository
- 5.5.3.5 Trading and Asset Transfer
- 5.5.3.6 Insurance
- 5.5.3.7 Real Estate
- 5.5.4 Benefits of Hyperledger Fabric.
- 5.5.4.1 Open Source
- 5.5.4.2 Private and Confidential
- 5.5.4.3 Access Control
- 5.5.4.4 Chaincode Functionality
- 5.5.4.5 Performance
- 5.5.4.6 Modular Design
- 5.6 Ethereum Versus Hyperledger
- 5.6.1 Purpose
- 5.6.2 Cryptocurrency
- 5.6.3 Participation
- 5.6.4 Privacy
- 5.6.5 Governance
- 5.6.6 Computer Code
- 5.6.7 Smart Contracts
- 5.6.8 Consensus Mechanism
- 5.6.9 Rate of Transactions
- 5.6.10 Use-cases
- 5.7 Decentralized Applications
- 5.7.1 Merits of Decentralized Applications
- 5.7.1.1 Zero Downtime
- 5.7.1.2 Privacy
- 5.7.1.3 Resistance to Censorship
- 5.7.1.4 Absolute Data Integrity
- 5.7.2 Demerits of Decentralized Applications
- 5.7.2.1 Maintenance
- 5.7.2.2 Performance Overhead
- 5.7.2.3 Network Congestion
- 5.7.2.4 User Experience
- 5.7.2.5 Centralization
- 5.8 Tokens
- 6 Identity as a Panacea for the Real World
- 6.1 Identity Systems
- 6.1.1 Contemporary ID Systems
- 6.2 Centralized Model
- 6.2.1 A Case Study of World's Largest Biometric ID System - Aadhaar
- 6.2.1.1 Salient Features of Aadhaar
- 6.2.1.2 Biometric and Demographic Standards
- 6.2.1.3 Enrollment Set-up
- 6.2.1.4 Entities and Their Roles
- 6.2.1.5 Process of Authentication
- 6.2.1.6 Budget and Outlay
- 6.2.1.7 Enrollment Status and Saturation
- 6.3 Cost and Benefits
- 6.3.1 Merits
- 6.3.2 Demerits
- 6.3.2.1 Waste of Resources
- 6.3.2.2 Lack of Neutrality
- 6.3.2.3 Technical Glitches
- 6.3.2.4 Security Procedures
- 6.3.2.5 Unauthorized Access
- 6.3.2.6 Absence of Data Protection Act
- 6.3.2.7 Involvement of Private Players
- 6.3.2.8 Freedom of Choice as an Illusion
- 6.3.2.9 Implicit Coercion
- 6.4 Quest for One World - One Identity
- 7 Decentralized Identities
- 7.1 Identity Models
- 7.1.1 Centralized Identity
- 7.1.2 Federated Identity
- 7.1.3 User-centric Identity
- 7.1.4 Self-sovereign Identity.
- 7.2 Blockchain-based Solutions
- 7.3 Identity Management
- 7.3.1 Current Challenges
- 7.3.1.1 Absence of Compatibility
- 7.3.1.2 Identity Theft
- 7.3.1.3 KYC Onboarding and Weak Authentication Protocols
- 7.3.1.4 Lack of Control
- 7.4 Identity Storage | Interplanetary File System
- 7.4.1 How Does IPFS Access the Documents?
