Blockchain Architecture Design
Blockchain Architecture Design
Introduction to
Blockchain
CONTENTS
Part-1 : Introduction to Blockchain 1-2P to 1-12P
1-1P (IT-6/CS-7)
1-2 P (IT-6/CS-7) Introduction to Blockchain
PART- 1
Introduction to Blockchain.
Questions-Answers
7.
Unanimous: All network participants agree to the validity of each of
the records.
Answer
Motivation behind Blockchain :
1 Blockchain attempts to address the uncertainty existing in the financial
transactions.
2. For example, the buyer expects fair goods for his money. The seller
expects to receive the payment once he delivers the goods.
3 However, there would be a lack of trust between the parties intending
to enter into the agreement.
4. Hence, a need fora third party arises that provides the trust platform
for both the parties.
5. This mediating party assures the seller and buyer legitimate trade.
6. Trusting a third party however requires a lot of research and knowledge.
7. Blockchain aimed to overcome this uncertainty by implementing the
applications in a secure and decentralized way.
8. Blockchain is gaining more and more acceptance and adoption, in the
trustless society, precisely due to this reason.
9 Decentralization is an essential motivating factor contributing to the
development and success of blockchain.
10. The decentralization is achieved by distributing the computation tasks
toall the nodes.
Need for Blockchain:Need for blockchain is due to the following reasons :
1. Faster settlements:Traditional bankingsystems have time-consuming
process for the settlement of transactions. But, blockchain reduced the
time significantly.
2. Security :Cryptography functions and consensus protocols enable
secured transactions in blockchain.
3. Immutable : Since blocks are immutable, tampering of the block is
very difficult.
4 Transparent :Since blockchain is adecentralized system, third-party
intervention is not needed at all. All stockholders of the network can
participate in the network. This ensures transparency.
Que 1.3. What are different types of blockchain ?
Introduction to Blockchain
1-4P (IT-6/CS-7)
Answer
three types :
Blockchain technologies can be divided into following
A. Public blockehain :
system and known
1. Public blockchains are regarded as open sourcejoin in the network.
participant can
as permissionless ledger and any
network.
2 Nopermission is needed to join the
the network
3. Participants have full rights for reading and writing into
and have same copy of the ledger.
networks due to the
4. Public blockchain work seamlessly in trustless
immutable nature of the records.
Ethereum.
5 Examples of public blockchain are Bitcoin and
Node
Node Node
Node
B. Private blockchain :
1. They are permissioned ledger and restricts access to only selected
participants of the network.
Each contributor in the network will have the whole record of the
2.
transactions and the associated blocks.
3. All blocks are encrypted by a private key and cannot be interpreted
by anyone.
4. They are controlled only by authorized users.
5. Users can be validated with the support of identity nmanagement
system.
6. Private blockchain involves trusted network and is suitable for
sharing the ledger internally.
7. Examples of private blockchain are Hyperledger, Corda, and
Quorum.
Blockchain Architecture Design 1-5 P (IT-6/CS-7)
Node
Bridge
Node Node
Bridge
Bridge
Bridge
Node
C. Consortium blockchain :
1 Consortium blockchains are permissioned blockchains governed
by a group of organizations rather than one entity.
2 Consortium blockchains are more decentralized than private
blockchains, resulting in higher levels of security.
3. Setting up consortiums is a difficult process as it requires cooperation
between a number of organizations, which presents logistical
challenges as well as potential antitrust risk.
4 Also, some participating organizations may not have the needed
technology or the infrastructure to implement blockchain tools.
5. Hyperledger, Corda, and R3CEV are some consortium blockchains.
1-6P (IT-6/CS-7) Introduction to Blockchain
Node
Bridge
Node Node
Bridge
Bridge
Node
Answer
A Advantages and disadvantages of public
blockchain:
Advantages :
1. Public blockchains are completely independent of
the organization that started it ceases organizations, so if
to exist the public blockchain will
still be able to run.
2 Publicblockchains have high level of network's
3. Public blockchains are transparency.
mostly scure, as long as the users follow security
protocols and methods fastidiously.
Disadvantages :
1. The network can be slow,
and companies can't restrict access or use.
Blockchain Architecture Design 1-7P (IT-6/CS-7)
2. Ifhackers gain 51% or more of the computing power of a public
network, they can unilaterally alter it. blockchain
3 Public blockchains don't
scale well. The network slows down as more
nodes join the network.
B. Advantages and disadvantages of private
blockchain :
Advantages :
1. In private blockchain the controlling
organization sets permission levels,
security, authorizations and accessibility.
2. Private blockchains are fast and
can process transactions more quickly
than public blockchains.
3. Private blockchains can support and process a lot of higher transactions.
Disadvantages :
1 Private blockchains aren't true blockchains, since the core philosophy of
blockchain is decentralization.
2. It's difficult to fully trust the information, since cent:ralized nodes
determine what is valid.
3. The source code from private blockchains is often proprietary and closed.
Users can't independently audit it, which can lead to less security.
C. Advantages and disadvantages of consortium blockchain :
Advantages :
1. Aconsortium blockchain tends to be more secure, scalable and efficient
than a public blockchain network.
2. Like private blockchain, it also offers accesS controls.
Disadvantages :
1. Consortium blockchain is less transparent than public blockchain.
2 It can be compromised if a member node is breached.
3 Consortium blockchain's own regulations can impair the network's
functionality.
Que l.5.Explain the major elements of the blockchain ecosystem
in detail. AKTU2020-21, 2021-22; Marks 07
Answer
Following are four main elements/components in a complete blockchain
ecosystem:
A Network of nodes:
1. All nodes are connected together to form a network that validates
and maintains all the transactions.
2 Consensus protocol isused to validate each transaction.
1-8 P (IT-6/CS-7) Introduction to Blockchain
Answer
The following steps are involved in the working of blockchain :
1 Users initiate a transaction in the network. The transaction could be
contracts, cryptocurrency or records of other information.
2. The request for the transaction has to be represented as block in the
network.
Blockchain Architecture Design 1-9 P (IT-6/CS-7)
3. The block is created first and then disseminated to the participants of
the network.
4 All participants analyze the received block from the network and validate
that block.
5 The block validation is done with the support of consensus algorithm.
6 Members of the network validate the block for attaching the block to
the network.
7 The new block is attached to the network and transaction gets completed.
8 Block added with the consent of members of the network becomes
permanent and immutable.
Block created Block is broadcasted
User request for the to all other nodes in
for transaction
transaction network
Block is
Transaction is Nodes certify the
added to the
executed block
chain
Answer
1 A blockchain database utilizes blockchain technology to create an
immutable ledger of transactions.
2. Blockchain technology relies on peer-to-peer decentralized transactions
meaning that it is a distributed ledger.
3 This offers greater security and removes the need for any single
controlling entity that retains administration rights over the database.
4 The data structure involves data being recorded in blocks.
5. As each new block or transaction is recorded, it is added to the previous
one to form a chain of data records or a blockchain.
6. As a result, a blockchain contains every transaction recorded since the
ledger was started.
7. The technology relies on a consensus algorithm that requires a majority
of the nodes on the network to validate any new transactions.
8 This makes any unauthorized modifications or any attempts to tamper
with the data extremely difficult.
9. Ablockchain as a database can contain any information.
10. Blockchains are not really good at storing vast amounts of data due to
network limitations and cost.
1-10P (IT-6/CS-7) Introduction to Blockchain
Answer
entitled toread or
9 Anyone with the right proof Only entities
of work can write on the
write can do so.
blockchain.
10. Blockchain is not recursive. The database is recursive. Here,
Here, we cannot go back to we can go back to repeat a task on
repeat a task on any record. a particular record.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
S. No. Digital money Distributed ledger
1 Digital money refers to any Adistributed ledger is merely a type
means of payment that exists of database spread across multiple
in a purely electronic form. sites, regions, or participants.
2.
Digital moneyis susceptible Distributed ledgers are inherently
to hacks. harder to hacks because all of the
distributed copies need to be
attacked simultaneously for an
attack to be successful.
3 Bitcoin is a form of digital Biteoin uses blockchain which is a
money. type of distributed ledger.
Answer
Function Modifiers in Solidity :
1 Function Modifiers are code that can be run before andor after a function
call.
2 Function Modifiers are used tomodify the behaviour of a function.
3. Function Modifiers can be used to:
i. Restrict access
: Validate inputs
:iüi. Guard against reentrancy hack
Answer
1. Bitcoin is a digital and global money system cryptocurrency.
2 It allows people to send or receive money across the internet.
3. It is the first of its kind technology that allows the transfer of digital
currency across the internet without needing a third party.
4. Money can be exchanged without being linked to a real identity.
5 The mathematical field of eryptography is the basis for Biteoin's security.
6. There are no physical Bitcoins, only balances kept on a publicledger
that everyone has transparent access to.
7. All Bitcoin transactions are verified by a massive amount of computing
power via a process known as "mining."
8. Bitcoin is built on a distributed digital record called a blockchain.
9 Blockchain is a record of all transactions that have taken place in the
Biteoin network.
