Blockchain for Business
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Группа авторов. Blockchain for Business
Table of Contents
List of Table
List of Illustrations
Guide
Pages
Blockchain for Business. How It Works and Creates Value
Preface
1. Introduction to Blockchain
1.1 Introduction
1.1.1 Public Blockchain Architecture
1.1.2 Private Blockchain Architecture
1.1.3 Consortium Blockchain Architecture
1.2 The Privacy Challenges of Blockchain
1.3 De-Anonymization
1.3.1 Analysis of Network
1.3.2 Transaction Fingerprinting
1.3.3 DoS Attacks
1.3.4 Sybil Attacks
1.4 Transaction Pattern Exposure
1.4.1 Transaction Graph Analysis
1.4.2 AS-Level Deployment Analysis
1.5 Methodology: Identity Privacy Preservation
1.5.1 Mixing Services
1.5.2 Ring Signature
1.6 Decentralization Challenges Exist in Blockchain
1.7 Conclusion
1.8 Regulatory Challenges
1.9 Obstacles to Blockchain Regulation
1.10 The Current Regulatory Landscape
1.11 The Future of Blockchain Regulation
1.12 Business Model Challenges
1.12.1 Traditional Business Models
1.12.2 Manufacturer
1.12.3 Distributor
1.12.4 Retailer
1.12.5 Franchise
1.13 Utility Token Model
1.13.1 Right
1.13.2 Value Exchange
1.13.3 Toll
1.13.4 Function
1.13.5 Currency
1.13.6 Earning
1.14 Blockchain as a Service
1.15 Securities
1.16 Development Platforms
1.17 Scandals and Public Perceptions
1.17.1 Privacy Limitations
1.17.2 Lack of Regulations and Governance
1.17.3 Cost to Set Up
1.17.4 Huge Consumption of Energy
1.17.5 Public Perception
References
2. The Scope for Blockchain Ecosystem
2.1 Introduction
2.2 Blockchain as Game Changer for Environment
2.3 Blockchain in Business Ecosystem
2.3.1 Business Ecosystem
2.3.1.1 What Is Business Model?
2.3.1.2 Business Model—Traditional
2.3.2 Are Blockchain Business Models Really Needed?
2.3.2.1 Blockchain Business Model
2.3.2.2 Model 1: Utility Token Model
2.3.2.3 Model 2: BaaS
2.3.2.4 Model 3: Securities
2.3.2.5 Model 4: Development Platforms
2.3.2.6 Model 5: Blockchain-Based Software Products
2.3.2.7 Model 6: Blockchain Professional Services
2.3.2.8 Model 7: Business Model—P2P
2.4 Is Blockchain Business Ecosystem Profitable?
2.5 How Do You “Design” a Business Ecosystem?
2.6 Redesigning Future With Blockchain
2.6.1 Is Earth Prepared for Blockchain?
2.7 Challenges and Opportunities
References
3. Business Use Cases of Blockchain Technology
3.1 Introduction to Cryptocurrency
3.2 What is a Bitcoin?
3.2.1 Bitcoin Transactions and Their Processing
3.2.2 Double Spending Problem
3.2.3 Bitcoin Mining
3.3 Bitcoin ICO
3.3.1 ICO Token
3.3.2 How to Participate in ICO
3.3.3 Types of Tokens
3.4 Advantages and Disadvantages of ICO
3.5 Merchant Acceptance of Bitcoin
References
4. Ethereum
4.1 Introduction
4.2 Basic Features of Ethereum
4.3 Difference between Bitcoin and Ethereum
4.4 EVM (Ethereum Virtual Machine)
4.5 Gas
4.5.1 Gas Price Chart
4.6 Applications Built on the Basis of Ethereum
4.7 ETH
4.7.1 Why Users Want to Buy ETH?
4.7.2 How to Buy ETH?
4.7.3 Alternate Way to Buy ETH
4.7.4 Conversion of ETH to US Dollar
4.8 Smart Contracts
4.8.1 Government
4.8.2 Management
4.8.3 Benefits of Smart Contracts
4.8.4 Problems With Smart Contracts
4.8.5 Solution to Overcome This Problem
4.8.6 Languages to Build Smart Contracts
4.9 DApp (Decentralized Application or Smart Contract)
4.9.1 DApp in Ethereum
4.9.2 Applications of DApps
4.10 Conclusion
References
5. E-Wallet
5.1 Introduction to Wallet Technology
5.2 Types of Wallet. 5.2.1 Paper
5.2.2 Physical Bitcoins
5.2.3 Mobile
5.2.4 Web
5.2.5 Desktop
5.2.6 Hardware
5.2.7 Bank
5.3 Security of Bitcoin Wallets
5.4 Workings of Wallet Technology
5.5 Create HD Wallet From Seed
5.5.1 Initiation
5.5.2 Steps for Creating an HD Wallet From a 24-Word Seed Phrase Through Particl-qt Tool
5.5.3 Steps for Encrypting the HD Wallet
5.5.4 Utilization
5.5.5 Steps for Generating Address to Access Transactions on the HD Wallet
5.6 Navigating HD Wallet
5.7 Conclusion
References
