0% found this document useful (0 votes)
8 views130 pages

Week 12

The document discusses the potential applications of blockchain technology in land registry records, financial services, and government operations. It highlights the advantages of using blockchain, such as decentralization, transparency, and reduced fraud, while also addressing implementation challenges and privacy concerns. Various projects, including Project Ubin and the Stellar and Ripple protocols, are examined to illustrate blockchain's role in cross-border payments and public sector data management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views130 pages

Week 12

The document discusses the potential applications of blockchain technology in land registry records, financial services, and government operations. It highlights the advantages of using blockchain, such as decentralization, transparency, and reduced fraud, while also addressing implementation challenges and privacy concerns. Various projects, including Project Ubin and the Stellar and Ripple protocols, are examined to illustrate blockchain's role in cross-border payments and public sector data management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 130

Blockchain and its applications

Prof. Sandip Chakraborty

Department of Computer Science & Engineering


Indian Institute of Technology Kharagpur

Lecture 56: A Potential Use Case – From a Critics


Perspective
• Land Registry Records – Can we use a Blockchain?
• Requirement analysis

• Tradeoff analysis
Maintaining Land Registry Records
• Historically, land registries were paper-based
• Can be lost, destroyed, falsified, or otherwise manipulated

• Selling a property (land)


• Owner has to prove the ownership

• A complex business network – multiple realtors,


inspectors, appraisers, escrow
• Help people to do the best purchase / sell of the property
Real Estate Scams and Frauds
Real Estate Scams and Frauds

Can a blockchain help?


Real Estate Scams and Frauds

Can a blockchain help?


What is the business network?
Who are the participants?
Who will maintain the blockchain?
What are the transactions?
The People in the Business Network
• Government
• Real estate agents (?)
• Buyers
• Sellers
• Investors (Crowdfunding)
• Startups (real estate business)
The Assets
• Lands
• Properties (buildings, etc.)
• Money
The Transactions
• Buy lands and/or properties
• Sell lands and/or properties
• Crowdfund an investment
• Return from a crowdfunded investment
Public or Private Blockchain

• Public Blockchain
• Pros: Open network, anyone can
invest or participate as a startup
• Cons: You do not know to whom you
are investing
Public or Private Blockchain

• Private Blockchain
• Pros: The identity of the participants
are known, better security (?)
• Cons: Who will validate the
authenticity? May fallback to a
centralized system
Advantages of using blockchain

• Provides a decentralized platforms and marketplace


• Can avoid intermediaries
• Liquidity in business – can be traded readily
• Fractional ownership and crowdfunded investments
• Reduced cost of transactions
• Better transparency
But there are many important implementation
questions ...
• Who are going to be the full nodes of the system?
• Government?
• Investors?
• Startups?
• Buyers, sellers?
But there are many important implementation
questions ...

• Everyone is a full node


• I'll sell my property for once … why should I
download the entire blockchain?
• Should I sign out once I am done? How do I
resolve a query that comes later on?
• Do I need to keep my keys forever?
• What if I loose the keys?
But there are many important implementation
questions ...

• I am not the full node


• Which full node should I trust?
But there are many important implementation
questions ...

• Blockchain, by default, is world-readable


and world-writable
• Isn't it a privacy concern?
• Say, I am an investor. Everyone can see where I
have invested and how much money I have
invested
But there are many important implementation
questions ...

• Blockchain, by default, is world-readable


and world-writable
• Isn't it a privacy concern?
• Say, I am an investor. Everyone can see where I
have invested and how much money I have
invested
• Cross-argument: Use keys to secure the
channel
But there are many important implementation
questions ...
• Blockchain, by default, is world-readable
and world-writable
• Isn't it a privacy concern?
• Say, I am an investor. Everyone can see where I
have invested and how much money I have
invested
• Cross-argument: Use keys to secure the
channel
• Who is going to provide the key?
But there are many important implementation
questions ...
• What should be the credential to participate as an
investor or a start-up?
• Who will validate that a start-up is not a fraud
• Trusted third party?
• Then why can't that trusted third party
maintain a database?
• Note: There are methods for blind
signatures, you don't need to
reveal all information to the TTP
Conclusion
• There are many fundamental questions that need to
be solved before putting an application to the
blockchain

• The application designer needs to analyze all


possible trade-offs
• Is the benefit more than the cost?

• Digitizing the land and property records might solve


many of the problems! Need to think of it ...
Conclusion

• We have seen the idea of decentralized identity


management
• Can explore whether that can be coupled with
other applications to solve some of the problems
that we mentioned
Blockchain and its applications
Prof. Sandip Chakraborty

Department of Computer Science & Engineering


Indian Institute of Technology Kharagpur

Lecture 57: Blockchain in Financial Services


• Cross-border payments over blockchain

• Project Ubin
• Steller Protocol and Network

• Ripple Protocol and Network

• Project Ubin
Cross-Border Payments
• Classic use case for which Bitcoin was created and perhaps the
holy grail of cryptocurrencies
• To date, we have over 6000 cryptocurrencies!
• But, what qualifies as a currency. In economics, the following
criteria must be satisfied:
• Medium of exchange: Are merchants willing to accept the
currency in exchange for goods and services
• Unit of account: Is it a measure of the real value of goods and
services (e.g., would a merchant be willing to accept the same
value regardless of relative currency fluctuations)
• Store of value: A mode of investment
Steller Protocol and Network
• Decentralized, hybrid blockchain platform with open membership;
launched in 2014; Lumens as native asset
• Federated Byzantine Agreement (FBA) – quorums formed based on
participants individual trust decisions, followed by agreement within
quorums (Steller Consensus Protocol)
• 2-5 second transaction clearance
• Anchors act as bridges between a given currency and Stellar
network
• Has a distributed exchange: pay in EUR with INR balance
and network will automatically convert it at lowest rate
for you https://www.stellar.org/
Steller Protocol and Network
• The idea got published in a SOSP 2019 Paper --
• Lokhava, Marta, et al. "Fast and secure global payments with
Stellar." Proceedings of the 27th ACM Symposium on Operating
Systems Principles. 2019.

• Federated voting: Nodes try to agree on abstract statements by


first voting, then accepting, and finally confirming statements.
• Keep on voting any valid statement
(that the nodes believe to be valid)
• Accept when a majority votes (form quorums)
• Confirm when the quorum unanimously accepts a statement
Federated Voting in Steller
Federated Voting in Steller
Vote x

Vote y
Federated Voting in Steller
Vote x

Vote x Vote x

Vote x

Vote y

Vote y Vote y
Federated Voting in Steller
Accept x

Vote x Accept x

Accept x

Vote y

Vote y Vote y
Federated Voting in Steller
Accept x

Accept x Accept x

Accept x

Accept x

Vote y Vote y
Federated Voting in Steller
Accept x

Accept x Accept x

Accept x

Accept x

Accept x Accept x
Steller Protocol and Network
• Partially synchronous protocol
• Safety under asynchronous assumptions
• Liveness require a synchronous network

• Performance:
Ripple Protocol and Network
• Protocol for banks to clear and settle payments in real time through a
distributed network
• Consensus (XRP Ledger – XRPL -- https://xrpl.org/ ) allows payment
exchanges and remittance to happen without need for a centralized clearing
house
• Average 5 second confirmations; no mining, custom protocol that hasn’t yet
been validated for correctness and fault tolerance
• Gateway nodes convert fiat currencies to XRP (currency in Ripple)
• Market-makers convert from one currency to another
• Centralized governance, with Ripple still holding a large fraction
of the cryptocurrency
• https://ripple.com
Ripple Protocol and Network

• Unlike Steller, there are open questions on Ripple consensus


• Chase, Brad, and Ethan MacBrough. "Analysis of the XRP ledger
consensus protocol." arXiv preprint arXiv:1802.07242 (2018).
• Claims that XRPL violates safety and liveness
Project Ubin: SGD on Distributed Ledger

• A collaborative project with the industry to explore the use of


Blockchain and Distributed Ledger Technology (DLT) for clearing and
settlement of payments and securities
• Taken up by the Monetary Authority of Singapore (MAS) in November,
2016
• Reports available on the MAS website:
https://www.mas.gov.sg/schemes-and-initiatives/project-ubin
Project Ubin: SGD on Distributed Ledger

• Five-phase project
• Phase 1: Tokenized SGD
• Phase 2: Re-imagining RTGS
• Phase 3: Delivery versus Payment (DvP)
• Phase 4: Cross-border Payment versus Payment (PvP)
• Phase 5: Enabling Broad Ecosystem Collaboration
Project Ubin: SGD on Distributed Ledger

