a security privacy perspective through
play

A Security & Privacy Perspective through Hyperledger/fabric - PowerPoint PPT Presentation

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems Introduced in 2008


  1. Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016

  2. Blockchain systems • Introduced in 2008 [Bitcoin08] • Open to be used by anyone • Decentralized networks to decide on the order & validity of transactions that are announced in it • Blockchain/Ledger of announced & validated transactions • Mechanism/protocols to extend the ledger • Occasionally, with their own currency (e.g., BTC, ETHER) • Emerging: – Integrated in multiple businesses around the globe – Market sizes of Billions USD – An ecosystem established around them

  3. Blockchain systems: concepts of interest Ledger Ledger Peer Peer Transaction Ledger Ledger Ledger Validating Entities Client Peer Peer End-user Alice Ledger Ledger Peer Peer • Transaction definition • Blockchain / Ledger data structure • Participant identities • Underlying agreement (aka consensus) protocol • Motivation mechanisms for proper functionality of the system 3

  4. Blockchain systems: the example of Bitcoin Ledger Ledger Peer Peer Transaction Ledger Ledger Ledger Validating Entities Client Peer Peer End-user Alice Ledger Ledger Peer Peer • Transactions are payment transactions • Users and validating peers are the same set • Clients use self-generated pseudonyms • Miners “vote” with their computing power the executed result • Motivation for good behavior through the generation of BTC coins 4

  5. Blockchain systems: the example of Ethereum Ledger Ledger Peer Peer Transaction Ledger Ledger Ledger Validating Entities Client Peer Peer End-user Alice Ledger Ledger Peer Peer • Transactions can include any type of code, smart contract • Smart contracts & result are added to the Blockchain • Users and validating peers are the same set • Clients use self generated pseudonyms • Miners “vote” with their computing power • Motivation for good behavior through the generation of ETHER coins 5

  6. Blockchain for enterprise?

  7. Problem: Electronic networks that transfer the ownership of assets between parties according to business rules are inefficient , expensive and vulnerable . Hack Party A’s Records Counter-party Bank records records API-integrations Party C’s Records Auditor records Party B Records System integrations grow x(x-1) with each additional party x

  8. Solution: Blockchain networks — simpler; no centralized control points; spread risk = lowered costs; hardened inside (not just at the perimeter). Party A All Parties have Replicated Ledger Counter-parties Banks Can still have private – permissioned network Digitally Signed / Encrypted Auditors Party C Transactions & Ledger Consensus Algorithm Prevents Double-spend Party B

  9. Blockchain: all we need!  Shared replicated ledger : a peer-to-peer append-only transaction database that is replicated and shared across organizational boundaries/legal entities  Embedded crypto layer : supporting secure authenticated verifiable multi-party transactions via tokenization, digital identity, digital signatures, and other  Business rules (evolving to Smart Contracts): ability to specify business logic, embed it in the transaction database, and couple execution of the logic with transaction processing Business rules derived from contracts trigger actions & workflows Multi-party contracts defined around shared state & state changes Org A Org C Secure authenticated updates to shared state Org B Org D Replicated shared state

  10. Benefits of Blockchain  Reduce costs and complexity  Automate trusted processes  Improve discoverability  Ensure trusted record-keeping "Over decades banks and other firms have built systems for themselves ... and then a collection of processes has emerged between the banks ... to make sure these systems are kept synchronized and are reconciled with each other." "With shared or distributed ledgers perhaps we can imagine a world where participants share this infrastructure, so rather than everyone running their own systems that have to be reconciled, we can have ... an open platform that multiple firms can connect to.“ R. G. Brown

  11. Blockchain: How to decide whether to use it? Very high Performance, Are You Managing No Does Identity Does This Require (sub)Millisecond Contractual Matter? a Market Approach? Transactions? Relationships? Yes 1 Yes Yes Yes Are you working with Do You Need to Keep Does it Require Greater Complex Business Your Transactions Than Two Parties? Logic? Private? No 4 Yes Yes Yes 2 Yes Are You Looking to Reduce Costs? No Consider Are You Looking to Yes Let’s Talk Improve Alternative 3 Discoverability? Approaches By design, no one party can Smart contracts aim to provide When everyone on an exchange Blockchain networks allow each modify, delete, or even append any security superior to traditional can view the same ledger, it is easy participant to create customized record without consensus, making contract law and to reduce other to broadcast an intention (or offer) solutions using their own 1 2 3 4 the system useful for ensuring the transaction costs associated with by appending it. For example, in a proprietary business logic while immutability of contracts and other contracting. trading network, all ask and bids running on the same common legal documents. would be visible to every network ledger. 1 participant. 1

  12. Enterprise blockchain ? Not quiet there yet… • Strong identity management • Auditable user-behavior • Accountability of individual users and validating entities • Transactional privacy of blockchain users • Anonymity & unlinkability of transactions of the same user • Confidentiality of the contract to be executed w.r.t. validating entities • Access control in contract invocation • Scalability & performance • Proof-of- work systems need to be substituted by something more “ energy-efficient ” • Need to sustain large number of transactions per time unit • Scale to large number of nodes • Support for auditing 12

  13. Open (-sourced) Blockchain : Enterprise Blockchain born within IBM One of Hyperledger candidates

  14. Hyperledger-fabric model Permission Issuer Ledger Transaction Ledger Peer Peer (defining contracts) Client Ledger Ledger Ledger End-user Validating Entities Peer Peer Alice Transaction (invoking contracts) Ledger Ledger Peer Peer Client End-user Bob • Permissioned system • Transactions can implement arbitrary (business) logic via chain-codes • Distinct roles of users , and validators • Users deploy chaincodes and invoke them through deploy & invoke transactions • Validators evaluate the effect of a transaction and reach consensus over the new version of the ledger • Ledger = total order of transactions + hash (global state) • Pluggable consensus protocol , currently PBFT & Sieve 14

  15. Security & privacy features Each user has control over the degree to which its transaction activity will Privacy of user- participation be shared with its environment Contract logic can be confidential, i.e., concealable to unauthorized entities Contract Privacy Users can be accounted for the transactions they create, cannot frame Accountability other users for their transactions, or forge other users’ transactions. Non-repudiation Auditors are able to access & verify any transaction they are legally Auditability authorized to 15

  16. Security and privacy mechanisms Privacy of user- participation Auditable mechanisms to grant users { credentials to ( anonymously ) Membership authenticate their transactions and Services secure their connection to the network. Contract Privacy Accountability Non-repudiation Auditable mechanisms to enable users to { Contract conceal their contracts and associated Confidentiality transactions to unauthorized nodes , while Mechanisms guaranteeing correctness. Auditability 16

  17. Adversarial model Membership Management Ledger Transaction Ledger Peer Peer (defining contracts) Client Ledger Ledger Ledger End-user Validating Entities Peer Peer Alice Ledger Ledger Peer Peer Client End-user Transaction Bob (invoking contracts) • Permission issuer / membership service is assumed honest • Users: - have access to raw ledger data - may try to escalate their read/invoke access rights • Validators: Up to f number of byzantine nodes • All entities assumed trusted to not reveal confidential information that are given access to. 17

  18. Membership Membership Ledger Ledger auditors Peer Peer Client Ledger Ledger Ledger Validating Entities Peer Peer End-user Ledger Ledger Peer Peer User registration Peer registration Nominal Anonymous Nominal credentials credential credential  Users prove identity and issue two types of credentials • Transaction certificates (anonymous) • Enrollment certificates (nominal)  Peers only issue enrollment certificates  Nominal credentials contain encryption & signing keys Membership  Auditors can audit certificates and ownership Management 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend