Professional Documents
Culture Documents
On
Submitted to
BACHELOR OF TECHNOLOGY
In
By
This is to certify that the Technical Seminar report entitled “BLOCKCHAIN TECHNOLOGY
(BEYOND BITCOIN)” which is being submitted by N. MANJU NAGESHWARI
[20BH5A0509], in partial fulfillment for the award of the Degree of BACHELOR OF
TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING of JAWARHARLAL
NEHRU TECHNOLOGICAL UNVIERSITY, HYDERABAD, is a record
of the bonafide work carried out by him/ her under my guidance.
4.1 ADVANTAGES 20
4.2 DISADVANTAGES 20
4.3 APPLICATIONS 20-22
4.4 THE ATTACKS AND PROBLEM OF THE BLOCKCHAIN 23
4.5 BLOCKCHAIN GROWING POPULARITY 24-25
5 CONCLUSION 26
BIBILOGRAPHY 27
FIGURE CONTENTS
This allows participating entities to know for certain that a digital event happened by
creating an irrefutable record in a public ledger. It opens the door for developing a democratic
open and scalable digital economy from a centralized one. There are tremendous opportunitiesin
this disruptive technology, and the revolution in this space has just begun. This white paper
describes blockchain technology and some compelling specific applications in both financial and
non-financial sector. We then look at the challenges ahead and business opportunities in this
fundamental technology that is all set to revolutionize our digital world.
1
CHAPTER-1
INTRODUCTION
A blockchain is essentially a distributed database of records or public ledger of all
transactions or digital events that have been executed and shared among participating parties.
Each transaction in the public ledger is verified by consensus of a majority of the participants in
the system. And, once entered, information can never be erased. The blockchain contains a
certain and verifiable record of every single transaction ever made.
To use a basic analogy, it is easy to steal a cookie from a cookie jar, kept in a secluded
place than stealing the cookie from a cookie jar kept in a market place, being observed by
thousands of people. Bitcoin is the most popular example that is intrinsically tied to blockchain
technology. It is also the most controversial one since it helps to enable a multibillion-dollar
global market of anonymous transactions without any governmental control.
2
EXISTING SYSTEM
In offline systems no transparency at all where as in online systems provide transparency but
lack confidence in transparency.
When come to privacy in offline systems no open records on the internet. Where as in online
systems opened for others to view transaction history or locked for nobody to see.
Integrity is not guaranteed at all in offline systems.it is a risk that data will be already by third
parties. There is no security in offline systems. Where as in online systems the variable security
provided by security system in the system.
3
PROPOSED SYSTEM
Privacy is protected because nobody knows where the transaction originated. Data cannot
be altered by third party due to agreement algorithm. Very secure with user-to-user in blockchain
system.
4
CHAPTER-2
EVOLUTION OF BLOCKCHAIN:
In year 2008, an individual or group writing under the name of Satoshi Nakamoto
published a paper entitled “Bitcoin: A Peer-To-Peer Electronic Cash System”. This paper
described a peer-to-peer version of the electronic cash that would allow online payments to be
sent directly from one party to another without going through a financial institution. Bitcoin was
the first realization of this concept. Now word cryptocurrencies is the label that is used to describe
all networks and mediums of exchange that uses cryptography to secure transactions-as against
those systems where the transactions are channeled through a centralized trusted entity. The
author of the first paper wanted to remain anonymous and hence no one knows Satoshi
Nakamoto to this day. A few months later, an open source program implementing the new
protocol was released that began with the Genesis block of 50 coins. Anyone can install this
open source program and become part of the bitcoin peer-to-peer network. It has grown in
popularity since then.
5
STRUCTURE OF BLOCKCHAIN:
The Blockchain consists of linear sequence blocks, which are added to chain with the regular
intervals. The information in the blocks depends on the Blockchain network. but the timestamp,
transaction, and hash are existed in all the Blockchain variants. Each block contains the
cryptographic hash of the previous block.
All hash's information is generated automatically, it means that it is not possible to change
any information in the hash.
• In this case, each next block amplifies the verification of the previous block and the
secure of all Blockchain.
• The more blocks in the chain the safer and more reliable the Blockchain.
6
Fig 2.2 Merkle Tree
The merkle tree is a binary tree with each leaf node labelled with the hash of one transaction
stored in the block body, and the non-leaf nodes labelled with the concatenation of the hash
of its child nodes. Merkle root, i.e.. the root hash of a Merkle tree, is used to reduce the
efforts to verify the transactions in a block. Since a tiny change in one transaction can
produce a significantly different ↳ Merkle root, the verification can be completed by simply
comparing the Merkle root instead of verifying all the transactions in the block.
7
WORKING OF BLOCKCHAIN:
Bitcoin uses cryptographic proof instead of the trust in the third party for two willing parties
to execute an online transaction over the Internet. Each transaction is protected through a
digital signature. Each transaction is sent to the “public key” of the receiver digitally signed
using the “private key” of the sender. In order to spend money, owner of the cryptocurrency
needs to prove the ownership of the “private key”.
The entity receiving the digital currency verifies the digital signature. Thus ownership of
corresponding “private key” on the transaction using the “public key” of the sender. Each
transaction is broadcast to every node in the Bitcoin network and is then recorded in a public
ledger after verification. Every single transaction needs to be verified for validity before it is
recorded in the public ledger.
Verifying node needs to ensure two things before recording any transaction:
8
ORDER OF TRANSACTION:
1. The order of these transactions that are broadcast to every other node in the Bitcoin
peer-to-peer network.
3. Considering that the transactions are passed node by node through the Bitcoin
network, there is no guarantee that orders in which they are received at a node are the
same order in which these transactions were generated.
4. there is need to develop a mechanism so that the entire Bitcoin network can agree
regarding the order of transactions, which is a daunting task in a distributed system.
UNORDERED TRANSACTION:
The Bitcoin solved this problem by a mechanism that is now popularly known as Blockchain
technology. The Bitcoin system orders transactions by placing them in groups called blocks and
then linking these blocks through what is called Blockchain.
9
The transactions in one block are considered to have happened at the same time. These blocks
are linked to each-other (like a chain) in a proper linear, chronological order with every block
containing the hash of the previous block. There still remains one problem. Any node in the
network can collect unconfirmed transactions and create a block and then broadcasts it to rest of
the network as a suggestion as to which block should be the next one in the blockchain. Howdoes
the network decide which block should be next in the blockchain? There can be multiple blocks
created by different nodes at the same time. One can’t rely on the order since blocks canarrive at
different orders at different points in the network.
Bitcoin solves this problem by introducing a mathematical puzzle: each block will be acceptedin
the blockchain provided it contains an answer to a very special mathematical problem. Thisis
also known as “proof of work”—node generating a block needs to prove that it has put enough
computing resources to solve a mathematical puzzle. For instance, a node can be required to find
a “nonce” which when hashed with transactions and hash of previous block produces a hash with
certain number of leading zeros. The average effort required is exponential in the number of zero
bits required but verification process is very simple and canbe done by executing a single hash.
10
CLASSIFICATION OF BLOCKCHAIN:
Private The direct access to the data of the Blockchain is It is not possible to apply
limited and the advantages of the Blockchain are
partially lost
11
PROPERTIES OF BLOCKCHAIN:
The properties of the blockchain has different parameters, which calculated, if the following
properties are known:
• Header size
• transaction size
• bandwidth (b(I,j))
• Block size
Blockchain Consensus algorithms ensure each new block added to the network is the only
version of the truth, which is agreed by all the nodes in a distributed/decentralized computing
network.Blockchain is a distributed decentralised network that aims to give immutability and
security of data. Without a central authority to validate and verify the transactions, each
transaction in a Blockchain network is considered to be truly secure and validated.
As blockchain functions in a decentralised manner and records large volume transactions in real-
time, there may be the complexity of what is the truth is. The key is to get consensus one way or
another, or else malicious things like double-spending attacks can occur. This is where the
consensus algorithm comes in. A consensus algorithm is a mechanism in computer scienceused
to establish agreement on a single data value across distributed processes or systems.
12
A consensus algorithm is a protocol through which all the parties of the blockchain network
come to a common agreement (consensus) on the present data state of the ledger and be able to
trust unknown peers in a distributed computing environment.
concept was first introduced in 1993 by Cynthia Dwork and Moni Naor, and later re-introduced
by Satoshi Nakamoto in the Bitcoin whitepaper in 2008. In a PoW system, blockchain validators
must take data from a block header as an input, and continuously run it through a cryptographic
hash function. Validators hash slight variations of the input data by including anarbitrary number
called a nonce every time the input data is run through the cryptographic hashfunction. PoW needs
high levels of electricity of processing power to decide what data gets added to the next block in
a blockchain. Specialised computers called ASICs are required to compute complex
mathematical problems needed for the PoW system.
The PoS consensus algorithm was created in 2011 as an alternative to PoW. Although PoS and
PoW have similar objectives, they present some fundamental differences and features, especially
during the validation of new blocks on the blockchain network. The Proof of Stake (PoS)
consensus algorithm differs with the PoW mining consensus with a mechanism where blocks
are validated based on the stake of the network participants. Here, unlike running hash functions,
validators stake resources primarily in the form of digital money or tokens. The validator of
every block is then randomly selected from the stakeholders based on the amount of
Ccomputational power allocated.
13
Also, each voter’s power is proportional to the size of the stake in the network. Blockchain
projects like EOS, Bitshares, Steem, Tezos, etc. use DpoS consensus algorithm for validating
transactions.
PoET consensus system was developed by Intel to solve the computing challenge of “random
leader election.” It was released as part of the Software Guard Extensions (SGX) programming
reference manual. PoET is now utilised by many private blockchains, including Hyperledger
Sawtooth as it relies on randomised timer system for network participants rather than using
mining hardware as in the case of Proof of Work (PoW). Each participating blockchain node in
the network is needed to wait for a randomly chosen period, and whoever with finished time
wins the new block and validates it.
Proof of Authority (PoA) is a consensus algorithm type based on the reputation of trusted parties
in a blockchain network. It is considered an efficient mechanism for private blockchainsand was
conceptualised by Ethereum co-founder and former CTO Gavin Wood in 2017. PoA consensus
algorithm is based on the value of identities within a network- and in a system block,validators do
not stake resources but their own identities and reputation. So, PoA blockchain networks are
secured by the validating nodes that are arbitrarily chosen as trustworthy parties.
The Proof of Authority model works on a fixed number of block validators, making it an easily
scalable blockchain system because transactions are checked by already-approved network
participants. PoA consensus algorithm can be utilised in applications such as supply chains or
trade networks because the real identities of nodes are known and trusted.
14
SMART CONTRACTS:
• That was invented in year 1994 by Nick Szabo. The smart contract is the script which
is stored in the Blockchain.
• The smart contract has the unique address, set of executable functions and state
variables.
• The user launches the smart contract by addressing the transaction to it.
• After that, the smart contract is automatically and independently performed in the
established order on each node of the chain, depending on the data, which contained in
the running transaction.
15
CHAPTER -3
BEYOND BITCOIN
1. BITCOIN
16
2. ETHEREUM COIN
Ethereum is basically an open software platform based on the blockchain
technology which allows developers to building several decentralized applications called
DAPPS. Ethereum is also called as a distributed public blockchain network thatfocuses
on running the programmingcode of any application. Ethereum was firstcreated in
2013 by founder Vitalik Buterin and Ether is the cryptocurrency that is generated on the
Ethereum platform.
The Ether tokens can be used to make payments by transferring them between accountsas
well as to compensate the mining nodes for the computations performed on the
Ethereumblockchain.
The Ethereum platform has been designed in a way to allow developers for the creationof
smart contracts. The smart contract is basically a computer code or script which can
automatically execute tasks when certain conditions are met. This tasks can include
anything like an exchange of content, money, property, or anything of value.
17
3. RIPPLECOIN
Ripple was co-founded by Jed McCaleb and Chris Larsen and was released in 2012.
Ripple facilitates the seamless transfer of money by connecting banks, payment
providers, corporates and digital asset exchanges through the RippleNet. The Ripple
XRP tokens provide banks and other financial institutions an on-demand solution to
sources liquidity for instant global transfers. As the Ripple network is based on
blockchain technology it allows for low-cost global funds transfers just in a matter of
few seconds. The Ripple’s distributed ledger XRP makes use of a consensus protocol
that allows for payments and exchanges to take place in a distributed process.
4. LITE COIN
It created in 2011 by former Google engineer, Charles Lee, Litecoin offers a faster
mining block generation time and a much increased number of coins to Bitcoin. Litecoin
(LTC) is a digital currency which operates on a peer-to-peer basis andfacilitates lightning
fast currency exchanges and payments across the globe. Thesoftware is open source,
allowing for the creation and exchange of coins based on a cryptographic protocol,
without being managed by any centralized authority. Rank 11 in all over the
cryptocurrency.
18
Fig 3.5 Lite Coin
5. DASH COIN
19
CHAPTER-4
ADVANTAGES
• it is not necessary to work with the third-party organization or with the central
administrator.
• The results of this recording give the Blockchain's transparency, immutability and
trusty.
• The Blockchain designs in a way that it can show any problems and correct them if it
is necessary. This advantage makes the Blockchain technology traceability
DISADVANTAGES
• The consumption of power is needed for keeping a real-time ledger. Every time the new
node is created and in the same time it communicates with each and other node. In this
way the transparency is created.
• The signature verification is the challenge of the Blockchain, because each transaction
must be signed with cryptographic scheme.
• The high costs are a big disadvantage of the Blockchain. The average cost of the
transaction is between 75 and 160 dollars and most of it covers by the energy
consumption. And the high initial capital costs of the blockchain.
APPLICATIONS:
1. Financial applications
2. Non-Financial applications
20
1. FINANCIAL APPLICATIONS:
i. Private Securities
It is very expensive to take a company public. A syndicate of banks must work to underwrite the
deal and attract investors. The stock exchanges list company shares for secondary market to
function securely with trades settling and clearing in a timely manner. It is now theoretically
possible for companies to directly issue the shares via the blockchain. These shares can then be
purchased and sold in a secondary market that sits on top of the blockchain. Here are some
examples:
NASDAQ Private Equity: NASDAQ launched its Private Equity Exchange in 2014 . This is 6
meant to provide the key functionalities like Cap table and investor relationship management for
the the pre-IPO or private companies. The current process of trading stocks in this exchangeis
inefficient and slow due to involvement of multiple 3rd parties.
Medici: Mediciis being developed as a securities exchange that uses the Counterparty
implementations of Bitcoin 2.0. The goal here is to create a cutting edge stock market.
Counterparty is a protocol that implements traditional financial instruments as the self- executing
smart contracts.
Coin setter: Coinsetter is a New York based bitcoin exchange. It is working on a Project
Highline, a method of using the blockchain to settle and clear financial transactions in T+ 10
minutes rather than the customary T+3 or T+2 days.
Augur: Augur is a decentralized prediction market that will allow users to buy and sell sharesin
anticipation of an event with the probability that a specific outcomes will occur. This can also be
used to make financial and economic forecasts based on the “wisdom of crowds”.
Bit shares: Bitshares are digital tokens that reside in the blockchain and reference specific assets
such as currencies or commodities. The Token holders may have the unique feature of earning
interest on commodities, such as gold, and oil, as well as dollars, euros and currency instruments.
21
ii. Insurance:
Assets which can be uniquely identified by one or more identifiers which are difficult to
destroy or replicate can be registered in blockchain. This can be used to verify ownership
of an asset and also trace the transaction history.
2. NON-FINANCIAL APPLICATIONS:
i. Notary Public: Verifying authenticity of the document can be done using blockchain and
eliminates the need for centralized authority. The document certification service helps in
Proof of Ownership (who authored it), Proof of Existence (at a certain time) and Proof
of Integrity (not tampered) of the documents. Since it is counterfeit-proof and can be
verified by independent third parties these services are legally binding.
ii. Music Industry: The music industry has gone a big change in last decade due to the
growth of Internet and availability of a number of streaming services over the Internet.It
is impacting everyone in the music industry-artists, labels, publishers, songwriters and
streaming service providers. The process by which music royalties are determined has
always been convoluted one, but the rise of the Internet has made it even more complex
giving rise to the demand of transparency in the royalty payments by artists and
songwriters.
iii. Decentralized Storage: Cloud file storage solutions such as Dropbox, Google Drive or
One Drive are growing in popularity to store documents, photos, video and music files.
Despite their popularity, cloud file storage solutions typically face challenges in areas
such as security, privacy and data control. The major issue is that one has to trust a third
party with one’s confidential files.
22
iv. Internet Applications: Namecoin is an alternative blockchain technology (with small
variations) that is used to implement decentralized version of Domain Name Server
(DNS) that is resilient to censorship. Use of Blockchain technology means since DNS or
phonebook of the Internet is maintained in a decentralized manner and every user can
have the same phone book data on their computer.
The Blockchain can be attacked by the different threats, which are connecting with the PoW and
PoS protocols. Most of them are almost impossible.
• Attack of 51%: It will happen when two miners are calculating the hash of the block at
the same time and get the same results. In this case the Blockchain will split and as the
result, users have two different chains, and both are considered true.
• Double-spending: Princip of this attack is the same with the previous attack, but here can
be used the split of the chain to spend the money again.
• Sybil’s attack: Its possible when one node accepts several essences, because the network
can’t authentically distinguish the physical machines. The Sybil’s attack can help to fill
the Blockchain with users under its control. It can lead to the previous twoattacks and
the ability to see all transactions with special programs.
• DDos’s attack: The attack consists of a large amount of the similar requests. There is the
protection in the DDos’s attack – size of the block up to 1 MB, size of each script up to
10000 bytes, up to 20000 of the signatures can check and maximums of the multiple
signature is 20 keys.
• Cracking of the cryptographic: It is possible if use the quantum algorithms such as
‘Shora’ which can break the RSA encryption. The scientists work on thecryptographical
algorithms, which based on the hash functions.
23
BLOCKCHAIN GROWING POPULARITY
24
Fig 4.3 Blockchain Technology Market In Different
25
CONCLUSION
The Blockchain is the new type of the database which solved some of the problems in
the centralized system, such as the transactions without a middleman, the spent time on each
transaction, the unintentional or special deletion or modification of data in the Blockchain.
With the advantages of the technology, such as the transparency, trusty, the multiple
copying of the transactions and the decentralized digital ledger, the Blockchain technology is
reliable and not destructible, and all mentioned attacks could disrupt the system work, not the
technology. It should be noted, that the attacks, which are described in the paper, are more
theoretical. There are only few examples of the Blockchain hacking in practice.
The Blockchain technology is useful and versatile for our world, because it can facilitate
most of the systems in the different industries, but it is new and its implementation islittle studied
issue on practice. The Blockchain technology promises us the bright future without the fraud and
deception due to the benefits of the Blockchain technology. The developers must devote more
time to the practical application and implementation of the Blockchain into the already existing
systems of the main industrial directions, because the Blockchain can bring the honest and trusty
business, government and logistic systems.
The challenges of the Blockchain are large, but the results of the Blockchain using havea
greater preponderance than disadvantages. It is necessary to keep exploring the Blockchain
development and application in the different areas for the nearest future, because this new
technology can help to solve many difficult problems, which are disturbing and preventing
correctly systems work
26
BIBILOGRAPHY.
[1] A. Bahga, V. Madisetti, “Blockchain Platform for Industrial Internet of Things”, Journalof
Software Engineering and Applications, No. 9, pp. [36]533-546, 2016
[2] A. Bahga, V. Madisetti, “Internet of Things: A Hands-On Approach”, Atlanta, 2014
[3] A. Litviņenko, A. Āboltiņš, “Computationally Efficient Chaotic Spreading Sequence
Selection for Asynchronous DS-CDMA”. Electrical, Control and Communication Engineering,
vol.13, pp.75-80, 2017
[4] A. Songara, L. Chouhan, “Blockchain: A Decentralized Technique for Securing
Internet of Things”. Conference paper, October 2017
[5] A. Shanti Bruyn, “Blockchain an introduction. Research paper”, 2017. Available from:
https://beta.vu.nl/nl/Images/werkstuk-bruyn_tcm235-862258.pdf
[6] Ascribe, “Lock in attribution, securely share and trace where your digital work spreads.”
[online]. Available from: https://www.ascribe.io/
[7] BitFury Group, “Proof of Stake versus Proof of work. White paper”, September 2015
[8] Blockchaintechnology, “Advantages & Disadvantages of Blockchain Technology”
[online]. 2016. Available from:
https://blockchaintechnologycom.wordpress.com/2016/11/21/advantages-disadvantages/
[9] Blockverify, “Blockchain Based Anti-Counterfeit Solution” [online]. Available from:
http://www.blockverify.io/
[10] C. Franko, “Borderless: A Governance Platform and Charity for a Global Society”
[11] D. Balaban, “Blockchain Networks: Possible Attacks and Ways of Protection” [online].
Available from: https://resources.infosecinstitute.com/blockchain-networks-possible-attacks-
ways-protection/#gref
[12] Dataflair team, “Advantages and disadvantages of Blockchain Technology” [online].
2018. Available from: https://data-flair.training/blogs/advantages-and-disadvantages-of-
blockchain/
[13] DHL Trend Research, “Blockchain in Logistics”, 2018
[14] Ethereum Homestead, “What is Ethereum” [online]. Available from:
http://www.ethdocs.org/en/latest/introduction/what-is-ethereum.html
[15] Everledger, “Pioneers of digital provenance” [online]. Available from:
https://www.everledger.io/about-us/about
27