SlideShare uma empresa Scribd logo
1 de 20
Blockchain overview:
types, use-cases, security and usability
Bozhidar Bozhanov, CEO @ LogSentinel
About me
• Senior software engineer and architect
• Founder & CEO @ LogSentinel
• https://techblog.bozho.net
• Twitter: @bozhobg
Blockchain in a nutshell
Hash chain
Merkle tree
Consensus
Source https://medium.com/poa-network/proof-of-authority-consensus-model-with-identity-at-stake-d5bd15463256
Types of blockchain solutions
Source https://medium.com/ltonetwork/the-rise-of-private-permissionless-blockchains-part-1-4c39bea2e2be
Terminology
Blockchain DLT Cryptocurrencies Smart contracts
Important features
Provably
immutable*
Distributed Trustless Hyped
Public blockchain
features
Main drawbacks of public blockchains
Expensive Volatile Not scalable Not mature
Hard do code and
support
Usability
Key management
Decentralization
How to make it
usable?
• Key management is hard (despite key management services)
• Secure key storage, key rotation
• Lost key = lost account, which is a no-go
• Mobile phones and user laptops should not be nodes
• Current blockchains don’t scale well, shared databases are huge
• The user must not know they are using blockchain
• Keys should be hidden & encrypted with password-derived keys
• Services should be used via web apps or mobile apps
Security
Cryptographic
security
Storage security
Private blockchain
security
• The cryptography is sound
• Keys are as secure as their storage
• Semi-quantum-resistant (hashes are resistant, ECC is not)
• It’s a bad idea to store sensitive data on a public blockchain
• Even encrypted, as re-encryption is not possible
• Fully decentralized apps are a risk
• Consensus is sometimes not needed (e.g. for single-party)
• PKI is a single point of failure -> HSMs are needed
• Need for regular verification of local data
Key technology components
Tamper-evident
data structures
Byzantine fault tolerance
Shared database
Distributed code execution
Immutable vs tamper-evident
Immutable
Tamper-evident
• Tamper-resistant – nobody can modify data
• Requires replication to multiple nodes with near real-time
validation
• Makes it possible to detect if tampering has occurred
• Practical tamper-resistance is achieved through backups with
integrity checks
Tamper-evident data structures
Hash chain Merkle tree
Patricia
merkle trees
Hash list Hash calendar
Smart contracts
Neither smart,
nor contracts 
Distributed code execution
Using the ledger
as a database
Written in specific languages
(e.g. Solidity)
Blockchain, blockchain, blockchain
Proposed use-cases and their issues
• E-voting – public bulletin boards have been around for a while. Blockchain can help, but
doesn’t solve fundamental problems
• Payments – it’s slow
• Food quality provenance – sensors and data entry are the hard part
• Item provenance – centralized database; physical identity != digital identity; cloning
• Healthcare data – storing data on a public blockchain, even encrypted, is risky
• Land or property registry – legal need for central authority (integrity is needed, though)
• Hotel reservations, ride sharing – p2p reputation is the hard problem to solve
• Many other usecases are just digital transformation + trusted timestamping (PKI)
Each component of blockchain
can solve real world problems.
Blockchain can solve problems
Prove
unmodifiability
Internal
lack of trust
Multi-stakeholder
databases
• Prove to 3rd parties that data has not been tampered with
• Logs, documents
• Internal actors modifying data
• Anchor to public blockchain, avoid scalability and cost issues
• Practically a signed, shared database. Enterprise integration.
• Higher education diploma registers
• Car manufacturer + dealers usecase
Conclusion
1. Cryptography is awesome
2. Data integrity is important
3. Use the right tool for the job
Thank you!

Mais conteúdo relacionado

Mais procurados

Team2Jax_FinalPresentation
Team2Jax_FinalPresentationTeam2Jax_FinalPresentation
Team2Jax_FinalPresentation
Anh Thuc Tran
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Kishor Datta Gupta
 

Mais procurados (20)

Blockchain Technology and its Business Application
Blockchain Technology and  its Business ApplicationBlockchain Technology and  its Business Application
Blockchain Technology and its Business Application
 
Blockchain for Real Estate Industry
Blockchain for Real Estate IndustryBlockchain for Real Estate Industry
Blockchain for Real Estate Industry
 
Blockchain developer
Blockchain developerBlockchain developer
Blockchain developer
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Team2Jax_FinalPresentation
Team2Jax_FinalPresentationTeam2Jax_FinalPresentation
Team2Jax_FinalPresentation
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital Transformation
 
Blockchain in healthcare sector
Blockchain in healthcare sectorBlockchain in healthcare sector
Blockchain in healthcare sector
 
Blockchain in life sciences
Blockchain in life sciencesBlockchain in life sciences
Blockchain in life sciences
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Implementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcareImplementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcare
 
Blockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A ReviewBlockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A Review
 
Blockchain Ecosystem
Blockchain EcosystemBlockchain Ecosystem
Blockchain Ecosystem
 
Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology
 
Blockchain ecosystem and evolution
Blockchain ecosystem and evolutionBlockchain ecosystem and evolution
Blockchain ecosystem and evolution
 
What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
 
Blockchain
Blockchain Blockchain
Blockchain
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
 

Semelhante a Blockchain overview - types, use-cases, security and usabilty

C13_blockchain introduction public (1).pptx
C13_blockchain introduction public (1).pptxC13_blockchain introduction public (1).pptx
C13_blockchain introduction public (1).pptx
haifaazka
 

Semelhante a Blockchain overview - types, use-cases, security and usabilty (20)

C13_blockchain introduction public (1).pptx
C13_blockchain introduction public (1).pptxC13_blockchain introduction public (1).pptx
C13_blockchain introduction public (1).pptx
 
dfgsdjghkjsdhfg.pptx
dfgsdjghkjsdhfg.pptxdfgsdjghkjsdhfg.pptx
dfgsdjghkjsdhfg.pptx
 
blockchain-introduction-public.pptx
blockchain-introduction-public.pptxblockchain-introduction-public.pptx
blockchain-introduction-public.pptx
 
Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and Privacy
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
A Breathless Tour of Blockchain
A Breathless Tour of BlockchainA Breathless Tour of Blockchain
A Breathless Tour of Blockchain
 
Blockchain and Hook model of engagement
Blockchain and Hook model of engagement Blockchain and Hook model of engagement
Blockchain and Hook model of engagement
 
03 - VMUGIT - Lecce 2018 - Massimiliano Mortillaro, Tech Unplugged
03 - VMUGIT - Lecce 2018 - Massimiliano Mortillaro, Tech Unplugged03 - VMUGIT - Lecce 2018 - Massimiliano Mortillaro, Tech Unplugged
03 - VMUGIT - Lecce 2018 - Massimiliano Mortillaro, Tech Unplugged
 
The deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 finalThe deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 final
 
A technical Introduction to Blockchain.
A technical Introduction to Blockchain.A technical Introduction to Blockchain.
A technical Introduction to Blockchain.
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat Model
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBM
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Introduction To Blockchain.pptx
Introduction To Blockchain.pptxIntroduction To Blockchain.pptx
Introduction To Blockchain.pptx
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018
 

Mais de Bozhidar Bozhanov

Mais de Bozhidar Bozhanov (20)

Антикорупционен софтуер
Антикорупционен софтуерАнтикорупционен софтуер
Антикорупционен софтуер
 
Nothing is secure.pdf
Nothing is secure.pdfNothing is secure.pdf
Nothing is secure.pdf
 
Elasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and MultitenancyElasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and Multitenancy
 
Encryption in the enterprise
Encryption in the enterpriseEncryption in the enterprise
Encryption in the enterprise
 
Електронна държава
Електронна държаваЕлектронна държава
Електронна държава
 
Algorithmic and technological transparency
Algorithmic and technological transparencyAlgorithmic and technological transparency
Algorithmic and technological transparency
 
Scaling horizontally on AWS
Scaling horizontally on AWSScaling horizontally on AWS
Scaling horizontally on AWS
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection online
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
 
Политики, основани на данни
Политики, основани на данниПолитики, основани на данни
Политики, основани на данни
 
Отворено законодателство
Отворено законодателствоОтворено законодателство
Отворено законодателство
 
Overview of Message Queues
Overview of Message QueuesOverview of Message Queues
Overview of Message Queues
 
Electronic governance steps in the right direction?
Electronic governance   steps in the right direction?Electronic governance   steps in the right direction?
Electronic governance steps in the right direction?
 
Сигурност на електронното управление
Сигурност на електронното управлениеСигурност на електронното управление
Сигурност на електронното управление
 
Opensource government
Opensource governmentOpensource government
Opensource government
 
Биометрична идентификация
Биометрична идентификацияБиометрична идентификация
Биометрична идентификация
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
 
Регулации и технологии
Регулации и технологииРегулации и технологии
Регулации и технологии
 
Regulations and technology
Regulations and technologyRegulations and technology
Regulations and technology
 
Архитектура на електронното управление
Архитектура на електронното управлениеАрхитектура на електронното управление
Архитектура на електронното управление
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Blockchain overview - types, use-cases, security and usabilty

  • 1. Blockchain overview: types, use-cases, security and usability Bozhidar Bozhanov, CEO @ LogSentinel
  • 2. About me • Senior software engineer and architect • Founder & CEO @ LogSentinel • https://techblog.bozho.net • Twitter: @bozhobg
  • 3. Blockchain in a nutshell Hash chain Merkle tree
  • 5. Types of blockchain solutions Source https://medium.com/ltonetwork/the-rise-of-private-permissionless-blockchains-part-1-4c39bea2e2be
  • 8. Main drawbacks of public blockchains Expensive Volatile Not scalable Not mature Hard do code and support
  • 9. Usability Key management Decentralization How to make it usable? • Key management is hard (despite key management services) • Secure key storage, key rotation • Lost key = lost account, which is a no-go • Mobile phones and user laptops should not be nodes • Current blockchains don’t scale well, shared databases are huge • The user must not know they are using blockchain • Keys should be hidden & encrypted with password-derived keys • Services should be used via web apps or mobile apps
  • 10. Security Cryptographic security Storage security Private blockchain security • The cryptography is sound • Keys are as secure as their storage • Semi-quantum-resistant (hashes are resistant, ECC is not) • It’s a bad idea to store sensitive data on a public blockchain • Even encrypted, as re-encryption is not possible • Fully decentralized apps are a risk • Consensus is sometimes not needed (e.g. for single-party) • PKI is a single point of failure -> HSMs are needed • Need for regular verification of local data
  • 11. Key technology components Tamper-evident data structures Byzantine fault tolerance Shared database Distributed code execution
  • 12. Immutable vs tamper-evident Immutable Tamper-evident • Tamper-resistant – nobody can modify data • Requires replication to multiple nodes with near real-time validation • Makes it possible to detect if tampering has occurred • Practical tamper-resistance is achieved through backups with integrity checks
  • 13. Tamper-evident data structures Hash chain Merkle tree Patricia merkle trees Hash list Hash calendar
  • 14. Smart contracts Neither smart, nor contracts  Distributed code execution Using the ledger as a database Written in specific languages (e.g. Solidity)
  • 16. Proposed use-cases and their issues • E-voting – public bulletin boards have been around for a while. Blockchain can help, but doesn’t solve fundamental problems • Payments – it’s slow • Food quality provenance – sensors and data entry are the hard part • Item provenance – centralized database; physical identity != digital identity; cloning • Healthcare data – storing data on a public blockchain, even encrypted, is risky • Land or property registry – legal need for central authority (integrity is needed, though) • Hotel reservations, ride sharing – p2p reputation is the hard problem to solve • Many other usecases are just digital transformation + trusted timestamping (PKI)
  • 17. Each component of blockchain can solve real world problems.
  • 18. Blockchain can solve problems Prove unmodifiability Internal lack of trust Multi-stakeholder databases • Prove to 3rd parties that data has not been tampered with • Logs, documents • Internal actors modifying data • Anchor to public blockchain, avoid scalability and cost issues • Practically a signed, shared database. Enterprise integration. • Higher education diploma registers • Car manufacturer + dealers usecase
  • 19. Conclusion 1. Cryptography is awesome 2. Data integrity is important 3. Use the right tool for the job