10. It also keeps track of new Bitcoins as they are generated.
Que 1.18. How are transactions and blocksencrypted in the bitcoin
implementation ?What are the benefits of blockchain technology ?
AKTU 2019-20, Marks 07
Answer
Encryption of transactions and blocks in the bitcoin :
1. Bitcoin blocks are public and they are not encrypted in any way.
2 The block content in Bitcoin is processed using a special hash function
called "SHA256" and the resulting value is stored in blockchain.
1-18P (IT-6/CS-7) Introduction to Blockchain
3. Block hash not only prevents modifications, it als0 guarantees the data
integrity in the block content.
Benefits of blockchaintechnology :Refer Q. 1.10., Page 1-11P,Unit-1.
Que 1.19. How will youhandle the risk management when it comes
to securing the transactions records ? AKTU 2020-21, Marks 07
Answer
1. Risk management is basically a process of finding the threats and all the
vulnerabilities to the financial records of an organization.
2 The best thing that can be done with this approach is to take the right
countermeasures against them immediately.
3 Another approach is to pay attention to a backup plan.
4. Based on the value of information, more approaches such as buying
new risk management software can simply be considered.
5 The prime risk to information is from black-hat hackers.
Que 1.20. What is the difference between off-chain transactions
and on-chain transactions ? AKTU 2020-21,Marks 07
Answer
Answer
1. Ethereum is adecentralized, open-source blockchain with smart contract
functionality.
2 Ethereum is ablockchain-based platform that is best known for its
cryptocurrency, Ether, or ETH, or simply Ethereum.
3. The blockchain technology that powers Ethereum enables secure digital
ledgers to be publicly created and maintained.
4 As a cryptocurrency, Ethereum is second in market value only to Bitcoin.
5. Bitcoin and Ethereum have many similarities but different long-term
visions and limitations.
6. Ethereum is transitioning to an operational protocol that offers incentives
to process transactions to those who own the largest amounts of ETH.
7 Open-source development is currently underway for a major upgrade
to Ethereum known as Ethereum 2.0or Eth2.
8 The main purpose of the upgrade is to increase transaction throughput
for the network from the current of about 15 transactions per second to
up to tens of thousands of transactions per second.
Double Spending :
1. Double-spending is a potential flaw in a digital currency scheme in
which the same single digital token can be spent more than once.
2. Unlike physical cash, a digital token consists ofa digital file that can be
duplicated or falsified.
3. The primary reason for double-spending is that digitalcurrency can be
very easily reproduced.
4. Double-spending leads to inflation by creating a new amount of copied
eurrency that did not previously exist.
5. There are primarily two ways to combat double-spending - central
clearing counterparty and blockchain.
6. Fundamental cryptographic techniques to prevent double-spending are
blind signatures and secret splitting.
Blockchain Architecture Design 1-21 P (IT-6/CS-7)
dapps in blockchain :
" 1 Adecentralized application (dapp) is an application built on a decentralized
network that conmbines a smart contract and a frontend user interface.
2 A
dapp has its backend code running on a decentralized peer-to-peer
network.
3. A dapp can have frontend code and user interfaces written in any
language to make calls to its backend.
4. Its frontend can get hosted on decentralized storage such as
InterPlanetary File System (IPFS).
Difference between dapp and a normal application:
S. No. dapp Normal app
1 dapps run on a decentralized Normal apps are not designed to
network or system. work in a decentralized ecosystem.
2 Most dapps charge users a fee Many normal apps are free.
to participate.
3 dapps store user data on the Normal apps store user data on a
application itself. separate server.
4. dapps tends to have a slower Normal apps have faster
verification process. verification process.
5 dapps does not require any An app requires an intermediary to
intermediary and it connectsconnect the users with application.
with users automatically.
6 dapp changes codes and An app is always under the control
functions automatically and of developers. They only can make
it resists the involvement of changes in codes and
developers. functionalities.
Answer
Blockchain : Refer Q. 1.1, Page 1-2P, Unit-1.
Difference between Bitcoin and Ethereum blockchain:
S. No. Bitcoin blockchain Ethereum blockchain
Que 1.26. What are tokens ? Give the types of token used in
blockchain ?
Answer
1. A token is a unit of value that is issued and defined by a specific
organization that is both accepted by a certain group of buyers and
sellers.
2 Within the crypto framework, a token needs to be supported by an
underlying blockchain network.
3 In this context, we can define a token as a cryptocurrency built onto an
existing blockchain.
4 The token is supported and given value based on the support and market
value of the specific blockchain frameworks capabilities.
Types of tokens : There are essentially two types of tokens :
A. Utility Tokens:
1. Utility tokens are essentially cryptocurrencies that are used for a
specific purpose, like buying a particular good or service.
2. For example, if you have to store large amounts of data you would
have to rely on companies like Google, Amazon, or Dropbox.
3. These large companies have a monopoly on data server storage so
they are able to dictate the price.
4. This is where the decentralized blockchain comes in with its utility
token.
5. Coins like Filecoin promise to store data in similar cloud storage
without using massive servers.
6. Users will be able to simply store data on the hard drives of other
people in the network.
1-24 P (IT-6/CS-7) Introduction to Blockchain
Answer
Different types of blockchains : Refer Q. 1.3, Page 1-3P, Unit-1.
Blockchain needs a token to operate : Following are the reasons why
blockchains need tokens to operate:
Tokens are needed to power blockchain.
i. Tokens are a currency.
ii. Tokens can represent asset ownership.
iv. Tokens can represent stake or equity ownership.
V. Tokens incentivize miners or nodes owners.
vi. Tokens can be tracking devices.
vi. Tokens allow for crowdfunding.
vii. Tokenization of non-physical assets and documents.
Blockchain Architecture Design 1-25 P (IT-6/CS-7)
PART-3
Design Primitives :Protocols, Security, Consensus,
Permissions, Privacy.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
1. Hyperledger :
i. Hyperledger is an open-source project that helps to deploy blockchain
technologies quickly and effectively.
The protocol is commonly used in blockchain software solutions
because it comes with its libraries that help to speed up development.
ii. The Linux Foundation is a strong supporter of Hyperledger.
2 Multichain :
i Multichain helps create private blockchains to facilitate more
efficient transactions and to develop new applications for the proof
of-work systems.
Multichain offer an API that can be used by blockchain development
services to streamline integration and accelerate deployment.
3. Enterprise Ethereum:
1. The goal of Ethereum Enterprise is to increase the business use
cases of blockchain software development.
The major advantage of Ethereum Enterprise is that it allows
businesses tocreate proprietary variants of Ethereum while still
taking full advantage of the latest Ethereum code.
4 Corda :
Answer
Consensus Protocols :
1 A blockchain is spread across nodes whose job is to verify transactions
on the network.
2 Anyone can submit information to be stored onto a blockchain.
3. Therefore it is important that there are processes in place that can
ensure everyone agrees on what information to add and what to discard.
4 These rules are essentially known as consensus protocols. They verify
transactions and help keep the network safe.
5 Consensus protocols form the backbone of blockchain by helping all the
nodes in the network verify the transactions.
6 Aconsensus protocol is traditionally set before the blockchain is first
created.
7 Consensus protocols prevent asingle entity taking control.
8.
Consensus protocols allow users on a decentralized network to trust
other users without a controlling third-party.
Working of Consensus Protocols :
1 The consensus protocol gives a specific method for verifying whether a
transaction is true or not.
2 It provides a method ofreview and confirmation of what data should be
added to a blockchain's record.
3. Blockchain networks don't have a centralized authority, so all nodes on
a blockchain must agree on the state of the network, following the
predefined protocol.
4. For Bitcoin,the consensus protocol is Proof-of-Work (PoW), the block
mining process which confirms each transaction.
Que 1.32. Explain permissions in blockchain.
Answer
1. In certain blockchain the access to the network is permissioned. This
means that permission and role for each node have to be granted.
2. These blockchains can be thought of as closed ecosystems that can only
be accessed by those who are allowed access.
3. Each contributor in the network will have the whole record of the
transactions and the associated blocks.
4. All blocks are encrypted by a private key and cannot be interpreted by
anyone.
5 They are controlled only by authorized users of a specific organization.
Blockchain Architecture Design 1-29 P (IT-6/CS-7)
6 This is useful for companies, banks, and institutions that are comfortable
to comply with the regulations and are very concerned about having
complete control of their data.
7 Examples of permissioned blockchain are Hyperledger Fabric, Corda,
and Quorum.
Que 1.33. Explain privacy in blockchain.
Answer
1 In a blockchain all transactions are transparent.
2. As the information is available to the public, it could be used to reach the
users involved in the transaction.
3. Each user can be identified through the nodes it connects to.
4 This information could be used to find the beginning of a transaction.
5 This violates the privacy of the user.
6. Methods to tackle this are as follows :
i. Mixing: This refers to performing transactionsthrough multiple
input and output addresses. This would make it difficult to find a
relationship between the two participants.
Anonymous : This refers to the idea of completely anonymous
transactions where the miners do not have any information about
the transaction and the user information is encrypted.
iü. Off chain:Sensitive data are not stored on the blockchain and can
only be accessed by authorized personnel. This also solves the
problem of space as some of the information is stored in adifferent
location.
PART-4
Blockchain Architecture and Design.
Questions-Answers
|AKTU2020-21, Marks 07
1-30 P (IT-6/CS-7) Introduction to Blockchain
OR
Write and explain the blockchain architecture in depth. What are
the primary benefits of immutability in blockchaining ?
AKTU2021-22, Marks 07
Answer
The following diagram displays the layered architecture of blockchain :
Application and Presentation Layer
Smart Contracts, dapps, User Interface
Consensus Layer
PoW, PoS, DPoS, PoET, PBFT
Network Layer
Peer-to-Peer (P2P)
Data Layer
Digital Signature, Hash, Merkle Tree, Transaction
Hardware / Infrastructure Layer
Virtual Machine, Containers, Services, Messaging
PART-5
Questions-Answers
Answer
1. Cryptographic primitives, or crypto primitives, are low-level cryptographic
algorithms that form the basic building blocks of a protocol.
2. Common examples of crypto primitives in the blockchain include hash
functions and digital signature.
3. Hash functions are mainly used in linking of blocksand in consensus
algorithms.
4. Digital signature is used in blockchain network for authentication.
A Hashing/Hash functions :
1 Hash value denotes a numeric value of a fixed length that will be
generated using eryptographic hash algorithm.
2 It identifies the data uniquely and blockchain state is represented
by hash function SHHA256.
3 Hashing generates a fixed length hash value that uniquely
represents the contents of an arbitrary length string.
4. Identical strings generate the same hash value.
1-34 P (IT-6/CS-7) Introduction to Blockchain
Hash : 06ecd9a034556c403064a9114d26e2d227324520e4c2d5b330cf5f881564ac9b
Even a very small change in input string results a new hash value. In
the above-mentioned string, only 'b' is changed in the book string. It
creates a completely new hash value for the new string.
Data : Blockchain concepts book chapter
PART-6
Hash Chain to Blockchain.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Blockchain Architecture Design 1-35 P (IT-6/CS-7)
Answer
1. A hash chain is commonly defined as the repeated application of a
cryptographic hash function to a given data.
2 This type of hash cryptography can be extremely useful in security
setups.
3 By providing a successive chain, hash chains make it harder for a hacker
to hijack data by applying a single input.
4 In hash chain a user supplies an individual input on the first session, and
then adds authenticating data on the next session.
5 Over a set of sessions,those individual hash inputs createa "hash chain"
that authenticates a single user input in a more profound way.
6 Security properties of hash chain come from the fact that the hash
function is a one-way function; therefore retrieving the original data is
not possible.
7. Ahash chain is similar to a blockchain, as they both utilize a cryptographic
hash function for creating a link between two nodes.
8 However, a blockchain is generally intended to support distributed
consensus around a public ledger (data), and incorporates a set of rules
for encapsulation of data and associated data permissions.
PART-7
Basic Consensus Mechanisms.
Questions-Answers
Answer
A consensus mechanism/algorithm is a fault-tolerant mechanism that is
used in blockchain systems to achieve the necessary agreement on a single
data value or asingle state of the network among distributed processes.
Introduction to Blockchain
1-36 P (IT-6/CS-7)
Following are the basic consensus mechanisms used in blockchain systems :
1. Proof of Work (PoW) :
i First algorithm PoW is developed and used in Bitcoin cryptocurrency.
This algorithm is widely used in mining process.
ii. In this algorithm, the nodes/computers in the network agree on
the hash of the miner and block will be added in the network.
iv. First miner will get the reward for solving puzzle.
2. Proof of Stake (PoS):
i. This algorithm validates the block according to the stake of
participants.
i. Validation is determined by the investment of the currency.
ii.Minersare not rewarded with the money.
3. Practical Byzantine Fault Tolerance :
This algorithm is based on reaching agreement even when the
failure of the nodes happened in the network.
ii. This algorithm is focused on the node failure by considering both
faulty and working nodes.
ii. Fault tolerance can be achieved by taking the correct values of
working nodes and assigning the default vote value for the faulty
nodes.
iv. Thus network reaches an agreement on correct values.
4 Proof of Activity (PoA):
It is a combined approach of PoW and PoS.
ii. It provides assurance that all transactions are genuine in nature
and users reach at a consensus on the status of the ledger.
iüi. In first phase, miners are trying to find out the new block using
PoW consensus.
iv. When new block is identified, process changes into PoS.
5. Proof of Burn Time :
The principle behind this consensus algorithm is burning or
destroying coins detained by the miners.
i. It ensures the agreement of all participating nodes by valid state of
network, thus avoiding cryptocoin double spending.
i. Miners are allowed to write block proportion for destroying or
burning the number of tokens.
6. Proof of Capacity :
This algorithm is based on hard disk space instead of computational
power of the node.
i. Hard disk space of the nodes is utilized for mining the cryptocoins.
Blockchain Architecture Design 1-37 P (IT-6/CS-7)
ii. Miners can store the possible solutions in the hard drive before
mining, thus avoiding changes in the header value rapidly.
iv. Miners can match the required hash value from the list for winning
the reward.
7. Proof of Importance :
This algorithm is based on PoS.
It works on the concept of harvesting and vesting.
ii. Harvesting determines the node's eligibility for adding block into
the network and node vests transaction fees in turn within that
block.
Proof-of-Work Proof-of-Stake
1. Mining/ The amount of The amount of stake
validating a computing work or number of coins
block determines the determines
probability the likelihood of
of mining a block. validating a new
block.
2. Distribution of One who mines the block The validator does
reward first, receives a reward. not receive a block
reward as they are
paid a network fee.
3. Competition Miners must compete to An algorithm
solve complex puzzles determines a winner
using their computer based on the size
processing power. of their stake.
4 Specialized Application-specific A standard server
equipment integrated circuits and grade device is
Graphics Processing Unit sufficient for
are used to mine the PoS-based systems.
coins.
1-38 P (IT-6/CS-7) Introduction to Blockchain
5 Efficiency and PoW systems are less PoS systems are far
reliability energy-efficient more cost
and less expensive, and energy-efficient
but they are more although they are
reliable. less reliable.
Que 1.40. Explain the steps that are involved in the blockchain
project implementation. AKTU2020-21, Marks 07
OR
Explain the steps that are in the blockchain project implementation.
Mention the significance of blind signature and how it is useful ?
AKTU 2021-22, Marks 07
Answer
The blockchain development process consists of the following six stages:
1. Identify the goal :
i. First of all, it is essential to develop a problem statement and
understand all of the issues you want to solve with a proposed
solution.
Ensure that the blockchain solution will benefit your business
abilities.
ii. Analyze whether you need to migrate your current solution to the
blockehain,
scratch.
or you require anew application to be developed from
iv. Once you decide that you need a blockchain solution for your
business operations, the next step is toselect the right blockchain
platform and blockchain development tools for your project.
2 Choose the right blockchain platform:
i. Building a blockchain from seratch requires thorough research
and takes months to years to develop it successfully.
Blockchain Architecture Design 1-39 P (IT-6/CS-7)
Consensus
CONTENTS
Part-1 : Consensus : Requirements for 2-2P to 2-3P
the Consensus Proto cols
2-1 P (IT-6/CS-7)
2-2 P (IT-6/CS-7) Consensus
PART- 1
Questions-Answers
Long Answer Type and Medium Answer Type Questions
PART-2
Questions-Answers
Long Answer Type and Medium Answer Type Questions
timestamp NO
version
Answer
1 Aproof of work verification is difficult, costly, and time-consuming to
create, but easy to verify.
2. Bitcoin is secure because it is computationally infeasible to attack the
network.
3. Requiring Proof of Work for participation is central to this property.
4. Hence Bitcoin relies on computational work on cryptographic challenges
as the basis for trust.
5. Proof of Work (PoW) is necessary for security, which prevents fraud,
which enables trust.
6. This security ensures that independent data processors (miners) can't
lie about a transaction.
7 Proof of Work is used to securely sequence Bitcoin's transaction history
while increasing the difficulty of altering data over time.
8 It is used to choose the most valid copy of the blockchain in the network
ifthere are multiple copies.
9. Finally, proof of work is the key to creating a distributed clock, which
allows miners to freely enter and leave the network while maintaining
a constant rate of operation.
Blockchain Architecture Design 2-5 P (IT-6/CS-7)
Answer
1. The Proof of Work (PoW) algorithm used by Bitcoin is a variant of
Hashcash algorithm.
2. Hashcash was originally proposed as a way to slow malicious actors by
making them play an expensive game of chance.
3. In the Bitcoin implementation, blocks are added to each miner's
blockchain when one miner solves the game of chance.
4 In order for miners on a network to add blocks to the blockchain, they
are required toguess a number which is less than or equal to a Difficulty
Target.
5. This value is anywhere between 1 and 2256, which is increased or
decreased tochange the difficulty required to guess the number.
6 To generate this number, the mining software takes the header of the
block they are trying to add and uses SHA-256 encryption to hash it.
7 The header contains key data required by the
block to make it secure,
including a nonce (number used once) value in the header.
8. This number is altered by miners each time they try to
guess the number.
9. If the number generated by the hash exceeds the Difficulty Target, the
process is retried until a number less than the value is found.
10. The higher the target value is, the higher the probability ofguessing the
nu iber and vice-versa.
11. The miners are rewarded in bitcoins and transaction fees if they are the
first to find a number less than or equal to the Difficulty Target.
12. Every 4 years the block reward halves, slowing inflation nd making
each coin more scarce, which should increase the value ofiBitcoin.
13. This is designed to keep miners invested even while as
they earn less
Bitcoin units.
14. Another key aspect of the design is that the Difficulty Target
aims to
ensure blocks are added to the blockchain every 10 minutes or
so-regardless of the computing power on the network.
PART-3
Scalability Aspects of Blockchain Consensus Protocols.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
2-6 P (IT-6/CS-7) Consensus
Answer
1 Scalability is a key barrier when applying blockchain to real business
environments.
2 The primary focus is toimprove the scalability of blockchain systems,
which is due tothe inefficiencies of the consensus mechanism- Proof of
Work (PoW).
3 The scalability issue is analysed from the perspectives of throughput,
storage and networking.
4 Currently, the throughput of the Bitcoin blockchain is restricted to
approximately 7transactions per second (TPS).
5. It is not possible to directly apply blockchain to real business environments
where nodes have limited storage and computing resources.
6. The traditional blockchain network is a broadcast medium, in which
each node relays all transactions. This data transmission mode cannot
be scaled up to handle a large number of transactions due to the
requirement for network bandwidth resources.
Approaches for improving the scalability of blockchain consensus
protocols : Following approaches exist for improving the scalability of
blockchain consensus protocols:
1. Increasing the Block Size :
i. Increasing the block size is an obvious solution to increase
throughput by including more transactions in each block.
ü. However, this solution increases the block propagation delay and
spends more nodes efforts to process and confirm transactions.
2. Reducing the Transaction Size :
i By increasing the number of transactions in each block we can
reduce the transaction size.
ii. In blockchain systems digital signatures account for 60-70 percent
of the transaction size.
ii. Segregated Witness (SegWit), separates digital signatures from
the rest of the transaction data and moves the digital signatures to
the end of blocks.
iv. In this way, the transaction size is reduced, and one block can
contain more transactions.
3. Reducing the Number of TransactionsProcessed by Nodes:
i. An alternative to improving the throughput is to reduce the number
of transactions processed by nodes.
2-7P (IT-6/CS-7)
Blockchain Architecture Design
ii Off-chain transactions, sharding, and decoupling management/
control from execution are three solutions.
A. Off-chain transactions :Off-chain transactions make use of the fact
that if nodes make frequent transactions, then it is not necessary to
store every transaction on the blockchain, only the net settlement is
needed.
B. Sharding: Sharding is an effective technique to improve the horizontal
scalability of blockchain systems. With blockchain sharding, nodes are
separated into different shards. Each shard only processes a small portion
of all transactions. In this way, transactions are processed in parallel. In
sharding blockchain systems, the throughput increases linearly as more
nodes join the systems.
C. Decoupling Management/Controlfrom Execution :The decoupling
of management/control from execution can be done via virtualization,
with which multiple virtual DLT systems with varying characteristics
can be dynamically ereated on the same substrate DLT system to
accommodate different QoS requirements.
PART-4
Permissioned Blockchains.
Questions-Answers
Que 2.6. What are the permissioned blockchains ? What are its
key characteristics ?
Answer
1 Permissioned blockchains are blockchain networks that require access
to be part of.
2 These blockchains can be thought of as closed ecosystems that can only
be accessed by those who are allowed access.
3 Permissioned blockchains use an access control layer to govern who has
access to the network.
4. A permissioned blockchain provides a way to secure the interactions
among a group of entities that have a common goal but which may not
fully trust each other.
5 Each contributor in the network will have the whole record of the
transactions and the associated blocks.
2-8P (IT-6/CS-7) Consensus
PART-5
Design Goals.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
PART-6
Consensus Protocols for Permissioned Blockchains.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
5. After receiving verification, the first node will broadcast that decision
with all the other participants in the network.
6. A consensus decision is achieved based on the total confirmations
submitted by all the nodes.
7 PBFT can be very beneficial for low latency storage systems.
8. This type of model is often used in digital assets backed platforms
that don't need big amount of capacity, but carry out a large number
of transactions.
9 PBFT makes sure that the transaction records within the network
are accurate.
6. The propose, prevote, and precommit steps each take one third of
the total time allocated for that round.
7. Each round is longer than the previous round followed by a small
fixed increase of time.
8 This allows the network to eventually achieve consensus in a limited
concurrent network.
9 In this mnodel, several nodes play a major role in validating and
signing transactions, which makes this process more secure.
10. There are also lower chances of double spend attacks due to the
voting power distribution among trusted nodes.
11. Round robin consensus mechanism is ideal for the trade, finance
and supply chain industries.
12. Common examples of blockchains that use this model are Multichain
and Tendermint.
CONTENTS
Part-1: Hyperledger Fabric .3-2P to 3-8P
Part-2 Decomposing the 3-8P to 3-9P
Consensus Process
3-1 P (IT-6/CS-7)
3-2 P (IT-6/CS-7) Hyperledger Fabric
PART-1
Hyperledger Fabric
Questions-Answers
Answer
Following are the key design features of Hyperledger Fabric model :
1. Assets : Asset definitions enable the exchange of almost anything with
monetary value over the network,from whole foods to antique cars to
currency futures.
Blockchain Architecture Design 3-3 P (IT-6/CS-7)
2 Chaincode : Chaincode execution is partitioned from transaction
ordering, limiting the required levels of trust and verification across
node types, and optimizing network scalability and performance.
3. Ledger Features: The immutable, shared ledger encodes the entire
transaction history for each channel, and includes SQL-like query
capability for efficient auditing and dispute resolution.
4. Privacy: Channels and private data collections enable private and
confidential multi-lateral transactions that are usually required by
competing businesses and regulated industries that exchange assets on
a common network.
5. Security and Membership Services : Permissioned member ship
provides a trusted blockchain network, where participants know that
alltransactionscan be detected and traced by authorized regulators and
auditors.
6. Consensus : Aunique approach to consensus enables the flexibility
and scalability needed for the enterprise.
Que 3.3. What are the advantages of Hyperledger Fabric ?
Answer
Following are the advantages of Hyperledger Fabric :
1. Rich queries: One can run these queries to find the transactions that
have been executed on the blockchain platform.
2. Modular architecture : Modular means that various modules can be
used either together or on-need basis.Thus, it is different from Ethereum
where you have to utilize the entire blockchain. In Hyperledger, you
can use a module that you require.
3. Protection of digital keys and sensitive data : Hyperledger works
on the same distributed ledger concept and keeps your digital keys and
data secure from tampering.
4 Permissioned data : A party can view/use the data only if it is
permissioned to do so. Unlike Ethereum and Bitcoin blockchain, everyone
cannot see all the data. This is essential for enterprise applications.
5. Performance and scalability: Hyperledger is better than many other
public blockchain networks when it comes to performance and scalability,
as its target audience is enterprises who have stringent performance
requirements. Moreover, it is undergoing further improvements in order
to make it more efficient and scalable.
Answer
permissioned
Hyperledger Fabric is a distributed operating system for
1. in general
executes distributed applications written
blockchains that
purpose programming languages.
execute-order-validate blockchain
2. Hyperledger Fabric introduces the order execute design.
architecture and does not follow the standard
Validate
Update state
Execute Order
1
1
ordering
service
Answer
1. A blockchain network includes different actors like peers, orderers,
client applications, administrators and more.
2 Each of these actors has a digital identity encapsulated in an X.509
digital certificate.
3 These identities determine the exact permissions over resources and
access to information that actors have in a blockchain network.
4. Adigital identity has some additional attributes that Hyperledger Fabric
uses to determine permissions.
5. For an identity to be verifiable, it must come from a trusted authority.
Blockchain Architecture Design 3-7P (IT-6/CS-7)
Answer
1 Since Hyperledger Fabric is a permissioned network, blockchain
participants need a way to prove their identity to the rest of the network
in order to transact on the network.
2. Public Key Infrastructure (PKI) can provide verifiable identities through
a chain of trust.
3. However, a private key can never be shared publicly.
4 To overcome this,a mechanism is required to enable that proof which is
where the MSP comes in.
5. MSPs are used to define the organizations that are trusted by the network
members.
6. MSPs are also the mechanism that provides members witha set of roles
and permissions within the network.
7. The MSP is the mechanism that enables you to participate on a
permissioned blockchain network.
8. The MSP identifies which Root CAs and Intermediate CAs are accepted
to define the members of a trust domain.
9. MSP turns an identity into a role by identifying specific privileges an
actor has on a node or channel.
10. A Hyperledger Fabric blockchain network can be governed by one or
more MSPs.
Answer
Policy : Apolicy is a set of rules that define the structure for how decisions
are made and specific outcomes are reached.
