Skip to main content

Practical Deployability of Permissioned Blockchains

  • Conference paper
  • First Online:
Business Information Systems Workshops (BIS 2018)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 339))

Included in the following conference series:

Abstract

Ever since the evolution of cryptocurrencies, there has been profound interest in employing the underlying Blockchain technology for enterprise applications. Enterprises are keen on embracing the advantages of Blockchain in applications ranging from FinTech, Supply chain, IoT, Identity Management, Notary, Insurance and to many other domains. Blockchain is often spoken of as the third disruption after computers and the internet, and is being studied for application in several domains. A blockchain, as used in most cryptocurrencies, does not require any authorization for participants to join or leave the system, and hence is referred to as a permission-less blockchain. However, enterprise applications cannot operate in such models. Enterprise applications operate in a regulated, permissioned blockchain setting. This paper provides an industry focused insight into the practicality and feasibility of permissioned blockchains in real-world applications. In particular, we consolidate some non-trivial challenges that should be addressed in making the permissioned blockchain practically deployable in enterprises.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The modifications are based on independent comments from Prof. Bart Preneel, University of Leuven, Belgium at BLOCKCHAIN 2017 Workshop and Sitaram Chamarty, TCS Innovation Labs, Hyderabad.

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). https://bitcoin.org/bitcoin.pdf

  2. King, S., Nadal, S.: Ppcoin: peer-to-peer crypto-currency with proof-of-stake. Self-published paper, 19 August 2012. https://peercoin.net/assets/paper/peercoin-paper.pdf

  3. Dziembowski, S., Faust, S., Kolmogorov, V., Pietrzak, K.: Proofs of Space. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9216, pp. 585–605. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48000-7_29

    Chapter  Google Scholar 

  4. Wüst, K., Gervais, A.: Do you need a Blockchain?. IACR Cryptology ePrint Archive 2017/375. https://eprint.iacr.org/2017/375.pdf

  5. Back, A.: Hashcash: a denial-of-service countermeasure (2002). http://www.hashcash.org/papers/hashcash.pdf

  6. Ethereum. https://www.ethereum.org/

  7. Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: Third Symposium on Operating Systems Design and Implementation, OSDI, USENIX (1999)

    Google Scholar 

  8. Cachin, C., Schubert, S., Vukolic, M.: Non-determinism in byzantine fault-tolerant replication. In: International Conference on Principles of Distributed Systems, OPODIS (2016)

    Google Scholar 

  9. Identity Mixer. https://www.zurich.ibm.com/identity_mixer/

  10. Blockchain in Air ticketing. https://medium.com/@PasschainBlog/is-blockchain-necessary-in-airline-ticketing-d4e089910bd3

  11. Shafagh, H., Burkhalter, L., Hithnawi, A., Duquennoy, S.: Towards Blockchain-based auditable storage and sharing of IoT data. In: ACM CCSW (2017)

    Google Scholar 

  12. Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Symposium on Security and Privacy, SP (2016)

    Google Scholar 

  13. Fromknecht, C., Velicanu, D., Yakoubov, S.: A Decentralized Public Key Infrastructure with Identity Retention. https://eprint.iacr.org/2014/803.pdf

  14. Zhang, F., Cecchetti, E., Croman, K., Juels, A., Shi, E.: Town Crier: an authenticated data feed for smart contracts. In: ACM SIGSAC Conference on Computer and Communications Security, CCS (2016)

    Google Scholar 

  15. Oraclize. http://www.oraclize.it/#projects

  16. Everledger. https://www.everledger.io/

  17. Certificate Transparency. https://www.certificate-transparency.org/

  18. Ateniese, G., Magri, B., Venturi, D., Andrade, E.: Redactable blockchain -or- rewriting history in bitcoin and friends. In: IEEE European Symposium on Security and Privacy (Euro SP) (2017)

    Google Scholar 

  19. Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: EuroSys (2018)

    Google Scholar 

  20. Supplychain Traceability: Anti-counterfeiting. https://wiki.hyperledger.org/_media/groups/requirements/hyperledger_-_supply_chain_traceability-_anti_counterfeiting.pdf

Download references

Acknowledgements

We thank Dr. Sumanta Sarkar and Dr. Sachin Lodha from Tata Consultancy Services for their insightful feedback. We also thank anonymous reviewers for their valuable comments in improvising the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitesh Emmadi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Emmadi, N., Vigneswaran, R., Kanchanapalli, S., Maddali, L., Narumanchi, H. (2019). Practical Deployability of Permissioned Blockchains. In: Abramowicz, W., Paschke, A. (eds) Business Information Systems Workshops. BIS 2018. Lecture Notes in Business Information Processing, vol 339. Springer, Cham. https://doi.org/10.1007/978-3-030-04849-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-04849-5_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-04848-8

  • Online ISBN: 978-3-030-04849-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics