100,99 €
Blockchain for Real World Applications A comprehensive examination of blockchain architecture and its key characteristics Blockchain architecture is a way of recording data such that it cannot be altered or falsified. Data is recorded in a kind of digital ledger called a blockchain, copies of which are distributed and stored across a network of participating computer systems. With the advent of cryptocurrencies and NFTs, which are entirely predicated on blockchain technology, and the integration of blockchain architecture into online and high-security networked spaces more broadly, there has never been a greater need for software, network, and financial professionals to be familiar with this technology. Blockchain for Real World Applications provides a practical discussion of this subject and the key characteristics of blockchain architecture. It describes how blockchain technology gains its essential irreversibility and persistency and discusses how this technology can be applied to the information and security needs of different kinds of businesses. It offers a comprehensive overview of the ever-growing blockchain ecosystem and its burgeoning role in a connected world. Blockchain for Real World Applications readers will also find: * Treatment of real-world applications such as ID management, encryption, network security, and more * Discussion of the UID (Unique Identifier) and its benefits and drawbacks * Detailed analysis of privacy issues such as unauthorized access and their possible blockchain-based solutions Blockchain for Real World Applications is a must for professionals in high-security industries, as well as for researchers in blockchain technologies and related areas.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 581
Veröffentlichungsjahr: 2022
Rishabh Garg
Birla Institute of Technology and Science – Pilani, India
This edition first published 2023
© 2023 John Wiley & Sons, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750–8400, fax (978) 750–4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748–6011, fax (201) 748–6008, or online at http://www.wiley.com/go/permission.
Trademarks
Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty
While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762–2974, outside the United States at (317) 572–3993 or fax (317) 572–4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our website at www.wiley.com.
Library of Congress Cataloging-in-Publication Data
Names: Garg, Rishabh, author.Title: Blockchain for real world applications / Rishabh Garg.Description: Hoboken, New Jersey : John Wiley & Sons, 2023. | Includes index.Identifiers: LCCN 2022041346 (print) | LCCN 2022041347 (ebook) | ISBN 9781119903734 (hardback) | ISBN 9781119903741 (pdf) | ISBN 9781119903758 (epub) | ISBN 9781119903765 (ebook)Subjects: LCSH: Blockchains (Databases) | Electronic funds transfers.Classification: LCC QA76.9.B56 G37 2023 (print) | LCC QA76.9.B56 (ebook)| DDC 005.74--dc23/eng/20220920LC record available at https://lccn.loc.gov/2022041346LC ebook record available at https://lccn.loc.gov/2022041347
Cover image: © Yuichiro Chino/Getty Images
Cover design by Wiley
Set in 9.5/12.5pt STIXTwoText by Integra Software Services Pvt. Ltd, Pondicherry, India
Cover
Title page
Copyright
Illustrations
Foreword
Preface
1 Introduction
2 Distributed Ledger Technology
2.1 Different Types of Distributed Ledger Technology
2.1.1 Blockchain
2.1.2 Directed Acyclic Graph
2.1.3 Hashgraph
2.1.4 Holochain
2.1.5 Tempo (Radix)
2.2 Chronological Evolution
2.2.1 Blockchain 1.0
2.2.2 Blockchain 2.0
2.2.3 Blockchain 3.0
2.2.4 Blockchain 4.0
2.3 Blockchain Architecture
2.3.1 Block
2.3.2 Hash Function
2.3.3 Encryption
2.3.3.1 Problems
2.3.4 Keys: Public and Private
2.3.5 Decentralized Identifier
3 Blockchain Ecosystem
3.1 Working of Blockchain
3.2 Key Characteristics
3.2.1 Decentralization
3.2.2 Persistence
3.2.3 Anonymity
3.2.4 Auditability
3.3 Unspent Transaction Output
3.4 Classification of Blockchain on Access Management
3.4.1 Public Blockchain
3.4.2 Private Blockchain
3.4.3 Consortium Blockchain
3.5 Consensus
3.5.1 Proof-of-Work
3.5.2 Proof-of-Stake
3.5.3 Peercoin
3.5.4 Practical Byzantine Fault Tolerance
3.5.5 Delegated Proof-of-Stake
3.5.6 Ripple
3.5.7 Tendermint
3.5.8 Consensus Algorithms: A Comparison
3.5.8.1 Node Identity Management
3.5.8.2 Energy Saving
3.5.8.3 Tolerated Power of Adversary
3.5.9 Advances in Consensus Algorithms
3.6 Payment Verification in Blockchain
3.6.1 Simple Payment Verification
3.6.1.1 Key Features
3.6.2 Full Payment Verification
3.6.2.1 Key Features
3.7 Hashgraph
3.7.1 Elements of Hashgraph
3.7.2 Diagrammatic Representation
3.7.3 How Does Hashgraph Work?
3.8 Scalability
4 Transactions in Bitcoin Blockchain
4.1 Coinbase Transactions
4.1.1 Structure
4.1.2 Key Features of Coinbase Transactions
4.1.3 Computation of Transaction Value
4.2 Transactions Involving Fiat Currency
4.2.1 Cryptocurrency Exchanges
4.2.2 Bitcoin Debit Card
4.2.3 Bitcoin ATMs
4.2.4 Metal Pay
4.2.5 Peer-to-Peer Exchanges
4.3 Top Fiat Currencies for Bitcoin Transactions
4.3.1 US Dollar
4.3.2 Japanese Yen
4.3.3 Euro
4.3.4 Korean Won
4.3.5 Chinese Yuan
4.3.6 Indian National Rupee
4.4 Price Determination for Bitcoin in Transactions
4.4.1 Cost of Mining Bitcoin
4.4.2 Market Supply and Demand
4.4.3 Bitcoin Rewards
4.4.4 Exchanges
4.4.5 Competing Cryptocurrencies
4.4.6 Regulatory Provisions
4.4.7 Internal Governance
4.4.8 Value of Bitcoin
4.4.9 Can the Bitcoin Price Be Zero?
4.4.10 Why Is Bitcoin’s Price Volatile?
4.5 Controlling Transaction Costs in Bitcoin
4.5.1 History of Bitcoin Cash
4.5.2 Concerns about Bitcoin Cash
4.5.3 Bitcoin Cash Core Features
4.5.4 Utility of Bitcoin Cash
4.5.5 Advancements over Bitcoin
4.5.5.1 Maximum Block Size
4.5.5.2 Cost Efficiency
4.5.5.3 Smart Contract Support
4.5.5.4 Issue of Token
4.5.5.5 Nonfungible Tokens
4.5.5.6 No Replacement-by-Fee
4.5.5.7 Schnorr Signatures
4.5.5.8 Difficulty Adjustment Algorithm
4.5.6 Bitcoin Cash – Ease of Use
4.5.7 Challenges to Bitcoin Cash
5 Ethereum and Hyperledger Fabric
5.1 Early Attempts to Program Cryptocurrencies
5.2 Smart Contracts
5.3 Working of Ethereum
5.3.1 Gas
5.3.2 Ether
5.4 Hyperledger
5.5 Working of Hyperledger
5.5.1 Components
5.5.2 Workflow
5.5.2.1 Proposal
5.5.2.2 Endorsement
5.5.2.3 Transmission to Ordering Service
5.5.2.4 Updating the Ledger
5.5.3 Industrial Applications of Hyperledger Fabric
5.5.3.1 Production
5.5.3.2 B2B Contract
5.5.3.3 Supply Chain
5.5.3.4 Asset Depository
5.5.3.5 Trading and Asset Transfer
5.5.3.6 Insurance
5.5.3.7 Real Estate
5.5.4 Benefits of Hyperledger Fabric
5.5.4.1 Open Source
5.5.4.2 Private and Confidential
5.5.4.3 Access Control
5.5.4.4 Chaincode Functionality
5.5.4.5 Performance
5.5.4.6 Modular Design
5.6 Ethereum Versus Hyperledger
5.6.1 Purpose
5.6.2 Cryptocurrency
5.6.3 Participation
5.6.4 Privacy
5.6.5 Governance
5.6.6 Computer Code
5.6.7 Smart Contracts
5.6.8 Consensus Mechanism
5.6.9 Rate of Transactions
5.6.10 Use-cases
5.7 Decentralized Applications
5.7.1 Merits of Decentralized Applications
5.7.1.1 Zero Downtime
5.7.1.2 Privacy
5.7.1.3 Resistance to Censorship
5.7.1.4 Absolute Data Integrity
5.7.2 Demerits of Decentralized Applications
5.7.2.1 Maintenance
5.7.2.2 Performance Overhead
5.7.2.3 Network Congestion
5.7.2.4 User Experience
5.7.2.5 Centralization
5.8 Tokens
6 Identity as a Panacea for the Real World
6.1 Identity Systems
6.1.1 Contemporary ID Systems
6.2 Centralized Model
6.2.1 A Case Study of World’s Largest Biometric ID System – Aadhaar
6.2.1.1 Salient Features of Aadhaar
6.2.1.2 Biometric and Demographic Standards
6.2.1.3 Enrollment Set-up
6.2.1.4 Entities and Their Roles
6.2.1.5 Process of Authentication
6.2.1.6 Budget and Outlay
6.2.1.7 Enrollment Status and Saturation
6.3 Cost and Benefits
6.3.1 Merits
6.3.2 Demerits
6.3.2.1 Waste of Resources
6.3.2.2 Lack of Neutrality
6.3.2.3 Technical Glitches
6.3.2.4 Security Procedures
6.3.2.5 Unauthorized Access
6.3.2.6 Absence of Data Protection Act
6.3.2.7 Involvement of Private Players
6.3.2.8 Freedom of Choice as an Illusion
6.3.2.9 Implicit Coercion
6.4 Quest for One World – One Identity
7 Decentralized Identities
7.1 Identity Models
7.1.1 Centralized Identity
7.1.2 Federated Identity
7.1.3 User-centric Identity
7.1.4 Self-sovereign Identity
7.2 Blockchain-based Solutions
7.3 Identity Management
7.3.1 Current Challenges
7.3.1.1 Absence of Compatibility
7.3.1.2 Identity Theft
7.3.1.3 KYC Onboarding and Weak Authentication Protocols
7.3.1.4 Lack of Control
7.4 Identity Storage | Interplanetary File System
7.4.1 How Does IPFS Access the Documents?
7.4.2 Transactions Involved in Accessing Documents on IPFS
7.4.3 IPFS Commands
7.5 Biometric Solutions
7.5.1 Fingerprint Verification
7.5.2 Iris Scan
7.5.3 Vascular Technology
7.5.4 Palm Vein Pattern
7.5.5 Facial Recognition
7.5.1.1 Verification of Government ID
7.5.1.2 Verification of a User
7.5.1.3 Creation of a Digital ID
7.5.2 System Overview
7.5.2.1 Identify Creator
7.5.2.2 Identity User
7.5.2.3 Identity Manager
7.5.2.4 Identity Device
7.5.3 Blockchain Identity Protocol
7.5.3.1 Creation of Digital ID
7.5.3.2 Use of Digital ID
7.5.3.3 Digital ID Management
7.5.4 Security Audit
7.5.4.1 Binding
7.5.4.2 Privacy
7.5.5 Authentication Protocol
7.6 Identity Access
7.6.1 Identity Encryption
7.6.2 Zero Knowledge Proof
7.6.3 Revocation
7.7 Merits of a Proposed System
7.7.1 Seamless Navigation
7.7.2 Accessibility
7.7.3 Easy and Secure
7.7.4 Decentralized Public Key Infrastructure
7.7.5 Decentralized Storage
7.7.6 Manageability and Control
7.7.7 Data Portability
7.7.8 Prevention of Identity Theft
7.8 Disadvantages of the Proposed System
7.8.1 Privacy Leakage
7.8.2 Selfish Mining
7.8.3 Admin Conflicts
7.9 Challenges
7.9.1 Storage Optimization and Redesign
7.9.2 Privacy Protection
7.9.3 Random Beacons and Timestamps
7.10 Solutions with Hyperledger Fabric
7.10.1 Warning Pointers
7.10.2 Safety Protocols
8 Encryption and Cybersecurity
8.1 Cryptography
8.1.1 Different Types of Cryptography
8.1.1.1 Symmetric Key Cryptography
8.1.1.2 Asymmetric Key Cryptography
8.1.1.3 Hash Functions
8.1.2 Cryptographic Schemes
8.1.2.1 Simple Substitution Cipher
8.1.2.2 Caesar Cipher
8.1.2.3 Vigenére Cipher
8.1.2.4 Transposition Cipher
8.2 Playfair Cipher
8.2.1 Encryption Algorithm
8.2.1.1 Step 1 – Generate Squares (5 * 5)
8.2.1.2 Step 2 – Algorithm to Encrypt Plaintext
8.2.2 Decryption Algorithm
8.2.2.1 Step 1 – Generate Squares (5 * 5)
8.2.2.2 Step 2 – Algorithm to Decrypt the Ciphertext
8.2.3 Advantages and Disadvantages
8.2.3.1 Advantages
8.2.3.2 Disadvantages
8.3 Hill Cipher
8.3.1 Substitution Scheme
8.3.1.1 Encryption
8.3.1.2 Decryption
8.4 RSA Algorithm in Cryptography
8.4.1 Working Mechanism
8.4.1.1 Generating the Public Key
8.4.1.2 Generating a Private Key
8.5 Multiple Precision Arithmetic Library
8.5.1 GNU Multiple Precision Arithmetic Library
8.5.2 RSA Algorithm Implementation Using GMP Library
8.5.3 Weak RSA Decryption with Chinese Remainder Theorem
8.6 SHA-512 Hash in Java
8.7 Cybersecurity
8.7.1 Common Cyberattacks
8.7.1.1 Denial-of-Service Attacks
8.7.1.2 Malware
8.7.1.3 Man-in-the-Middle Attack
8.7.1.4 Phishing
8.7.1.5 Structured Language Query Injection
8.7.1.6 Latest Cyberthreats
8.7.2 Key Cybersecurity Features
8.7.3 Blockchain for Cybersecurity
8.7.4 Pros and Cons of Blockchain in Cybersecurity
8.7.4.1 Pros
8.7.4.2 Cons
8.7.5 Real-world Examples
8.7.5.1 Australian Government
8.7.5.2 Barclays
8.7.5.3 Chinese Military
8.7.5.4 Cisco
8.7.5.5 Coinbase
8.7.5.6 Colorado State
8.7.5.7 Founders Bank
8.7.5.8 Health Linkage
8.7.5.9 JP Morgan
8.7.5.10 Mobile Coin
8.7.5.11 Philips Healthcare
8.7.5.12 Santander Bank
8.7.5.13 Wall Street
Reference
9 Data Management
9.1 Data Science
9.1.1 Challenges for Data Scientists
9.1.2 Blockchain-based Solutions
9.2 Education and Employment Verification
9.2.1 Existing Verification Process
9.2.2 Blockchain as an Option
9.2.2.1 Enrollment Process
9.2.2.2 Validation Process
9.2.2.3 Double Layer Encryption
9.2.3 Learner’s Console
9.2.4 Assessment Portal
9.2.5 Background Verification
9.2.5.1 Maintenance of Track Record
9.2.5.2 CV Validation
9.2.5.3 Opportunities for Job Aspirants
9.2.6 Bureaucratic Disintermediation
9.2.7 Advantages of Blockchain-based Verification
9.3 Health Care
9.3.1 Potential Uses in Health Care
9.3.1.1 Digital Health Records
9.3.1.2 Drug Supply Chain
9.3.1.3 Health Insurance
9.3.1.4 Remote Health Monitoring
9.3.1.5 Organ Transplantation
9.3.1.6 Credential Verification
9.3.2 Real-world Use-Cases
9.3.2.1 Akiri
9.3.2.2 Avaneer Health
9.3.2.3 Block Pharma
9.3.2.4 BurstIQ
9.3.2.5 Centers for Disease Control and Prevention
9.3.2.6 Chronicled
9.3.2.7 Coral Health
9.3.2.8 Embleema
9.3.2.9 Factom
9.3.2.10 Guardtime
9.3.2.11 MedicalChain
9.3.2.12 Patientory
9.3.2.13 Professional Credentials Exchange
9.3.2.14 RoboMed
9.3.2.15 Tierion
9.4 Genomics
9.4.1 Real World Use-Cases
9.4.1.1 doc.ai
9.4.1.2 EncrypGen
9.4.1.3 Nebula Genomics
9.5 Food Supply Chain
9.6 Real Estate
9.6.1 Title Management
9.6.2 Smart Assets
9.6.3 Trust and Transparency
9.6.4 Financing
9.6.5 Cost and Efficiency
9.6.6 Tokenization
9.6.7 Pros and Cons of Tokenization
9.7 Crowd Operations
9.7.1 Decentralized Voting (Electoral Process)
10 Banking and Finance
10.1 Banking and Investment
10.1.1 Identity Authentication
10.1.2 Banking Charges
10.1.3 Fast Payments
10.1.4 Withdrawal and Settlements
10.1.5 Credit and Loans
10.1.6 Transfer of Assets
10.1.7 Peer-to-Peer Transfers
10.1.8 Hedge Funds
10.1.9 Fundraising
10.1.10 Enhanced Security
10.1.11 Accountability
10.2 Trade Finance
10.2.1 Smart Contracts
10.2.2 Enterprise Resource Planning
10.2.3 Data Repositories and Registries
10.2.4 Tokenization of Fiat Money
10.2.5 Lightning Network
10.2.6 Pre- and Post-trade Processes
10.2.7 Accounts and Audit
10.2.8 Latent Benefits
10.2.8.1 Decentralization
10.2.8.2 Information Transmission
10.2.8.3 Incorporation of IoT
10.2.8.4 Defense Mechanism
10.2.8.5 Transparency
10.2.8.6 Disintermediation
10.2.8.7 Corporate Lending
10.2.8.8 Cost Efficiency
10.2.8.9 Loyalty Rewards
10.2.9 Impending Challenges and Remediation
10.2.9.1 Security
10.2.9.2 Storage Capacity
10.2.9.3 Block Time
10.2.9.4 Privacy
10.2.9.5 Cyberattacks
10.2.9.6 Robustness
10.2.9.7 Legal Enforcement
10.3 Auction Process
10.4 Decentralized Finance
10.4.1 DeFi Financial Products
10.4.2 Total Value Locked in DeFi
10.4.3 Use Cases for Decentralized Finance
10.4.3.1 Asset Management
10.4.3.2 Tokenization
10.4.3.3 Tokenized Derivatives
10.4.3.4 Decentralized Exchanges
10.4.3.5 Decentralized Autonomous Organization
10.4.3.6 Data Analytics and Assessment
10.4.3.7 Payments
10.4.3.8 Lending and Borrowing
10.4.3.9 Identity
10.4.3.10 Know Your Transactions
10.4.3.11 Insurance
10.4.3.12 Margin Trading
10.4.3.13 Marketplace
10.4.3.14 Gaming
10.4.3.15 Yield Farming
10.4.4 Ethereum as a DeFi Platform
10.4.4.1 Fast Money Transfer around the World
10.4.4.2 Stream Money across the Globe
10.4.4.3 Programmable Money
10.4.4.4 Access Stable Currencies
10.4.4.5 Borrowing
10.4.4.6 Lending
10.4.4.7 No-loss Lottery
10.4.4.8 Exchange Tokens
10.4.4.9 Advanced Trading
10.4.4.10 Fund Aggregation
10.4.4.11 Portfolio Management
10.4.4.12 Quadratic Funding
10.4.4.13 Crowd Funding
10.4.4.14 Insurance
10.5 Prediction Markets
10.5.1 Scope for Decentralized Markets
10.5.2 Real World Examples of Prediction Markets
10.5.2.1 Augur
10.5.2.2 TotemFi
10.5.2.3 Finance.vote
10.5.2.4 OptionRoom
10.5.2.5 Polymarket
10.5.3 Summary
11 Growing Landscape of Blockchain
11.1 Blockchain Applications in Real World: An Overview
11.2 e-Governance
11.3 Supply Chain Management
11.3.1 Data Logging on Ledger
11.3.2 Access to a Ledger
11.4 e-Commerce
11.4.1 Backend
11.4.2 Smart Contracts
11.4.3 Ethereum Front-end
11.4.4 Currency Store
11.5 Distributed Resources and Internet of Things
11.5.1 Tracking and Compliance
11.5.2 Delivery Consignment
11.5.3 Maintenance Record
11.6 Decentralized Streaming
11.6.1 Operative Mechanism
11.6.1.1 Orchestrator
11.6.1.2 Delegators
11.6.1.3 Participation Rewards
11.6.2 Video Mining
11.6.2.1 Dual Mining
11.6.2.2 Trade-offs and Considerations
11.6.2.3 Earnings
11.6.2.4 Rewards
11.6.2.5 Fees
11.6.2.6 Costs
11.6.2.7 Per Pixel Pricing
11.6.2.8 Probabilistic Micropayments
11.6.2.9 Automatic Price Adjustments
11.6.2.10 Transcoding Pools
11.6.2.11 Private Pools
11.6.2.12 Public Pools
11.6.2.13 Selection
11.6.2.14 Economic Security
11.6.2.15 Latency
11.6.2.16 Other Considerations
12 Functional Mechanism
12.1 Software Requirements
12.2 Installing a Mobile Application
12.3 Fetching or Uploading the Documents
12.4 Government or Third-party Access
12.5 Credibility Through Smart Contracts
12.6 User-Optimized Features
Appendices
Glossary
Index
End User License Agreement
Chapter 2
Figure 2.1 Different milestones during...
Figure 2.2 Blockchain – a continuous...
Figure 2.3 An illustration of...
Figure 2.4 Components of a...
Figure 2.5 A cryptographic hash...
Figure 2.6 Asymmetric key encryption...
Figure 2.7 Decentralized identifier (DID...
Chapter 3
Figure 3.1 Working of blockchain...
Figure 3.2 Creating blockchain account...
Figure 3.3 Adding peers on...
Figure 3.4 Checking peer account...
Figure 3.5 Checking account balances...
Figure 3.6 Transacting on the...
Figure 3.7 Key characteristics of...
Figure 3.8 Input and output...
Figure 3.9 Proof-of-work...
Figure 3.10 Limenberg’s representation...
Chapter 4
Figure 4.1 Input of raw...
Figure 4.2 Different subdivisions of...
Figure 4.3 Instance of a...
Figure 4.4 Coinbase transaction: reward...
Figure 4.5 Bitcoin halving
Figure 4.6 Bitcoin debit card
Figure 4.7 Top fiat currencies in the world
Figure 4.8 Bitcoin value
Figure 4.9 Bitcoin hard forks
Chapter 5
Figure 5.2 Working of Hyperledger Fabric
Figure 5.3 B2B working of HPL
Figure 5.4 Comparison between centralized...
Chapter 6
Figure 6.1 Paper identities across the world
Figure 6.2 Digital identities across...
Figure 6.3 Digital identities across...
Figure 6.4 Aadhaar – An identity...
Figure 6.5 Entities involved in...
Figure 6.6 Process of authentication...
Figure 6.7 Budget and expenditure...
Figure 6.8 Numbers of UID...
Figure 6.9 Saturation status (in...
Figure 6.10 Areas, where Aadhaar...
Chapter 7
Figure 7.1 Online identity models...
Figure 7.2 Centralized identity
Figure 7.3 User-centric identity
Figure 7.4 Comparison between the...
Figure 7.5 Characteristics of self...
Figure 7.6 Use cases of...
Figure 7.7 Biometric solution – system...
Figure 7.8 Security audit – binding...
Figure 7.9 Identity and access...
Figure 7.10 Disadvantages of blockchain...
Chapter 2
Figure 8.1 Cipher encryption: If...
Figure 8.2 Cipher encryption: If...
Figure 8.3 Cipher encryption: If...
Figure 8.4 Cipher encryption: Plaintext...
Figure 8.5 Cipher decryption: If...
Figure 8.6 Cipher decryption: If...
Figure 8.7 Cipher decryption: If...
Figure 8.8 Cipher decryption: Ciphertext...
Figure 8.9 Letters (left) and...
Figure 8.10 Hill Cipher encryption...
Figure 8.11 Hill Cipher decryption...
Figure 8.12 Cyber threats (Man...
Chapter 9
Figure 9.1 Blockchain application for...
Figure 9.2 Enrollment process
Figure 9.3 Record management process
Figure 9.4 Validation process
Figure 9.5 Two-layer encryption model
Figure 9.6 Learner’s assessment record
Figure 9.7 Blockchain in healthcare supply chain
Figure 9.8 Food supply chain management
Chapter 10
Figure 10.1 Parties and their role in trade finance
Figure 10.2 Integration of enterprise...
Figure 10.3 Deployment of smart contracts using remix IDE
Figure 10.4 Truffle test for smart contracts
Figure 10.5 Yield.vote as a DeFi platform
Figure 10.6 Augur betting platform
Figure 10.7 TotemFi prediction platform
Figure 10.8 Finance.vote market
Figure 10.9 Finance.vote market
Figure 10.10 OptionRoom market
Figure 10.11 Polymarket
Chapter 11
Figure 11.1 Applications of blockchain...
Figure 11.2 Applications of blockchain...
Figure 11.3 Blockchain for supply...
Figure 11.4 A sample template...
Figure 11.5 Blockchain enabled Internet...
Figure 11.6 Video mining through...
Chapter 12
Figure 12.1 Blockchain-enabled identity
Figure 12.2 Blockchain for recording citizen data
Figure 12.3 Endorsement of documents on user’s profile
Figure 12.4 One World – One Identity
Figure 12.5 Third party access
Figure 12.6 Rise and fall of trust score
Chapter 3
3.1 Content of genesis file
3.2 Connected peer node – 1
Chapter 7
7.1 IPFS commands
7.2 App.js logic
7.3 Storing the hashes
7.4 Creation of Digital ID
7.5 Use of Digital ID
7.6 Fingerprint authentication code for iPhone
Chapter 8
8.1 Playfair Cipher – Encryption using C
8.2 Playfair Cipher – Decryption using C
8.3 Encryption and decryption in Hill Cipher using C++
8.4 RSA Asymmetric Cryptography using C
8.5 RSA Algorithms using C
8.6 Chinese Remainder Theorem
8.7 Calculating SHA-512 hash value
Chapter 9
9.1 Voting process using smart contracts
9.2 Decentralized voting process
9.3 Python-based frontend
Chapter 10
10.1 Smart contract code for lending and borrowing (Interface)
10.2 ERC3156 code
10.3 Auction process using smart contracts
10.4 Truffle test for smart contracts
10.5 dApp to implement auction smart contract
10.6 Limit orders in smart contracts
Chapter 11
11.1 e-Commerce app (Backend)
11.2 e-Commerce app (Server.js file)
11.3 Smart contract for currency minting
11.4 Deployment of smart contract by the owner
11.5 Smart contract for Payments (transferring money to admin)
11.6 Ethereum (Frontend)
11.7 Transacting on the dApp using Currency store
Chapter 3
Table 3.1 Comparisons among public blockchain, consortium blockchain, and private bloc...
Table 3.2 Comparisons among Typical Consensus Algorithms.
Chapter 5
Table 5.1 Constants.
Table 5.2 Flow control.
Table 5.3 Computation Fee in Gas Points.
Chapter 6
Table 6.1 Demographic and biometric details collected by UIDAI.
Table 6.2 Different entities and their role in UID cycle.
Chapter 7
Table 7.1 Comparison between a Typical ID Management and a Blockchain ID Management.
Chapter 10
Table 10.1 Global trade pain points and potentials benefits of using blockchain platfor...
Table 10.2 Impact of blockchain on trade finance.
Chapter 11
Table 11.1 Blockchain applications across the real world.
Table 11.2 Use of blockchain across different countries.
Cover
Title page
Copyright
Table of Contents
Illustrations
Foreword
Preface
Begin Reading
Appendices
Glossary
Index
End User License Agreement
i
ii
iii
iv
v
vi
vii
viii
ix
x
xi
xii
xiii
xiv
xv
xvi
xvii
xviii
xix
xx
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
2.1 Different milestones during the evolution of blockchain
2.2 Blockchain – a continuous sequence of blocks
2.3 An illustration of a block
2.4 Components of a block
2.5 A cryptographic hash function
2.6 Asymmetric key encryption in blockchain
2.7 Decentralized identifier (DID)
3.1 Working of blockchain
3.2 Creating blockchain account
3.3 Adding peers on the blockchain
3.4 Checking peer account
3.5 Checking account balances
3.6 Transacting on the blockchain
3.7 Key characteristics of blockchain
3.8 Input and output UTXOs references
3.9 Proof-of-work – Fault tolerance mechanism
3.10 Limenberg’s representation of hashgraph
4.1 Input of raw data
4.2 Different subdivisions of the raw data
4.3 Instance of a real coinbase transaction
4.4 Coinbase transaction: reward block
4.5 Bitcoin halving
4.6 Bitcoin debit card
4.7 Top fiat currencies in the world
4.8 Bitcoin value
4.9 Bitcoin hard forks
5.1 Working of Ethereum
5.2 Working of Hyperledger Fabric
5.3 B2B working of HPL
5.4 Comparison between centralized and distributed systems
6.1 Paper identities across the world
6.2 Digital identities across the world – North and South America
6.3 Digital identities across the world – Europe, Asia, and Africa
6.4 Aadhaar – An identity based on biometric and demographic data
6.5 Entities involved in UID project
6.6 Process of authentication
6.7 Budget and expenditure of UIDAI (in 10,000,000 INR)
6.8 Numbers of UID (Aadhaar) generated (× 10,000,000)
6.9 Saturation status (in percentage)
6.10 Areas, where Aadhaar is mandatory
7.1 Online identity models: Stages of evolution
7.2 Centralized identity
7.3 User-centric identity
7.4 Comparison between the existing model and the proposed model
7.5 Characteristics of self-sovereign identity
7.6 Use cases of blockchain
7.7 Biometric solution – system overview
7.8 Security audit – binding
7.9 Identity and access management through blockchain
7.10 Disadvantages of blockchain in ID management
8.1 Cipher encryption: If both the letters in the digraph are in the same column
8.2 Cipher encryption: If both the letters in the digraph are in the same row
8.3 Cipher encryption: If none of the rules apply
8.4 Cipher encryption: Plaintext to ciphertext
8.5 Cipher decryption: If both the letters in the digraph are in the same column
8.6 Cipher decryption: If both the letters in the digraph are in the same row
8.7 Cipher decryption: If none of the rules apply
8.8 Cipher decryption: Ciphertext into plaintext
8.9 Letters (left) and corresponding numbers (right) – Hill cipher encryption uses the above scheme of numbers and letters that can be modified as per condition
8.10 Hill Cipher encryption – ACT encrypts to POH
8.11 Hill Cipher decryption – POH decrypts back to ACT
8.12 Cyber threats (Man-in-the-Middle)
9.1 Blockchain application for data science
9.2 Record management process
9.3 Enrollment process
9.4 Validation process
9.5 Two-layer encryption model
9.6 Learner’s assessment record
9.7 Blockchain in healthcare supply chain
9.8 Food supply chain management
10.1 Parties and their role in trade finance
10.2 Integration of enterprise resource planning with blockchain
10.3 Deployment of smart contracts using remix IDE
10.4 Truffle test for smart contracts
10.5 Yield.vote as a DeFi platform
10.6 Augur betting platform
10.7 TotemFi prediction platform
10.8 Finance.vote market
10.9 Finance.vote market
10.10 OptionRoom market
10.11 Polymarket
11.1 Applications of blockchain technology in real world
11.2 Applications of blockchain technology across government departments
11.3 Blockchain for supply chain management
11.4 A sample template of a product profile
11.5 Blockchain enabled Internet of Things
11.6 Video mining through Livepeer
12.1 Blockchain-enabled identity
12.2 Blockchain for recording citizen data
12.3 Endorsement of documents on user’s profile
12.4 One World – One Identity
12.5 Third party access
12.6 Rise and fall of trust score
3.1 Content of genesis file
3.2 Connected peer node – 1
7.1 IPFS commands
7.2 App.js logic
7.3 Storing the hashes
7.4 Creation of Digital ID
7.5 Use of Digital ID
7.6 Fingerprint authentication code for iPhone
8.1 Playfair Cipher – Encryption using C
8.2 Playfair Cipher – Decryption using C
8.3 Encryption and decryption in Hill Cipher using C++
8.4 RSA Asymmetric Cryptography using C
8.5 RSA Algorithms using C
8.6 Chinese Remainder Theorem
8.7 Calculating SHA-512 hash value
9.1 Voting process using smart contracts
9.2 Decentralized voting process
9.3 Python-based frontend
10.1 Smart contract code for lending and borrowing (Interface)
10.2 ERC3156 code
10.3 Auction process using smart contracts
10.4 Truffle test for smart contracts
10.5 dApp to implement auction smart contract
10.6 Limit orders in smart contracts
11.1 e-Commerce app (Backend)
11.2 e-Commerce app (Server.js file)
11.3 Smart contract for currency minting
11.4 Deployment of smart contract by the owner
11.5 Smart contract for Payments (transferring money to admin)
11.6 Ethereum (Frontend)
11.7 Transacting on the dApp using Currency store
3.1 Comparisons among public blockchain, consortium blockchain, and private blockchain
3.2 Comparisons among typical consensus algorithms
5.1 Constants
5.2 Flow control
5.3 Computation fee in gas points
6.1 Demographic and biometric details collected by UIDAI
6.2 Different entities and their role in UID cycle
7.1 Comparison between a typical ID management and a blockchain ID management
10.1 Global trade pain points and potentials benefits of using blockchain platform
10.2 Impact of blockchain on trade finance
11.1 Blockchain applications across the real world
11.2 Use of blockchain across different countries
Mistaken identity has often produced many delightful works in literature starting from the Comedy of Errors by Shakespeare. Alas, the complex world of today does not admit of that luxury. The modern systems developed by governments and businesses all over the world use individual identities for a large number of functions and delivery of services. Every day, millions of people sign up online to carry out a wide range of activities. Users are routinely coerced to disclose their personal identifiable information before allowing access to online services. With each transaction, the user leaves his digital footprints behind, which have the potential to compromise specific personal information. This is why an identity system that is error free and impervious to manipulation and fraud is a prerequisite for the real world.
Blockchain technology, while ensuring a self-sovereign identity, offers a robust and tamper-proof ecosystem to conduct real-world activities, such as education, health care, real estate, transportation, banking, business, trade/finance, supply-chain management, e-commerce, and decentralized streaming.
The present book expounds the multifaceted nature of blockchain technology, its architecture, and key characteristics, such as irreversibility and persistence. The readers will discover the potential use of blockchain technology in all significant walks of life and learn to handle transactional procedures. The narrative is lucid, with great art-work, and is sure to enthuse readers.
The book also provides associated code cells for IPFS commands, creation of digital IDs, encryption and decryption, a decentralized voting process, auction process, e-commerce with a practical stepwise mechanism for readers to attain breakthrough proficiency in the thrust area.