Need of policies in Hyperledger Fabrie:
1 Policies are one of the things that make Hyperledger Fabric different
from other blockchains like Ethereum or Bitcoin.
3-8 P (IT-6/CS-7) Hyperledger Fabric
2. The policies that govern the network are fixed at any point in time and
can only be changed using the same process that governs the code.
3. Policies allow members to decide which organizations can access or
update a Hyperledger Fabric network.
4. Policies contain the lists of organizations that have access to a given
resource.
PART-2
Questions-Answers
Answer
1. In distributed ledger technology, consensus has become synonymous
with a specific algorithm, within a single function.
2. However, consensus encompasses more than simply agreeing upon the
order of transactions.
3. This differentiation is highlighted in Hyperledger Fabric.
4. In Hyperledger Fabricconsensus is defined as the full-circle verification
of the correctness of a set of transactions comprising a block.
5. In Hyperledger Fabric consensus is achieved when the order and results
ofa block's transactions have met the explicit policy eriteria checks.
6. These checks take place during the lifecycle of a transaction.
7 These checks include the usage of endorsement policies and system
chaincodes to ensure that these policies are enforced.
8 These system chaincodes also helps to make sure that enough
endorsements are present and they are derived from appropriate entities.
9 Also a versioning check takes place during which the current state of
the ledger is agreed upon.
Blockchain Architecture Design 3-9P (IT-6/CS-7)
10. This versioning check takes place before any blocks
transactions are appended to the ledger. containing
11. This final check provides protection against
and other threats.
double spend operations
12. In addition to these, there are ongoing identity
in alldirections of the transaction flow. verifications happening
13. Access control lists are implemented on hierarchical layers of the
network.
14. Payloads are repeatedly signed, verified and authenticated as a
transaction proposal passes through the different architectural
components.
15. Consensus in Hyperledger Fabric is a byproduct of the
ongoing
verifications that take place during a transaction's journey from proposal
to commitment.
PART-3
Hyperledger Fabric Components.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
PART-4
Chaincode Design and Implementation.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1. Chaincode is the term for programs that run on top of the blockchain to
implement the business logic ofhow applications interact with the ledger.
2. Chaincode is a program, written in Go, node.js, or Java.
3. The execution of chaincode is isolated from the endorsing peer process.
4. Chaincode initializes and manages ledger state through transactions
submitted by applications.
5. A chaincode typically handles business logic agreed to by members of
the network, so it may be
considered as a "smart contract".
6. Each chaincode is implemented as an isolated program that maintains
its own private state on the ledger.
7 State created by a chaincode can't be accessed directly by another
chaincode.
ii. Itrecords all reads and writes of data on the ledger into a WriteSet
and ReadSet:
a. WriteSet:
1. The transaction's WriteSet contains a list of key and value
pairs that were modified during the execution by the
chaincode.
ii. When the value of a key is modified the WriteSet will
contain the updated key and value pair.
ii. When a key is deleted, the WriteSet will contain the key
with an attribute marking the key as deleted.
b. ReadSet:
i. The transaction's ReadSet contains a list of keys and their
versions that were accessed during execution by the
chaincode.
The version number of a key is derived from a combination
of the block number and the transaction number within
the block.
im. This design enables the efficient searching and processing
of data.
iv. Whenever a chaincode reads the value ofa key,the latest
committed value in the ledger is returned.
6. Multiversion concurrency control :
i. Fabric uses a multiversion concurrency control (MVCC) mechanism
toensure consistency in the ledger and to prevent double spending.
To ensure consistency, Fabric uses a versioning system of keys
stored on the ledger.
i . The aim of the versioning system is to ensure that transactions are
ordered and committed into the ledger in a sequence that does not
introduce inconsistencies.
Answer
1. After establishing the basic building blocks of chaincode and the methods
which initiates the chaincode, we need to implement the functions of
the chaincode.
2. These functions help in recording and retrieving data to and from the
ledger to provide the business logic of the smart contract.
3. Following steps are involved in the implementation of chaincode
functions:
3-14 P (IT-6/CS-7) Hyperledger Fabric
PART-5
Beyond Chaincode : Fabric SDK and Front End.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1 The Hyperledger Fabric SDK allows applications to interact with a Fabric
blockchain network.
2 It provides a simple API to submit transactions to a ledger or query the
contents of a ledger with minimal code.
3 The Hyperledger Fabric SDK provides a structured environment of
libraries for developers to write and test chaincode applications.
4. The SDK is fully configurable and extensible through a standard
interface.
5 Components, including cryptographic algorithms for signatures, logging
frameworks and state stores, are easily swapped in and out of the SDK.
6. The SDK provides APIs for transaction processing, membership services,
node traversal and event handling.
7. Currently, there are three officially supported SDKs -for Node.js, Java,
and Go.
Que 3.17. Write a short note on: Hyperledger Fabric SDK for
Node.js.
Answer
1. The Hyperledger Fabric SDK for Node.js is designed in an Object
Oriented programming style.
2. Its modular construction enables application developers to plug in
alternative implementations for handling transaction commit events,
transaction evaluation (query), and other behaviors.
3. The SDK is composed of following modules:
i. fabric-network: Provides high levelAPIs for client applications to
interact with smart contracts (chaincode), and is the recommended
API for building client applications.
Blockchain Architecture Design 3-17 P (IT-6/CS-7)
ii. fabric-ca-client : Provides APIs to interact with the optional
Certificate Authority component, fabric-ca, that contains services
for membership management.
iii. fabric-common : A low-level API, used to implement fabric
network capability, that provides APls to interact with the core
components of a Hyperledger Fabric network, namely the peers,
orderers and event streams.
Que 3.18. Write a short note on: Hyperledger Fabric SDK for Java.
Answer
1. The SDKprovides a layer of abstraction to interact with a Hyperledger
Fabric blockchain network.
2 It allows Java applications to manage the lifecycle of Hyperledger
channels and user chaincode.
3 The SDK also provides a means to execute user chaincode, query blocks
and transactions on the channel, and monitor events on the channel.
4 The SDK acts on behalf of a particular User which is defined by the
embedding application through the implementation of the SDK's User
interface.
5. Channels may be serialized via Java serialization in the context of a
client.
6.Applications need to handle migration ofserialized files between versions.
7 The SDK also provides a client for Hyperledger's certificate
authority.
8 The SDKis however not dependent on this particular
of a certificate authority. implementation
9 Other Certificate authority's maybe used by implementing the SDK's
Enrollment interface.
Que 3.19. Write a short note on : Hyperledger Fabric SDK for Go.
Answer
1 This SDK enables Go developers to build solutions that
interact with
Hyperledger Fabric.
2 Package client enables Go developers to build client applications using
the Hyperledger Fabric programming model.
3. Client applications interact with the blockchain network using a
Fabric
Gateway.
4 A client connection
to a Fabric Gateway is established by
calling
client.Connect() with a client identity, client signing
and client connection details. implementation,
3-18 P (IT-6/CS-7) Hyperledger Fabric
PART-6
Hypeledger Composer Tool.
Questions-Answers
Answer
Blockchain clients who adopt Hyperledger Composer experience the following
benefits:
1 Faster creation of blockchain applications.
2 Eliminating the massive effort required to build blockchain applications
from scratch.
3 Reduced risk with well-tested and efficient design.
4 Creates reusable assets based on best practices.
5 Greater flexibility as the higher-level abstractions make it far simpler to
iterate.
4 UNIT
Use Case 1 &2
CONTENTS
Part-1 : Blockchain in Financial .4-2P to 44P
Software and Systems (FSS)
Part-2 : Settlements 4-4P to 4-5P
4-1P (IT-6/CS-7)
4-2 P (IT-6/CS-7) Use Case 1 & 2
PART-1
Questions-Answers
Answer
Blockchain in financial software and systems :
1. Blockchain has been applied to banking and financial services in various
ways and getting numerous benefits.
2 Smart contract service helps in conducting financial transactions without
an intermediary.
3 It has the potential to manage securities, deeds, settlements, and claims
in an automated manner.
4 Most people know the term "blockchain" in relation to the cryptocurrency
Bitcoin.
5 However, mainstream financial institutions have started to use
blockchain technology without Bitcoin to make their own transactions
more efficient and secure.
6 Blockchain is essentially a ledger of recorded financial transactions.
7. This ledger is distributed, published, and stored in multiple locations.
When a transaction occurs, it is added to each copy of the ledger.
8 This helps ensure an accurate record of transactions.
9 Because there are many copies of the ledger, blockchain is practically
immutable and highly secure.
10. To alter any part of the record, a hacker would have to change every
copy of the ledger simultaneously, which would be extremely difieult.
Que 4.2. What is the feature of blockchain that make its
application useful in financial services?
Answer
1 Blockchain is one of the most exalted technology today which has a
pervading impact on financial servicex.
Blockchain Architecture Design 4-3P (IT-6/CS-7)
Answer
Financial sector is using blockchain because of the following benefits :
1. Transparency :
The distributed ledger is shared among all the participants over the
network.
ii All can keep an eye on every ongoing transaction leaving behind
any chance of discrepancy.
2 Security :
i. Hackers are trying all their tactics to hack the device.
It is very pricey to hack the blockchain network in terms of time.
iii. Blockchain technology is developed such that even if one block is
altered, all information of the block gets spoiled, makingit worthlesS
to hack.
3. Secure platform :
Blockchain provides a digital platform which ensures security to all
the intellectual property.
i. The digital certification and certification of ownership is some of
the reason to trust this technology.
4. Prevents payment scams:
i. Basic reason of why Blockchain provides powerful security is because
ifa coin is spent, it cannot be used for next payment.
This is the way it stopscorruption.
iüi. Another reason ofpopularity of the technology is that ifa transaction
occurs between two parties, it has digital signature from both parties
which prevents any fraud.
44P (IT-6/CS-7) Use Case 1 & 2
5. Transactions in minutes :
i. One can send or receive money or financial documents in minutes,
thus it saves time.
ii. Traditional payment system directs every document to the clearing
house for approval using third party, which causes down time in
the transaction.
PART-2
Settlements.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
PART-3
KYC (Know Your Customer).
Questions-Answers
Answer
1. KYC (Know Your Customer) processes are the backbones of afinancial
institution's anti-money laundering efforts.
2.
Regulatory compliance committee in India has enforced KYC for every
bank.
3. However, KYC process takes long time for collecting and uploading the
data individually in the system.
4. It is estimated that 80% of KYC efforts go on gathering information and
processing.
5 Also, there is high possibility of false entry and duplication of the data.
6.
Blockchain carries the key to eliminating inefficiencies and duplication
in KYC processes.
7.
Blockchain stores this data in a central repository and generates a
reference number.
8
This reference number is shared among all banks and financial
institutions in near real time.
9. Banks can access the same data for due diligence related t0 any
customer's request for any other service in the same bank or with other
banks.
10. This helps in removing the efforts of collecting and checking KYC
information again and again.
11. Since the data are stored in encrypted form, security is maintained.
4-6P (IT-6/CS-7) Use Case 1 & 2
Answer
The benefit of ablockchain solution for KYC are:
1 Data quality :All data alterations are tracked and monitored in real
time.
2. Lowered turnaround time :Through KYC blockchain software
solutions, financial institutions get direct access to the data which saves
data gathering and processing time.
3 Reduced manual labor : KYC on blockchain eliminates paperwork
from the process.
4 Validation of information accuracy : KYC blockchain systems enable
transparency and immutability that, in turn, allows financial institutions
tovalidate the trustworthiness of data present in the DLT platform.
5 Real-time updated user data : Every time a KYC transaction is
performed, the information is shared within a distributed ledger. This
blockchain technology KYC system enables other participating
institutions to access real-time updated information.
6. Distributed datacollection : The introduction of blockchain in KYC
brings data on a decentralized network which can be accessed by parties
after permission has been given to them.
Que 4.7. Is blockchain solutions the answer to KYC issues ?
Answer
1 Gathering information and processing it takes up a great amount of
cost, time, and effort in the KYC process leaving very few resources
available for monitoring and assessing user behavior.
2. By offering speedy access to up-to-date data, blockchain KYC solutions
can lower the time needed for the laborious tasks.
3 This saved time can then be employed to find solutions to more complex
KYC challenges.
4 However, blockchain cannot solve allthe issues faced by KYC.
5 After the data is acquired, financial institutions still have to validate the
information.
6 For this, Artificial Intelligence and cognitive processing-like technologies
have to be employed for greater efficiencies.
7. In its present state, blockchain when used in combination with other
technologies can showcase high potential to help institutions lower the
cost and time linked with the KYC process.
Blockchain Architecture Design 4-7P (IT-6/CS-7)
PART-4
Capital Markets.
Questions-Answers
Answer
1. Blockchain technology significantly reduces the barrier to issue new
assets or financial products.
4-8 P (IT-6/CS-7) Use Case 1 & 2
2 Due to blockchain the cost of issuance of new securities drops and the
speed of issuance increases.
3. Using blockchain issuers will be able to tailor new instruments to the
needs of each investor.
4. The enhanced ability to more exactly match investor desire for return
will ereate a direct bond between capital seekers and investors.
5. Investors aim to mitigate risk while increasing their potential returns.
One of the key drivers of risk is a lack of liquidity.
6. This is addressed by the programmable nature of digital assets and
financial instruments which allows for lower transaction costs, increasing
the potential liquidity of an asset.
7. Combined with the increased connectivity and efficiencies across capital
markets, investors will see greater liquidity and a decreased cost of
capital.
8 The transparent and distributed blockchain ledger will enable more
robust insights intoasset quality.
PART-5
Insurance.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1 Blockchain is transforming the insurance sector by bringing optimization
in the business processes and sharing the information with better
efficiency, security, and transparency.
2 Using the smart contracts it is shifting insurance system from manual
to automated, thereby eliminating the traditional processing system.
3 Due to decentralization of blockchain, insurance sector will get
streamlined in underwriting, payments, claims, and reinsurance
processes.
4 In blockchain as the data is not stored at any centralized place it provides
higher level of protection and cost saving.
5 Blockchain technology provides benefits to following insurance verticals:
A. Health insurance :
1 Health insurance is in direct connection with the medical
institutions and patients using advanced data analytics.
2 All such processes and operations can be done through
blockchain in an efficient, secure, immutable, and transparent
manner.
B. Life insurance:
1 Blockchain can be used to connect various segments in life
insurance, namely, insurance companies, insuree,
beneficiaries, government, etc.
2 With the help of smart contract technology, insurance
companies can automate the whole processing.
3 They can operate smoothly with better efficiency, reduced
time and money on operations.
C. Auto insurance :
1 Auto insurance industry can be benefitted in terms of reducing
the level of paperwork and making underwriting easier.
2 Blockchain can help in faster resolution of accident claims.
D. Travel insurance :
1 Travel insurance could also be a vertical which use blockchain
to protect the traveler in case of flight delay.
2 Operational efficiency in this vertical of insurance would
increase international coverage.
Que 4.12. How blockchain technology can be used for claim
settlement in insurance sector?
Use Case 1 & 2
4-10P (IT-6/CS-7)
Answer
1 Settlement of claims is the biggest challenge in insurance sector.
2 These claims settlement can become simpler with the help of custom
smart contract.
3. This smart contract takes various parameters of insurance policy and
processes the operation automatically through trustless identity
verification mode.
4. In distributed ledger system, smart contract processes the funds for
claims settlement.
5. Also, controlling is not done exclusively by either policy holder or
insurance company.
6. Funds can be directed to the genuine party automatically after the
verification using the digital contract.
7. Smart contracts can settle the insurance claims in a faster and speedy
manner without the requirement of any paper documents, photocopies,
and complicated web portals.
Que 4.13. How blockchain technology can be used for underwriting
in insurance sector ?
Answer
1. The process of underwriting involves calculation of the coverage amount
on the policy for policy holder and the annual premium charge.
2 It is very time-consuming process and need high level of data analysis.
3 With the help of blockchain, data analysis can be done automatically
using its tools for analysis.
4. It can help the underwriters to reduce the risk liability and automate
insurance policy price determination process.
5. This results in cost-efficient model of insurance and better experience
for the customer.
6. Transparency in the underwriting process helps in building trust between
customers and insurance companies.
Answer
1. Reinsurance occurs when multiple insurance companies share risk by
purchasing insurance policies from other insurers to limit their own
total loss in case of disaster.
2. It is described as "insurance of insurance companies."
Blockchain Architecture Design 4-11 P (IT-6/CS-7)
3. Premiums paid by the insured are typically shared by all of the insurance
companies involved.
4. Blockchain can be used for reinsurance purpose, as it helps in automating
all calculations, balances, and reconciliation.
5. This technology can track the funds available for settlement of claims.
6. It can help the insurance companies in assessing financial risks and
improving upon the reinsurance strategy in totality.
7 Also, it can simultaneously benefit the insurance companies in terms of
minimizing cost and time.
PART-6
Blockchain in Trade/Supply Chain.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
A. Problems associated with traditional supply chain
management :
1. The existing supply chain management system is outdated.
2. It is unable to match the pace of changes happening across the
globe.
3. The speed of existing supply chain is extremely slow.
4 Following are the major problems which have been face by the
industry in supply chain management :
i Problem of transparency related to supply of goods from one
place to other.
i. No surety of goods genuineness as "real and "certified".
iüi. Identifying the true value of transaction.
iv. Expensive and inefficient systems.
5. Risk of counterfeiting and fraud, lack of trust, unreliability, and
insecurity in data are also problems which have been observed.
B. Decentralization of supply chain management :
1 There are numerous benefits of decentralization of supply chain
management.
2 Major benefits are bringing traceability and transparency into the
system.
3 Real-time tracking of data is possible which helps to locate the
items and their conditions, resulting in reduction of human error.
4 There would be a change in the speed of transactions and efficiency
level will also be enhanced.
5. Since blockchain is trustless chain therefore it provides more
security and eliminates the chances of fraud and errors.
6. Other benefits of decentralized supply chain are improved inventory
management, lower courier costs, less paperwork, and faster issue
identification.
PART-7
Provenance of Goods.
Questions-Answers
PART-8
Visibility.
Questions-Answers
Answer
1. Supply Chain Visibility (SCV) is the ability to track individual components,
sub-assemblies and final products as they travel from supplier to
manufacturer to consumer.
2 This data helps companies maneuver around inventory shortages, avoid
bottlenecks, meet compliance directives and track products through to
delivery.
Blockchain and supply chain visibility (SCV):
1 Asignificant motivation for companies investing in blockchain for SCV
is increasing consumer demand for information about product origins.
2 The internet has enabled information sharing among customers, and
blockchain offers the potential for the kind of visibility that can be
corroborated by the system.
3 The level and quality of visible data that blockchain might ofer could
increase service quality to consumers, creating greater value.
4 Blockchain is demonstrated as an enabler of visibility in supply chains.
5 Blockchain potentially offers the upstream visibility in supply chains.
6. This is largely a result of the decentralised, consensus-based trust
mechanism underpinning the technology.
7 The visibility provided by blockchain solutions aids decision-making by
enabling stakeholders to see timely, accurate, and reliable information.
8 Blockchain integrated with product labelling solutions offers a level of
visibility that was previously not possible.
PART-9
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
Advantages of blockchain in supply chain finance include :
1. Decentralized and secure databases.
2. Anonymous and inexpensive transactions.
3. Smart contracts and product traceability.
Limitations of blockchain in supply chain finance:
1. Validation of successful adoption of blockchain technology.
2. Integration with existing IT systems.
3. Scalability.
4. Lack of computing power.
5. Regulatory and legal governance.
4-16 P (IT-6/CS-7) Use Casse 1 & 2
PART- 10
Invoice Management.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1 Invoice management (invoice processing) is the method by which
companies track and pay supplier invoices.
2. The process involves receiving an invoice from a third party, validating
it as legitimate, paying the supplier, and noting the payment in company
records.
Problems associated with manual invoice processing :
1. Lack of Process Transparency : The status of manual invoice
processing is opaque. The status of the entire process and the duration
it will take to mature often lacks transparency.
2. Hidden Costs: Hidden costs often linger in manual invoice processing,
where one invoice is handled several times, even before an approval
decision is made.
3. High Error Rates: Manual invoicing is vulnerable to numerous errors
with accuracy plainly in the hands of the invoice processing handlers.
This can give rise to costly problems.
4. Unnecessarily Complex Processing : During the early stages, a
business might handle invoices as they arrive. However, as a company
grows, its processes become unnecessarily complex.
Role of blockchain in invoice processing :
1. Blockchain technology can streamline invoice processing, save costs,
minimize settlement times, and improve the business agility.
2. In an environment where businesses experience errors and fraud
attempts concerning invoice processing, guaranteeing trust becomes
obligatory .
3 For this purpose, blockchain offers an invoicing solution that brings
trust toevery step of the invoicing process.
4. The solution leverages blockchain technology to gather and process
data in a faster and effective manner.
Blockchain Architecture Design 4-17P (IT-6/CS-7)
5. The invoice solution ensures that invoices are from legitimate suppliers
and for expected and genuine orders.
6 It also inhibits fake and erroneous typing and double spending of invoices.
7. With this invoice solution, businesses can confirm and authorize every
step of the invoicing process, match invoice data with purchase order
data, from the reception of an invoice to the authorization of payment.
Que 4.22. Discuss blockchain in trade/supply chain with respect
to trade/supply chain finance, and invoice management.
AKTU2019-20, Marks 07
Answer
Trade/Supply Chain Finance: Refer Q. 4. 19, Page 414P, Unit-4.
Invoice Management:Refer Q. 4.21, Page 4-16P,Unit-4.
PART-11
Invoice Discounting.
Questions-Answers
Answer
1
Executive accounting is designed for service type businesses that require
a sophisticated yet simple to use accounting system.
2. Executive accounting contains many advanced features such as three
account
styles of invoicing, multi-currency capabilities, multiple bank
capabilities and other powerful features.
3 Executive accounting is a single-user system that can be upgraded to an
unlimited number of users.
offers
4. Executive accounting is designed exclusively for a business that
services to the people.
manage any
5. There is no strict upper limit on services and a business can
service through the executive accounting.
6 Yes, blockchain support executive accounting.
executive
7. Blockchain has algorithms that are specially meant to handle
accounting. executive
are associated with
8. In fact, it cut down many problems that
accounting.
UNIT
5 Use Case 3
CONTENTS
Part-1 : Blockchain for Government .5-2P to 5-2P
5-1 P (IT-6/CS-7)
5-2 P (IT-6/CS-7) Use Case 3
PART- 1
Questions-Answers
PART-2
Digital Identity.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Que 5.2. What are the problems associated with existing digital
identity management system ? How blockchain helps in overcoming
those problems ?
OR
Discuss blockchain for government with respect to digital identity.
Answer
A. Problems in the existing identity management system :
1 Due to the lack of common platform of digital identity management,
individuals every time need to verify and authenticate their identities
at all places.
2 Existing digital identity management system are based on biometric
identification, which is password-based and stored in an unsecured
system.
3 These unsecured systems are highly prone to data theft and
hacking.
4 The centralized systems are identity centric and people get one
social security number containing all details.
5 Misuse of this information may result in disastrous acts such as
frauds in banking, purchasing, fake identity creation, etc.
6 Moreover, companies also sell the personal information for
commercial purposes and generate revenues.
B. Role of blockchain in overcoming existing identity management
problems :
1 Blockchains decentralized mechanism of identity management helps
resolves allexisting issues by providing a new model of identity
management using BCT.
2. Cryptography is used to separate data from the identity of individuals
for better security.
Use Case 3
5-4 P (IT-6/CS-7)
possess
3 With the help of separate data management companies can
preserving the individuals'
and obtain data which is oftheir use while
privacy.
individuals', and
4 This creates a win-win situation for government,
companies.
Que 5.3. Give some use cases for blockchain application in identity
management.
Answer
identity
Following are some use cases for blockchain application in
management :
1. Datacollection and its analysis :
Accuracy of data is of utmost importance for any country, state, or
company.
ii.
The real-time data storage using blockchain can be analyzed and
improved in numerous industry practices.
üüi. This will also bring faith in terms of security of data.
iv. Analysis and analytics can be applied in a better manner for the
research and development, decision-making, and further
betterment of the society.
2. E-Residency :
i.
The identity management done using BCT can help individuals to
vote, file their income tax returns, perform various other processes
in a more efficient and secure manner.
It can also help virtual residency authentication due to government
verified ID's maintained using DLT.
iüi. Allthe government transactions can be moved to blockchain using
e-residency identity management in order to streamline all
interactions among individuals and government.
3. Immigration and identity :
i Digital identity card can be linked tothe details on the blockchain,
and this will act as a temporary ID card when entering in new
country.
ü. This will help immigration services to get smoother.
i. Travelers can also link their debit/eredit cards and can monitor
their account activity.
4. Self-s0vereign identities :
i The individuals can have a better life with the secure, transparent,
reliable, and accurate identity management system provided by
BCT.
Blockchain Architecture Design 5-5 P (IT-6/CS-7)
PART-3
Land Records.
Questions-Answers
Answer
1. Anumber of governments around the world suffer from bad land registry
records.
2 There are hundreds of years of land records, which make keeping track
of land ownership difficult.
3 Factors contributing to the growing problems faced by land registry
officials are:
i. Discrepancies with the paperwork.
Forged documents and counterfeit titles.
Occasional loss of all documents.
4 For developing countries bad land registry records, government
corruption, the use of paper-only systems, and natural disasters all
contribute to the growing problems faced by land registry officials.
5. Blockchain-based technology is a cost-effective solution to these
problems.
6 The transparent nature of blockchain makes it an effective technology
for use in public records systems, title registry, and land right
management.
7 Blockchain is more efficient, reliable and cost-effective than current
models in use.
8 It provides immutable records, secure access and storage, user
friendliness, and operational simplicity.
9 Blockchain technology allows users to easily secure the deeds of
transactions by entering the details and uploading them on distributed
document storage with immutable logs.
5-6P (IT-6/CS-7) Use Case 3
PART-4
Other Kinds of Record Keeping between Government Entities.
Questions-Answers
Answer
1. Digitization of health records is a significant task in the public health
sector, which is huge,complex and associated with ethical issues.
2. Medical records are scattered and erroneous, with inconsistent data
handling processes.
3. Sometimes, hospitals and clinics are forced to work with incorrect or
incomplete patient records.
4. Blockchain technology can help public health by creating a secure and
flexible ecosystem for exchanging patient's electronic health records.
Blockchain Architecture Design 5-7P (IT-6/CS-7)
Answer
1. Ademocratic country depends on voter consensus to elect officials.
2 Unfortunately, the voting systems at present are inefficient and
manipulation prone.
3 Blockchain can improve the system to identify the rationality of the
individual citizens.
4 BCT uses decentralized ledger to store voting data. The result is not
managed by a centralized authority.
5. This eliminates the menace of voting result manipulations.
6 Voters can cast votes the same way they initiate other secure transactions.
7. They can also validate that their votes were cast or not.
8. Potential solutions are currently working to blend secure digtal identity
management, anonymous vote-casting, individualized ballot processes,
and ballot casting confirmation verifiable by the voter.
PART-5
Public Distribution System.
Questions-Answers
PART-6
Social Welfare Systems.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
PART-7
Blockchain Cryptography.
Questions-Answers
Answer
1. Cryptography is method for protecting information through the use of
encrypting and decrypting the data.
2. Blockchains mainly make use of two types of eryptographic algorithms:
Hash functions
Blockchain Architecture Design 5-13 P (IT-6/CS-7)
i. Asymmetric-key algorithms
3. Hashing is mainly used in linking of blocks and in
consensus algorithms.
4 Asymmetric key cryptography is driving the blockchain applications for
identifying the contributors of the network and proof of their ownership.
5. So cryptography is an excellent way for replacing the third parties and
provides trustless environment in blockchain network.
PART-8
Privacy on Blockchain.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
PART-9
Security on Blockchain.
Questions-Answers
Que 5.18. What are the key principles in blockchain that are helpful
in eliminating the security threats that needs to be followed ?
AKTU2020-21, 2021-22; Marks 07
Answer
The fundamental principles in blockchain that must be followed to eliminate
security threats are:
1. Auditing :
i An audit involves an assessment that recorded transactions are
supported by evidence that is relevant, reliable, objective, accurate,
and verifiable.
The acceptance of a transaction into a reliable blockchain may
constitute sufficient appropriate audit evidence for certain financial
statement assertions such as the occurrence of the transaction.
iii For example, in a Bitcoin transaction for aproduct, the transfer of
Bitcoin is recorded on the blockchain.
iv. However, the auditor may or may not be able to determine the
product that was delivered by solely evaluating information on the
Bitcoin blockchain.
2. Securing applications :
i. Blockchain technology produces a structure of data with inherent
security qualities.
i It's based on principles of cryptography, decentralization and
consensus, which ensure trust in transactions.
3. Securing testing and similar approaches :
To guarantee trust, testers must ensure that all the components of
a blockchain are working perfectly and that all applications are
interacting with it in a trusted manner.
Use Case 3
5-16P (IT-6/CS-7)
Some of the core tests that should be run include functional,
performance, API, node testing, and other specialized tests.
4. Database security :
1. The records on a blockchain are secured through cryptography.
iü. Network participants have their own private keys that are assigned
to the transactions they make and act as a personal digital signature.
5. Continuity planning :
i Business Continuity Planning (BCP) is the process involved in
creatinga system of prevention and recovery from potential threats
to a company.
i. The plan ensures that personnel and assets are protected and are
able to function quickly in the event of a disaster.
6. Digital workforce training :
The digital workforce is use to describe a variety of robotic and
automated solutions for driving productivity efficiencies in the
workplace.
i. Digital workforce training helps in making blockchain security more
efficient.
Answer
1. Data in blockchain are cryptographically hashed.
2 Hash function is aone-way function which means that hash can be
generated from the plain text, but deriving the plain text from the hash
is extremely difficult.
3 Thus, tracking of information and unautho.ized tampering of data cannot
be done.
4 Hash value denotes a numeric value of a fixed length that will be generated
using cryptographic hash algorithm.
5 It identifies the data uniquely and blockchain state is represented by
hash function SHA256.
6 Hashing generates a fixed length hash value that uniquely represents
the contents of an arbitrary length string.
7. Identical strings are generating the same hash value.
8 Retrieving the original string from hashed values is not possible, since it
is a one-way function.
9. Genesis block hash is calculated using initial transactions.
10. Index of the block, previous block hash, timestamp, block data, and
nonce are used for calculating the hash value of the consecutive blocks.
Blockchain Architecture Design 5-17 P (IT-6/CS-7)
Answer
1. Asymmetric cryptographic mechanism is used to verify the credibility of
the transaction ina deceitful environment.
2 Digital signature works on the principle of asymmetric cryptography.
3 Each transaction member is provided with aprivate and public key.
4. A private key is stored confidentially because it is used for signing
negotiations.
5 The transactions that are signed are transmitted across the distributed
network and the public keys are used for their accessibility.
6. Indigital signature there are two levels involved: verification phase and
signing.
7. During the phase of signing, the encryption of the data is carried out
using the private key by the sender.
8. Encrypted result and native data are delivered, which are sent to the
receiver of the transaction.
9. For the validation of the received value by the receiver, the public key is
used and the data are checked if it has been meddled.
10. Elliptic Curve Digital Signature Algorithm (ECDSA) is used to implement
digital signature mechanism in blockchains.
11. Fig. 5.20.1 shows the process of assignment of the digital signature.
2 ECC focuses on pairs of public and private keys for decryption and
encryption in blockchain network.
3 ECC is a powerful cryptography approach.
4. It generates security between key pairs for public key encryption by
using the mathematics of elliptic curves.
5 ECC has gradually been growing in popularity due to its smaller key size
and ability to maintain security.
6. ECCbases its approach to public key cryptographic systems on how
elliptic curves are structured algebraically over finite fields.
7 ECC creates keys that are more difficult, mathematically, to crack.
8 For this reason, ECC is considered to be the next generation
implementation of public key cryptography in blockchain network.
Que 5.22. What is SHA-256 hashing algorithm ?
Answer
1 Secure Hashing Algorithm (SHA)-256 is the hash function and mining
algorithm of the Bitcoin protocol.
2. It refers to the cryptographic hash function that outputs a 256 bits long
value.
3. It moderates the creation and management of addresses, and is also
used for transaction verification.
4. It is a Secure Hashing Algorithm, commonly used for digital signatures
and authentication.
5. SHA-256 is the most famous of all cryptographic hash functions because
it's used extensively in blockchain technology.
6. SHA-256 Hashing algorithm was developed by the National Security
Agency (NSA)in 2001.
7 The algorithm is a variant of the SHA-2 (Secure Hash Algorithm 2).
8 SHA-256 is also used in popular encryption protocols such as SSL, TLS,
SSH and open source operating systems such as Unix/Linux.
9 The hash algorithm is extremely secure and its workings aren't known
in the public domain.
10. It is use to protect sensitive information, due to its ability to verify a
content of data without revealing it.
11. It is also utilized for password verification, since it does not require the
storage of exact passwords.
12. Due to the astronomical number of potential combinations a brute force
attack is extremely unlikely to succeed.
Que 5.23.What is Merkle Tree and Merkle Root ?
Blockchain Architecture Design 5-19 P (IT-6/CS-7)
Answer
MerkleTree:
1. A Merkle tree is a data structure that is used in computer science
applications.
2. In bitcoin and other cryptocurrencies, they're used to
data more efficient.ly and securely. encrypt blockchain
3. It's a mathematical data structure made up of
hashes of various data
blocks that summarize all the transactions ina block.
4. It also enables quick and secure content verification across big
and verifies the consistency and content of the data. datasets
Hash01i Hash23 i
L
T1 T2 T3 T4
2. Merkle trees are made by hashing pairs of nodes repeatedly until only
one hash remains.
3 This hash is known as the Merkle Root or the Root Hash.
4. They're built from the bottom, using Transaction IDs, which are hashes
of individual transactions.
5. Each non-leaf node is a hash ofits previous hash, and every leaf node is
ahash of transactional data.
Example: Consider the following scenario :
1 A, B,C, and D are four transactions, all executed on the same block.
2. Each transaction is then hashed. After hashing we get the following :
Hash A Hash B Hash C Hash D
3 The hashes are paired together, resulting in Hash AB and Hash CD.
4 The Merkle Root is formed by combining these two hashes i.e., Hash
ABCD.
Markle Root
Hash ABCD
Non-Leaf Nodes
Hash AB Hash CD
Answer
Application of Merkle trees:
1. Merkle trees are used in distributed systems for efficient data verification.
2
Merkle trees can be used to verify any kind of data stored, handled and
transferred in and between computers.
Blockchain Architecture Design 5-21 P (IT-6/CS-7)
3 Merkle trees help ensure that data blocks received from other peers in
a peer-to-peer network are received undamaged and unaltered.
4 Merkle trees can be used to check that other peers in a
network do not lie and send fake blocks.
peer-to-peer
5. Merkle trees can be used to check inconsistencies.
Use of Merkle trees in blockchains : Following are various Merkle tree
implementations in blockchains :
1 Git, a distributed version control system, is one of the most widely used.
Git uses Merkle tree to store its data (source).
2 Interplanetary File System, a peer-to-peer distributed protocol, uses
Merkle tree toprovide a solution for private file storage in the blockchain.
3 Apache Cassandra uses Merkle Trees to detect inconsistencies in replicas.
4 Amazon DynamoDB, a No-SQL distributed databases, use Merkle trees
to control discrepancies.
5 Ethereum also uses a Merkle Tree, but a different type than Bitcoin.
Ethereum uses a Merkle Patricia Trie.