• Phase 1: Tokenized SGD


• Consortium of financial institutions to conduct inter-bank
payments using blockchain technology
• Bank of America Merrill Lynch, Credit Suisse, DBS Bank, HSBC, JP
Morgan, Mitsubishi UFJ, OCBC, R3, Singapore Exchange (SGX),
United Overseas Bank
• Include DLT-based payment in MEPS+
• Participant banks pledge cash into a custody account
held at MAS. MAS will then create the equivalent value
in Digital SGD on the DL and assign them to the
respective banks.
Project Ubin: SGD on Distributed Ledger
Project Ubin: SGD on Distributed Ledger

• Phase 2: Re-imagining RTGS


• Led by MAS and The Association of Banks in Singapore (ABS)
• Developed PoC using three DLT platforms – Ethereum, Fabric,
and R3 Corda; open-sourced https://github.com/project-ubin
• Solves the problem of gridlock
Project Ubin: SGD on Distributed Ledger

• Phase 3: Delivery versus Payment (DvP)


• The cash payment for a purchased security occurs prior to,
or upon, its delivery
• Two counterparties (traders) meets at an agreed time
to exchange the agreed assets.
• In this phase, MAS and SGX collaborated to realise
domestic DvP settlement on two separate blockchain
platforms
Project Ubin: SGD on Distributed Ledger

• Phase 3: Delivery versus Payment (DvP)


Project Ubin: SGD on Distributed Ledger

• Phase 4: Cross-border Payment versus Payment (PvP)


• Joint initiative by Bank of Canada (BoC), Bank of England
(BoE) and MAS; initiated in November, 2018
• Transparency in payment status, availability of cross-border
payment services, reduced time for payment
processing, reduced costs
• Considers three different payment models and analyzes
their respective impact and scale
Project Ubin: SGD on Distributed Ledger

• Phase 4: Cross-border Payment versus Payment (PvP)


• Model 2
Project Ubin: SGD on Distributed Ledger

• Phase 5: Enabling Broad Ecosystem Collaboration


• Provides technical insights into the blockchain-based multi-
currency payments network prototype that was built
• Describes how the network could benefit the financial
industry and blockchain ecosystem.
Project Ubin: SGD on Distributed Ledger

• Phase 5: Enabling Broad Ecosystem Collaboration


Project Ubin: SGD on Distributed Ledger
• Phase 5: Enabling Broad Ecosystem Collaboration
Blockchain for Procure-to-Pay
(B2P)
Automated document verification
and payment processing
Conclusion

• Financial services have been one of the key use-cases


for Blockchain
• Project Ubin develops a payment network prototype for
multi-currency payments; the project has been open-
sourced
• Check the project reports for
Ubin: https://www.mas.gov.sg/schemes-and-
initiatives/project-ubin
Blockchain and its applications
Prof. Sandip Chakraborty

Department of Computer Science & Engineering


Indian Institute of Technology Kharagpur

Lecture 58: Public Sector Use Cases


• Government use cases of blockchain
• Public data management

• Public taxation

• National strategies
Blockchain and Government
• Government needs to maintain (in digital or in paper form)
• Daily operations and activities
• Government assets (land records, buildings etc.)
• Details of people, organizations and institutions
• Records of people
• Business transactions
Multi-institutional and Multi-Organizational
• Different levels of governance

Country State District Village,


Panchyat, Cities
Multi-institutional and Multi-Organizational
• Every level builds its own ledger of data
• Different access management policies
• Role based access control or access management

• Different priority of data


• High priority or highly secured data - restricted
access - needs to prevent from unauthorized access
(example: AADHAAR Data)
Blockchain and Government
• Blockchain can help in management of government
data at different levels

• Note
• Directly store the data on blockchain?
• The data cannot be altered without colluding majority of
the blocks
• Data access as transactions - can check or verify who
has accessed what
Government and Cyber Crime
• Government database is a major target for
hackers
• In 2020, there are 1001 cases of data breaches that
affected 155.8 million individuals
(Source: https://www.statista.com/)

• “Cyber War” - actions by a nation-state to


penetrate another nation’s computers or
networks (Richard Clarke)
Theft of Government Data
Processing of Government Data
• Data is shared among multiple organizations at
different level of government structure

• The problem of data breaches increases at every


level
• Data duplication
• Data multiplicity

• Protection of data gets diluted if multiple copies


of same data exist
Sharing of Passport Data: An Example

Passport
Data

Ministry of foreign
Affairs - Passport
data management
Sharing of Passport Data: An Example

Airport/ Sea port


Custom Check

Passport
Data

Ministry of foreign
Affairs - Passport
data management
Sharing of Passport Data: An Example
National Army
Defense Agency

Airport/ Sea port


Custom Check

Passport
Data

Ministry of foreign
Affairs - Passport
data management
Sharing of Passport Data: An Example
National Army
Defense Agency
National Police Agency
Airport/ Sea port CBI/CID - Crime department
Custom Check
Public Service
Identity Database
Passport
Data

Ministry of foreign
Affairs - Passport
data management
Sharing of Passport Data: An Example
National Army
Defense Agency
National Police Agency
Airport/ Sea port CBI/CID - Crime department
Custom Check
Public Service
Identity Database
Passport
Data

Ministry of foreign
Income Tax Department Affairs - Passport
National Intelligence data management
National Audit Agency
Sharing of Passport Data: An Example
National Army
Defense Agency
National Police Agency
Airport/ Sea port CBI/CID - Crime department
Custom Check
Public Service
Identity Database
Passport
Data

Ministry of foreign
Income Tax Department Affairs - Passport
Ministry of
National Intelligence data management
Public Service
National Audit Agency
Government Information Sharing System: A
Typical Example
Service
Requester Agency Directory

Service Broker
Service Broker
Organization Service
Service Gateway

Data Directory Service


Service Gateway

Search, Account and


Other Service

Government Information Sharing


Civic Service System Portal
System
How Blockchain Helps
• Access and verification of a central data
– Data is in a central database
– Access to the database are the transaction
– Every such transactions (access to the data) is logged in a
blockchain
– Data can be accessed only through the blockchain
– Anyone can verify who has accessed data and for what
purpose
How Blockchain Helps
• Sharing of data
– Data is in the blockchain
– (May not be the ideal solution all the time)
– Everyone can verify which data has been shared
– Data cannot be altered
How Blockchain Helps
• Sharing of data and access control
– Keep both the data and the access at a blockchain
– Depends on the size of the data
– Anyone can verify the data and the access
– Neither data nor access can be altered
– Access cannot be denied
Case Study: Processing Tax Payments
• Goods and Services Tax (GST) - indirect tax covering
various goods and services during the production and
service stages
• IGST
• SGST
• CGST
• The entire workflow is pretty complex -
Let’s see how Blockchain can help!
Case Study: Processing Tax Payments
• Say, you want to purchase a dress - it has multiple
workflows at the production stages
GST without Blockchain

A GST Invoice Buyer pays Information of the


is issued by the bill with payment is recorded
the seller GST at GST Portal

Seller pays to the


Additional payment Final Tax goes to
suppliers
is adjusted the government
GST with Blockchain

A GST Invoice Buyer pays


Seller pays to the
is issued by the bill with
suppliers
the seller GST

Smart Contract adjusts the tax


Final Tax goes to
calculation during the payment
the government
Case Study: Processing Tax Payments

• During the payment for a good or a service


• Blockchain smart contracts can calculate the invoice
based on the tax amount that is already levied during the
production process
• Smart contract directly transfers the tax amount to tax
authority (CGST or SGST)
• The refund, if any, is directly paid to the customer’s
account
Advantages of using Blockchain

• The administrative burden for accounting services is


drastically reduced
• All the transactions are done in real time, no “return
filing” is required, or “return filing” can be avoided
• All the transactions are transparent
• Reduces risk of fraud and mistakes
• Immediate auditing from the transaction log
Draft National Strategy of Blockchain in India
• Published by Ministry of Electronics and Information Technology
(MeiTY) during January 2021
Draft National Strategy of Blockchain in India
• Highlights a number of use cases for possible national interests

• Transfer of Land Records (Property Record Management)


• Digital Certificates Management (Education, Death, Birth,
agreements, sale deeds …)
• Pharmaceutical supply chain
• e-Notary Service (Blockchain enabled e-Sign Solution)
• Farm Insurance
• Identity management
• Power distribution
• Duty payments
Draft National Strategy of Blockchain in India
• Highlights a number of use cases for possible national interests

• Agriculture and other supply chains


• eVoting
• Electronic Health Record Management
• Digital Evidence Management System
• Public Service Delivery
• IoT Device Management and Security
• Vehicle lifecycle management
• Chit fund operations administration
• Microfinance for Self-Help Groups
Draft National Strategy of Blockchain in India
National Blockchain Roadmap, Australia
Conclusion

• There are various scopes for applying blockchains in


public services that involve multiple stakeholders
• Are we sufficiently prepared?

