152,99 €
The book focuses on the power of business blockchain. It gives an overview of blockchain in traditional business, marketing, accounting and business intelligence. The book provides a detailed working knowedge of blockchain, user cases of blockchain in business, cryptocurrency and Initial Coin Offering(ICO) along with the risks associated with them. The book also covers the detailed study of decentralization, mining, consensus, smart contracts, concepts and working of distributed ledgers and hyper ledgers as well as many other important concepts. It also details the security and privacy aspects of blockchain. The book is beneficial for readers who are preparing for their business careers, those who are working with small scale businesses and startups, and helpful for business executives, managers, entrepreneurs, bankers, government officials and legal professionals who are looking to blockchain for secure financial transactions. The book will also be beneficial for researchers and students who want to study the latest developments of blockchain.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 593
Veröffentlichungsjahr: 2021
Cover
Title Page
Copyright
Preface
1 Introduction to Blockchain
1.1 Introduction
1.2 The Privacy Challenges of Blockchain
1.3 De-Anonymization
1.4 Transaction Pattern Exposure
1.5 Methodology: Identity Privacy Preservation
1.6 Decentralization Challenges Exist in Blockchain
1.7 Conclusion
1.8 Regulatory Challenges
1.9 Obstacles to Blockchain Regulation
1.10 The Current Regulatory Landscape
1.11 The Future of Blockchain Regulation
1.12 Business Model Challenges
1.13 Utility Token Model
1.14 Blockchain as a Service
1.15 Securities
1.16 Development Platforms
1.17 Scandals and Public Perceptions
References
2 The Scope for Blockchain Ecosystem
2.1 Introduction
2.2 Blockchain as Game Changer for Environment
2.3 Blockchain in Business Ecosystem
2.4 Is Blockchain Business Ecosystem Profitable?
2.5 How Do You “Design” a Business Ecosystem?
2.6 Redesigning Future With Blockchain
2.7 Challenges and Opportunities
References
3 Business Use Cases of Blockchain Technology
3.1 Introduction to Cryptocurrency
3.2 What is a Bitcoin?
3.3 Bitcoin ICO
3.4 Advantages and Disadvantages of ICO
3.5 Merchant Acceptance of Bitcoin
References
4 Ethereum
4.1 Introduction
4.2 Basic Features of Ethereum
4.3 Difference between Bitcoin and Ethereum
4.4 EVM (Ethereum Virtual Machine)
4.5 Gas
4.6 Applications Built on the Basis of Ethereum
4.7 ETH
4.8 Smart Contracts
4.9 DApp (Decentralized Application or Smart Contract)
4.10 Conclusion
References
5 E-Wallet
5.1 Overview of Wallet Technology
5.2 Types of Wallet
5.3 Security of Bitcoin Wallets
5.4 Workings of Wallet Technology
5.5 Create HD Wallet From Seed
5.6 Navigating HD Wallet
5.7 Conclusion
References
6 Blockchain and Governance: Theory, Applications and Challenges
6.1 Introduction
6.2 Governance: Centralized vs Decentralized
6.3 Blockchain’s Features Supportive of Decentralization
6.4 Noteworthy Application Areas for Blockchain-Based Governance
6.5 Scopes and Challenges
6.6 Conclusion
References
7 Blockchain-Based Identity Management
7.1 Introduction
7.2 Existing Identity Management Systems and Their Challenges
7.3 Concept of Decentralized Identifiers
7.4 The Workflow of Blockchain Identity Management Systems
7.5 How Does it Contribute to Data Security?
7.6 Trending Blockchain Identity Management Projects
7.7 Why and How of Revocation
7.8 Points to Ponder
7.9 Conclusion
References
8 Blockchain & IoT: A Paradigm Shift for Supply Chain Management
8.1 Introduction
8.2 Supply Chain Management
8.3 Blockchain and IoT
8.4 Blockchain Technology and IoT Use Cases in Supply Chain Management
8.5 Benefits and Challenges in Blockchain-Based Supply Chain Management
8.6 Conclusion
References
9 Blockchain-Enabled Supply Chain Management System
9.1 Introduction
9.2 Blockchain Technology
9.3 Blockchain Technology in Supply Chain Management
9.4 Elements of Blockchain That Affects Supply Chain
9.5 Challenges in Implementation of Blockchain-Enabled Supply Chain
9.6 Conclusion
References
10 Security Concerns of Blockchain
10.1 Introduction: Security Concerns of Blockchain
10.2 Cryptocurrencies Scenarios
10.3 Privacy Challenges of Blockchain
10.4 Decentralization in Blockchain
10.5 Legal and Regulatory Issues in Blockchain
10.6 Smart Contracts
10.7 Scandals of Blockchain
10.8 Is Blockchain the Rise of Trustless Trust?
10.9 Blockchain Model Challenges
References
11 Acceptance and Adoption of Blockchain Technology: An Examination of the Security & Privacy Challenges
11.1 Introduction
11.2 Security Issues of Blockchain
11.3 Privacy Challenges of Bitcoin
11.4 Blockchain Application-Based Solutions
11.5 Conclusion and Future Work
References
12 Deficiencies in Blockchain Technology and Potential Augmentation in Cyber Security
12.1 Introduction
12.2 Security Issues in Blockchain Technology
12.3 Privacy Challenges
12.4 Decentralization Challenges
12.5 Regulatory Challenges
12.6 Business Model Challenges
12.7 Scandals and Public Perception
12.8 Why Blockchain is Trustless
12.9 Use of Blockchain in Cybersecurity
References
13 Internet of Things and Blockchain
13.1 History of ‘Internet of Things’
13.2 IoT Devices
13.3 Sensors and Actuators
13.4 Cloud and Haze-Based Engineering
13.5 Blockchain and IoT
13.6 Edge Computing
13.7 Contextual Analyses
13.8 Fate of Blockchain and IoT
References
14 Blockchain Applications
14.1 Introduction to Blockchain
14.2 Blockchain in Big Data Predictive Task Automation
14.3 Digital Identity Verification
14.4 Blockchain Government
14.5 Blockchain Science
14.6 Blockchain Health
14.7 Blockchain Learning
References
15 Advance Concepts of Blockchain
15.1 Community Supercomputing
15.2 Blockchain Genomics
15.3 Blockchain Learning
15.4 Community Coin
15.5 Demurrage Currencies
Reading List
Index
End User License Agreement
Chapter 1
Table 1.1 A novel comparison among public, consortium, private blockchain.
