Professional Documents
Culture Documents
Module Blockchain
Session No. I
Version 1.0
Industry 4.0
Material from the published or unpublished work of others which is referred to in the Class
Notes is credited to the author in question in the text. The Class Notes prepared is of 7,140
words in length. Research ethics issues have been considered and handled appropriately
within the Globsyn Business School guidelines and procedures.
Table of Contents
1. Introduction ............................................................................................................. 7
2.1.1. Overview..............................................................................................................19
2.2.1. Overview..............................................................................................................23
3.7.1. Benefits................................................................................................................36
References ................................................................................................................... 43
List of Figures
Figure 1.1: Blockchain................................................................................................................ 7
Figure 1.2: Constituents of Blockchain ....................................................................................... 8
Figure 1.3: Traditional Network vs. Blockchain ..........................................................................11
Figure 1.4: Blockchain use in Dispute Management ..................................................................13
Figure 1.5: Blockchain use in Fraud Detection ..........................................................................13
Figure 1.6: Blockchain use in Tax Management ........................................................................14
Figure 1.7: Blockchain based on Market Data ...........................................................................14
Figure 1.8: Financial Transaction using Blockchain ...................................................................15
Figure 1.9: Management of Rules and Regulations using Blockchain .......................................16
1. Introduction
Each of the different data blocks are both secured and also linked to each other based on the
application of cryptographic principles or chains.
The above aspect makes it highly difficult for the blocks to be altered. Different types of
applications associated to diverse fields like finance and healthcare are carried out based on the
incorporation of Blockchain Technology. Blockchain earns needed popularity in that the same
helps in recording of different types of transactions (Bawa, 2019).
In the word of Don and Alex Tapscott, the author of Blockchain Revolution during 2016 defined
Blockchain as a digital ledger encompassing economic transactions, which are programmed for
not only recording financial transactions but virtually recording everything that has needed
value, and also which is incorruptible in nature. Again, in simple terms, a Blockchain is identified
to be a time-stamped series of data which is immutable in nature and managed by a cluster of
various computers that are not possessed by a single entity (Bawa, 2019).
1.2.2. Body
Information regarding transaction data is essentially encompassed in a structural form of tree
data containing different types of nodes (Malik, 2019).
(Greenfield, 2017)
1.3.2. Distribution
In the Distribution phase, the request made in the initiation phase is distributed along a network
of large number of computer nodes.
1.3.3. Validation
The Validation phase encompasses the validation of the request made by the different nodes
(Malik, 2019).
1.3.4. Blocking
Specific blocks are created in the locking phase for processing of the request. Each of the
different blocks created in the process contains wrappers that encompass additional information
for the different types of transactions. The hash for different sets of information is determined in
this stage for reducing the chances of data alteration.
1.3.5. Chaining
The Chaining stage reflects the chaining of the new blocks with that of the existing blocks
especially in the read-only mode. The chaining of the blocks carried out in the read-only mode
forbids the chances of the same being altered or removed in a subsequent fashion (Malik,
2019).
Public Verifiability is identified as a key aspect that helps in distinguishing the technology
associated with traditional database with that of Blockchain. The Public Verifiability is generally
enabled by the parameters concerning Integrity and Transparency. In terms of Integrity, every
user can tend to be sure of that the data retrieved is uncorrupted and unchanged from the time
the same is recorded. Regards to Transparency, each of the different users has the authority in
verifying the manner in which the Blockchain is appended over a specific period (Ray, 2017).
Another specific difference between Traditional and Blockchain Technology can be rightly
understood regards to the incorporation of “CRUD” and also “Read and Write Operations”.
Regards to a Traditional Database, a specific client is noted to perform four different types of
functions like Create, Read, Update and finally Delete. The four different functions are known as
CRUD in a collective fashion. On the contrary, the Blockchain is recognised as a structure that
is ready to be appended. Herein, a user can tend to add more amount of data regards to the
addition of greater numbers of blocks (Ray, 2017). In Blockchain, the previous data tends to be
stored in a permanent fashion such that it cannot be further altered. Thus, Blockchain only
allows two types of operations to be performed. The same are noted as Read Operations and
also Write Operations. The Read Operations are carried out for querying and retrieving of data
from Blockchain. The Write Operations are more concerned of with adding of data into the
Blockchain (Ray, 2017).
(Faizod , 2018)
Collaboration
Large numbers of individuals around the globe apply the Blockchain technology for participating
in knowledge development and dissemination and in sharing of needed information.
Funding
Considerable numbers of investors focus on funding the development of the Blockchain
platform.
(Glucksmann, 2019)
(Digital, 2016)
(Voshmgir, 2019)
(Bijlipay, 2016)
(Rakhmilevich, 2019)
(UXer, 2019)
(followmyvote.com, 2019)
2. Blockchain Components
single or specific point (Belin, 2019). The following illustration reflects the differences between
Centralised and Distributed Ledger systems.
Clearing House
Ledger
(Belin, 2019)
L L
e e
d d
g g
e e
r r
L L
e e
d d
g g
e e
r r
(Belin, 2019)
intermediary for validating and authenticating the different transactions. The business
enterprises focus on incorporating DLT for processing, validating and authenticating
transactions and also other types of exchanges concerning datasets. The consensus of the
stakeholders involved in the process is needed for storing of the data in the ledger. The files
stored in the distributed ledger are thereby timestamped and are also embodied with a unique
cryptographically designed signature. The stakeholders involved in the DLT are given access to
view the different types of records. DLT thus acts as a repository of potential datasets that can
both be verified and subjected to audits during subsequent periods (Belin, 2019). In the
Distributed Ledger System, the data in the form of transaction entries are documented in a file
or ledger. Each and every stakeholder of the DL System has ease of access to the data
resources. Thus, happening of any type of transaction in the DL network becomes largely
accessible to the interested parties. The above case reflects a sharp contrast to the Centralised
Ledger System wherein the access to the ledger is had by a single point of authority. In DLT,
the records of different transactions are accessed by three potential stakeholders like the
sender of the information, the receiver of the information and finally the controlling authority
regards to the same. The Controlling Authority existent as a potential party in a DLT is also
identified as an effective intermediary for different types of transactions (Belin, 2019).
Distributed Ledger is favoured by the enterprises in that the burden of responsibility, regards to
the maintaining of the sanctity of the information contained in the ledger, rests upon the different
participants involved in the process. Further, the above aspect removes the need of any type of
intermediary along the total process which in turn makes the same appealing in nature.
The Distributed Ledgers have gained considerable amount of popularity and exposure in the
current period. The stakeholders like the regulators, academicians, consultants and also the
management of technology firms are focusing on promoting the application of DLT mainly
regards to the carrying out of financial services. Different types of financial applications like
trading, generation of payments, carrying out of deposits and lending related functions, identity
management and authentication processes along the digital platforms, risk management
functions and KYC Compliances are all undertaken based on the deployment of DLT (Belin,
2019).
Blockchain is identified as an effective form of distributed ledger. Distributed Ledger differs from
Blockchain in terms of the absence of chains and also in DLT the data stored is not contained in
mere blocks. Rather, Distributed Ledger systems acts as an effective database that helps in
dissemination of data across diverse regions and thereby provides access to participants
spread along international markets. Blockchain acts like a subset of Distributed Ledger which in
turn acts as a superset in that not all of the distributed ledgers are Blockchains (Belin, 2019).
effective decisions fail to realise the hidden inaccuracies in the data (Madi, 2019). The same
accounts in reducing and affecting the effectiveness of the decisions made by the parties. The
distributed ledgers that tend to be of permission-less nature tend to become potentially exposed
to the emergence of cyber-attacks. The same happens owing to the absence of needed
authority that would monitor the client identification and enrolment process. Likewise, the failure
regards to cybersecurity tends to potentially affect the weaker nodal points thereby leading to
leakage of data (Madi, 2019).
2.2. Hashing
2.2.1. Overview
Hashing, regards to Blockchain technology, is associated with the generation of an output that
has a fixed dimension irrespective of the length of the input resource. In cases, where the
Blockchain is used in the development of cryptocurrencies, transactions of different lengths are
run based on a hashing algorithm that thereby contribute in the generation of a specific output
having a fixed dimension. The output of fixed lengths that is produced irrespective of the lengths
of the inputs is identified by Hash. The Hashing activity can be essentially studied regards to
Secure Hashing Algorithm 256 which is commonly known as SHA-256. Hashing carried out
based on the employment of SHA-256 contributes in the generation of an output having a length
of 256-bits or 32 bytes (Online Hash Crack , 2019). The size of the output remains the same
irrespective of the size of the transaction that ranges from a single word to that which
encompasses large volumes of complex datasets. The same helps in keeping the track of the
transaction whether someone tends to recall or trace the hash. Again, in another example, the
hashing of a YouTube video of a size of around 50 megabytes based on the application of SHA-
256 will tend to generate an output of 256-bits of hash. The hashing of a text message of the
size of 5 kilobytes would tend to generate an output of 256-bits. In the above two examples
though the size of the output remains the same at around 256-bits yet the hash pattern counters
a vivid change. From the above discussion it can be effectively briefed that Hashing is identified
as the “Umbrella Terminology” for the different types of Cryptographic Hash functions (Online
Hash Crack , 2019).
(haseebrabbani, 2010)
highly fast in nature. It reflects that the hash result of the word, “Hi” and again that of a
significantly large file would be generated within some seconds (Online Hash Crack , 2019).
3.1. Overview
Cryptocurrencies are identified to be virtual currencies that are digital means for carrying out of
financial transactions. The digital currencies are both created and employed by private groups
and other individuals. In that the cryptocurrencies like Bitcoin are not governed by the national
governments the same are identified as alternative currencies. They are also identified as
potential mediums of financial exchange that tend to exist beyond the limits of the monetary
policy of an economy. Bitcoin as a cryptocurrency has wide scale popularity and is also found to
be used on an extensive scale by the international population.
Cryptocurrencies are defined as currencies that tend to incorporate cryptographic protocols. The
cryptographic protocols are code systems that are highly complex in nature and focus on
encrypting the transfers of sensitive data for potentially securing the exchange units. The
cryptocurrency developers focus on building the protocols based on the application of advanced
mathematics and also computer engineering tools which in turn make them quite difficult to be
hacked. The same makes the currencies remain protected from being duplicated or
counterfeited. The protocols also help in covering up the identities of the different
cryptocurrency users which in turn creates problem for attributing the fund flows to different
individuals and also groups.
(Corindex, 2019)
3.3.2. Cons
The cryptocurrencies are however observed to suffer from a range of potential drawbacks that
are underlined as follows. The parameters like liquidity and also the volatility of the monetary
value tends to considerably affect the cryptocurrencies compared to other fiat currencies.
Further, the cryptocurrencies are mostly noted to be used regarding the carrying out of
transactions associated to parallel economy or black markets. The above case tends to limit the
acceptance and the use of cryptocurrencies along diverse economies. Again, the financial
professionals and experts discourage the use of cryptocurrencies in that they consider the same
to be operational based on pure speculation.
their own accord. In the absence of a private key, a user becomes unable in both spending and
also in converting the cryptocurrency. However, the operational need based on the use of
private keys is noted to suffer from their own set of drawbacks. In case of loss of the private key,
the user can focus on generating another private key for carrying out the accumulation of
cryptocurrencies. The user however would never be able to recover the lost currencies that
were associated with the lost private key (Bitnovosti.com , 2017).
(Bitnovosti.com , 2017)
3.4.2. Wallets
The cryptocurrency users tend to possess “wallets” that contain some unique information which
helps in conforming the users as the temporary holders of the cryptocurrency units. Compared
with that of private keys that help in confirming the authenticity of carrying out a cryptocurrency
transaction, the wallets contribute in potentially reducing the risks concerning the pilferage of
units that are not in use. The wallets that are employed for conducting of exchanges associated
to cryptocurrencies counter a potential threat concerning the same being hacked. The wallets
are cryptocurrency instruments that are stored in the cloud that serves as an internally based
hard drive or a storage device placed externally. Backup for the wallets are highly necessary.
(Falk, 2019)
3.4.3. Miners
The miners contribute in acting as the record-keepers for the communities trading on
cryptocurrencies. The miners focus on employing considerable amounts of computing potentials
and also other technical methods for verifying the completeness, accuracy and also the security
of the blockchains associated with currencies. The miners work in a periodic fashion for
developing novel copies of the existing Blockchain. The miners, as the name suggests, thereby
contribute in enhancing wealth based on the generation of brand new types of cryptocurrency
units.
(Martucci, 2019)
The widely used and popularly known cryptocurrencies like that of Bitcoin and Ripple are
generally traded based on the application of special types of secondary exchanges that earn
similarity to the forex exchanges used for fiat currencies. The above platforms allow the holders
for exchanging the cryptocurrency holdings owned by them with significant fiat currencies like
that of US Dollar and the Euro and also with other types of cryptocurrencies both less and more
popular. The exchanges are enabled along the secondary exchanges in terms of a transaction
value that does not exceed 1 percent.
Further, the Cryptocurrency exchanges contribute in developing liquid markets for effective
cryptocurrencies and also in setting a value for them while maintaining relation with the
traditional currencies. The exchange pricing however is noted to be of a highly volatile nature.
Mt. Gox is recognised as a popular exchange for cryptocurrencies. The collapse of Mt. Gox
happened to make the exchange rate for US Dollar to potentially reduce more than that of 50
percent. However, during 2017, the explosion of the demand regarding cryptocurrency
happened to increase the exchange rate for US Dollar by around ten times.
(Dillet, 2018)
(Steelmit, 2017)
(Unlock, 2017)
(Suresh, 2013)
(Kulkarni, 2019)
(Hoffmann, 2017)
3.6.6. 2010s
The latter half of the 2010 period reflected the emergence of large numbers of cryptocurrencies
like that of Litecoin. Further, the period was featured the initial exchanges of the Bitcoin
currency.
(Forbes, 2018)
3.6.7. 2012s
During 2012, WordPress emerged as one of the significant merchants regards to accepting
payments in Bitcoin. Other than Wordpress, retailers like Newegg.com, Expedia and also
Microsoft focused on accepting payments made through the use of Bitcoin. In the current era,
large numbers of business corporations are observed to accept Bitcoin as an effective method
for generation of payments.
3.7.2. Challenges
3.7.2.1. Supports the growth of the Parallel Economy
The existence of minimal regulatory policies regards to Cryptocurrencies make the same a
haven for carrying out of illegal practices concerning black marketing and also other illicit
activities like trafficking of drugs.
3.7.2.3. Enhances the chances for huge financial losses owing to data losses
The carrying out of financial transactions based on the use of cryptocurrencies make the same
amenable to data losses owing to activities like hacking and also the entry of malware intrusions
and viruses in the system. The users that tend to store the transactional data along single
storage devices like a single cloud based service tend to suffer from irreversible financial losses
owing to the damage of the device and its disconnection from the server.
3.8.1. Bitcoin
Bitcoin is observed as the most used and popular cryptocurrency around the world. The
programmed supply limit of Bitcoin is estimated to be 21 million. Bitcoin is also viewed as a
legitimate means for carrying out of exchanges.
(Martucci, 2019)
3.8.2. Litecoin
Litecoin was issued during 2011. It tends to work based on the same structural aspect of
Bitcoin. In terms of market capitalisation, Litecoin earns the second or third rank after Bitcoin. It
differs from Bitcoin regards to the encryption algorithm and on the basis of programmed supply
units of 84 million.
(Idowu, 2019)
3.8.3. Ripple
Ripple was developed during 2012. The most noted feature of Ripple is the existence of a
“Consensus Ledger” that accounts for speeding up the level of transaction confirmation and also
the creation times for the blockchains. Moreover, the existence of an in-house currency
exchange actively contributes in helping Ripple get easily converted to other types of Fiat
currencies. Ripple however is criticised to be largely susceptible to manipulation carried out by
hackers in comparison to other types of cryptocurrencies.
(Cryptocolumn, 2018)
3.8.4. Ethereum
The cryptocurrency, Ethereum, was launched during 2015. The existence of “smart contracts”
contribute in enforcing the performance of a specific transaction and also help in generating of
refunds in cases of violation of agreements by concerned parties.
(Medium , 2019)
3.8.5. Dogecoin
Dogecoin is identified to be a variation of the Litecoin. The same is featured to contain a shorter
creation time for generation of blockchains by around a minute.
(Ryan, 2018)
References
Bawa, N., 2019. It's Time To Explain Blockchain. [Online]
Available at: https://www.forbes.com/sites/forbestechcouncil/2019/01/31/its-time-to-explain-
blockchain/#5c85e4b7621d
[Accessed 2 December 2019].
Belin, O., 2019. The Difference Between Blockchain & Distributed Ledger Technology. [Online]
Available at: https://tradeix.com/distributed-ledger-technology/
[Accessed 12 December 2019].
Bijlipay, 2016. How Block-chain Technology will Revolutionize Online Payments. [Online]
Available at: https://bijlipay.co.in/blog/block-chain-technology-will-revolutionize-online-payments/
[Accessed 9 December 2019].
Bitnovosti.com , 2017. Six Things Bitcoiners Should Know About Private Keys. [Online]
Available at: https://bitnovosti.com/2017/04/21/six-things-about-the-private-keys/
[Accessed 10 December 2019].
Corindex, 2019. Crypto research of the July 2019 cryptocurrency activity. [Online]
Available at: Crypto research of the July 2019 cryptocurrency activity
[Accessed 9 December 2019].
Digital, I., 2016. AEF2016 - Брайан Томпсон - Building trust in blockchain. [Online]
Available at: https://www.slideshare.net/Kazakhtelecom/aef2016-building-trust-in-blockchain
[Accessed 9 December 2019].
Dillet, R., 2018. SEC says cryptocurrency exchanges are an unregulated mess. [Online]
Available at: https://techcrunch.com/2018/03/07/sec-says-cryptocurrency-exchanges-are-an-
unregulated-mess/
[Accessed 10 December 2019].
Glucksmann, T., 2019. Catch Me If You Can: Fighting Fraud With Blockchain. [Online]
Available at: https://cointelegraph.com/news/catch-me-if-you-can-fighting-fraud-with-blockchain
[Accessed 9 December 2019].
Greenfield, R., 2017. Explaining How Proof of Stake, Proof of Work, Hashing and Blockchain
Work Together. [Online]
Available at: https://medium.com/@robertgreenfieldiv/explaining-proof-of-stake-f1eae6feb26f
[Accessed 20 July 2019].
haseebrabbani, 2010. What is Hashing & Digital Signature in The Blockchain?. [Online]
Available at: https://blockgeeks.com/what-is-hashing-digital-signature-in-the-blockchain/
[Accessed 9 December 2019].
Kulkarni, P., 2019. How not to fall for a Ponzi scheme. Here are 5 red flags. [Online]
Available at: https://economictimes.indiatimes.com/wealth/invest/how-not-to-fall-for-a-ponzi-
scheme-here-are-5-red-flags/articleshow/70203114.cms
[Accessed 10 December 2019].
Madi, J., 2019. FinTech: Law and Regulation. United Kingdom: Edward Elgar Publishing.
Malik, F., 2019. What Is The Concept Of BlockChain And How Can I Benefit From It?. [Online]
Available at: https://medium.com/fintechexplained/what-is-the-concept-of-blockchain-and-how-
can-i-benefit-from-it-e91ef047cdf7
[Accessed 2 December 2019].
Martucci, B., 2019. What Is Cryptocurrency – How It Works, History & Bitcoin Alternatives.
[Online]
Available at: https://www.moneycrashers.com/cryptocurrency-history-bitcoin-alternatives/
[Accessed 9 December 2019].
McKinlay, J., Pithouse, D. & McGonagle, J., 2018. Blockchain: background, challenges and
legal issues. [Online]
Available at: https://www.dlapiper.com/en/denmark/insights/publications/2017/06/blockchain-
background-challenges-legal-issues/
[Accessed 9 December 2019].
Rakhmilevich, M., 2019. Why Enterprise Developers Need to Understand Blockchain in 2019.
[Online]
Available at: https://blogs.oracle.com/blockchain/why-enterprise-developers-need-to-
understand-blockchain-in-2019
[Accessed 9 December 2019].
Ryan, J., 2018. Why Dogecoin Is The Cryptocurrency To Watch In 2018. [Online]
Available at: https://www.lifehacker.com.au/2018/03/year-of-the-dogecoin-will-dogecoin-rise-
more-than-bitcoin-in-2018/
[Accessed 10 December 2019].
Suresh, K., 2013. E-Gold Vs Gold ETF’s – Which is the best investment option?. [Online]
Available at: https://myinvestmentideas.com/2013/07/e-gold-vs-gold-etfs-which-is-the-best-
investment-option/
[Accessed 10 December 2019].
Unlock, 2017. Digi.cash New Asset Trading system… is it better than Blockchain versions
today?. [Online]
Available at: https://www.unlock-bc.com/news/2019-12-09/blockchain-identity-management-
market-to-reach-1146-billion
[Accessed 10 December 2019].
Voshmgir, S., 2019. Token Economy. 1st ed. Berlin: Amazon Media.