• However, we should be careful about the possible


side channels
Blockchain and its applications
Prof. Sandip Chakraborty

Department of Computer Science & Engineering


Indian Institute of Technology Kharagpur

Lecture 59: Blockchain for Decentralized Marketplace


(Part 1)
• Blockchain application for a decentralized marketplace
• Design a blockchain use-case

• Analyzing the requirements


Online Service Providers
• Offers services to the consumers (end-users).​
• Use web interface or mobile apps for communicating with consumers.​
• Examples: Service
• Ecommerce​ Request
• Cloud Service Providers​
• Media Service Providers​
• Logistics Providers​ Consume Service Provider
r Service,
invoice, etc..
Online Service Providers
● Multiple service providers (SPs) come into agreement to collaborate.
● Gain access to the common larger set of end-users.
● Offer wider range of services under the same platform.
● Meet user demands by sharing resources.
● Examples:
○ Different sellers under ebay, Amazon.
○ Cloud infrastructure providers under OnApp Federation.
○ Hotels under trivago
Online Service Providers

Trade Logistics
Ecommerce Platform Network

Seller 1 Seller 3
Ban
k
Seller 2
Existing Consortia -- Centralized
Consumers

Ecommerce Platform

Seller 1 Seller 3
Seller 2
Consumers
Limitations
● Usually governed by a single authority (service
broker / marketplace )
○ Unfair business advantage to the broker
● Only service broker or marketplace provider
is responsible for communicating with end-users.
SP 1 SP 3
● Profit sharing with central broker
SP 2
● Bias of broker towards a particular provider
● Risk of manipulation & unfair dispute resolution
Objective
• Design a transparent decentralized architecture for
service providing consortium, while eliminating any
centralized broker/marketplace.
Objective
• Design a transparent decentralized architecture for
service providing consortium, while eliminating any
centralized broker/marketplace.

Blockchain Interoperability for Service Decentralization​,


IEEE INFOCOM 2021

Bishakh Chandra Ghosh (IITKGP), Tanay Bhartia (IITKGP),


Sourav Kanti Addya (NITK), Sandip Chakraborty (IITKGP)
Centralized to Decentralized
Consumer Consumer
s s

SP
SP
broker / marketplace

SP SP SP
SP
SP
Requirements
• While eliminating the central broker/marketplace, all its
functionalities must be preserved in the decentralized
consortium architecture:
● Unified Interface
○ The consortium should have a unified interface to its consumers.
○ The interface should be without any centralized broker or agent.
○ Consumers should be able to view catalog, query prices, request
for resources, get resource access information and credentials,
make payment, etc., through the interface.
Challenges

A. Byzantine behavior B. Byzantine faulty C. Verifiability and confidentiality of


of consortium SPs. consumers with ability to create information from the consortium
multiple identities.​
• There is no single trusted spokesperson of
• The participating SPs might • End-users / consumers can exhibit the consortium.​
be byzantine faulty [8].​ byzantine fault.​ • The results of the consortium is based on
• SPs can maliciously try to • Each user requests must be agreed agreement of the SPs.​
affect the pricing, scheduling, upon by the consortium participants to • This agreement must be manifested outside
and policies of the process it correctly.​ the federation, and should be verifiable by
consortium.​ • Consumers can create as the end-users.​
• SPs can be biased many identities (accounts) as they • Sensitive consortium response must remain
towards certain users and want introducing the risk of confidential between the consumers and the
also might try to block certain Sybil attacks[8].​ SPs.​
user requests by affecting the
consortium agreement.​
Threat Models
● Byzantine faults: We consider that at most 1/3 of the SPs may be
Byzantine Faulty. Non-faulty consumers control majority of computing power.
● Sybil attacks: End-user consumers can create multiple accounts/identities
for accessing the consortium services.
● Impersonation attacks: Decentralized consortium does not have a
single spokesperson. A malicious SP might try to deceive a
consumer by posing as the consortium’s spokesperson.
● Leakage of sensitive information: Sensitive information of the
consortium as well as users might be exposed while passed
over the decentralized network.
Architectural Requirements
1 Decentralized Consortium Collaboration
1. Agreement on pricing, catalog, policies.
2. Scheduling of requests
3. Confidentiality of SP information must be preserved.

Consumer Consumers
s SP SP
Service SP SP Service
Request Response
SP SP

SP Process
SP Request SP SP
2
Decentralized Consortium Interface
1. Agreement on each user request and the ordering of user requests.
2. Service response must be verifiable by end-users. Confidentiality of
response must be preserved.
Decentralized Consortium Interface

SP
SP

Consumers
SP
Private SP
Blockchain
Decentralized Consortium Interface
● How user requests reach the Consortium?
● No single spokesperson for the consortium.
- No single web portal or address available for communication.
● Simple solutions like a broadcast from the consumers to the closed
network will not work.
○ Messages might be lost
○ Messages might arrive out of order.
● Consumers might be byzantine faulty and try
to partition the consortium.
Decentralized Consortium Interface
Required Guarantees:
1. Consortium Interface Safety - Non faulty SPs receive
the same set of consumer requests and in the same
order.

1. Consortium Interface Liveness - All non


faulty consumer requests are eventually received by
the consortium.
Designing the Interface
● Use public blockchain for the interface.
● Any user can join the network and avail services by
issuing transactions.
● Smart contract (having a fixed logical address), act as
the single point of contact.
● Mining process mines blocks with the transactions.
● The network has consensus on each block =>
Consensus on each user request.
● Each block has a fixed ordering of transactions =>
Consensus on order of user requests.
Designing the Interface

Service Service request - Tx Propagation: Block Confirmation:


smart contract
Block Mining:
Request Tx is flooded among Block is mined based Mined block is flooded in
Contract execution
Consumer transaction
the participants on PoW / PoS / other. the network.
s
Transferring Consensus to the Consortium

Servic ?
e SP
reques SP
Consumer t
s
Public SP Private SP
Blockchain Blockchain
Transferring Consensus to the Consortium
Consortium SPs cannot simply pick requests from the
permissionless blockchain and start processing:
1. Some consortium members might not get the mined
block in time and thus cannot participate in its
scheduling.
2. Malicious consortium members may introduce and
schedule invalid consumer requests that are
not mined at all.
3. Consensus protocol like PoW, often goes
through temporary forks. (Network is partitioned into
two or more parts with different accepted blocks.)
Transferring Verifiable Response

Servic
e SP
reques
SP
Consumer
s
t
Service
response
?
SP SP
Public
Blockchain
Private
Blockchain
Transferring Verifiable Response
A single SP cannot simply post a response of the
Consortium back to the users.
1. Consortium response is always based on a consensus
on the same.
2. The consortium consensus has no manifestation
outside the private blockchain.
3. The consortium consensus on response must be
verifiable by the end-users.
4. Confidentiality of the response has to be preserved
while transferring across the public blockchain network.
Transferring Verifiable Response
A single SP cannot simply post a response of the
Consortium back to the users.
1. Consortium response is always based on a consensus
on the same.
How do consensus
2. The consortium we solve this
has problem?
no manifestation
outside the private blockchain.
3. The consortium consensus on response must be
verifiable by the end-users.
4. Confidentiality of the response has to be preserved
while transferring across the public blockchain network.
Blockchain and its applications
Prof. Sandip Chakraborty

Department of Computer Science & Engineering


Indian Institute of Technology Kharagpur

Lecture 60: Blockchain for Decentralized Marketplace


(Part 2)
• Blockchain application for a decentralized marketplace
• Design a blockchain use-case

• Analyzing the requirements

• Consensus on Consensus
Transferring Consensus to the Consortium

Servic ?
e SP
reques SP
Consumer t
s
Public SP Private SP
Blockchain Blockchain
Transferring Verifiable Response

Servic
e SP
reques
SP
Consumer
s
t
Service
response
?
SP SP
Public
Blockchain
Private
Blockchain
Consensus on Consensus
Consensus propagation from public blockchain to private
consortium blockchain

● Each SP also participates in the public blockchain to receive service


requests from consumers.
● When a transaction is committed in the public ledger, it is verified by the
SPs through Simplified Payment Verification (SPV)[8]
● For each service request, the SPs collect
endorsements through Propagation Contract
● Each endorsement goes through BFT consensus.
● When a service request receives k ≥ ⅔ of the SPs’
endorsements, it is marked as confirmed.
Consensus on Consensus
Block Number
B10
Service Transaction Public
request Tx Propagation Blockchain Offset O1
(T1) Consensus T1
Consume Miner Service request Tx
r
Public Ledger SPV (B10,
B0 B1 B9 B10 O1)

T1
SP 1 SP2 SPk
Initialize Propagation
BFT Consensus Contract & Send
endorsement - E(T1)
E(T1)
BFT Consensus
Private Ledger BFT Consensus
E(T1)

PB0 PB1 PB14 PB15 PB16


E(T1) E(T1) E(T1)
EC = 1 EC = 2 EC = k
B10, O1 B10, O1 B10, O1 T1 ready for
scheduling
Verifiable Response Transfer
• Two kinds of information need to be transferred from the consortium to the
consumers:
a. Consortium information such as catalog, pricing, etc.. - not sensitive
b. Request responses - results of scheduling and processing consumer requests
such as a digital document, e.g., access credentials, tickets, invoices, etc. -
sensitive
● Both kinds of data are generated collectively by SPs through
private blockchain’s consensus process.
● Consumers being outside the permissioned network cannot
verify the correctness of the data.
● Separate protocol required for validation of consortium
response by consumers.
Verifiable Response Transfer
● We use the concept of Collective Signing (CoSi) [21]
○ A set of consortium SPs collectively sign a valid data to make it verifiable.
○ We utilize Boneh-Lynn-Shacham (BLS) cryptosystem for aggregating
signatures from individual SPs.
○ A BLS signature for message is computed as:
is a cryptographic hash function.
Is secret key of SP
Aggregated multi signature for n SPs:

[21] Syta, Ewa, Iulia Tamas, Dylan Visher, David Isaac Wolinsky, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi,
and Bryan Ford. "Keeping authorities" honest or bust" with decentralized witness cosigning." In 2016 IEEE Symposium on
Security and Privacy
Verifiable Response Transfer
● Consortium response is accepted as valid only if it has ≥ ⅔ of the SPs’
signatures.
● For preserving confidentiality, a response to a consumer is encrypted
using its public key.
● Signature Collection:
● Multisignature collection is carried out off-chain to improve latency.
● A communication tree is formed along which the singing request
and the signatures are exchanged.
● Each node of the tree aggregates signatures collected from its
descendants.
● Fallback to smart contract based signature collection in case of
denial of service attack by some SP.
Verifiable Response Transfer
Private Ledger
PB0 PB1 PB14 PB15 PB16 PB17 PB18
E(T1) E(T1) E(T1)
Response S(M)
EC = 1 EC = 2 EC = k R1 SC = 1
B10, O1

M = Encrypt(R1)
B10, O1 B10, O1

Initialize Signature
Scheduling Collection Fallback
BFT Consensus
Contract Contract

BFT Consensus
Aggregated
Public signatures SM
Public Ledger Blockchain
SP1
M
Tx
B0 B1 B9 B10 M
Miner SP2 SP3
M
M M
SM M
SP4 SP5 SP6 SP7

If some SPs deny /


Validate Aggregated fail
Signature & Decrypt
* If SP1 fails other SPs initialize the contract after a timeout
Consume
r
Use Case Implementation: Cloud Federation
● Consortium of cloud service providers (CSPs).
● Provide cloud infrastructure resources to end-users (IaaS).
● Implemented a fair scheduling algorithm for allocation of consumer
requests among SPs:
○ Each SP will be allocated the number of consumer requests
proportional to its infrastructure contribution in the federation.
● Test bed implementation using Ethereum and Hyperledger
Fabric, and Hyperledger Burrow.
● Mininet emulation for evaluating scalability.
Use Case Implementation: Cloud Federation

VM
Request

Consume
r VM access
credentials

Cloud federation
consortium
Testbed Setup
Results
Results
Results
Conclusion
● There are interesting research/design problems in the blockchain
space
● You need to think of applying the right technology at the right
place!

● Remember the fundamental questions that we talked about earlier


● Network, participants, assets, transactions
● Keys – how to obtain and share
● Trusted third party – do we have any?
● Why people will join your blockchain network

You might also like