Rishabh Garg, BITS – India has envisioned blockchain as a panacea for building robust identity systems. Though the technology is in its nascent stage, the present book will serve as a beacon to those seeking crystallized knowledge on blockchain. I have no doubts that with its simple handling of a complex subject this book will find inroads to American and European Universities.
Indraneel Shankar Dani
Former Additional Chief Secretary
Chairman, Land Reforms
Government of Madhya Pradesh, India
The “Tragedy of the Commons” is a long-held belief that people cannot serve their personal interest and the common good simultaneously. Holding to this concept, millions of people worldwide continue to scavenge for basic necessities in the absence of formal identity, despite incomparable technical advancements.
Identity is the nucleus of all human endeavors across the globe, including education, jobs, banking, finance, health care, business, e-commerce, national security, etc. Nevertheless, 1.1 billion people worldwide have no proof of identity, and 45% of those without an identity are among the poorest 20% on the planet. This problem overly affects children and women in rural areas of Asia and Africa. Given this, the author came up with the current concept for an all-inclusive ID in 2016 and originally called it “Generic Information Tracker” (Dainik Bhaskar, 2016). During the platinum jubilee celebrations of the Council of Scientific and Industrial Research (CSIR) at Vijnana Bhawan, New Delhi, India, the author discussed his concept with Mr. Narendra Modi, the prime minister of India. Mr. Modi praised the author’s work and encouraged him to develop the idea for India Vision, 2020.
After working through the complexities, the author presented the breakthrough to scientists, corporate stalwarts, and policy makers at the India International Science Fest, 2016. The author was honored with the Young Scientist Award by the Ministry of Science and Technology, Earth Science, and Vijnana Bharti (Times of India, New Delhi, 2016).
To make the title more explicit, the prototype was renamed as Digital ID with Electronic Surveillance System (Dainik Jagran, 2017). The National Innovation Foundation, Department of Science & Technology, Government of India, registered the inventive project (NIF, 2018), and the author was conferred with the National Award for Outstanding Innovation, 2017 by the honorable president of India, Mr. Ram Nath Kovind at Rashtrapati Bhawan, New Delhi.
During the last five years, the author deliberated upon the feasibility, benefits, and privacy concerns of a single identity model against multiple identity documents. Following an analysis of the security concerns associated with a centralized database, a number of digital identity models were examined with respect to data security, decentralization, immutability, revocation, accountability, auditability, speed, and user control over personally identifiable information. Finally, blockchain seemed to be the most promising solution to readdress nearly all the issues affecting digital identity and access management.
The book provides a thorough understanding of the blockchain ecosystem, framework, essential features, Ethereum, Hyperledger, and cryptocurrencies. This is followed by a comprehensive discussion on the prospective uses of blockchain cryptography, cybersecurity, identity management, credential verification, job validation, health care, remote health monitoring, organ transplantation, genomics, drug supply chain, food and civil supplies, etc. Vibrant illustrations and corresponding code cells have been provided to help readers to comprehend banking, trade, finance, decentralized finance, prediction markets, portfolio management, quadratic funding, crowd funding, e-commerce, etc.
The very purpose of the book is to help readers adopt this embryonic stage of blockchain technology for multiple use cases, whether they are a budding technologist, a start-up enthusiast, or a nontechnical user of decentralized apps.
The author accords his special thanks to Mr. Hari Ranjan Rao, joint secretary, Ministry of Telecom, Government of India; and Mr. Manish Rastogi, principal secretary, Department of Science and Technology, Government of MP for informal discourses, which helped him to resolve the prevalent inadequacies and put together a coherent picture of the decentralized framework.
The foreword of the book has been written by Mr. Indraneel Shankar Dani, former additional chief secretary, and chairman of Land Reforms, Government of Madhya Pradesh, India, to whom the author is deeply grateful.
Dating back to Babylonian era, the ledger appears to be a bedrock of civilization as the exchange of value always required two unknown people to trust each other’s claims. Even today, we need a common system, which can provide order to the society, keep track of our transactions, establish public trust in it, and maintain it forever.
A blockchain is fundamentally a digital ledger that carries a list of transactions, that could, in principle, represent almost anything – money, digital stocks, cryptocurrencies, or any other asset. Blockchain can follow instructions to buy or sell these assets and implement inclusive set of terms and conditions through so-called smart contracts.
Blockchain differs from a simple ledger in that all transactions are stored in multiple copies on independent computers, individually within a decentralized network, rather than managed by a centralized institution, such as a bank or government agency. Once a consensus is reached, all computers on the network update their copies of the ledger simultaneously. If a node attempts to retroactively add or subtract an entry without consensus, the rest of the network automatically invalidates the entry.
Unlike a traditional ledger, it is governed by complex mathematical algorithms and impregnable cryptography that adds a layer of integrity to the ledger, what Ian Grigg (2005) referred to as triple-entry accounting – one entry on the debit side, another on the credit side, and a third on an immutable, undisputed, shared ledger.
Thus, Distributed Ledger Technology (DLT) is a technical infrastructure and protocol that allows simultaneous access, verification and updating of records in an irreversible manner over a network spanning multiple entities or locations. Blockchain is one of its many forms – Directed Acyclic Graph (DAG), Hashgraph, Holochain, or Tempo (Radix). It is a sequence of blocks containing a complete list of transactions in the form of a digital public ledger that is replicated and distributed throughout the network. The blockchain ecosystem includes blocks – the data structure used to keep records of transactions, which are distributed among all nodes in the network, and nodes – a user or computer that holds a complete copy of the record or ledger.
The blockchain technology was first mentioned by Stuart Haber and W. Scott Stornetta in 1991. However, Satoshi Nakamoto, a person who goes by the alias, popularized it in 2008 to operate as the public transaction ledger of Bitcoin. Over the past one decade and a half, there have been innovations around blockchain consensus mechanisms, constitutional design, programmable smart contracts, and tokens. Blockchain 1.0 applications were mainly limited to digital currencies, which were used in commercial transactions, foreign exchange, gambling, and money laundering. The expansion of Blockchain 2.0 applications enabled smart-contracts, decentralized applications (dApps), and Decentralized Autonomous Organizations (DAO). Blockchain 3.0 was able to register its presence in areas, such as education, health, science, transportation, and logistics in addition to currency and finance, and now Blockchain 4.0 is evolving as a business-friendly ecosystem for the world of commons. The integration of blockchain with emerging technologies like Internet of Things, cloud, artificial intelligence, and robotics is one of the biggest promises of the times to come.
Blockchain is typically classified into public, private, and consortium blockchain. A public blockchain is a permissionless blockchain in which any user, whosoever wishes to transact with the network, can participate and write on the blockchain. A private blockchain only allows nodes coming from a specific organization to participate in the consensus process. That’s why it is also called permissioned blockchain. A consortium blockchain is a semi-private system in which a group of like-minded companies leverage cross-company solutions to improve workflow, accountability, and transparency.
Blockchain, irrespective of its type, uses an asymmetric cryptography mechanism to validate the authenticity of transactions. It is basically a network of participants that share nodes for common business purpose and process. Each block of the blockchain contains about 1 MB of data. This block stores the information chronologically until its 1 MB data capacity is occupied, and then the second block repeats the same process. All these blocks join in a sequence, and to do this, each block gets a unique hash that exactly matches the string of data in that block. If anything inside a block changes, even to a little extent, the block gets a new hash.
In a blockchain, this hash is created by a cryptographic hash function. A cryptographic hash function is a complex algorithm that takes any string of input and turns it into a 64-digit string of output. A hash is not always qualified. A block on the blockchain will only be accepted if its hash starts with at least ten consecutive zeros. A small, specific piece of data is added to each block called a nonce. The process of repeatedly altering and hashing a block’s data to find a suitable hash is called mining, and this is what miners do. Miners spend a lot of electricity in the form of computational power by constantly changing the block structure (nonce) and hashing it until a qualified signature (output) is found. The more computational power they have, the faster they can hash different block compositions to find a qualified hash.
The process (hash function) used here that converts any information into a string of alphanumeric values (hash), is called encryption. There are mainly two types of encryption – asymmetric encryption and symmetric encryption, depending on whether the same or different keys are used for encryption and decryption. Cryptocurrencies use blockchain to achieve the benefits of a public ledger as well as an advanced cryptographic security system so that online transactions are always chronicled and secure. Transactions are simply data that indicate the flow of cryptocurrency from one wallet to another.
In order to record the flow of currency or data from one wallet to another in an immutable form, nodes communicate with one another to reach consensus on the records of the ledger. However, the transaction is accepted only if majority of the nodes agree on its validity. When all nodes reach a consensus, transactions are recorded on a new block and added to the existing chain. While Bitcoin focused on decentralized payments, Vitalik Buterin and his collaborators introduced arbitrary computer code into the blockchain using transactions. Thus, Ethereum came into being as a peer-to-peer network where each node runs an operating system called the Ethereum Virtual Machine. This securely executes and verifies application code, hitherto called smart contracts, and allows participants on the blockchain to transact with each other without a trusted central authority.
Smart contracts are used for the automation of common centralized processes, such as conditional transfer of digital assets, multisig asset exchange, or waiting for a specific amount of time to execute a transaction. It allows the creation of decentralized applications for B2C trades whereas B2B transactions, which need to keep their data secure and confidential, can adopt Hyperledger. Hyperledger offers a modular architecture that delivers a high degree of privacy, resilience, and scalability. It is an enterprise-level private blockchain network that enables several business entities – such as banks, corporate institutions or trade establishments – to transact with each other.
Thus, digital transactions can be decentralized, encrypted, and held securely on a distributed ledger. It has the potential to cut millions of hours spent on administrative processes every year and bring efficiency through smart contracts in all walks of life. The present book explicates the unrestrained functionality of blockchain and its application in the real world.
It’s a well-known fact that identity is the nucleus of all the activities in the world. In a civilized society, identity entitles the individual to discharge his rights and responsibilities. Over the centuries, governments around the world issued a variety of identity documents to enable citizens to make access to education, health care, business activities, pensions, banking, social benefits, and state welfare schemes.
Many countries issued identity numbers for a singular purpose, but in due course of time, they became a de facto national identification number. In order to provide an official identity to every citizen of India, the Department of Information Technology, Government of India, introduced a biometric-enabled, unique identification number (UID). This project has listed over a billion users with an estimated expenditure of 130 billion INR, till date (UIDAI, 2022). India’s Unique Identification System, called Aadhaar, has been taken as a case study to deliberate over the advantages and disadvantages of a centralized identity model in light of privacy issues, unconstitutional access, absence of data-protection laws, involvement of private partners, etc.
The UID project was expected to portray a more accurate picture of Indian residents and enable them to have hassle-free access to government schemes and public services, but the ground reality has been far from such claims. First of all, the technological framework for such a large database is not available in the country; and second, the Indian bureaucracy is not technically smart enough to handle such big data with burgeoning privacy and data-security issues in India. Also, the lack of interoperability between departments and government levels takes a toll in the form of excess bureaucracy, which, in turn, increases processing time and cost.
At present, the system preserves the personally identifiable information (PII) of millions of users on a centralized government database, supported by some legacy software, with numerous single points of failure (SPoF). Such a centralized system, containing PII, acts like a honeypot to hackers. Following the reports of prevalent data breaches and continuing threats to online data over the past decade, the security of digital identities has emerged as one of the foremost concerns on the national front. Today, a user has to juggle various identities associated with his username across different websites. There is no consistent or homogenous way to use the data generated by one platform on the other. The most threatening and frustrating experience is that a digital identity arises organically from the personal information available on the web or from the shadow data created by a user’s online activities, on a day-to-day basis. The fragile links between digital and offline identities make it relatively easy to create pseudonymous profiles and fake identities, for enactment of fraud.
In a world where a number of vulnerable citizens, not having an identity or bank account, but own a smartphone, echoes the possibility of a mobile-based, digital-identity solution. Due to the increasing sophistication of smartphones, advances in cryptography, and the advent of blockchain technology, a new identity management system can be built on the concept of decentralized identifiers (DID).
Decentralized identity is an approach to identity management that allows individuals to store their credentials and personally identifiable information in an application called a wallet. In such a system, passwords are replaced with non-phishable cryptographic keys that validates identities for business activities while securing users’ communications.
Detailing the models of decentralized identity – federated, user-centric, and self-sovereign – the present book explores the likelihood of storing and managing identity credentials and information in an interplanetary file system or wallet through a blockchain-based solution. Blockchain assures citizens, organizations, and service providers that big data is never stored in a single repository, rather distributed among decentralized databases. Users, without being physically present, can share their digital ID with the service provider through a personal device, such as a smartphone, and receive appropriate services without jeopardizing their privacy.
Further, all the documents that identify users get stored on their personal devices backed by IPFS, making them safe from data breaches. No transaction of user’s information would occur without the explicit consent of the user. It will permit the user to control his personally identifiable information, make the system more interoperable, allow the user to employ data on multiple platforms, and protect the user from being locked into one platform. Thus, blockchain would allow people to enjoy self-sovereign and encrypted digital identities, replacing the need for creating multiple usernames and passwords.
Blockchain identity management can help people to create, manage, verify, and authenticate their identity in real-time. It can provide relief to billions of people holding multiple cards for specific purposes. A single ID (One World – One Identity) comprising 20 digits could be provided to all on the day of census. The Digital ID System (IPFS/Private Ledger) would record all substantive data of a citizen, like digital identity number, citizen name, date of birth, family details, photo, biometric details, digital signature, educational progress, employment details, driver’s license, financial details, passport, visa, medical records, etc. in a distributed ledger like blockchain. While millions of transactions are recorded across hundreds of nodes scattered over thousands of financial institutions, notwithstanding any geographical or political boundaries; likewise, all identity documents from different administrative organizations can be recorded using a private key (Garg, 2019, 2021). The difference between a private key and a public key is that a private key, also called a secret key, is a variable that can be used to both encrypt and decrypt data, whereas a public key is a big numerical number that can only be used to encrypt data.
The main purpose of encryption is that it allows only the actual sender of the message and the intended recipient to read the pertinent information. There has been several milestones in the history of cryptography that led to the formation of the fundamentals of modern algorithms. In early times the cipher was the fundamental component for communicating secret messages, which included letters as a basic element. A few of its variants include Simple Substitution Cipher, Caesar Cipher, Vigenere Cipher, Transposition Cipher, Playfair Cipher, and Hill Cipher. In addition, many cryptographic algorithms, such as the RSA algorithm, Multiple Precision Arithmetic Library, GNU Multiple Precision Arithmetic Library, Chinese Remainder Theorem, and Secure Hashing Algorithm (SHA-512) Hash in Java have also been popular.
Just as encryption protects any data from misuse, cybersecurity protects systems and networks from digital attacks. The cyber-attack landscape has grown exponentially in the last few years. Cyberattacks are carried out by using various malware like Trojans, Rootkits, Virus, etc. and are known as Distributed Denial of Service (DDoS) attack, Man in the Middle (MITM) attack, phishing, Ransomware attack, and Structured Language Query (SQL) injection. Blockchain has emerged as a promising mitigation technology for cybersecurity.
Once an identity management is set up and cryptographically protected, the Ethereum blockchain can allow a credential holder to share all his academic credentials with validators in an encrypted format. The system uses smart contracts, and thus, no document can be shared without the explicit consent of its holder. Thus, blockchain can prove to be a good tool for background verification of a candidate, thereby saving time, cost, and human resources spent on verification and evaluation.
Apart from academic verification, blockchain has a wide range of applications and uses in health care as well. It helps secure the transfer of patient medical records, manage drug supply chains, and unlock biological and genetic codes for health researchers. Besides, there has been a spurt in efforts to scale-up the capabilities of blockchain for decentralized voting and the food supply. Blockchain lets the journey of food items to be tracked directly from the farm to the shelves of the superstore. Many issues, such as food fraud, security recalls, and supply chain inefficiencies, can be solved through blockchain-enabled food traceability.
There has also been an unprecedented boom in the banking and finance industry in the wake of blockchain technology. Blockchain makes it easy for remote untrusted parties to build consensus on the state of a database, without the intervention of gatekeepers. It can handle all financial transactions like payments, settlement systems, fundraising, securities management, loans, credit, and trade finance, etc. like a bookkeeper. This is the reason why it surpasses the traditional system in terms of identity verification, payments, withdrawals, settlements, credits and loans, asset transfers, peer-to-peer transfers, hedge funds, safety, and accountability.
Another area that is poised for a blockchain revolution is trade finance. Trade finance relies heavily on paper-based business operations involving information transmission, asset transfer, and payment processes. Instead of legal terms, these contracts may be better described in Python programming language so that traders can better understand them. Thus, blockchain, along with smart contracts, provides a secure, transparent, auditable, and automated transaction environment for business investors. It has a potential to revolutionize trade finance by rationalization of the processes of smart contracts, enterprise resource planning, lightning network, pre- and post-trade processes, accounts and audits, loyalty rewards, etc.
Beyond the precincts of existing financial networks, decentralized finance (DeFi) is a blockchain-based fintech, which is altogether open and programmable. In the present book, the product and potential of myriad use-cases of decentralized finance, such as asset management, tokenization, token derivatives, decentralized autonomous organization, data analysis and assessment, payments, lending and borrowing, insurance, margin trading, market place, gaming, and yield farming have been delineated. It also outlines Ethereum as a platform for DeFi to transfer funds, streaming money, programmable currency, lending, borrowing, no-loss lotteries, exchange tokens, advance trading, fund aggregation, portfolio management, quadratic funding, crowd funding, and insurance.
The blockchain landscape is expanding quickly, spanning over all facets of the real world, such as agriculture and natural resources, animal husbandry, air travel, billing and payments, construction, drugs supply, entertainment, fisheries, food and drink, gambling, human resource management, information and communications, infrastructure and energy, insurance, Internet of Things, legal enforcement, public assistance, medical claim settlement, messaging, hospitality, postal services, production, public transport, real estate, ride hailing, shipping and freight transport, taxation, travel and mobility, vaccination and community health, vehicles, welfare distribution, and wills and inheritances.
Many nations have tried to create their own e-governance systems to deliver essential civic services during the past few decades, but majority of them ran into privacy and security issues. Blockchain can resolve these issues and assist government agencies to lower labor costs, save time, and enhance operational efficiency.
Another area, the supply chain, is also becoming increasingly more complex, more elaborate, and more global. Due to a serious business restriction called supply chain visibility, most businesses have little to no awareness about their second- and third-tier suppliers. Better results may be expected if blockchain technology is implemented in the supply chain. To trace the product’s origins and manufacturing processes, the supply chain can use a shared, consensus-based public ledger. Blockchain may offer certification and documentation, including information about the product lifecycle, and make it instantly available to all parties. Products can be tracked from factory to storage, transit, delivery, and sale.
Further, e-commerce establishments can leverage the advantages of Ethereum. It is a platform for those e-commerce brands who desire to manage their own blockchain through apps that accept Bitcoin payments. The introduction of blockchain technology into e-commerce will help users to track their purchase orders, store product, and service warranties, and gain access to the data. At the same time, it enables businesses to combine services like payment processing, inventory control, product description, etc. to evade the cost of buying and maintaining separate systems. It can speed up tracking, compliance, maintenance, and delivery of goods by integrating the Internet of Things.
The main advantage of blockchain applications is that almost all of the software, including Hyperledger fabric, are open source, and most of them are designed to work on Linux. Virtual machines or Docker containers can also be used to execute them on Windows. In the present book, blockchain operations have been explained in a vivid and engaging way. By using their private key, a user can quickly create an account on the blockchain. They may then download the smartphone application from the Play Store. The user can self-certify their information using this software, which will retrieve personal information from the supplied ID. Alternately, the user may submit their credentials, which include name, date of birth, location, parents’ names, address, and biometric data (DNA map, finger impression, retinal image, blood sample, etc.).
A government agency may at any moment access the user’s information for authentication purposes. The authorities may use text messages to ask the identity holder for access to certain information. Business logic in smart contracts will produce a credibility score for the user. The higher the score, the higher is the credibility of the individual. Consequently, a banker and a customer, sitting on two sides of the globe, can automate the transfer of money on their decentralized software, thanks to cryptography and smart contracts that run on Ethereum. Distributed record-keeping and algorithmic consensus, two of blockchain’s fundamental properties, are thus primed to allow entrepreneurs to create and implement decentralized apps that have the potential to change the world.
Garg R, 2019. Multipurpose ID: One Nation – One Identity, Annual Convention – Indian Society for Technical Education (ISTE). National Conference on Recent Advances in Energy, Science & Technology, (39). doi: 10.6084/m9.figshare.16945078.
https://www.researchgate.net/publication/337398750_Multipurpose_ID_One_Nation_-_One_Identity
.
Garg R, 2021. Global Identity through Blockchain. Proceedings of the International Webinar on Blockchain, Scholars Park, India, 01–60. doi: 10.13140/RG.2.2.27803.18728.
https://www.researchgate.net/publication/353141617_Global_Identity_through_Blockchain
.
Grigg I, 2005. Triple Entry Accounting.
https://iang.org/papers/triple_entry.html
UIDAI, 2022.
https://uidai.gov.in
.