BT - Module 1
BT - Module 1
Blockchain Technology
Topic Hours
5. Cost of Implementation
• Problem: Building and maintaining a blockchain system is expensive due to high
development, infrastructure, and security costs.
• Example: Companies like banks need to rebuild their financial systems to adopt blockchain.
3. Healthcare
• Electronic Health Records (EHRs): Securely stores and shares patient data.
• Drug Traceability: Prevents counterfeit medicines in pharmaceutical supply chains.
• Clinical Trials: Ensures data integrity and transparency in research
4. Real Estate
• Property Transactions: Reduces paperwork and fraud in property sales.
• Land Registry: Provides secure, tamper-proof records of ownership.
Blockchain Applications
5. Voting Systems
• E-Voting: Enables transparent and tamper-proof digital voting systems.
• Fraud Prevention: Ensures voter identity and election integrity.
6. Identity Management
• Self-Sovereign Identity (SSI): Gives individuals control over their personal data.
• Digital IDs: Helps in identity verification for banking and government services.
7. Internet of Things (IoT)
• Secure IoT Networks: Protects connected devices from hacking.
• Automated Machine-to-Machine Transactions: Enables smart contracts between IoT devices.
8. Intellectual Property & Copyright Protection
• Digital Rights Management (DRM): Protects artists, writers, and musicians from piracy.
9. Gaming & Entertainment
• In-Game Assets: Blockchain-based assets can be traded across games (e.g., Axie Infinity).
• Decentralized Gaming Platforms: Allows fair and transparent gaming economies.
10. Government & Public Services
• Transparent Taxation: Reduces fraud in tax collection.
• Public Records Management: Securely stores documents like birth certificates and licenses
Blockchain Design Principles
The design rules of blockchain generally include key aspects that ensure its security, transparency, and
decentralization. Here are the core principles:
1. Decentralization
• No single entity controls the network.
• Uses a distributed ledger across multiple nodes.
2. Transparency
• Transactions are recorded on a public or permissioned ledger.
• All network participants can verify transactions.
3. Immutability
• Once recorded, transactions cannot be altered or deleted.
• Uses cryptographic hashing to ensure data integrity.
4. Security
• Uses encryption and cryptographic techniques (e.g., SHA-256).
• Consensus mechanisms (PoW, PoS, etc.) prevent fraud and attacks.
5. Consensus Mechanism
• Transactions must be validated by network participants.
• Examples: Proof of Work (PoW), Proof of Stake (PoS), Byzantine Fault Tolerance (BFT).
6. Smart Contracts
• Self-executing contracts with predefined rules.
• Automates and enforces agreements without intermediaries.
7. Scalability
• Designed to handle an increasing number of transactions efficiently.
Blockchain Ecosystem
• The blockchain ecosystem refers to the network of technologies, participants, and protocols that work together to
create, maintain, and expand blockchain networks.
• The blockchain ecosystem is the network of all the participants in the blockchain network that share the business
process and business objectives.
Types of Blockchain Ecosystem:
1. Single-party led blockchain ecosystem:
• This ecosystem is led by a single organization where all the stakeholders have a mutual benefit for
participating in the network.
• Bumble Bee Foods has created a single-party-led blockchain ecosystem to improve the traceability of
the yellowfin tuna fish. This helped to improve the buyer’s confidence in the fish’s freshness.
• This is also known as the Consortium blockchain ecosystem. Two or more organizations in the
ecosystem.
• The participating organizations have a common goal.
• BunkerTrace a marine fuel tracking solution is a joint venture blockchain ecosystem between
Forecast technology Ltd. and Blockchain Labs for Open Collaboration (BLOC).
• This ecosystem comprises various government agencies that share a project and have to self-report
for compliance.
• For example, a shared project between Marine Transport International and Recycling Association.
Blockchain Ecosystem
Participants in Blockchain Ecosystem
1. Leaders:
• Leaders take control of everything happening on the blockchain network.
• These are the creators of the project and are the main beneficiaries of the work in the
ecosystem.
2. Core group:
• The core group refers to the group of active or leading organizations in the network that gives
shape to operational activities in the network.
• They are responsible for the blockchain ecosystem actively. controlling, streamlining, and
managing
• Active participants: These are the group of primary network participants that take on the
responsibility of contributing to workflow, governance, and data management.
3. Users:
◦ They don’t get any responsibility for the active management of the network.
◦ Their only responsibility in the ecosystem is to obtain desired benefits from the network
alongside accessing their own data.
4. Third-party service providers:
• They are important participants in the network and offer different types of services on the
network.
• They could offer desired services like IT support services or infrastructure and applications
services in exchange for specific fees.
Components of Blockchain Ecosystem
1. Node application:
• It is a particular internet application that every internet-connected computer must download for
participating in a blockchain ecosystem.
• Once one has a node application installed, it can participate in the ecosystem.
2. Distributed ledger:
• logical component and the data structure that is managed inside the node application.
• Once the node application is installed, one can view the respective ledger contents from that ecosystem.
3. Consensus algorithms:
• Consensus algorithm is implemented as a part of the node application in the blockchain ecosystem.
• They provide the rules of the game for how the ecosystem will arrive at the single view of the ledger.
4. Virtual machine:
• It is the representation of the computer environment created by a computer program and
operated with instructions programmed in a language.
Blockchain : Consensus Problem
• There is no central authority present to validate and verify the transactions, yet every transaction
in the Blockchain is considered to be completely secured and verified.
• The "Byzantine" aspect refers to the scenario where nodes might send conflicting information, and
AAP protocol is specifically designed to handle such situations by employing cryptographic
techniques to identify and disregard unreliable data.
Consensus Problem: AAP Protocol
ABA-Based Consensus Protocols in Blockchain
✅ Tendermint (BFT Consensus)
• Uses a round-based voting mechanism with leader rotation.
• Ensures fast finality in asynchronous settings.
✅ Algorand (BA)*
• Uses a verifiable random function (VRF) to select a leader for each round.
• Probabilistic finality ensures efficient agreement.
✅ HoneyBadgerBFT
• Fully asynchronous BFT protocol.
• Uses threshold cryptography and randomized agreement to prevent delays.
Consensus Problem: Analysis of AAP protocol
Analysis of AAP protocol
Advantages:
• Highly Secure: Due to its Byzantine Fault Tolerance, AAP can withstand malicious actors
attempting to disrupt the network.
• Scalability: Its asynchronous nature allows for efficient operation even with network delays or
varying node response times.
• Decentralized Consensus: AAP facilitates consensus building without relying on a central
authority.
Challenges:
• These models help standardize functionality, improve modularity, and enable reusability in smart contract development,
consensus mechanisms, and decentralized applications (dApps).
• Abstract smart contracts serve as blueprints that define functions but do not provide full implementations.
• These models define the general structure of consensus mechanisms without tying them to a specific blockchain.
• Blockchains require standardized data structures for transactions, blocks, and states.
• Abstract models define how data is organized, stored, and processed across different blockchain implementations.
• Used in decentralized identity (DID) systems, defining roles like issuers, verifiers, and holders while leaving specific
implementation details flexible.
GARAY MODEL
•The Garay Model refers to a formal security model proposed by Juan
A. Garay
•Analysing and proving the security of blockchain consensus
protocols.
•Model focuses on the security and efficiency of blockchain system.
Key Features of the Garay Model in Blockchain:
1.Formal Security Analysis of Blockchain
1.It provides a mathematical framework to analyze blockchain
protocols, particularly Bitcoin’s proof-of-work (PoW) consensus.
2.Abstract Modeling of Nakamoto Consensus
1.It abstracts Bitcoin’s PoW mechanism and defines properties like
chain growth, chain quality, and chain soundness.
GARAY MODEL
3.Adversarial Conditions & Assumptions
1.The model assumes an adversary who can control a certain
percentage of the mining power and examines how this impacts
security and fairness.
4.Liveness and Persistence
2.The model ensures that valid transactions get confirmed within
a reasonable timeframe (liveness), and once a transaction is
confirmed, it remains in the chain permanently (persistence).
Why is it Important?
•It rigorously proves that Bitcoin’s blockchain is secure under certain
conditions.
•It helps design and analyze new blockchain consensus mechanisms.
•It is useful for academic research on blockchain security.
RLA MODEL
• "RLA model" typically stands for "Reverse Logistics Automation model
• System that utilizes blockchain technology to streamline and track the process of returning
products, particularly in the context of supply chain management and sustainability initiatives.
• RLA Model explored the application of blockchain technology to improve efficiency and
transparency in reverse logistics.
Key points about RLA models in blockchain
• Tracking product lifecycle:
Blockchain's immutability allows for detailed tracking of a product's journey from initial
purchase to its eventual return and recycling, ensuring transparency and accountability.
• Improved efficiency:
By automating data recording and verification on the blockchain, RLA models can
significantly reduce administrative overhead and streamline reverse logistics processes.
• Sustainability focus:
• RLA models can be used to incentivize responsible recycling and reuse by tracking the
movement of returned items and potentially rewarding participants for sustainable
practices.
PoW
Proof of Work (PoW) is a decentralized system that verifies transactions on a
blockchain network. It is a competitive process that uses complex mathematical
puzzles to secure the network.
How it works
•Miners compete to solve a complex mathematical puzzle to create a new block
•The winner receives a reward in the form of the blockchain's native coin
•The process requires a lot of energy and computing power
Why it's used
•PoW is considered more secure than other consensus mechanisms
•It's resistant to double-spending attacks and unauthorized alterations
Drawbacks
•It's very energy intensive and has a large carbon footprint
•It requires expensive hardware
•It's vulnerable to 51% attacks, where an entity controls over half of the
network's mining power
•A large carbon footprint is related to Proof of Work (PoW) in blockchain
technology because PoW requires high energy consumption, which leads
to large-scale carbon emissions.
PoW
•Miners are individuals or entities that use computational power to validate
transactions and secure a blockchain network, typically in Proof of Work (PoW)
blockchains like Bitcoin. Miners compete to solve complex mathematical puzzles,
and the first to solve it gets to add a new block to the blockchain and receive a
reward.
How does the peer-to-peer (P2P) network architecture support the decentralization of blockchain systems?
What are the key differences between public and private blockchains in terms of accessibility, control, and use cases?
What are the key architectural components of a blockchain, and how do they contribute to its security and
decentralization?
What are the major challenges in implementing blockchain technology in large-scale systems?
List and briefly explain three real-world applications of blockchain technology across different industries.
What are the core design principles of blockchain that ensure immutability and trust?
Describe the major components of the blockchain ecosystem and their roles.
What is the consensus problem in distributed systems, and why is it critical for blockchain networks?
How does the Asynchronous Byzantine Agreement differ from the synchronous version, and what are its advantages?
What is the AAP protocol in the context of blockchain consensus, and how does it function under Byzantine fault
conditions?
Discuss the strengths and weaknesses of the AAP protocol based on its analytical evaluation.
Compare and contrast Proof of Work (PoW), Proof of Stake (PoS), and hybrid consensus models in terms of energy
efficiency, security, and scalability.
What is the purpose of abstract models in blockchain research, and how do they simplify protocol design?
Explain the GARAY model and RLA model and their significance in analyzing blockchain consensus mechanisms.