Evaluation Forms for Blockchain- Based System ver. 1.0

Slides:



Advertisements
Similar presentations
Computer Systems & Architecture Lesson 2 4. Achieving Qualities.
Advertisements

System Integration Verification and Validation
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Non-functional requirements
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
CSE 303 – Software Design and Architecture
Software Software is omnipresent in the lives of billions of human beings. Software is an important component of the emerging knowledge based service.
Cryptography, Authentication and Digital Signatures
Database System Development Lifecycle 1.  Main components of the Infn System  What is Database System Development Life Cycle (DSDLC)  Phases of the.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
12.1 Introduction Checklists are used as a technique to give status information in a formalized manner about all aspects of the test process. This chapter.
ACM 511 Introduction to Computer Networks. Computer Networks.
Network Security Celia Li Computer Science and Engineering York University.
Non Functional Testing. Contents Introduction – Security Testing Why Security Test ? Security Testing Basic Concepts Security requirements - Top 5 Non-Functional.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
TAG Presentation 18th May 2004 Paul Butler
Block Chain 101 May 2017.
Information Systems Security
Computer Security Introduction
Chapter 2 Object-Oriented Paradigm Overview
Chapter 1 Characterization of Distributed Systems
Enterprise Architectures
Computers Are Your Future
Chapter 19: Network Management
Cryptocurrencies by.
SEVERITY & PRIORITY RELATIONSHIP
Cryptography and Network Security
Software Quality Assurance Software Quality Factor
Cryptographic Hash Function
TAG Presentation 18th May 2004 Paul Butler
Bitcoin - a distributed virtual currency system
Introduction to Hyperledger Fabric
Developing Information Systems
Chapter 6 Database Design
Blockchains and Cryptocurrencies: What Financial Planners Need to Know
Information and Network Security
Digital Signature.
Blockchain at UB B. Ramamurthy
Blockchain Adrian Zaragoza.
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Focus Group 3: Blockchain and digitalisation
Computer and Network Security
Efficient CRT-Based RSA Cryptosystems
Charakteristiky kvality
Blockchain technology at Change Healthcare
Multi-party Authentication in Web Services
Cryptography and Network Security
Distributed Ledger Technology (DLT) and Blockchain
Blockchain Alexander Prenta 9/27/2018.
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
Bitcoin & Blockchain Bina Ramamurthy 2/22/2019.
GRIF DEX is an international decentralized exchange, a trading platform where you can buy and sell coins, tokens and fiat currency. An exchange will conform.
FST Network All Rights Reserved
Security of Wireless Sensor Networks
Blockchains and Smart Contracts for the Internet of Things
Database System Architectures
Quality Factors.
Faculty Seminar Series Blockchain Technology
ISO/IEC Systems and software Quality Requirements and Evaluation
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES
Cryptography and Network Security
INTRODUCTION A Database system is basically a computer based record keeping system. The collection of data, usually referred to as the database, contains.
Tomaž Špeh SURS TF SERV, Luxembourg,
Explore Txs, block, blockchain in Bitcoin
Blockchains Lecture 6.
Presentation transcript:

Evaluating blockchain options Virginia Cram-Martos & METI (Japan) Rome, 10-2017

Evaluation Forms for Blockchain- Based System ver. 1.0 The original presentation by METI and the full report that it is based upon can be found at: http://www.meti.go.jp/english/press/2017/0329_004.html Text that is in italics and underlined was added or changed Evaluation Forms for Blockchain- Based System ver. 1.0 12 April 2017 Information Economy Division Commerce and Information Policy Bureau

Blockchain Characteristics Characteristics (examples) Each node owns the same transaction histories, and the «task» of generating new blocks is shared across the blockchain‘s network of nodes –-- thus no single point of failure exists, enabling “no downtime in effect” Centralized system (Conventional system) Blockchain-based system Transaction records are successively stored in blocks, and these are added to a chain of existing blocks. Therefore, it is extremely difficult to falsify. Node Blockchain-based systems can be developed at lower cost than existing systems of similar secureness, by combining technology elements such as node distribution, consensus algorithm, cryptography, etc. Block Block Block Hash value Hash value Hash value Nonce Nonce Nonce <Transaction records> <Transaction records> <Transaction records> 1