Chapter 6
Table 6.1 Some Blockchain solutions for managing governance.
Chapter 8
Table 8.1 Supply Chain actors, current limitations faced and blockchain impact.
Chapter 9
Table 9.1 Supply Chain actors, current limitations faced and blockchain impact.
Chapter 13
Table 13.1 Difference between blockchain and IoT.
Chapter 15
Table 15.1 Comparison of Monetary assets and Non-Monetary assets.
Chapter 1
Figure 1.1 Demonstrating the pictorial impression of blockchain [2].
Figure 1.2 The diagrammatic representation of the types of blockchain architectu...
Figure 1.3 Figure states the types of blockchains in trend.
Figure 1.4 The figure states the internal working paradigm of a blockchain.
Figure 1.5 Basic architecture of mixing services [1].
Figure 1.6 Different types of Networks in blockchain [5]. (a) Centralized. (b) D...
Figure 1.7 Demonstrating the properties of the model [23].
Chapter 3
Figure 3.1 A chain of bitcoin transactions.
Figure 3.2 Validating transactions [1].
Figure 3.3 Timestamping block of transactions using hash.
Figure 3.4 ICO process.
Figure 3.5 Best performing currency of 2015 [9].
Chapter 4
Figure 4.1 Transaction of block [Ref:https://masterthecrypto.com].
Figure 4.2 Transaction for buying Ethernet [Ref:https://www.coingecko.com/en/coi...
Chapter 7
Figure 7.1 Identity controlling factors, authentication, and authorization, dire...
Figure 7.2 Pictorial representation of centralized, decentralized and distribute...
Figure 7.3 Pictorial presentation of ‘key-data’ concept.
Figure 7.4 Analytical view of blockchain identity management system. Ref: Self-S...
Figure 7.5 Process of authorization in blockchain systems.
Figure 7.6 Features of self-sovereign systems. Ref: consensys.net.
Figure 7.7 Advantages of using blockchain systems. Ref: Blockchain Council.
Figure 7.8 Process flow of blockchain identity management systems.
Figure 7.9 Process of revocation in blockchain identity management systems. Ref:...
Figure 7.10 Statistics of people lacking ID by region. Ref: ourworldindata.org.
Figure 7.11 Advantages of blockchain identity management systems. Ref: nec.com.
Figure 7.12 Traditional versus blockchain identity management systems. Ref: food...
Chapter 8
Figure 8.1 The parties in a Supply Chain.
Figure 8.2 The five drivers of a supply chain.
Figure 8.3 Different network structures.
Figure 8.4 The four key concepts of blockchain.
Chapter 9
Figure 9.1 Sustainable supply chain management.
Figure 9.2 Example of Applications of Blockchain.
Figure 9.3 Transaction management in blockchain enabled supply chain.
Chapter 12
Figure 12.1 Types of privacy protection.
Figure 12.2 (a) Centralized and (b) decentralized systems represented by nodes a...
Figure 12.3 The three aspects of decentralization.
Figure 12.4 Steps of wait-and-see approach.
Figure 12.5 Different features of sandboxing.
Figure 12.6 Scandals related to Blockchain.
Figure 12.7 The two different public perception on Blockchain.
Figure 12.8 The different uses of Blockchain in Cybersecurity.
Chapter 13
Figure 13.1 Hype cycle for emerging technologies, 2019.
Figure 13.2 Market of IoT by 2025.
Figure 13.3 Futuristic IoT devices.
Figure 13.4 Examples where sensors and actuators are used (source: https://s3.am...
Figure 13.5 Ways of connecting through web for data sharing.
Figure 13.6 People and processes.
Figure 13.7 Sensor to actuator flow.
Figure 13.8 Architecture of IoT systems.
Figure 13.9 Haze architecture for smart IoT gateway.
Figure 13.10 Smart watches and fitness trackers (source: https://www.pebble.com/...
Figure 13.11 Embedded skin patches (source: MC10 electronics).
Figure 13.12 Brain sensing headband with embedded neuro sensors (source: http://...
Figure 13.13 Relationship of cloud computing and IoT (source: https://innovation...
Figure 13.14 Three tier edge computing model.
Figure 13.15 Golden state food disrupting supply chain and logistics.
Figure 13.16 Smartlog.
Figure 13.17 Reshaping of the automotive industry using NetObjex.
Figure 13.18 Transformation of Sharing Economy business-slock it.
Figure 13.19 Game changer of pharmacy industry—Mediledger.
Figure 13.20 Transformation of agriculture—Pavo.
Chapter 14
Figure 14.1 Diagram of Blockchain.
Chapter 15
Figure 15.1 Community Super Computing (Courtesy of Getty Images).
Figure 15.2 Contagious disease and humans.
Figure 15.3 Block chain provides a seamless secured information exchange between...
Figure 15.4 Genome sequencing.
Figure 15.5 Smart Learning (Courtesy: Manav Rachna).
Figure 15.6 Blockchain-based Bitcoin.
Figure 15.7 Gold.
Figure 15.8 Company Shares.
Figure 15.9 Indian Currency and US Currency.
Cover
Table of Contents
Title Page
Copyright
Preface
Begin Reading
Index
End User License Agreement
v
ii
iii
iv
xv
xvi
xvii
xviii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
379
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Publishers at Scrivener
Martin Scrivener ([email protected])
Phillip Carmical ([email protected])
Edited by
S.S. Tyagi
and
Shaveta Bhatia
This edition first published 2021 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2021 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchant- ability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 978-1-119-71104-9
Cover image: Pixabay.Com
Cover design by: Russell Richardson
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines
Printed in the USA
10 9 8 7 6 5 4 3 2 1
The motivation behind this book was the desire to impart succinct knowledge in the field of blockchain technology—a technology that has been singled out as a pillar of the Fourth Industrial Revolution by World Bank. However, it was written not only to fulfill the desire of the editors and contributing authors but also to address the desire for such a book expressed by all the technical students, researchers, academicians, and professionals who we interact with on a daily basis. We understood the need for this book after observing numerous sessions and independent lectures on the subject of blockchain technology. It was evident that blockchain technology is currently one of the most important futuristic technologies, and that researchers and professionals all across the world are beginning to show tremendous interest in learning about this piece of technology.
The world essentially became aware of blockchain technology way back in 2008 with its first ever massive-scale implementation in the form of a digital currency called Bitcoin, introduced in Satoshi Nakamoto’s whitepaper. However, a lesser known fact is that the first occurrence of blockchain technology and its associated concepts was observed in papers published from 1991 to 1997 titled “How to Time-Stamp a Digital Document,” “Improving the Efficiency and Reliability of Digital Time-Stamping,” and “Secure Names for Bit-Strings” authored by W. Scott Stornetta et al.—also known as the founding fathers of blockchain technology—the mention of which can be found in the “references” of Satoshi Nakamoto’s bitcoin whitepaper.
When LinkedIn ranked blockchain technology as the number-one “hard skill” for 2020, we could sense the sudden influx of further interest in the technology, which cemented the idea of this book in our minds. This book has taken the shape of a reference as well as a textbook that can help academics, researchers, professionals, and experts alike. The approach followed in the book is that of a reference manual, starting with certain very important blockchain technology-related topics, including an introduction to the technology, a discussion of the ecosystem that people have started building around it and other topics (i.e., Ethereum, Wallets, Governance, Bitcoin), its challenges, and many more.
Furthermore, this book takes a deep dive into the inclusion of additional technologies, such as the Internet of Things, to discuss the changes rendered in the areas of supply chain management, identity management, etc. Blockchain applications are focused on in order to provide viable references to the readers and help them imagine real-world implementations across other sectors.
Another benefit of the book is the inclusion of business use cases that give a new dimension to the knowledge imparted. Practical concepts are discussed beyond the expected theory, which should help the readers obtain an added advantage as they go through the chapters discussed below.
In Chapter 1, “Introduction to Blockchain,” after blockchain is defined, its importance is discussed in the current scenario. Here the author explains the concepts of de-anonymization, identity privacy preservation, and the future of blockchain regulation with business model challenges.
In Chapter 2, “The Scope of Blockchain Ecosystem,” the delineation of the foundation of the blockchain ecosystem in businesses is dealt with, explaining how blockchain acts as a game changer and drilling down to a level of detail about the effect that energy production from business ecosystem has on the planet.
In Chapter 3, “Business Use Cases of Blockchain Technology,” a detailed discussion is presented of bitcoin as a cryptocurrency that uses blockchain as its transactions medium. The author also discusses the double-spending problem, bitcoin mining, bitcoin ICO, and ICO token.
In Chapter 4, “Ethereum,” the aim is to bring together the concepts of Ethereum and smart contractors along with the creation of virtual machine in easy steps. The chapter also explains Ethereum installation, its workings, the concept of Ethereum gas, ways to buy ETH, and the workings of Smart contracts and DApps along with their decentralized application areas.
In Chapter 5, “E-Wallet,” an overview of wallet technology is presented, and the steps for creating and navigating an HD wallet are explained.
In Chapter 6, “Blockchain and Governance: Theory, Applications, and Challenges,” the advantages reaped by using blockchain infrastructure are highlighted along with ventures wherein blockchains have been utilized to bring about improvements from the current centralized implementations, and finally the challenges that need to be addressed before moving to a decentralized model of governance.
In Chapter 7, “Blockchain-Based Identity Management,” the instant verification of identities is discussed, which is very important for today’s systems and processes to be functional. Blockchain-based identity mechanisms are presented that can help with identity verifications without the involvement of intermediaries.
In Chapter 8, “Blockchain and IoT: A Paradigm Shift for Supply Chain Management,” blockchain- and IoT-based supply chain practices are delved into that can enable instant tracking even up to the level of a consumer. It provides a view of how blockchain can be useful in devising and facilitating a framework for path tracing and quality management in supply chains.
In Chapter 9, “Blockchain-Enabled Supply Chain Management,” the application of blockchain and digital currencies for better outcomes in a supply chain is discussed. This chapter also focuses on the applicability of blockchains along with how smart contracts and ledgers can help in managing the overpriced gaps starting from procure-to-play.
In Chapter 10, “Security Concerns of Blockchain,” the author discusses the security threats posed by blockchain, the different types of security attacks, and their prevention when developing advanced blockchain systems.
In Chapter 11, “Acceptance and Adoption of Blockchain Technology: An Examination of the Security and Privacy Challenges,” the prevalent security and privacy challenges associated with blockchain are explored along with the negative implications of these challenges. The author also details certain blockchain applications that reflect the acceptance and adoption of blockchain technology.
In Chapter 12, “Deficiencies in Blockchain Technology and Potential Augmentation in Cyber Security,” the major security concerns related to blockchain are discussed as well as issues and facts that reveal that blockchain invites new challenges or edging off risk of security. The author also discusses privacy as well as decentralization challenges related to blockchain technology.
In Chapter 13, “Internet of Things and Blockchain,” the historical background of the IoT is discussed along with the IoT gadgets currently being used and those being proposed for the future, different kinds of sensors and actuators, and a mix of blockchain and IoT.
In Chapter 14, “Blockchain Applications,” the author discusses the specific qualities every particular application possesses such as blockchain in big data predictive task automation along with digital identity verification, decentralized government services, and global public health.
In Chapter 15, “Advanced Concepts of Blockchain,” the future applications of blockchain technology are discussed. The author also discusses community supercomputing, blockchain geonomics, blockchain learning, community coin, monetary and nonmonetary currencies, some prominent alternate coins, and demurrage currencies in detail.
In conclusion, we would like to thank all the authors for their contributions to this book.
The Editors December 2020
Akshay Mudgal
GD Goenka University, Sohna, Gurugram, India
Abstract
Since its origin, the blockchain innovation has demonstrated promising application possibilities. From the initial crypto-currency to the current shrewd agreement, blockchain has been applied to numerous fields. In spite of the fact that there are a few investigations on the security and protection issues of blockchain, there comes up short on an efficient assessment on the security of blockchain system. Blockchain, as a decentralized and distributed open record technology in distributed system, has gotten significant consideration recently. It applies a connected square structure to check and store information, and applies the believed agreement instrument to synchronize changes in information, which makes it conceivable to make a sealed advanced stage for putting and sharing information. It is accepted that blockchain can be applied to differing Internet intelligent frameworks (e.g., Internet of Things, flexibly chain frameworks, human identity management and so on). In any case, there are some security challenges that may obstruct the wide utilization of blockchain. For all such in this chapter the broader aspects of privacy issues, decentralisation and regulatory challenges will be parleyed, whereas business models in association with blockchain will also be taken care off with a keen focus on security and privacy aspects of the blockchain.
Keywords: Blockchain, security, privacy, de-centralized, crypto-currency, data theft
Since the presentation of Bitcoin in 2009, its fundamental strategy, blockchain, has indicated promising application prospects and pulled in heaps of considerations from the scholarly community and industry [4]. Being the first digital money, Bitcoin was appraised as the top performing cash in 2015 and the best performing product in 2016, also, has more than 300K affirmed exchanges day by day in May, 2017. Simultaneously, the blockchain system has been applied to numerous fields, including medication, financial matters, Web of things, programming designing, etc. [4]. The presentation of Turing-complete programming dialects to empower clients to create brilliant agreements running on the blockchain marks the beginning of blockchain 2.0 time. With the decentralized accord component of blockchain, keen agreements permit commonly doubted clients to finish information trade or exchange without the need of any outsider confided in power [4]. Ethereum is presently (May of 2017) the most broadly utilized blockchain supporting keen agreements, where there are now 317,506 savvy contracts and in excess of 75,000 exchanges happened day by day [4].
Security comes on the top priority or the at most concern for any piece of action that is needed to be done or auctioned, hence the blockchain comes in a role play (Figure 1.1). Blockchain was basically developed by a group of researchers in the year 1991 to impart or emboss a time stamp on the digital documents but that didn’t work well and the experiment was the failure, due to which today’s psychedelic technology was garbaged [2]. In the year 2004 a computer scientist named Hal Finuey again reintroduced the blockchain with an alteration which was RPOW (Reusable Proof of Work).
A blockchain is a collection of four major components which collectively forms a block [2]. A blockchain is a decentralized, distributed, public ledger. It (blockchain) is a place to keep the record (transactional) which is decentralized as it can be created anywhere, whereas it is accessible anywhere, hence it is distributed, but what about the security aspect? as it can be accessed and created by anywhere and by anyone, which means there is a need to make the concept more feasible and secure.
Figure 1.1 Demonstrating the pictorial impression of blockchain [2].
When it is about privacy and security of any element/product/or a system, then it should have the basic working and the architectural knowledge of it. So, that the level of the security which are already existing can be updated or replaced for the better future [2].
In reference to the second chapter of this book, it explains to us about the working of the Blockchain. In this section of this chapter the basic architecture of the blockchain will be discussed, but moving ahead towards the architecture one should discuss few of the important terms which will be majorly used in the security and privacy aspects of the blockchain.
Immutable—Making the ledge secures with the digital signature or hash function.
POW—Proof of work, which is a protocol which has the main goal to deterring the cyber attacks.
Hash—It is unique value being assigned by the set of rules/algorithms/functions or the combination of all to make the ledger unique and separated from other blocks.
Digital Signature—It is another means of securing measure of the ledge, so that the data must be verified and treated as authentic.
Mining—Mining in general an activity to collect the useful out of whole.
These are the major terms which we may encounter in this chapter commonly. You will get to know more about these terms in the coming sections of this chapter, but before that the different types of blockchain architectures will be discussed below.
Logically, a blockchain is a chain of blocks which contain specific information (database), but in a secure and genuine way that is grouped together in a network (peer-to-peer) as shown in Figure 1.2. In other words, blockchain is a combination of computers linked to each other instead of a central server, meaning that the whole network is decentralized (Figure 1.3) [3].
Understanding it with the help of a relevant example like work on the Google docs and wait for others to make the necessary changes if required the same scenario is in the decentralized architecture of the blockchain. Blockchain allows and permit us to make the relevant docs shared rather copied [2, 3]. This distributed piece of information (ledger) provides the trust factor and the security of data.
Figure 1.2 The diagrammatic representation of the types of blockchain architecture [3].
Figure 1.3 Figure states the types of blockchains in trend.
Whereas the exact different case is there in the centralized architecture, the information or ledger which was shared is now kept private and shared with the authentic and with those who have required and necessary authority to access the data, which means now the data/ledger is kept private and not shared globally.
Now what left the distributed architecture, in this type a local copy of the ledger is given to all the parties/entities, so that the major alterations are done by the high officials or the major party whereas the information of the ledger is being distributed within the complete locality.
Table 1.1 will make the concept more clear and transparent to understand.
Table 1.1 A novel comparison among public, consortium, private blockchain.
Property
Public blockchain
Consortium blockchain
Private blockchain
Consensus determination
All miners
Selected set of nodes
Within one organization
Read permission
Public
Public or restricted
Public or restricted
Immutability level
Almost impossible to tamper
Could be tampered
Could be tampered
Efficiency (use of resources)
Low
High
High
Centralization
No
Partial
Yes
Consensus process
Permission less
Needs permission
Needs permission
A public blockchain architecture states that the data or the ledger and access to the system is available to anyone who is willing to participate for instance Bitcoin, Ethereum, and Litecoin blockchain systems are public and can be accessed by anyone globally [2, 3].
An opposite situation to the public blockchain architecture, the private system is highly controlled and managed only by users from a specific organization or institution or the company or authorized users who have an invitation for participation.
This blockchain structure can consist of a few organizations [3]. In a consortium, procedures are set up and controlled by the preliminary assigned users. It a system that is ‘semi-private’ and has a group which controls it, but works across different organizations. In simple terms it can be said as a distributed blockchain architecture.
The following table provides a detailed comparison among these three blockchain systems [3]:
In the previous section, the basic introductory part of blockchain is discussed. In this part the requirement of privacy including different tools and techniques are going to be discussed.
As shown in Figure 1.4 in this section, a blockchain is a highly secure mechanism or technology which allows the user to make secure and safe transactions [1, 3]. It is a statement said by many engineers, scientist and researchers but how......?
To know about this said statement in detail, one should back track a blockchain and need to collect the required information about how this technique is too strong and safe for transactions. Here we also need to know if this technology is too tremendous then why was it being garbaged in 1991 and then again re-launched in 2004 [1].
The working paradigm of a blockchain:
Let’s have a closer and a deeper look at Figure 1.4 that illustrates what a block is in a blockchain.
Each block in a blockchain consists of:
certain data
the hash of the block
the hash from the previous block (HOPB).
The data stored in each block completely depends on the type of blockchain. For instance, in the Bitcoin blockchain structure, the block maintains data about the receiver, sender, and the amount of coins.
A hash is a unique set of alphanumeric codes which is auto generated by the algorithms and the functions of the blockchain (in general terms it can be treated as the fingerprint, long record consisting of some digits and letters). Each block hash is generated with the help of a cryptographic hash algorithm (SHA 256) [1]. As a result, this helps to identify each and every block in a blockchain structure easily. The moment a block (of blockchain) is created, it automatically gets connected or attaches a hash, while any changes made in a block either in the ledger field or anywhere it straightened affects the change of a hash too which makes the technology precisely highly safe and secure. In simple terms, the hashes help to detect any changes in blocks of a blockchain.
Figure 1.4 The figure states the internal working paradigm of a blockchain.
The final element within the block is the hash which is from a previous block (refer to Figure 1.4). This creates a chain of blocks and is the main element behind blockchain architecture’s security [4]. As an example, assume a bock range from 1 till 46; block 45 points to block 46. The very first block in a chain is a bit special—all confirmed and validated blocks are derived from the genesis/creator block.
Any corrupt attempt provokes/results the blocks to change [4, 5]. All the assumed block’s hashes get changed resulting to the mismatch of hashes which then carry incorrect or invalid information and render the whole blockchain system invalid.
On the other hand, in theory, it could be possible enough to adjust or alter all the blocks with the help of strong computer processors (processors here means highly configured computers). However, there is a solution that eliminates this possibility called proof-of-work [1]. This allows a user to slow down the process of creation of new blocks. In the architecture of Bitcoin blockchain, it majorly takes around 10 min to determine or collects the necessary information of proof-of-work and adds a new block to the chain, but as it was discussed the block can only be added by the person which have the best computational system, here logical ability works rare rather than the system power, hence this work is done by miners—special nodes within the Bitcoin blockchain structure. The miners who win in the race get to keep the transaction fees from the block that they verified as a reward [1, 4].
Each new user (node) joining the peer-to-peer network (a network which have internet connection to share files and folders) of blockchain receives a full copy of the system. Once a new block is created, the detail of it is sent to each node within the blockchain system [4]. Then, each node verifies the information of the block and checks whether the information/data stated there in the block is correct. If everything is alright, the block is added to the local blockchain in each node.
All the nodes inside blockchain architecture create a consensus protocol. A consensus system is a set of network rules, and if everyone abides by them, they become self-enforced inside the blockchain.
To manage and protect the term privacy under blockchain technology, one must satisfy the subsequent requirements:
The links between the transactions must not be visible or discoverable.
The data of the transactions is merely and only known to their members.
The private or open blockchain must have an entrance control strategy or approval plan to fulfil the security prerequisites of blockchain, which fulfils the total straightforwardness of the blockchain information. Be that as it may, if the case is of an open setting, everybody can have an access to the blockchain with no limitations, the protection issues must be handled on the following factors:
Identity Privacy: Which alludes the intractability and unmanageability in the middle of the transaction contents and thus the original identities of their partakers stay sheltered, safe and secure about.
Transaction Privacy: In the following the transactional contents (e.g., amount or transacting patterns) can only be accessed and captured by the specified user(s), and kept secret, unknown and safe to the common or general public blockchain network [1, 4].
As it is referenced over, a transaction or a block of a blockchain contains the identity of the previous transaction, the addresses of its members or participants, values (trade), timestamp and unique mark of its sender. Due to its natural behavior or characteristic, it is possible to trace back and follow the flow of transactions to extract and collect the users’ physical identities or other common and additional private information through the tools techniques and also of data mining. In this section, it is referred towards the Bitcoin system as a typical instance to analyze the privacy threats for the blockchain network.
Users majorly/always create an alias when they hook up with the Bitcoin system. However, thanks to the general public and openness of blockchain, it’s possible to run a static analysis of the blockchain which allow us to track and unhide the masked users, that’s what de-anonymization is. Here, we have list out many attacks which will work under to de-anonymize the users’ real identities.
The blockchain majorly performs its work on the P2P network, which suggests that a node will share public its IP address when broadcasting the transactions. Researchers and scientist have identified three abnormal relay patterns for analyzing the network which could be mapped to Bitcoin addresses to IP addresses (i.e., multi-relayer & non-rerelayed transaction, single-relayer transactions and multi-relayer & rerelayed transactions).
Another major issue or threat that can cause problem to the data of transaction and for which the anonymity becomes problem is a transaction’s user-related features. Androulaki et al. have explained six characteristics that may portray a few highlights of transaction conduct, i.e., Random time-interval (RTI), hour of day (HOD), time of hour (TOH), time of day (TOD), coin flow (CF) and input and output balance (IOB). Abundance consideration on these characteristics may expand the odds to de-anonymize an individual client [1].
A denial-of-service assault might be a cyber assault and the most known and basic issue, where the noxious assailant attempts to look for or hack a machine or system asset being inaccessible to its customers by disturbing or ending web/network services of the host associated with the web or neighborhood server. The most well-known way or method to deal and handle with, be covered up by IP addresses or to hide the IP in P2P network is utilizing anonymity network systems (e.g., TOR).
A Sybil attack is another digital attack where the pernicious attacker and programmers destabilize the stature or notoriety system of a P2P network by making an outsized number of nom de plume or phony characters, utilizing them to understand a disadvantageous impact. Concerning the de-anonymization inside the blockchain, Bissias et al. broke down and judge that Sybil attacks could stop and break the decentralized anonymity protocol and can expand the likelihood to search out the clients’ genuine identities.
Except some personal information, majorly all transactional information goes to the public network which can be used to get the statistical distribution, which may help to get some guidelines and regulations for the blockchain applications.
Under this the major focus is on discovering and analyzing some overall transaction features (e.g., daily turnover, exchange rate or transaction pattern) over time.
This technique aims to get the bitcoin network by recursively connecting to clients, requesting and collecting their lists of other connected or peer IP addresses. In this flow, one can obtain concrete and correct information and data on size, structure and distribution of the bitcoin’s core network.
This part of the chapter presents a summarized overview of solutions that have been recently proposed by researchers aimed at maintaining and preserving privacy of the blockchain [1]. In a public blockchain, for example, in the digital currency or crypto currency Decreed, it is adviced and proposed that the clients’ address should have been adjusted and altered by creating another key pair for every session. Except that, there are three frequently-used systems and methods for safety and security and protecting anonymity in the blockchain and they summarized by: mixing services, ring signature, and non-interactive zero-knowledge proof.
As per the structure discussed in previous few sections the blockchains are linked with each other like sender or receiver of a transaction, therefore, by calculating and analyzing the public content (i.e., analytical attack), an individual can deduce some secret or privacy information or data to eliminate such attacks. One of the solutions is to confuse or blur the transaction’s relationships with the help of mixer (aka tumbler or laundry) as shown in Figure 1.5. The first mixing service introduced by Chaum [1], allows the user to hide his content of communication as well as the participants of the communication. The same concept is shown below in pictorial manner.
Figure 1.5 Basic architecture of mixing services [1].
Assume that one element prepares a message M for delivery to another substance at address R by encrypting it with the receiver’s open key KR, appending and attaching the address R, and afterward encrypting the result with the intermediary’s open key KI. The left-hand of the accompanying expression means the cipher content, which is transferred to an intermediary:
KI (r0, KR (r1, M), R) → KR (r1, M), R [1].
The symbol indicates the transformation of the cipher message by the intermediary into another cipher content appeared on the right-hand side. These transformations perform a decryption on the original cipher message by the intermediary with its private key. At that point the intermediary delivers the sub-cipher content to R who at that point decrypts it with his/her own private key. It is important to take note that r1 and r0 are random numbers which ensure that no message is transferred more than once [1].
At the point when the intermediary gets much information on input and output, this mechanism will shroud the correspondences between each message’s origin and destination. The order of arrival is covered up by yielding the uniformly estimated items in random patterns. Moreover, to minimize the danger of the single intermediary being the attacker, multiple intermediaries can be connected together thereby creating a mix cascade [1, 2].
Over the most recent couple of years, the services have been applied to the blockchain network to obfuscate the transaction history and reduce the risk of de-anonymization. These research efforts center around two main methods: (I) centralized mixing and (ii) decentralized mixing.
a. Centralized mixing is to mix transactions anonymously at the cost of some service fees. There are plenty of websites which work or behave like online mixers and swap the transactions among different users so as to shroud the relationship between their incoming and active transactions [1]. Likewise, most of them are reachable or contactable just through the TOR network which empowers anonymous communications through a free, worldwide, volunteer overlay network.
b. Decentralized mixing Decentralized mixing is to moderate the denial of services (DOS) danger caused or raised by the centralized services; a decentralized mixing design is proposed to empower a lot of commonly entrusted companions to distribute their messages at the same time and anonymously without the need of an outsider anonymity proxy [1, 4]. Another significant advantage of this methodology is the end of the requirement for mixing expenses. Moreover, it is nearer and progressively perfect to the decentralized structure of blockchain contrasted with the incorporated mixing design. Up until this point, there are for the most part two strategies to accomplish the decentralized mixing process, i.e., Coin Join and multi-party calculation (MPC).
Although the decentralized mixing techniques gives an “excellent” mixing in the blockchain, but they still need a delay till the time participants discover or find their partners for their transactions to be mixed. The ring signature enables a user (also a member of a set) to sign a message on behalf of the “ring” of members but there is no way to say that which one is real and who have signed. The core idea and methodology of this technology is the choice of a set without any central manager, which will significantly improve privacy in blockchain [1].
Brief of mixing services in blockchain [1].
Protocol
Anonymity
Centralized Party
Mix Cost
Sybil Strength
Dos Strength
Mixing Scale
Theft Strength
Waiting Time
Mixing website
Linkable at mixer
Required
Yes
Good
Poor
L/A
High
Long
CoinSwap
Linkable at mixer
Required
Yes
Good
Poor
N/A
Safe
Long
Mixcoin
Linkable at mixer
Required
Yes
Good
Poor
N/A
Accountable
Long
Blindcoin
Unlinkable
Required
Yes
Good
Poor
N/A
Accountable
Long
Blindly Signed Contracts
Unlinkable
Required
Yes
Good
Poor
N/A
Safe
Long
TumbleBit
Unlinkable
Required
Yes
Good
Good
L/T
Safe
Long
Dash
Unlinkable
Required Many
Yes
Good
Good
Less
P/D
Normal
Coinjoin
Internal Unlinkable
Decentralized
No
Poor
Poor
Less
High
Long
CoinShuffle
Unlinkable
Decentralized
No
Good
Moderate
Less
High
Long
XIM
Unlinkable
Decentralized
No
Moderate with fees
Moderate with fees
Large
Low
Long
Abbreviations:
L/A—Limited to access
N/A—No Limitation
L/T—Limited by transaction
P/D—Prevented with deposit
The very basic definition of Blockchain states and implies that, in relation to Figure 1.6, it is a decentralized ledger that can store information quite securely and immutably, utilizing cryptographic encryption and hashing techniques. But it seems in reality, that the word ‘decentralized’ is somehow stuck only to the definition [5]. A number of Blockchains out there in the market make use of centralized mechanisms.
But what exactly does this word “decentralization” means? Does it only refer to data being processed “not at the same place (distributed)?”
As explained by Vitalik Buterin in his blog, the decentralization can be categorized or viewed into three perspectives—first is “Architectural”. This states the number of physical computers attached or is in the network? Second comes “Political”—How many entities control these computers? And the last “Logical”—that derives that does the data structure and interfaces of the computers or systems act like a single structure or a swarm [5]?
No one controls Blockchains and they don’t have the infrastructural central or head point of failure. Hence, they are politically and architecturally decentralized. However, they are or can be said logically centralized since they act and behave like a single entity/computer.
But even if the above definition is correct and acceptable, then are blockchains as they are today decentralized?
Figure 1.6 Different types of Networks in blockchain [5]. (a) Centralized. (b) Decentralized. (c) Distributed networks.
The answer majorly comes is NO, because of these possible reasons:
Having four computers instead of having one is always better. But what if all the computers get infected with same issue or defect?
All the nodes in a Blockchain run the same client software, and if they get some issues or turns out to be buggy, reason may be any or then the whole system can come to a pause/standstill. This can put a question mark on the architectural decentralization of the Blockchains [5, 6].
In a Blockchain which uses the proof-of-work consensus mechanism and majority of the miners are from the same country, the government of that country can choose or decide to seize and control or stop all the mining farms on the account of national security [7]. This scenario or case is a major threat to the political decentralization of Blockchain.
Similarly, in a proof of stake Blockchain, if more than 70% of the coins at stake are held at one exchange, can put the political decentralization of the Blockchain at risk.
Moreover, if the majority of mining hardware (infrastructure) is built by the same company, it can also compromise the political decentralization of the Blockchain [8].
So, that means centralized Blockchains are not that good or of no use?
Not majorly, and this is because Blockchains serve various purposes, and these may require them to be centralized.
According to the report of Crytpo asset Taxonomy, about 16% of crypto currencies are said to be fully decentralized. The other crypto currencies reviewed are either centralized, or only semi-decentralized. Only 9% of all utility tokens were found to be sufficiently decentralized and only 7% of financial assets such as those born from initial coin offerings are decentralized [9, 10]. Crypto currencies such as Bitcoin, Stellar, Litecoin that work primarily as a payment method are among the most decentralized types of crypto assets, as per the report.
While the original crypto currency—Bitcoin, was designed and developed to be decentralized and removing the control of governments or any central organization, some experts claim and suggest that even Bitcoin can’t be termed as fully decentralized since a majority of the Bitcoin miners are from China.
Decentralization is a process that is beyond and above the computers and networks. It involves organizations and individuals in plural. Partial decentralization can be achieved at present [8]. However, the complete decentralization is very difficult to accomplish and it would take time for the Blockchains to become truly decentralized, if they intend to do so. It will not only involve Blockchain Technology but also artificial intelligence algorithms that would replace humans to eliminate biases.
A blockchain is a type of distributed ledger technology can be termed as DLT, consisting of a decentralised network of fixed or unchangeable databases, shared equally across the system. In the very beginning age of development of blockchain technology, blockchain has shown great potential in different areas from crypto currencies to smart contracts and so on [10, 11].
During the opening of the European Blockchain Partnership, Mariya Gabriel, EU Commissioner for Digital Economy and Society, clearly and boldly mentioned that “in the future, all public services will use blockchain technology”. As this tending technology continues to develop and attract keen attention and consciousness, regulation of blockchain is becoming an important and needful discussion.
In the fourth section of our Blockchain series, the regulatory measures and challenges associated with blockchain management are going to be discussed.
Being a decentralized system of network, blockchains are treated as the most strenuous technology and that’s the considerable reason to manacle it into strict regulations. Due to the innovative and dispensed nature, blockchains create numerous problems for regulators [12]. As it is already defined and know that Blockchains are distributed and decentralized. As a result, the nodes or sub systems within a network can be placed all around the world, without a definite ‘home-base’, making the question of legal jurisdiction complex.
The structure of blockchains creates issues concerning liability and accountability as un-authorized public blockchains have no form of a central authority or decision-maker that can be held responsible for the actions carried out within the network [12].
Apart from this, within a blockchain, data is shared across every node or participants of the network, each maintaining a full replica of the database. This case makes the situation more difficult as the real owner of the blockchain couldn’t be determined or is quite difficult to be judge it for the already created blockchain [12−14]. This scenario presents a challenge where intellectual property is concerned, making it strenuous to determine the author or owner of the data.
Privacy is another great challenge for regulators of blockchain. Transactions are linked completely and solely to a network account address rather than a personal identification (PI number), apparently ensuring privacy. However, if a connection between the two node are made and on the same side it revealed, the protection of an individual(s) privacy is no longer exists [16].
Blockchain regulation, like the technology itself, remains very much in its starting phase. Initiatives above the national level, such as the EU’s Blockchain Observatory and Forum, the European Blockchain Partnership and the Mediterranean Seven, focus on supporting its use and development, largely avoiding regulatory issues. This is because of a lack of consensus and harmony on blockchain and its applications; while some nations have treated it with suspicious eye, including China, although other countries such as Malta and Estonia have passionately and embraced it. This has made a regulatory landscape which differs from nation to nation [17].
Italian and Swiss agencies are among those that have chosen it to observe and check, for the time being, rather than embarking on the time-consuming process of developing and managing new legislation and policies that may soon be outdated given the early stages of blockchain technology development. “Switzerland doesn’t need new special regulations for blockchain”, asserted Ueli Maurer, the country’s Finance Minister [18]. The agencies of government have started opting to update and apply some new chances in their existing rules and laws to account for this novel technology.
