Blockchains: Architecture, Design and Use Cases
Blockchains: Architecture, Design and Use Cases
1
Image courtesy: http://beetfusion.com/
CONCEPTUALIZATION AND
APPLICATIONS
2
The Permission-less Model
• Works in an open environment and over a large network of participants
• The users do not need to know the identity of the peers, and hence the
users do not need to reveal their identity to others
Block 3 Block 6
Block 3 Block 6
• The blocks which are not part of the longest chain Block 10
The Cryptocurrency Applications using Blockchain
Source: https://blockchain.info/
The Permissioed (Private) Model – Blockchain 2.0
• Blockchain can be applied just beyond cryptocurrency
• Most enterprise use cases only involve a few ten to a few hundred known
participants
Permissioned Blockchain
• Can leverage the 30+ years of technical literature to realize various
benefits like
– Strict notion of security and privacy
– Greater transactional throughput based on the traditional notions of
distributed consensus
• Raft Consensus
• Paxos Consensus
• Byzantine Fault Tolerance (BFT) algorithms
Permissioned Blockchain Applications
Source: https://www.multichain.com
• Asset Movements and Tracking
Permissioned Blockchain Applications
• Provenance tracking - tracking the origin and movement of high-value items across a
supply chain, such as luxury goods, pharmaceuticals, cosmetics and electronics.
– When the high-value item is created, a corresponding digital token is issued by a trusted entity,
which acts to authenticate its point of origin.
– Every time the physical item changes hands, the digital token is moved in parallel -> the real-
world chain of custody is precisely mirrored by a chain of transactions on the blockchain.
– The token is acting as a virtual “certificate of authenticity”, which is far harder to steal or forge
than a piece of paper.
The Blockchain Based Distributed Web
How IPFS Works
• Each file and all of the blocks within it are given a unique fingerprint based
on a cryptographic hash
• IPFS removes duplications across the network and track version history for
every file
• Each network node stores only the content it is interested in and some
indexing information that helps to figure out who is storing what
Source: https://ipfs.io/
How IPFS Works
• When looking up files, you ask the network to find nodes storing the
content behind a unique hash
Source: https://ipfs.io/
Hyperledger Fabric
• A permissioned blockchain framework that provides an enterprise-grade
foundation for transactional applications