(Practical Byzantine Fault Tolerant) There are many Blockchains and many variations IN blockchain technology Typical classification of blockchain platform by governance scheme *Modified from IBM release document Public Consortium Private Governance - Several parties One single party Identity of users Free Permissioned Not specified, may contain malicious members Specified, composed of reliable members Consensus algorithm PoW etc. PBFT etc. (Practical Byzantine Fault Tolerant) Multi-block confirmation Large electricity consumption Immediate block confirmation Simple / Fast / Small electricity consumption Processing time of transaction Long (e.g. 10 min) Short (e.g. a few sec) Use case Virtual currency etc. Business network as interbank transfer, stock exchange etc. Example Bitcoin, Ethereum etc. Ripple, Hyperledger Fabric, etc. 5 5

Items on Evaluation Forms for Blockchain-Based SystemS ver. 1.0 These Items Are Closely Related To The Characteristics Of Blockchain Technology Large Category Category Evaluation items Quality Performance Efficiency Throughput Network latency Block confirmation Data reference Interoperability Interoperability with existing systems Interoperability with other blockchain systems Scalability Capacity Number of nodes Reliability Maturity Availability Fault Tolerance Recoverability Security Confidentiality Integrity Non-repudiation Authenticity Portability Adaptability Replaceability Large Category Category Evaluation items Maintenance / Operation Maintainability & operability Modularity Reusability Analyzability Modifiability Testability Large Category Category Evaluation items Cost R&D R&D of Blockchain platform technical elements R&D of subsystems Implementation (Commercializ ation) Hardware cost Software cost System implementation cost Maintenance & operation Operational cost Maintenance cost 8

EXAMPLE - Evaluation Forms DESCRIPTION ver. 1.0 - *BC= blockchain Category Evaluation item Outline of category Related BC technology & BC characteristics Points to remember and remarks on using Evaluation form Reliability Fault Tolerance Degree to which a system, product or component operates as intended despite the presence of hardware or software faults. ・Node failure tolerance ・Tolerance of network failure and network attacks Clarify the definition of normal operation. Clarify node conditions and network conditions for normal operation. Clarify the main chain determination method after fork generation due to network divisions. Recoverability Degree to which, in the event of an interruption or a failure, a product or system can recover the data directly affected and re-establish the desired state of the system. ・ Recoverability of node failure (recovery method and time, etc.) Clarify preconditions for the network environment and data volume. Security Confidentiality Degree to which a product or system ensures that data are accessible only to those authorized to have access. ・Access control Clarify the management method of the access authority (reading, writing, etc.) to the data, setting level, etc. ・Data anonymization Clarify the existence of a function to conceal data. Clarify the object and scope of concealment. Clarify concealed data verification method by third party. ・ Transaction anonymization Clarify the existence of a function to conceal transactions. Clarify the verification method by third party. Integrity Degree to which a system, product or component prevents unauthorized access to, or modification of, computer programs or data. ・Membership management Clarify the existence of membership management functions. Non-repudiation Degree to which actions or events can be proven to have taken place, so that the events or actions cannot be repudiated later. ・Consensus algorithm Clarify the existence of block confirmation by consensus algorithm. Also, clarify how to decide the main chain after fork. ・Hard fork policy Clarify the rule, method, and the extent of the influence of block rollback.

The Evaluation of Blockchain Systems Depends Upon a Complex Set of Trade-offs Between Unique Characteristics Descriptions of Many Key System Characteristics Can Often be Found in System «White Papers»

Tri∆ngul∆rity Creating change through Innovation, eCommerce and Trade Thank You Virginia Cram-Martos crammartos@triangularity.net Tri∆ngul∆rity Creating change through Innovation, eCommerce and Trade