Other nations have taken the some different kind of approach and have chosen to adopt and absorb some new national legislation, solely addressing and pointing sole aspects or specific applications of blockchain [17, 18]. Keen attention has been drawn up to the application of blockchain in the sector of finance and crypto tools and assets like Bitcoin. Countries such as Poland, France and Luxembourg have chosen to absorb some specific guidelines tailored to these issues.
Meanwhile, a few countries such as Liechtenstein have taken a more advanced and progressive and forward approach as the government has approved The ‘Blockchain Act’, which marks a milestone not just for Liechtenstein but for the international community which look at blockchain as a malicious and untrustworthy technology [19]. It provides the first holistic regulatory framework to govern the underlying concepts of blockchain.
Moving forward, regulators and policy makers will need to strike a fine balance when drafting blockchain legislation; overregulation will restrain development and also creates legal instability and uncertainty, which ultimately harms and affects the ultimate progress [19].
Blockchain must be regulated in such a way that accounts and support for the associated risks it produces while simultaneously encourages development of the technology. As such, legislation cannot simply consider current technologies but must seek and understand to be applicable to the generations of technology to follow.
Furthermore, while crypto and money explicit guideline is without a doubt fundamental, controllers should likewise embrace comprehensive structures equipped for directing the huge number of blockchain innovation applications, both now and to return. Non-money related applications are probably going to accomplish more footing and impact over the moving toward years, in this way requiring more noteworthy core interest.
Gauges will assume a vital job inside the route forward for blockchain, controlling its improvement and moving take-up by guaranteeing that the innovation supposedly is secure and solid [19, 20]. This pattern is starting to show up the same number of standard-setting bodies are connecting with the issues identified with blockchain and DLT. The International Telecommunication Union (ITU) has made a spotlight Group on Application of Distributed Ledger Technology devoted to the occasion of DLT principles [21]. The Institute of Electrical and Electronics Engineers (IEEE) has built up a Blockchain Initiative to work together with its Standards Association on blockchain institutionalization endeavours. The alliance for Standards (ISO) includes a devoted Blockchain and DLTs Technical Committee as of now performing on a progression of blockchain and DLT rules, covering everything from wording to security to keen agreements, on account of be discharged in 2021 [22].
While organizations and organizations working with blockchain presently work in a moderately guideline free space, this can probably adjust inside the not so distant future. It’s significant that they follow of improvements and effectively look for cooperation inside the administrative procedure, to shape strategy results and guarantee an administrative structure that keeps on supporting development.
Since the time Satoshi Nakamoto discharged the Bitcoin whitepaper and acquainted everybody with the blockchain innovation, the blockchain innovation appears to have increased its very own existence and has gotten a subject of enthusiasm over a wide assortment of organizations. A few organizations have begun working with another plan of action that is based around the blockchain. Right now, they are discussing fruitful usage of blockchain plans of action.
A plan of action is an extravagant term used to clarify the arrangement/procedure that the organization needs to create benefit by selling an item or administration. The plan of action gives a diagram of the plans of the organization to create an item or administration and to showcase it. Various organizations will utilize a plan of action which best suits their necessities. There are four conventional plans of action:
Manufacturer
Distributor
Retailer
Franchise.
This plan of action rotates around the formation of the item. The item could either be made without any preparation from normal assets or the maker can collect pre-assembled segments to make another item, for example, vehicles. An assembling business can follow two sub-models. It could either be “business-to-shopper” where they can sell their items straightforwardly to the buyers. Another choice includes re-appropriating the business part of the procedure to another organization, which is known as the business-to-business or B2B model. Right now, makers offer their item to the retailers who deal with the deals.
The Distributor plan of action purchases the item from the maker and afterward they either offer it to the end clients or a retailer. In a common inventory network, makers are the purpose of root while wholesalers are the go betweens who associate the producers to their end-clients or the retail location.
Retailers are physical shops or web based business sites which collect items from maker either straight forwardly or by means of a wholesaler. Retailers may be across the nation chains, or they could be free shops worked by a solitary substance. Retailers make it amazingly simple and clear for clients to purchase whatever items they need.
An establishment plan of action may include any of the previously mentioned plans of action, i.e., producing, circulating, or retailing. Anybody can buy an establishment which can have the two focal points and disservices. The primary bit of leeway is that an establishment as of now has all the business procedures and conventions coordinated inside it. On the other side, the principle impediment is the absence of adaptability. This should give you a thought of the conventional plans of action that have existed up until now. Be that as it may, since the time the approach of blockchain innovation, it has seen a large group of new plans of action. Thus, before going further, let us comprehend what blockchain models are.
What is the meaning of Utility? Utility methods are the absolute fulfilment that is gotten by the utilization of the products or administrations. The utility token model drives the usefulness in their business by means of the utilization of the tokens. Wave and Stellar are incredible instances of these sorts of models. The banks that are a piece of their system can encourage support movement through the utilization of the XRP or XLM tokens. According to William Mougayar, token utility has three significant properties (Figure 1.7):
Role
Features
Purpose
Figure 1.7 Demonstrating the properties of the model [23].
By claiming a specific token, the holder gets a specific measure of rights inside the biological system e.g. by having DAO coins in your ownership, you could have casting a ballot rights inside the DAO to choose which activities get subsidizing and which don’t.
The tokens make an inward monetary framework inside the limits of the venture itself. The tokens can support the purchasers and merchants exchange incentive inside the biological system. This permits clients to pick up endless supply of specific assignments. This creation and upkeep of individual, interior economies is one of the most basic elements of tokens.
It can likewise go about as a cost passage for you to utilize explicit functionalities of a specific framework e.g. In Golem, you have to have GNT (golem tokens) to access the advantages of the Golem supercomputer.
The token can likewise empower the holders to advance the client experience inside the bounds of the specific condition. e.g. In Brave (an internet browser), holders of BAT (tokens utilized in Brave) will get the rights to
