SlideShare uma empresa Scribd logo
Blockchain Technology
Types of Blockchain
Dr. Ramchandra Mangrulkar
Blockchain Types
Public Blockchain
Private Blockchain
Consortium / Federated Blockchain
Hybrid Blockchain
2/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Blockchain Types 1
1. https://blog.blockchainfirm.io/how-blockchain-technology-works/
3/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Public Blockchain / Permissionless Blockchain
4/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Public Blockchain
A public blockchain is the permission-less distributed ledger technology
where anyone can join and do transactions
Non-restrictive version where each peer has a copy of the ledger
The verification of the transactions is done through consensus methods
such as Proof-of-Work(PoW), Proof-of-Stake(PoS), and so on.
If a public blockchain doesn’t have the required peers participating in
solving transactions, then it will become non-functional.
Public Blockchain networks reward their participants for taking part in
the mining process and regulating the flow of the transactions while
simultaneously maintaining the immutability of the ledger.
Examples : Bitcoin, Ethereum, Litecoin, NEO
5/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Advantages of Public Blockchain
Anyone can join the public blockchain.
It brings trust among the whole community of users Everyone feels
incentivized to work towards the betterment of the public network
Public blockchain requires no intermediaries to work.
Public blockchains are also secure depending on the number of
participating nodes
It brings transparency to the whole network as the available data is
available for verification purposes.
6/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Dis-advantages of Public Blockchain
They suffer from a lack of transaction speed. It can take a few minutes to
hours before a transaction is completed. For instance, bitcoin can only
manage seven transactions per second compared to 24,000 transactions
per second done by VISA.
Another problem with public blockchain is scalability. They simply cannot
scale due to how they work. The more nodes join, the clumsier, and slow
the network becomes. There are steps taken to solve the problem. For
example, Bitcoin is working on lighting the network, which takes
transactions off-chain to make the main bitcoin network faster and more
scalable.
The last disadvantage of a public blockchain is the consensus method
choice. Bitcoin, for example, uses Proof-of-Work (PoW), which consumes
a lot of energy. However, this has been partially solved by using more
efficient algorithms such as Proof-of-Stake (PoS).
7/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Use Cases of Public Blockchain
Voting : Governments can do voting through public blockchain employing
transparency and trust.
Fundraising : Companies or initiatives can make use of the public
blockchain for improving transparency and trust.
8/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Private Blockchain / Permissioned Blockchain
9/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Private Blockchain
Private blockchain networks are shared only among the trusted
participants.
The control of a private network lies with the owner.
The rules that a private blockchain abides by can be customized
depending on levels of permissions, exposure, number of participants,
authorization requirements, and a lot more.
Examples : Multichain, Hyperledger Fabric, Hyperledger Sawtooth, Corda
10/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Advantages of Private Blockchain
Private blockchains are fast. This is because there are few participants
compared to the public blockchain.
Private blockchains are more scalable. The scalability is possible because,
in a private blockchain, only a few nodes are authorized to validate
transactions.
11/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Dis-advantages of Private Blockchain
Private blockchains are not truly decentralized. This is one of the biggest
disadvantages of private blockchain and goes against the core philosophy
of distributed ledger technology or blockchain in general.
Achieving trust within the private blockchain is tough because the
centralized nodes make the last call.
As there are only a few nodes here, the security isn’t all that good.
12/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Use Cases of Private Blockchain
Supply chain management : Organizations can deploy a private
blockchain to manage their supply chain.
Asset ownership : Assets can be tracked and verified using a private
blockchain.
Internal Voting : Private blockchain is also effective at internal voting.
13/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Federated Blockchain / Consortium Blockchain
14/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Federated Blockchain / Consortium Blockchain
A creative approach to solving organizations’ needs where there is a need
for both public and private blockchain features.
Consortium blockchains are partially decentralized blockchain networks. a
consortium blockchain is managed by more than one organization. So,
there is no one single force of centralized outcome here.
In a consortium blockchain, some aspects of the organizations are made
public, while others remain private.
To ensure proper functionality, the consortium has a validator node that
can do two functions, validate transactions, and also initiate or receive
transactions. In comparison, the member node can receive or initiate
transactions.
The federated blockchain helps in reducing the transaction costs and
redundancy of data while being faster and offering higher scalability.
Examples of Consortium Blockchain : Marco Polo, Energy Web
Foundation, IBM Food Trust.
15/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Advantages of Federated Blockchain
It offers better customizability and control over resources.
Consortium blockchains are more secure and have better scalability.
It is also more efficient compared to public blockchain networks.
Works with well-defined governance structures.
It offers access controls.
16/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Dis-advantages of Federated Blockchain
Even though it is secure, the whole network can be compromised due to
the member’s integrity.
It is less transparent. Regulations and censorship can have a huge impact
on network functionality.
It is also less anonymous compared to other types of blockchain.
17/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Use Cases of Federated Blockchain
Banking and payments : A group of banks can work together and create
a consortium. They can decide the nodes that will validate transactions.
Research : A consortium blockchain can be used to share research data
and results.
Food tracking : It is also great for food tracking.
18/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Hybrid Blockchain : A Duo Of Public And Private Blockchain
19/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Hybrid Blockchain
Hybrid blockchain is best defined as a combination of a private and
public blockchain. It has use-cases in an organization that neither wants
to deploy a private blockchain nor public blockchain and simply wants to
deploy both worlds’ best.
To be precise, a hybrid blockchain offers controlled access and complete
freedom, both at the same time.
A hybrid blockchain network is not open to all. However, it includes
features such as transparency, integrity, and security.
Hybrid blockchains are totally customizable. The existing members of this
blockchain decide who can participate in the network and who cannot
and also which transactions are made public and which are kept private.
This type of blockchain opens up the door to the best possible way that
an organization can work with its shareholders.
Example of Hybrid Blockchain : Dragonchain, XinFin’s Hybrid blockchain
20/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Difference between Types of Blockchain
21/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai

Mais conteúdo relacionado

Mais procurados

Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
mrzahidfaiz.blogspot.com
 
Manet
ManetManet
Edge Computing
Edge ComputingEdge Computing
Edge Computing
Vikas Yadav
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
MeghaShree665225
 
Sandbox
SandboxSandbox
Sandbox
ayush_nitt
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
DUET
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6
WE-IT TUTORIALS
 
Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)
Javed Khan
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in Blockchain
EC-Council
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
 
Syed IoT - module 5
Syed  IoT - module 5Syed  IoT - module 5
Syed IoT - module 5
Syed Mustafa
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
vinitha96
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
Maathu Michael
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 

Mais procurados (20)

Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Manet
ManetManet
Manet
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 
Sandbox
SandboxSandbox
Sandbox
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Cryptography
CryptographyCryptography
Cryptography
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6
 
Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in Blockchain
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Syed IoT - module 5
Syed  IoT - module 5Syed  IoT - module 5
Syed IoT - module 5
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 

Semelhante a Blockchain#3.pdf

Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
Dr. Ramchandra Mangrulkar
 
Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance
VIJAY MUTHU
 
Blockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxBlockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptx
SahilBansal648873
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
Abhishek Jaiswal
 
Blockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxBlockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptx
SahilBansal648873
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptx
MohamedMansour421585
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 
Blockchain Technology Overview
Blockchain Technology OverviewBlockchain Technology Overview
Blockchain Technology Overview
IRJET Journal
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
IRJET Journal
 
How to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfHow to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdf
StephenAmell4
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
BRNSSPublicationHubI
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
SyedMahammad1
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
Mahammad Syed
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptx
JackTheMan1
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
Nimmy Solomon
 
BlockchainRevolutioninBankingIndustry.pdf
BlockchainRevolutioninBankingIndustry.pdfBlockchainRevolutioninBankingIndustry.pdf
BlockchainRevolutioninBankingIndustry.pdf
LiberalAstu
 
Blockchain Technology-1.pptx
Blockchain Technology-1.pptxBlockchain Technology-1.pptx
Blockchain Technology-1.pptx
andre241421
 
Blockchain Technology Developments in Government 3.0
Blockchain Technology Developments in Government 3.0Blockchain Technology Developments in Government 3.0
Blockchain Technology Developments in Government 3.0
samossummit
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
SubhashKumar329
 

Semelhante a Blockchain#3.pdf (20)

Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
 
Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance
 
Blockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxBlockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptx
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
 
Blockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxBlockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptx
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptx
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
Blockchain Technology Overview
Blockchain Technology OverviewBlockchain Technology Overview
Blockchain Technology Overview
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
 
How to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfHow to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdf
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptx
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
BlockchainRevolutioninBankingIndustry.pdf
BlockchainRevolutioninBankingIndustry.pdfBlockchainRevolutioninBankingIndustry.pdf
BlockchainRevolutioninBankingIndustry.pdf
 
Blockchain Technology-1.pptx
Blockchain Technology-1.pptxBlockchain Technology-1.pptx
Blockchain Technology-1.pptx
 
Blockchain Technology Developments in Government 3.0
Blockchain Technology Developments in Government 3.0Blockchain Technology Developments in Government 3.0
Blockchain Technology Developments in Government 3.0
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 

Mais de Dr. Ramchandra Mangrulkar

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
Dr. Ramchandra Mangrulkar
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Dr. Ramchandra Mangrulkar
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
Dr. Ramchandra Mangrulkar
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Dr. Ramchandra Mangrulkar
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
Dr. Ramchandra Mangrulkar
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
Dr. Ramchandra Mangrulkar
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
Dr. Ramchandra Mangrulkar
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
Dr. Ramchandra Mangrulkar
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
Dr. Ramchandra Mangrulkar
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
Dr. Ramchandra Mangrulkar
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
Dr. Ramchandra Mangrulkar
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
Dr. Ramchandra Mangrulkar
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Dr. Ramchandra Mangrulkar
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
Dr. Ramchandra Mangrulkar
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Dr. Ramchandra Mangrulkar
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
Dr. Ramchandra Mangrulkar
 

Mais de Dr. Ramchandra Mangrulkar (20)

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
 

Último

Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 

Último (20)

Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 

Blockchain#3.pdf

  • 1. Blockchain Technology Types of Blockchain Dr. Ramchandra Mangrulkar
  • 2. Blockchain Types Public Blockchain Private Blockchain Consortium / Federated Blockchain Hybrid Blockchain 2/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 3. Blockchain Types 1 1. https://blog.blockchainfirm.io/how-blockchain-technology-works/ 3/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 4. Public Blockchain / Permissionless Blockchain 4/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 5. Public Blockchain A public blockchain is the permission-less distributed ledger technology where anyone can join and do transactions Non-restrictive version where each peer has a copy of the ledger The verification of the transactions is done through consensus methods such as Proof-of-Work(PoW), Proof-of-Stake(PoS), and so on. If a public blockchain doesn’t have the required peers participating in solving transactions, then it will become non-functional. Public Blockchain networks reward their participants for taking part in the mining process and regulating the flow of the transactions while simultaneously maintaining the immutability of the ledger. Examples : Bitcoin, Ethereum, Litecoin, NEO 5/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 6. Advantages of Public Blockchain Anyone can join the public blockchain. It brings trust among the whole community of users Everyone feels incentivized to work towards the betterment of the public network Public blockchain requires no intermediaries to work. Public blockchains are also secure depending on the number of participating nodes It brings transparency to the whole network as the available data is available for verification purposes. 6/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 7. Dis-advantages of Public Blockchain They suffer from a lack of transaction speed. It can take a few minutes to hours before a transaction is completed. For instance, bitcoin can only manage seven transactions per second compared to 24,000 transactions per second done by VISA. Another problem with public blockchain is scalability. They simply cannot scale due to how they work. The more nodes join, the clumsier, and slow the network becomes. There are steps taken to solve the problem. For example, Bitcoin is working on lighting the network, which takes transactions off-chain to make the main bitcoin network faster and more scalable. The last disadvantage of a public blockchain is the consensus method choice. Bitcoin, for example, uses Proof-of-Work (PoW), which consumes a lot of energy. However, this has been partially solved by using more efficient algorithms such as Proof-of-Stake (PoS). 7/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 8. Use Cases of Public Blockchain Voting : Governments can do voting through public blockchain employing transparency and trust. Fundraising : Companies or initiatives can make use of the public blockchain for improving transparency and trust. 8/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 9. Private Blockchain / Permissioned Blockchain 9/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 10. Private Blockchain Private blockchain networks are shared only among the trusted participants. The control of a private network lies with the owner. The rules that a private blockchain abides by can be customized depending on levels of permissions, exposure, number of participants, authorization requirements, and a lot more. Examples : Multichain, Hyperledger Fabric, Hyperledger Sawtooth, Corda 10/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 11. Advantages of Private Blockchain Private blockchains are fast. This is because there are few participants compared to the public blockchain. Private blockchains are more scalable. The scalability is possible because, in a private blockchain, only a few nodes are authorized to validate transactions. 11/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 12. Dis-advantages of Private Blockchain Private blockchains are not truly decentralized. This is one of the biggest disadvantages of private blockchain and goes against the core philosophy of distributed ledger technology or blockchain in general. Achieving trust within the private blockchain is tough because the centralized nodes make the last call. As there are only a few nodes here, the security isn’t all that good. 12/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 13. Use Cases of Private Blockchain Supply chain management : Organizations can deploy a private blockchain to manage their supply chain. Asset ownership : Assets can be tracked and verified using a private blockchain. Internal Voting : Private blockchain is also effective at internal voting. 13/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 14. Federated Blockchain / Consortium Blockchain 14/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 15. Federated Blockchain / Consortium Blockchain A creative approach to solving organizations’ needs where there is a need for both public and private blockchain features. Consortium blockchains are partially decentralized blockchain networks. a consortium blockchain is managed by more than one organization. So, there is no one single force of centralized outcome here. In a consortium blockchain, some aspects of the organizations are made public, while others remain private. To ensure proper functionality, the consortium has a validator node that can do two functions, validate transactions, and also initiate or receive transactions. In comparison, the member node can receive or initiate transactions. The federated blockchain helps in reducing the transaction costs and redundancy of data while being faster and offering higher scalability. Examples of Consortium Blockchain : Marco Polo, Energy Web Foundation, IBM Food Trust. 15/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 16. Advantages of Federated Blockchain It offers better customizability and control over resources. Consortium blockchains are more secure and have better scalability. It is also more efficient compared to public blockchain networks. Works with well-defined governance structures. It offers access controls. 16/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 17. Dis-advantages of Federated Blockchain Even though it is secure, the whole network can be compromised due to the member’s integrity. It is less transparent. Regulations and censorship can have a huge impact on network functionality. It is also less anonymous compared to other types of blockchain. 17/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 18. Use Cases of Federated Blockchain Banking and payments : A group of banks can work together and create a consortium. They can decide the nodes that will validate transactions. Research : A consortium blockchain can be used to share research data and results. Food tracking : It is also great for food tracking. 18/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 19. Hybrid Blockchain : A Duo Of Public And Private Blockchain 19/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 20. Hybrid Blockchain Hybrid blockchain is best defined as a combination of a private and public blockchain. It has use-cases in an organization that neither wants to deploy a private blockchain nor public blockchain and simply wants to deploy both worlds’ best. To be precise, a hybrid blockchain offers controlled access and complete freedom, both at the same time. A hybrid blockchain network is not open to all. However, it includes features such as transparency, integrity, and security. Hybrid blockchains are totally customizable. The existing members of this blockchain decide who can participate in the network and who cannot and also which transactions are made public and which are kept private. This type of blockchain opens up the door to the best possible way that an organization can work with its shareholders. Example of Hybrid Blockchain : Dragonchain, XinFin’s Hybrid blockchain 20/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 21. Difference between Types of Blockchain 21/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai