Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 30 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Wither Blockchain

by The Gurus
May 19, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

Blockchain – it’s either the greatest technological advance since hypertext transport protocol (http, the protocol of the world wide web) or the biggest technological hype since FDDI and ATM were touted to be the 100 mbps protocol of the future some 20 years ago.
In reality, both might be true. Certainly “blockchain” is being invoked by dozens and dozens of startups looking for (and getting) funding. On the other hand, blockchain is the foundation for Bitcoin, which may yet revolutionize banking, finance, trade and all other monetary transactions.
The key is security, which can be both the saving grace for blockchain as well as the stumbling block for those looking to exploit it in other areas. First, though, some technical background.
Blockchain is another form of database, but one that’s been around longer, even, than SQL. It’s a linked list, a type of structure from computing’s earliest days. Each record in a linked list contains two pointers: one to the previous record and one to the subsequent one. The last link in the chain will point back to the first. Early linked lists had little need for more security as only nodes attached to the mainframe on which the database was stored were able to access it. It was easy to compromise the linked list – just create a record and either plug it into the end of the chain, or change the pointers in the middle of the chain to point (both forward and backward) to the new link you’ve created. As instituted for Bitcoin, this is seemingly impossible.
Bitcoin’s blockchain is distributed. That means the chain exists on multiple computers (thousands, even) and if any show a discrepancy with the others, the blockchain represented on a majority of the nodes is the one that’s recognized as legitimate. These nodes, called “miners” in the Bitcoin system use a method called “proof of work” to verify new links in the blockchain. The miners must complete a proof of work (generally, a piece of data which is difficult – costly and/or time-consuming – to produce but easy for others to verify) with the first miner achieving the correct result being rewarded with newly generated Bitcoin. All of this insures the “immutability” (a favorite word of blockchain proponents) of the chain. In reality it insures that unwarranted changes will be quickly detected, thus preserving as unchanged the data in the blockchain. The “work” that is required by the proof of work is so chosen (automatically, I might add) so that the rate of adding links to the chain is approximately 1 every 10 minutes and that, its acknowledged, is the “weak link” in the blockchain’s use for other purposes.
Something like a stock exchange, which would seem an ideal candidate for an immutable database, typically has thousands, even hundreds of thousands of transaction per minute. If each needed 10 minutes to be entered into the electronic ledger, then within days the system would be months behind in updates.
Proposals to overcome this time lag include suggestions that “proof of work” be replaced, such as with the Classical Byzantine Fault Tolerant (BFT) consensus algorithm. Simplified, this means that an algorithm deployed on multiple nodes can recognize that other nodes have either failed or have been compromised and can do so in a miniscule amount of time. There is no reward for the nodes as there is in the proof of work system but it’s suggested that the nodes in the system be owned by named entities (in Bitcoin, the miners are anonymous) who put up collateral in order to participate (This derives from the Etherium – the other major digital currency model – method called “Proof of Stake). “Rogue” nodes can be identified and their owners’ made to pay a price. Of course, traditional security is also needed to keep unregistered nodes from infiltrating the system.
Another suggestion is the so-called “private” blockchain. This is a linked list owned by a single entity, or controlled by a very small group of organizations. In effect it’s no more and no less than a simple shared database which requires an inordinate amount of expense to be secured (just as, say, a public SQL system would).
In the end, there may well be numerous different systems sharing the name “blockchain”. For sure there will be at least two divergent systems – the Bitcoin-style blockchain which is tremendously secure, but slow; and the Etherium model which is much quicker but requires extra security. The “Blockchain as a Service” offerings from the likes of Microsoft, IBM, Amazon and others could also play a big role. Systems wherein writes are less frequent than reads (such as land records) would benefit from the Bitcoin model. Systems needing many writes and fewer reads would benefit from the Etherium model. Systems needing a linked-list ledger without a lot of overhead could benefit from the BaaS model. In the end, it’s not really a competition; there’s plenty of opportunity for all of these – and more. What is needed is a way to insure the integrity of whichever model is chosen and that’s an on-going task.
 
Dave Kearns is Senior Analyst at KuppingerCole and focuses especially on the future trends around authentication and authorization and therein on risk-/context-based authentication and authorization. He attended Carnegie Institute of Technology (now Carnegie Mellon University), leaving to help found the first on-line banking system in the US, with Pittsburgh‘s Dollar Savings Bank. Dave Kearns gave up computers to spend 15 years in the wine & spirits trade, only to come back to technology with the advent of local area networks in the mid 80‘s. He spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq). In 1987, he was a founding SysOp of Novell‘s Novell Support Connection service on Compuserve and served as the first president of the Association of NetWire SysOps. Dave Kearns was formerly Technical Editor of Networking Solutions magazine. He‘s written, edited and contributed to a number of books on networking and is a frequent speaker before both trade and business groups.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

LinkedIn data of millions of people for sale on dark web after hacking: expert

Next Post

General Data Protection Regulation: The compliance countdown has begun

Recent News

cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information