<<

A -based Application to Protect Minor Artworks

Clara Bacciu, Angelica Lo Duca, Andrea Marchetti IIT-CNR - via G. Moruzzi 1, 56124 Pisa (Italy) [name].[surname]@iit.cnr.it

Keywords: blockchain, Ethereum, recordkeeping, IPFS, Cultural Heritage, minor artwork

Abstract: A new emerging trend concerns the implementation of services and distributed applications through the blockchain technology. A blockchain is an append-only , which guarantees security, transparency and immutability of records. can be used in the field of Cultural Heritage to protect minor artworks, i.e. artistic relevant works not as famous as masterpieces. Minor artworks are subjected to counterfeiting, thefts and natural disasters because they are not well protected as famous artworks. This paper describes a blockchain-based application, called MApp (Minor Artworks application), which lets authenticated users (pri- vate people or organizations), store the information about their artworks in a secure way. The use of blockchain produces three main advantages. Firstly, artworks cannot be deleted from the register thus preventing thieves to remove records associated stolen objects. Secondly, artworks can be added and updated only by authorized users, thus preventing counterfeiting in objects descriptions. Finally, records can be used to keep artworks memory in case of destruction caused by a natural disaster.

1 INTRODUCTION cessible. To complicate things, in the last decades, Italy (as many other places in the world) has suffered Minor artworks are works that are artistically rel- a series of catastrophic events that largely affected evant but not as well-known as famous masterpieces, cultural heritage: earthquakes, landslides, floods, col- or belonging to the so-called minor arts, such as books lapses in important archaeological sites such as Pom- and manuscripts, pottery, lacquerware, furniture, jew- pei. Such events may have affected not only the ellery, or textiles. Examples of such works could be works themselves, but even their catalogues. Finally, those kept in some small libraries or churches, or even often, although minor artworks are registered in lo- in private households. In general, since it is often not cal , they can be easily erased from these well protected, a minor artwork may be more sub- catalogues, thus they can be completely forgotten in ject to counterfeiting, theft, and natural disaster. In case of theft. These motivations stress the need for Italy, trafficking in works of art is the third most lu- new practices to protect cultural heritage. Blockchain crative illegal activity, and globally the trend is the technology can prove to be effective in keeping digital same. Minor artworks having a medium/high value archives of works of art secure and up-to-date, provid- are easy to smuggle and sell for organised crime, since ing an aid for protection against natural and environ- controls on the origin of the good and on subsequent mental disasters, war damages, organised crime. transactions are often limited, even in famous muse- In this paper we would like to demonstrate that ums (Chiodi and Fedeli, 2018). This is true despite the blockchain technology can be used to protect mi- the existence of International treaties on protection of nor artworks and then we present a practical applica- cultural heritage, like the UNIDROIT Convention on tion (MApp) as a proof of the validity of this position. Stolen or Illegally Exported Cultural Objects (Rome, MApp combines the benefits of the blockchain tech- 1955). As for this treaty, buyers have the obligation nology and the Interplanetary File System (IPFS)2 for to check if the artwork has been stolen or illegally ex- the management of minor artworks archives. MApp ported. Some databases exist that can be used to per- provides users, either private people or organiza- form those checks, like the Interpol database of stolen tions, a public repository for minor artworks storage. artwork1, but are not always up-to-date or easily ac- Thanks to some specific advantages of blockchain,

1 https://www.interpol.int/How-we-work/ Date: 2019-07-29 Databases/Stolen-Works-of-Art-Database Access 2 https://ipfs.io/ Access Date: 2019-07-29 MApp is a secure application, which prevents thieves without rewriting also the new ones. With respect from removing records from the repository, prevents to a standard database, a blockchain is an append- counterfeiters with tampering with objects descrip- only register. This means that information can only tions, and helps users preserving artworks memory be added, but it cannot be removed. Modifications to in case of destruction of the physical object. Com- the stored data can be done by re-uploading a new pared to standard databases, the blockchain register version of it. A distributed consensus algorithm is guarantees integrity, transparency and authenticity of used to decide which transactions are to be consid- records. ered valid. New participants that want to start col- The remainder of the paper is organized as fol- laborating to the maintenance of the repository must lows: in Section 2 we give an overview of the follow this algorithm. There is no need of a central blockchain and IPFS technologies and in Section 3 authority or trust between nodes; the consensus algo- we illustrate the related work. Section 4 describes the rithm and cryptography grant the correctness of data problem setting and Sections 5 and 6 the MApp ap- even in presence of some malicious nodes. Signatures plication and its implementation. Finally, in Section and timestamping guarantee non-repudiation and are 7 we give conclusions and future work. a valid tool to perform audits. Summarizing, the big advantages of a blockchain as repository of data are that it is distributed, with no need of a central author- 2 BACKGROUND ity a no single point of failure, immutable, and secure. The main issues with blockchain implementation of distributed ledgers are scalability and efficiency: of- In this section we give an overview of the tech- ten, consensus algorithms that are used to grant con- nologies exploited by MApp: blockchain and IPFS. sistency are expensive in terms of time and resources. But in some cases trust assumptions can be relaxed, so 2.1 Blockchain that simpler consensus algorithms can be used. The most important blockchain protocols are: the above A blockchain is a particular implementation of a Dis- mentioned Bitcoin, Ethereum (Wood, 2014), Hyper- tributed Ledger (DL) (Zheng et al., 2016). A DL is es- ledger (Cachin, 2016). sentially a database, which is shared among different nodes of a network. In practice, all the nodes of the network share the same copy of the database and any 2.2 IPFS change made on a node is replicated to all the other nodes in few minutes and, in some cases, even in few seconds. The updates to the repository (called trans- IPFS is a peer-to-peer distributed filesystem which actions) are cryptographically signed by the node that permits the storage and the search of files, appli- sent them, and are communicated between partici- cations, websites and data. The substantial differ- pants in a peer-to-peer fashion. DLs can be permis- ence between IPFS and the classical HTTP trans- sioned (as opposite of permissionless) if a new record mission protocol, which regulates the current version can be added to the ledger only by some trusted actor of the Web, consists in the transition from a client- (e.g. government, departments and so on), and pri- server architecture to a peer-to-peer architecture. The vate (as opposite of public) if only trusted nodes can client-server architecture is characterized by a loca- read the content of the ledger. The protocol for the tion based addressing, while the peer-to-peer one is first functioning blockchain was introduced in 2008 defined by a content based addressing. This means to support the Bitcoin digital currency (Nakamoto, that IPFS assigns each content an immutable address, 2008), and implements the ledger as a chain of blocks. which does not change even in case of network fail- Each block contains a payload and a header. The pay- ure. Such an immutable address is built by applying load contains a series of transactions, while the header a hash function to every content. All the hash func- contains a timestamp, a cryptographic signature of the tions are stored into a Distributed Hash Table (DHT), payload (usually a hash of the entire content), and a which is used to access contents in the IPFS. link to the previous block of the chain (i. e., the cryp- The use of IPFS produces the following bene- tographic hash of the previous block). This way, the fits: a) availability, which implies that a resource integrity of the information stored in the blockchain (e.g. web site, file and so on) is always available; b) is protected through a security system based on cryp- anti-censorship, which implies that it is difficult for tography, since each block becomes dependent from authorities to censor resources; fast information re- the content of all the previous blocks, making it im- trieval, which gives the possibility to access resources possible to modify the data contained in old blocks even in case of a slow network. 3 LITERATURE REVIEW about records stored into an archive. ARMA Interna- tional4’s Generally Accepted Recordkeeping Princi- The problem of managing records through a ples (ARMA International, 2017) define a global stan- blockchain has been largely investigated during the dard that identifies the criticalities and a high-level last few years. In her paper, Lemieux proposes a framework of good practices for information gover- classification of blockchain applications (Lemieux, nance. They are a common set of principles that de- 2017), based on which information is stored in the scribe the conditions under which business records blockchain: a) mirror type, b) digital record type, c) and related information should be maintained. They tokenized type. are: Accountability: there should be a person that In the mirror type, the blockchain serves as a mir- is responsible and accountable for all the process; ror, which stores only records fingerprints. The com- Transparency: all the information should be docu- plete information of a record is stored into an external mented in an open and verifiable manner; Integrity: repository and the blockchain is used only to verify the information assets should be as authentic and reli- records integrity. In (Garc´ıa-Barriocanal et al., 2017) able as possible; Protection: no unauthorized parties the authors describe a first implementation of a decen- should be able to access private information; Com- tralized database, based on the combination pliance: laws and policies should be kept into con- of the blockchain and IPFS technologies. In their pa- sideration; Availability: information should be effi- per Liang et. al. describe ProvChain (Liang et al., ciently and accurately retrieved; Retention: informa- 2017), a system which guarantees data in tion should remain accessible for a period of time de- cloud environments. Vishwa et. al. (Vishwa and Hus- pending on legal, regulatory, fiscal, operational, and sain, 2018) illustrate a blockchain-based framework, historical requirements; Disposition: it should be pos- which guarantees copyright compliance of multime- sible to erase all the information that is no longer dia objects by means of smart contracts. needed. In the digital record type, the blockchain is used The following functional requirements are es- to store all the records in the form of smart con- sential for recordkeeping (Garc´ıa-Barriocanal et al., tracts. In (Bhowmik and Feng, 2017) the authors 2017): a) resource discovery/information retrieval; b) illustrate a distributed and tamper-proof framework resource management; c) resource use by appropri- for media. Each media is represented by a water- ate audiences; d) security; e) linking with related re- mark, which is firstly compressed and then stored into sources; f) software and hardware needs. a blockchain. Approved modifications to media are Resource discovery and information retrieval stored in the blockchain thus preventing tampering. should include an easy and fast way to search art- In (Galiev et al., 2018) the authors describe Archain, a works and their related information. Results of blockchain-based archive system, which stores small- searches should depend on the type of audiences: ev- sized records. Multiple roles are defined in the sys- ery artwork’s owner should decide which information tem, thus allowing records creation, approval and re- can be accessed by others. An appropriate ontology, moval. such as the Dublin Core Ontology (Weibel, 1997), In the tokenized type, records are stored in the should be defined to represent artworks and permit an blockchain and they are linked to a cryptocurrency. appropriate search by properties. Adding, updating or removing a record has a cost. Resource management should guarantee the ac- This constitutes an innovative case, where the liter- quisition of news about each minor artwork, such as ature is not consolidated yet. An example of this a temporary movement to an exhibit or a theft. Ev- type of blockchain is represented by the Ubitquity ery artwork movement should be traceable and doc- Project3, which records land transactions on behalf of umented. In addition, only authorized users, such as companies and government agencies. the artwork’s owner, should be able to register an art- work movement. Resource use by appropriate audiences should de- 4 PROBLEM SETTING fine access control policies on artworks. Access con- trol on information about artworks should guarantee The problem of storing minor artworks’ data into the following aspects: 1) only its owner should add an archive can be considered as a particular case an artwork, 2) the artwork’s owner should be aware of recordkeeping, which consists in creating, man- of who can access and update his/her artwork, 3) only aging, preserving, and defining access conditions 4ARMA International is a not-for-profit professional as- 3 http://www.ubitquity.io/brazil_ubitquity_ sociation and a global authority on governing information llc_pilot.html Access Date: 2019-07-29 as a strategic asset authorized users could access an artwork, 4) a group 5 MAPP of supervisor users should manage artworks in terms of approvals/rejects. In order to satisfy almost all the requirements of recordkeeping, we propose MApp, a system which Security of minor artworks should concern the fol- combines and exploits the benefits of blockchain and lowing aspects: privacy, authenticity and integrity. IPFS. The use of blockchain for recordkeeping is able Privacy is a security property which allows only au- to satisfy some of the requirements described in Sec- thorized users to access data. Authenticity is the prop- tion 4. In particular, a blockchain satisfies resource erty of attributing records to their legitimate authors. management and resource use by appropriate audi- Integrity refers to the property of guaranteeing that ences indirectly, resource discovery/information re- a record has not been modified by anyone. Integrity trieval, security directly (Garc´ıa-Barriocanal et al., should be provided through a tamper-proof environ- 2017). The use of IPFS for recordkeeping can guar- ment, where every artwork is not modified by unau- antee digital preservation of minor artworks. Linking thorized users. with related resources cannot be guaranteed neither by a blockchain nor by an IPFS, because it requires Linking is one of the most interesting aspects that an additional logic, based for example on mechanisms a system for recordkeeping should provide. Linking defined by (Berners-Lee et al., 2001) should concern both relations among artworks of the and (Bizer et al., 2011). Currently, this same archive (internal linking) and among artworks of aspect is out the scope of this paper. We defer this different archives (external linking). In general, link- kind of research to future work. ing is not a simple task, because it cannot be made completely automatic. Human operators, in fact, must 5.1 Users check that links among resources are correct, in order to guarantee the quality of links. Users of the system may play one of the following Software and hardware needs refer to digital roles: generic user, publisher, verifier. A generic user preservation of artworks thus making them available can search for an approved artwork in the system. The over time. Recordkeeping should take care of storage search can be done by artwork author or title. A pub- media instability and deterioration, which could lead lisher user can publish or update an artwork in the to data loss, and technology obsolescence and incom- system. When a new artwork is published, its status patibility, which may happen both at the hardware and is set to pending. This means that the artwork is not software level. approved yet thus cannot be accessed by third par- ties neither can be updated by its author. A verifier is an expert in the field to which the artwork belongs, Moreover, we took into consideration the the ISO and can vote for the approval of the artwork descrip- Standard 15489-1:2016 Information and documenta- tion. If an artwork reaches a certain number of votes tion Records management(ISO, 2016), that defines (a parameter that can be set in the system), its status concepts and principles for the creation, acquisition becomes approved, thus it can be searched by generic and management of records. Section 7.2 Charac- users and updated by its publisher. This mechanism teristics of a record lists the following: Authentic- based on votes constitutes a basic algorithm for com- ity: records must be created and maintained in such pliance with the principle of reliability of a record. a way that creators are authorized and identied, and More complex strategies can be defined and we defer that records are protected against unauthorized addi- this kind of study to future work. tion, deletion, alteration, use and concealment; Reli- ability: the content of a record should be accurate, and its creator should be worth of trust; Integrity: 5.2 Artwork Description a record should be complete and protected against unauthorized alteration. Every alteration should be Every minor artwork is described through some prop- documented and traceable; Usability: a usable record erties defined through vocabularies. Although there is one that can be located, retrieved, presented and in- are many more or less formal standards for the de- terpreted. scription of artworks, in our system we exploit two vocabularies: Dublin Core5 and extended Dublin All the described functional requirements are con- sidered in this paper, but linking, which is deferred as 5 http://www.dublincore.org/specifications/ future work and investigation. dublin-core/dces/ Access Date: 2019-07-29 Property DC Extended DC most of the foreseen use cases. Abstract   Access Rights   5.3 Operations Accrual Periodicity   Alternative Title   As already said, a publisher can perform two opera- Contributor   tions: publish and update an artwork. Coverage   Creator   Algorithm 1 publish(artwork) Date   f ← artwork. f acsimiles Date Available   m ← artwork.metadata Date Created   s ← subset(m) Date Modified   binary1 ← trans f orm( f ) Description   if binary1 then Format   hash1 ← upload to ip f s(binary1) Identifier   if hash1 then Language   m∗ ← artwork.metadata + hash1 License   binary2 ← trans f orm(m∗) Member Of   if binary2 then Publisher   hash2 ← upload to ip f s(binary2) Relation   if hash2 then Rights   result ← add to blockchain(hash2,s) Spatial Coverage   return result Source   end if Subject   end if Temporal Coverage   end if Title   end if Type   return FALSE Version   Table 1: Properties defined in Dublin Core and the Ex- tended Dublin Core. Algorithm 1 shows the pseudocode of the publish operation. Every artwork is composed of one or more facsimiles and some metadata, done through one of Core6. Dublin Core provides 15 basic properties to the previously described vocabularies. The facsimiles describe artworks. Extended Dublin Core allows a are converted in binary data (through the transform more detailed description of an artwork, through the function) and then uploaded to the IPFS (through the use of qualifiers (or subclasses) that allow a refine- upload to ipfs function). The upload returns an hash ment of the scheme with the addition of more precise for each facsimile, and the hashes are included in the meanings on the basic terms. Each Dublin Core ele- artwork metadata. The metadata undergoe the pre- ment is optional and may be repeated. Table 1 shows vious two steps (transform and upload to ipfs). The which properties are present in the two sets. returned hash of the metadata is then saved in the The choice of these metadata elements was made blockchain, together with a small subset of the art- by taking into account two factors. First of all, we work metadata, used for the search operation. tried to choose vocabularies able to represent the vast The function for update is similar to that for publi- set of typologies of minor artworks. Secondly, we cation: it receives the artwork and its new metadata as chose a compromise between the complexity of the input; if the status is approved, the new metadata are description, the ease of use for a non-expert user and transformed to binary and then updated in the IPFS. the degree of precision of the system used. For this If this last operation is successful, the new metadata reason, a user can choose one of the two sets to rep- are added to the blockchain. Algorithm 2 shows the resent their artworks. Dublin Core provides a meta search function, which receives a metadata as input. information scheme designed to assign reasonably The metadata can be either an author or an artwork broad properties to any digital material. It is a flex- name. The function searches for the metadata in the ible, simple and extensible scheme that is suitable for blockchain and returns the list of matching artworks pointers. For each retrieved artwork pointer, the com- 6 http://dublincore.org/specifications/ plete artwork information (metadata and facsimiles) dublin-core/dcmi-terms/ Access Date: 2019-07-29 is taken from IPFS and added to the result. Algorithm 2 search(metadata) 6.1 The Web User Interface artwork list ← get by tag blockchain(metadata) result ← 0 On the left side of the Web Interface (Footnote 11) if artwork list then it is possible to activate the module for inserting an for artwork pointer in artwork list do object and to consult the main information relating to hash ← artwork pointer.hash the active user (the user address, the token balance artwork ← get ip f s(hash) and the permissions). The central section contains the result.append(artwork) list of all the artworks recorded on the blockchain and end for the main information about each object. It also allows end if you to filter objects based on their approval status and return result search by title. The part on the right shows the com- plete description and the facsimiles of a selected art- work, extracted from the Data Lake.

