Home > Articles

Blockchain Technology

IBM Blockchain experts define the overall blockchain technology landscape and address the trust divide between an enterprise (permissioned) blockchain and a public, permissionless blockchain. Enterprise blockchain design and enterprise integration impact the cost of the solution deployment and the longevity of the application, so economic incentives are a vital component of any blockchain network. This distinction is vital for the valuation of crypto assets and to ensure the continued and sustained growth of a blockchain-powered business network.

Save 35% off the list price* of the related book or multi-format eBook (EPUB + MOBI + PDF) with discount code ARTICLE.
* See informit.com/terms

This chapter is from the book

This chapter is from the book

Open technology architecture, economic viability, and longevity of the blockchain network should be some of the primary design criteria.

—Nitin Gaur

Blockchain has tremendous potential and is much more than the sum of its core components. Enterprise blockchain provides a design avenue in which transaction data, value, and state are inherently close to the business logic, and the security of the execution of business transactions is validated by a secure community process, enabling a foundation of trust and the robust processing of transactions. There are certainly virtues to using a blockchain as a technology alternative that is permissioned and conforms to all the regulatory platforms that have evolved over time. Indeed, blockchain promises to solve long-standing industry concerns, such as modernizing the financial and trade system and speeding up securities and trade settlements. The goal is meaningful application of technology to move goods and money seamlessly with full systemic transparency, trust, and accountability of participants, all without an intermediary, and faster and at much lower cost.

Blockchain Technology: A Technical Perspective

As described in Chapter 2, blockchain technologies are viewed as a disruptive force for existing industries such as healthcare, supply chains, trade logistics, financial systems, and market infrastructure, and promise to fundamentally change the way that these industries operate. Nevertheless, some thorny challenges related to enterprise adoption must be addressed before you can adopt blockchain:

  • Blockchain currently lacks generally accepted definitions and standards. Standards bodies and ISO (International Organization for Standardization) initiatives, such as TC307, are currently attempting to standardize the taxonomy, terminology, and other standards for blockchain. Such standards are essential to widespread adoption of blockchain.

  • To use blockchain in their production systems, industries must address the enterprise challenges of transaction audibility, visibility, and integration into existing business functions.

  • Blockchain is a cryptographic database technology that was popularized by its association with cybercurrency (for example, Bitcoin and Altcoin). However, the technology itself has the potential to change the world. Blockchain technology solves the issue of time and trust, and provides a platform to eliminate middlemen (disintermediation) regardless of the industry.

  • Blockchain-backed business models are emerging that aim to change how industries operate by using co-creation schemes and changing the dynamic of ecosystems. These business models, which are based on digital trust, digital assets, digital (trust) equity, cross-ledger and cross-network transactions, and digital identity, aim to establish blockchain-powered business networks that are trusted and secure, facilitating a new type of interaction that can lead to new business models.

The Four Building Blocks

At a basic level, any proposed blockchain solution includes four building blocks: (1) a distributed (or shared) ledger; (2) cryptographic protocols; (3) consensus vehicles (trust system); and (4) chaincode, smart contracts, and business rules (Figure 3.1). These four building blocks collectively form the blockchain technology components, and they have independently existed for decades. Except for evolutionary changes in each of these technology domains, their core principles are understood and accepted.

Figure 3.1

Figure 3.1 The building blocks of blockchain.

Distributed (or Shared) Ledger

Distributed ledgers maintain the record of asset ownership. They are essential to achieve transactional finality. They ensure that the distributed transaction record cannot be changed, and they accept only appended records. Although the intended design of public or permissionless blockchain is to ensure visibility, an enterprise blockchain must account for regulations regarding the privacy of consumer data, and the exposure of business information to competitors.

Cryptographic Protocols

“Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages.”1 Cryptography enables various systemic attributes of blockchain security, such as transport security, hashing functions, and data and packet encryption. Cryptography also ensures authentication and verifiable transactions.

Cryptography focuses on computational hardness to make cryptography more difficult to break by any adversarial process in the distributed system. Cryptographic protocols work with the consensus or trust systems of a blockchain network. The cryptographic considerations change when they are used in a permissioned ledger network.

Consensus Vehicles (Trust System)

Consensus is essentially a group decision-making process that aids in achieving transaction finality. It is the core of blockchain-powered networks, and it works with the other three components to ensure that the network agrees on the transfer of an asset or a change in the distributed ledger. In general, trust system is the preferred term for this component, because not all validation is done through the consensus system.

This foundational element dictates the overall design of and investment in a blockchain infrastructure. Many new and innovative approaches to the trust system in the blockchain space have been proposed, with these variants offering specialization for specific use cases. It is the trust model that makes blockchains effective and delivers the staples of blockchain technology—namely, trust, security, transactionality, trade, and ownership. The trust system is the primary driver of the transaction system that blockchains replace. If only trade and ownership were addressed by distributed or shared ledgers, then the plurality might be addressed with an array of database solutions.

Consensus systems directly impact computational costs and the investment required for blockchain-based systems, so you must account for this cost when you are doing system design. Acceptable consensus models are emerging that provide value generation capability to the blockchain-powered networks.

Chaincode, Smart Contracts, and Business Rules

Smart contracts, also known as chaincode, are essentially codified business rules that govern the movement of assets between participants in a network. Chaincode aids in verification validation, and it provides the consensus mechanism that is used for transaction finality.

Blockchains can run code. Although the first blockchains were designed to perform a small set of simple operations (transactions of a digital asset-like token), techniques have since been developed to enable blockchains to perform more complex operations that are defined in full-fledged programming languages. Because these programs are run on a blockchain, they have unique characteristics compared to other types of software, such as business terms that are embedded in a transaction database and run by transactions. This kind of rules component is needed by any business to define the flow of the value and state of a transaction.

Why Blockchain?

So why blockchain? And why now? What makes this technology so special that it has attracted massive investment and forced the likes of supply chains, trade logistics, and the finance industry to rethink their business models under the guise of disruption? The answer likely lies in the Bitcoin blockchain system, which possibly is the only initial functional evidence of a peer-to-peer permissionless network. Although the Bitcoin blockchain system cannot be directly adopted into an enterprise model, much can be learned from it and then applied to a successful blockchain for enterprise.

Bitcoin has gained notoriety for being a radical and unregulated rogue (cyber) currency—a reputation that has prompted some regulated entities to distance themselves from the concept. However, many businesses see the virtues of using blockchain as a technology alternative that is permissioned and conforms to all the regulatory platforms that have evolved over time. Such an approach holds promise as a means to solve long-standing industry concerns, such as modernizing the financial and trade system and speeding up securities and trade settlement. The goal is meaningful application of technology to move goods and money seamlessly with full systemic transparency, trust, and accountability of participants, all without an intermediary, at a faster pace and a much lower cost.

Although the blockchain industry sees a clear separation between the enterprise world and the crypto world, we see a disconnect in understanding the technology trust system that makes a blockchain so attractive. The tenets of Bitcoin are driven by economic incentive (a rewards system for upkeep, longevity, high availability, and system maintenance), cryptography (to ensure order in a chaotic and permissionless world), and specialized computational power (massive clusters and hardware that are dedicated to solutions for bitcoins). Bitcoins signify that a trust currency can be either earned or bought, essentially representing the value of the invested economic resources (people, power, and time). When we apply these tenets to a permissioned ledger and network, the radicalized trust currency must be morphed into a viable trust system that you can choose to ignore or adopt as a foundation for incentive economics that are based on the trust system or consensus models.

Many consensus models, such as Byzantine Fault Tolerant (BFT) or Practical Byzantine Fault Tolerant (pBFT), RAFT, and Paxos, can address all use cases. An enterprise must understand them and drive investment into the underlying resources—that is, talent, energy, and time.

Resource considerations are important for any enterprise venturing into the realm of blockchain. This is another principle from the Bitcoin blockchain world, which is now dominated by specialized hardware, which in turn adds to the growing resource requirements. A data structure (a shared ledger), cryptography, encryption, and high I/O (input/output) (due to shared ledger replication, consensus, and other network group services) collectively place extraordinary demands on underlying resources.

Blockchain as a Consumable Technology

So, what else does an enterprise need to consider to make blockchain a consumable technology? Here are some considerations:

  1. Enterprise integration:

    1. Integration with the incumbent system of record (SoR): The solution must support existing and incumbent systems, such as customer-relationship management (CRM), business intelligence, and reporting and analytics. This integration is also important because the investments that are made in these systems are significant and embedded into various operational elements of a business.

    2. The blockchain as a transaction processing system: The SoR may be preserved as an interim approach to adopt blockchain, but an enterprise cannot have two systems as a transaction processing system—that is, a transaction cannot be processed twice.

    3. Design intent to include: The path of least disruption accelerates the enterprise adoption. This is a vital consideration due to costs and the disruption of operations.

  2. Auditing and logging: Auditing and logging address enterprise technology preferred practices, such as change management, support, and high-availability disaster recovery (HADR) requirements, as well as enterprise business practices and reporting requirements. You must satisfy regulations regarding regulated systems for purposes of nonrepudiation, technology root-cause analysis, fraud analysis, and other enterprise systems.

  3. Monitoring: Monitoring the system is vital because blockchain is a network, and any systemic impact—whether a technical or business exception—will affect the network and ecosystem participants. Also, you must satisfy regulations and generally accepted IT practices for purposes of high availability, capacity planning, pattern recognition, and fault identification.

  4. Reporting and regulatory requirements: This is the most important consideration, even for the interim adoption of blockchain as a transaction processing system. To meet these requirements, you should create connectors to an existing SoR to offload the reporting and regulatory requirements until the blockchain is enterprise-aware—or rather, the enterprise software is blockchain-aware.

  5. Authentication, authorization, and accounting requirements: Unlike in the permissionless world of the Bitcoin blockchain, in a permissioned enterprise world all participants must be identified and tracked, and their roles defined within the blockchain ecosystem. The topics that are part of this domain include the digital identities of the various individuals and business entities that participate in a blockchain network. Concepts such as a distributed or decentralized trust, digital identity, self-sovereign identity, consent management, and distributed access control (DACL) are evolving to address the various authentication and authorization needs of a blockchain network.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020