6. Blockchain and Governance: Theory, Applications and Challenges
6.1 Introduction
6.2 Governance: Centralized vs Decentralized
6.3 Blockchain’s Features Supportive of Decentralization
6.4 Noteworthy Application Areas for Blockchain-Based Governance
6.4.1 Public Service Governance
6.4.2 Knowledge and Shared Governance
6.4.3 Governance in Supply Chain
6.4.4 Governance of Foreign Aid
6.4.5 Environmental Governance
6.4.6 Corporate Governance
6.4.7 Economic Governance
6.5 Scopes and Challenges
6.6 Conclusion
References
7. Blockchain-Based Identity Management
7.1 Introduction
7.2 Existing Identity Management Systems and Their Challenges
7.3 Concept of Decentralized Identifiers
7.4 The Workflow of Blockchain Identity Management Systems
7.5 How Does it Contribute to Data Security?
7.6 Trending Blockchain Identity Management Projects
7.7 Why and How of Revocation
7.8 Points to Ponder
7.8.1 Comparison Between Traditional and Blockchain-Based Identity Management Systems
7.9 Conclusion
References
8. Blockchain & IoT: A Paradigm Shift for Supply Chain Management
8.1 Introduction
8.2 Supply Chain Management
8.2.1 The Aspects of a Supply Chain
8.2.2 Supply Chain Performance Dimensions
8.2.3 Supply Chain Migration Towards Digitalization
8.3 Blockchain and IoT
8.3.1 What Makes Blockchain Suitable for SCM?
8.3.1.1 Shared Ledger
8.3.1.2 Permissions
8.3.1.3 Consensus
8.3.1.4 Smart Contracts
8.3.2 The Role of Blockchain in Achieving the SCM Performance Dimensions
8.3.3 The Role of IoT in the Implementation of Blockchain Technology
8.4 Blockchain Technology and IoT Use Cases in Supply Chain Management
8.5 Benefits and Challenges in Blockchain-Based Supply Chain Management
8.6 Conclusion
References
9. Blockchain-Enabled Supply Chain Management System
9.1 Introduction
9.1.1 Supply Chain Management
9.2 Blockchain Technology
9.3 Blockchain Technology in Supply Chain Management
9.4 Elements of Blockchain That Affects Supply Chain
9.4.1 Bitcoin
9.5 Challenges in Implementation of Blockchain-Enabled Supply Chain
9.6 Conclusion
References
10. Security Concerns of Blockchain
10.1 Introduction: Security Concerns of Blockchain
10.2 Cryptocurrencies Scenarios
10.3 Privacy Challenges of Blockchain. 10.3.1 Protection Problems in Blockchain
10.3.2 Privacy-Preserving Mechanisms Analysis
10.3.3 Data Anonymization-Mixing
10.4 Decentralization in Blockchain
10.4.1 Role of Decentralization in Blockchain
10.4.2 Analysis of PoS and DPoS
10.4.3 Problems With Decentralization
10.4.4 Decentralization Recovery Methods
10.5 Legal and Regulatory Issues in Blockchain
10.5.1 Legal Value of Blockchain and its Problems
10.6 Smart Contracts
10.7 Scandals of Blockchain
10.7.1 Blockchain Technologies as Stumbling Blocks to Financial Legitimacy
10.8 Is Blockchain the Rise of Trustless Trust?
10.8.1 Why Do We Need a System of Trust?
10.9 Blockchain Model Challenges
References
11. Acceptance and Adoption of Blockchain Technology: An Examination of the Security & Privacy Challenges
11.1 Introduction
11.1.1 Research Methodology
11.1.2 Analysis
11.2 Security Issues of Blockchain. 11.2.1 The Majority Attack (51% Attacks)
11.2.2 The Fork Problems
11.2.2.1 Hard Fork
11.2.2.2 Soft Fork
11.2.3 Scale of Blockchain
11.2.4 Time Confirmation of Blockchain Data—Double-Spend Attack/Race Attack
11.2.5 Current Regulations Problems
11.2.6 Scalability and Storage Capacity
11.2.7 DOS Attack/Sybil Attack/Eclipse Attack/Bugs
11.2.8 Legal Issues
11.2.9 Security of Wallets
11.2.10 The Increased Computing Power
11.3 Privacy Challenges of Bitcoin
11.3.1 De-Anonymization
11.3.1.1 Network Analysis
11.3.1.2 Address Clustering
11.3.1.3 Transaction Finger Printing
11.3.2 Transaction Pattern Exposure
11.3.2.1 Transaction Graph Analysis
11.3.2.2 Autonomous System-Level Deployment Analysis
11.4 Blockchain Application-Based Solutions
11.4.1 Bitcoins
11.4.2 IoT
11.4.2.1 MyBit
11.4.3 Aero Token
11.4.4 The Chain of Things
11.4.5 The Modum
11.4.6 Twin of Things
11.4.7 The Blockchain of Things
11.4.8 Blockchain Solutions: Cloud Computing
11.5 Conclusion and Future Work
References
12. Deficiencies in Blockchain Technology and Potential Augmentation in Cyber Security
12.1 Introduction
12.2 Security Issues in Blockchain Technology
12.3 Privacy Challenges
12.3.1 BGP Hijacking Attack
12.3.2 BDoS (Blockchain Denial of Service)
12.3.3 Forcing Other Miners to Stop Mining
12.4 Decentralization Challenges
12.5 Regulatory Challenges
12.5.1 Principles to Follow While Regulating
12.5.1.1 Flexible to Legal Innovation
12.5.1.2 Experimentation Should be Encouraged
12.5.1.3 Focus on the Immediate Implications
12.5.1.4 Regulators Should Engage in a Transnational Conversation
12.5.2 Regulatory Strategies
12.5.2.1 Wait-and-See
12.5.2.2 Imposing Narrowing and Broadening Guidance
12.5.2.3 Sandboxing
12.5.2.4 Issue a New Legislation
12.5.2.5 Use Blockchain in Regulation
12.6 Business Model Challenges
12.7 Scandals and Public Perception
12.8 Why Blockchain is Trustless
12.8.1 Trust Mechanism
12.8.2 Anonymity
12.8.3 Use in Digital Wallets
12.8.4 Forgery Resistance
12.9 Use of Blockchain in Cybersecurity
12.9.1 Blockchain Database
12.9.2 DNS Security
12.9.3 IoT Security
12.9.4 DDoS Prevention
12.9.5 CDN (Content Delivery Network)
12.9.6 SMS Authentication
References
13. Internet of Things and Blockchain
13.1 History of ‘Internet of Things’
13.2 IoT Devices
13.3 Sensors and Actuators
13.4 Cloud and Haze-Based Engineering
13.5 Blockchain and IoT
13.6 Edge Computing
13.7 Contextual Analyses
13.8 Fate of Blockchain and IoT
References
14. Blockchain Applications
14.1 Introduction to Blockchain
14.1.1 Uses of Blockchain in Administration
14.2 Blockchain in Big Data Predictive Task Automation
14.2.1 How Can Blockchain Help Big Data?
14.2.2 Blockchain Use Cases in Big Data
14.3 Digital Identity Verification
14.3.1 Why Digital Identity Matters?
14.3.2 Blockchain (Definition and its Features)
14.3.3 Why do we Need Blockchain in Digital Identity?
14.3.4 How Does a Blockchain Work?
14.3.5 Why is a Blockchain Secure?
14.3.6 What’s Blockchain Identification Management?
14.3.7 Advantages
14.4 Blockchain Government
14.4.1 Decentralized Government Services
14.4.2 Liquid Democracy and Random Sample Election
14.5 Blockchain Science. 14.5.1 FoldingCoin
14.5.2 GridCoin (GRC)
14.5.3 Global Public Health
14.5.4 Bitcoin Genomics
14.6 Blockchain Health
14.6.1 Health Coin
14.6.2 EMR on Blockchain
14.6.3 Bit Coin Health Notary
14.7 Blockchain Learning. 14.7.1 Bitcoin MOOCs
14.7.2 Smart Contract Literacy
14.7.3 LearnCoin
References
15. Advance Concepts of Blockchain
15.1 Community Supercomputing
15.2 Blockchain Genomics
15.3 Blockchain Learning
15.4 Community Coin
15.4.1 Monetary and Non-Monetary Currencies
15.4.2 Difference Between Monetary and Non-Monetary Assets
15.4.3 Currency Multiplicity
15.4.4 List of Some Prominent Alternate Coins is Given Below
15.5 Demurrage Currencies
Reading List
Index
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
Scrivener Publishing
100 Cummings Center, Suite 541J
.....
Apart from this, within a blockchain, data is shared across every node or participants of the network, each maintaining a full replica of the database. This case makes the situation more difficult as the real owner of the blockchain couldn’t be determined or is quite difficult to be judge it for the already created blockchain [12−14]. This scenario presents a challenge where intellectual property is concerned, making it strenuous to determine the author or owner of the data.
Privacy is another great challenge for regulators of blockchain. Transactions are linked completely and solely to a network account address rather than a personal identification (PI number), apparently ensuring privacy. However, if a connection between the two node are made and on the same side it revealed, the protection of an individual(s) privacy is no longer exists [16].
.....