Professional Documents
Culture Documents
Features Challenges
• Not open to public: Participants known to each other, trust is • Not decentralized.
assured.
• Participants pre-approved by organization, ledger and its • If nodes are trusted (unlike in Blockchain) it may be cheaper
access distributed among participants. to go with traditional database.
• Central authority/owner controls permission to read, write or • Not considered a legitimate Blockchain as it is permissioned.
audit ledger. Immutability and trust of transactions are in question (as
• Central authority controls consensus process. being controlled by a single authority).
• High cryptographic methods secure data. • Organization must agree on who has the highest power to be
• High transaction processing speed: take seconds to create a the central authority.
block.
• Very low energy consumption (supercomputers not required
for processing).
Features Drawbacks
• Also known as federated Blockchain • Not fully decentralized.
• Permissioned Blockchain, hybrid between public • Different organizations have different
and private Blockchain: Any node can initiate and
receive transactions. Permission to write or audit requirements. Challenge is to agree on a standard
the ledger is determined by a group of pre- set of rules.
approved individuals or organization (consortium).
• Consensus process done by nodes who have full
access to ledger.
• High cryptographic methods secure data.
• Faster than public Blockchain with higher
scalability.
• Have better transaction privacy and traceability.
• Examples: R3 Corda, Hyperledger fabric
Common Chain of blocks – Peer-to-peer architecture – Public key cryptography – Immutable – Byzantine Fault
features Tolerance - Auditable
Users Anonymous; but Known & Trusted Known & Trusted Anonymity for public
web-tracking and participants participants network members; Private
cookies pose a risk network members are
to privacy known within the private
network.
Access Open and Access fully restricted Selectively open; relevant Centralized control of
transparent to all transparency provided providing access, hence
privacy and confidentiality
maintained
Dr. Maumita Chakraborty, UEM Kolkata 17
Public Blockchain Private Blockchain Consortium Blockchain Hybrid Blockchain
Network Type Decentralized; zero Centralized; single Partially decentralized; Zero point of failure
points of failure point of failure multiple points of failure
Operation Anyone can read or Pre-approved Pre-approved participants Any combination is
initiate or receive participants can read can read and/or initiate possible; Operations are
transactions and/or initiate transactions customizable. Central
transactions authority decides which
transactions can be made
public and which are
private
Verification Anyone can be Single validator node Only privileged members of The public network
made a node and or central authority to the consortium can validate verifies the block
take part in the create a block and create a block
consensus process
to validate
transactions and
create a block
Immutability Secured by hashing Secured by Secured by distributed Secured by hashing at the
distributed consensus consensus public network and
secured by distributed
consensus by the private
blockchain
1. 2. 3.
4. 5. 6.
Disadvantages:
• Time consuming: Miners need to iterate over many nonces before finding the right solution.
• High energy consumption: Significant work needs to be conducted by the miners to find the nonce for
creating the winning hash. For all miners, other than the winner, it is wasted energy.
• 51% risk: Miners often group together to combine their mining resources for more efficiency and savings.
Mining pool is against basic principle of distributed ledgers. Person/group gaining control of over 50% of the
network’s computing power can control the validation process. Referred to as a 51% attack.
Dr. Maumita Chakraborty, UEM Kolkata 28
Proof of Stake
• Requires validators to hold some of the Blockchain’s token or cryptocurrency (stake).
• More stake one has in the validating node, less tempted to corrupt the validating process.
• Users with highest stake in a cryptocurrency is most interested in maintaining and securing network (as any
attack would diminish reputation and price of the cryptocurrency that they hold).
• Mining nodes termed as validators/forgers/delegates.
• Validating nodes can forge or create new blocks proportional to the amount they have staked, i.e. a node
with a 10% stake in the network can validate 10% of transactions.
• Time and energy consumption less than PoW.
• Forgers are paid a transaction fee.
• Peercoin, NXT use PoS mechanism in Blockchain. Ethereum uses PoS over an existing PoW Blockchain,
resulting in a hybrid PoW/PoS system.
Disadvantages:
• Cheaper to attack: Perpetrator need to spend some money and not invest in the combined set of money,
time, hardware, electricity, and other resources.
• Centralization risk: Richest forger can control the consensus mechanism and get even richer.