Blockchain Introduction
Blockchain Introduction
WHAT IS BLOCKCHAIN
Current Financial System BlockChain System
• Central authorities (bank, fed, notary, escrow, etc.) transfer • Distributed network of computers (nodes) that maintain a shared
actual value between two parties source of information
Bitcoin BlockChain
• A digital currency which was in a lot of • Distributed
ways the first demonstrable use of
BlockChain • Secure
• A protocol that supports a • Log file
decentralized, pseudo-anonymous,
peer-to-peer digital currency
INTRODUCTION TO BLOCKCHAIN
A BlockChain is a distributed secure log file or shared ledger
with technology to trust transactions without a central authority
Every viable transaction is stored
in the shared public ledger
• With respect to immutability, the way the data is structured is significant. There
are two key ideas: Hashes and Blocks.
WHAT IS BLOCKCHAIN
A Brief Intro:
• Hashes
• A hash function is a type of mathematical function which turns data into a fingerprint
of that data called a hash. It’s like a formula or algorithm which takes the input data
(any data, whether it’s the entire Encyclopedia Britannica, or just the number ‘1’) and
turns it into an output of a fixed length, which represents the fingerprint of the data.
There are many types of hash functions e.g. SHA-256
• When you mash the phrase “Hello from Bits on Blocks!” through this function, you get
this fingerprint out:
389f9ef3822e5c88f4b140db82c459064711a52182a3e438b4ebc7ecda62b9bb (SHA-256 hash of the phrase).
E.g.: DarkMatter Seamless SDK that integrates into your application; standardizes BLOCKCHAIN Security Schemes and Crypto Algorithms based on
Extended Functionality Version of Hyperledger Fabric
TRANSACTION FLOW EXAMPLE FOR PERMISSIONED BLOCKCHAIN
• Payer and provider systems are disconnected from one Peer to Peer Insurance System Mgmt.
another as well Medical Data Collection and Quantification
• Centralized healthcare data (maintained in on-site Paying Ransom when Access is denied
repositories powered by physical servers or on an IT
cloud) and heightened vulnerability to security breaches
(theft as well as potentially undetected
modification/falsification)
Linkages
SMART SOVEREIGNTY AND PROVENANCE
Cryptocurrency
Digital value Smart right Basic smart Multiparty Distributed Distributed Distributed Distributed
exchange and obligation contract smart autonomous autonomous autonomous autonomous
contract business unit organization government society
Simple to Complex
Smart Contracts –
A family Consumer buys Landlord Seller lends Unit of a Self-driving Settlers of a Groups of
member sends a digital content remotely locks buyer funds to corporation trucks make previously settlers from
some bitcoin to stream nonpaying buy house issues its own P2P deliveries, uninhabited different areas
another family tenant out of bonds, and pay local toll area code their establish self-
apartment buyers monitor road fees, and own self- enforcing trade
payments via a buy local enforcing agreements
shared ledger electricity government
services
Simple Complex
HEALTHCARE BARRIERS: MANAGING CONTRACTUAL CORRECTIONS
HEALTHCARE BARRIERS
Barrier “Many hospitals are unwilling to digitally sign some documents because the
codes that HIPAA mandates may need to be manually corrected, and those
Root Cause
corrections will break a digital signature.”
Surmounting the Instead, such modifications can (and should) be captured in additional digital
Barrier signatures/follow-on transactions
HEALTHCARE BARRIERS-2: PATIENT MANAGEMENT OF OWN DATA
HEALTHCARE BARRIERS
Barrier “How to achieve the HealthCare Industry objective of Patients and Consumers
Root Cause ‘owning’ and controlling their own Health related data?”
BARRIERS
BARRIERS
Barrier “It’s possible to undo lots of transactions in our current legal environment.
Reversing charges on credit cards is possible, for example, and is a desirable
Root Cause
feature of our current system.”
• Rigorous incorporation
of identity management
in order to meaningfully
enable transaction non-
repudiation
NATURAL BLOCKCHAIN + IGTF INTERSECTIONS
Permissioned BC potentially has a place in IGTF:
• What are the natural intersections for Permissioned BC and IGTF?
• Permissioned BC is dependent on strongest authentication of actors within the system, to ensure
non-repudiation on transactions, just the same as Grid/Supercomputing
• Digital Signing of transactions for confidentiality and integrity purposes (in addition to
Identity/Access controls identified above) makes PKI the natural (the BEST) solution for
permissioned BC, same as is used for IGTF
• BC Nodes should be run on strongly audited and securely operated infrastructure, which is what
IGTF requires of Authentication Providers, and potentially to a lesser degree the Attribute
Authority providers (I can be convinced of the latter perhaps)
• Global trust infrastructure at known levels of assurance is already in place for IGTF, this could
potentially allow easy deployment of global BC
• But do we need a new level of hardware based certificates for BC operations?
• What are the natural items that an IGTF BC infrastructure would be need for?
• Global Identities? (Individuals, nodes, services, LRAs?)
• Global Virtual Organizations with added benefit of transparency?
• Distribution of anchors and CRLs via BC?
ACHIEVABLE PERMISSIONED BLOCKCHAINS
Integrated at Individual Use Case Systems e.g.
VO’s
Symmetric Cryptographic Systems
T ransaction Level
Crypto
2: Infrastructure: Underlying
algorithms (state-of-art and customized) are
crypto
Crypto Schemes should ensure interoperability
key
and a multi-faceted audit capability within a
Key Management distributed trust framework while maintaining
Module Multi Signature Schemes
resistance against traffic analysis
T ransaction Level
1: Key and Multi-Signatures
Integrated Management
Management Unit Structure: are critical
B lock Chain Infrastructure Enablement Level
Integrated at IGTF Infrastructure [ Based on Hyperledger-Provided Framework]:
Level PublicKey Infrastructure (PKI):Achieved
through a hybrid PKI- and BlockChain- model
Privilege Management Infrastructure (PMI):
Proper Node (Client) and Membership Services
Public Key Privilege Management (Privilege Management Servers) to be designed
Infrastructure Infrastructure
INFRASTRUCTURE SCALABILITY IS KEY
Questions?
[email protected]
THANK YOU