- 7.4.2 Transactions Involved in Accessing Documents on IPFS
- 7.4.3 IPFS Commands
- 7.5 Biometric Solutions
- 7.5.1 Fingerprint Verification
- 7.5.2 Iris Scan
- 7.5.3 Vascular Technology
- 7.5.4 Palm Vein Pattern
- 7.5.5 Facial Recognition
- 7.5.1.1 Verification of Government ID
- 7.5.1.2 Verification of a User
- 7.5.1.3 Creation of a Digital ID
- 7.5.2 System Overview
- 7.5.2.1 Identify Creator
- 7.5.2.2 Identity User
- 7.5.2.3 Identity Manager
- 7.5.2.4 Identity Device
- 7.5.3 Blockchain Identity Protocol
- 7.5.3.1 Creation of Digital ID
- 7.5.3.2 Use of Digital ID
- 7.5.3.3 Digital ID Management
- 7.5.4 Security Audit
- 7.5.4.1 Binding
- 7.5.4.2 Privacy
- 7.5.5 Authentication Protocol
- 7.6 Identity Access
- 7.6.1 Identity Encryption
- 7.6.2 Zero Knowledge Proof
- 7.6.3 Revocation
- 7.7 Merits of a Proposed System
- 7.7.1 Seamless Navigation
- 7.7.2 Accessibility
- 7.7.3 Easy and Secure
- 7.7.4 Decentralized Public Key Infrastructure
- 7.7.5 Decentralized Storage
- 7.7.6 Manageability and Control
- 7.7.7 Data Portability
- 7.7.8 Prevention of Identity Theft
- 7.8 Disadvantages of the Proposed System
- 7.8.1 Privacy Leakage
- 7.8.2 Selfish Mining
- 7.8.3 Admin Conflicts
- 7.9 Challenges
- 7.9.1 Storage Optimization and Redesign
- 7.9.2 Privacy Protection
- 7.9.3 Random Beacons and Timestamps
- 7.10 Solutions with Hyperledger Fabric
- 7.10.1 Warning Pointers
- 7.10.2 Safety Protocols
- 8 Encryption and Cybersecurity
- 8.1 Cryptography.
- 8.1.1 Different Types of Cryptography
- 8.1.1.1 Symmetric Key Cryptography
- 8.1.1.2 Asymmetric Key Cryptography
- 8.1.1.3 Hash Functions
- 8.1.2 Cryptographic Schemes
- 8.1.2.1 Simple Substitution Cipher
- 8.1.2.2 Caesar Cipher
- 8.1.2.3 Vigenère Cipher
- 8.1.2.4 Transposition Cipher
- 8.2 Playfair Cipher
- 8.2.1 Encryption Algorithm
- 8.2.1.1 Step 1 - Generate Squares (5 * 5)
- 8.2.1.2 Step 2 - Algorithm to Encrypt Plaintext
- 8.2.2 Decryption Algorithm
- 8.2.2.1 Step 1 - Generate Squares (5 * 5)
- 8.2.2.2 Step 2 - Algorithm to Decrypt the Ciphertext
- 8.2.3 Advantages and Disadvantages
- 8.2.3.1 Advantages
- 8.2.3.2 Disadvantages
- 8.3 Hill Cipher
- 8.3.1 Substitution Scheme
- 8.3.1.1 Encryption
- 8.3.1.2 Decryption
- 8.4 RSA Algorithm in Cryptography
- 8.4.1 Working Mechanism
- 8.4.1.1 Generating the Public Key
- 8.4.1.2 Generating a Private Key
- 8.5 Multiple Precision Arithmetic Library
- 8.5.1 GNU Multiple Precision Arithmetic Library
- 8.5.2 RSA Algorithm Implementation Using GMP Library
- 8.5.3 Weak RSA Decryption with Chinese Remainder Theorem
- 8.6 SHA-512 Hash in Java
- 8.7 Cybersecurity
- 8.7.1 Common Cyberattacks
- 8.7.1.1 Denial-of-Service Attacks
- 8.7.1.2 Malware
- 8.7.1.3 Man-in-the-Middle Attack
- 8.7.1.4 Phishing
- 8.7.1.5 Structured Language Query Injection
- 8.7.1.6 Latest Cyberthreats
- 8.7.2 Key Cybersecurity Features
- 8.7.3 Blockchain for Cybersecurity
- 8.7.4 Pros and Cons of Blockchain in Cybersecurity
- 8.7.4.1 Pros
- 8.7.4.2 Cons
- 8.7.5 Real-world Examples
- 8.7.5.1 Australian Government
- 8.7.5.2 Barclays
- 8.7.5.3 Chinese Military
- 8.7.5.4 Cisco
- 8.7.5.5 Coinbase
- 8.7.5.6 Colorado State
- 8.7.5.7 Founders Bank
- 8.7.5.8 Health Linkage
- 8.7.5.9 JP Morgan
- 8.7.5.10 Mobile Coin
- 8.7.5.11 Philips Healthcare
- 8.7.5.12 Santander Bank
- 8.7.5.13 Wall Street.
- 9 Data Management.