6.2 The Blockchain

As already said, MApp exploits the Ethereum blockchain to manage artworks. All the artworks are stored into an Archive, which is represented by the following smart contract, written in Solidity12: contract Archive{ mapping (uint => Artwork) public artworks; uint artworkCounter;

Figure 1: The system architecture. function publishArtwork(...){...} function updateArtwork(...){...} function searchArtwork(...){...} 6 IMPLEMENTATION function approveArtwork(...){...} } Figure 1 illustrates the MApp architecture, which The artworks variable contains all the artworks, both is composed of three elements: a) the front-end (Web approved and not approved yet, artworkCounter User Interface), b) the back-end (blockchain), c) the contains the current number of artworks contained in data lake (IPFS). The front-end provides the users the archive. The functions define all the operations with all the operations to manage artworks. The back- that can be done on the archive: publish, update, end contains the transactions concerning every art- search and approve an artwork. work. The data lake contains all the artworks (fac- Every artwork is defined by a structure contain- similes and metadata), which can be accessed through ing: the Artwork ID, the address of the author of the the description hash contained in the blockchain. As 7 description, the artwork name or title, the hash of the back-end the Ethereum blockchain was used. For the complete description of the artwork on IPFS, the hash Data Lake, MApp exploits IPFS. In order to establish of the representative image associated to the artwork the connection between the back-end and the front- 8 on IPFS, the approval status (true if approved or false end, javascript and web3.js were used, while for the if not approved yet), the number of positive votes for connection between the back-end and the data lake, approval. Infura9 was exploited. The source code of MApp can Users management is implemented through three be downloaded from GitHub10. There is also a live well-known contracts (Whitelist.sol, RBAC.sol version of MApp11 (available only in Italian). and Roles.sol), taken from the OpenZeppelin li- 13 7 https://www.ethereum.org/ Access Date: 2019- brary . These contracts are used to add users to the 07-29 list of advanced users, which can vote for artworks 8https://web3js.readthedocs.io/en/v1.2.0/ approvals. Access Date: 2019-07-29 9 https://infura.io/ Access Date: 2019-07-29 cess Date: 2019-07-29 10https://github.com/lukasd2/ 12 https://solidity.readthedocs.io/en/v0.5.5/ Digital-Archives-dApp Access Date: 2019-07-29 Access Date: 2019-07-29 11 https://lukasd2.github.io/ 13 https://openzeppelin.org/ Access Date: 2019- Digital-Archives-dApp/src/artworks.html Ac- 07-29 6.3 The Data Lake REFERENCES

As already said, the Data Lake is implemented ARMA International (2017). Generally Accepted Record- through IPFS. When a user publishes a new artwork, keeping Principles. this is added to the Data Lake, where it is identified Berners-Lee, T., Hendler, J., Lassila, O., et al. (2001). The through a unique description hash that guarantees that semantic web. Scientific american, 284(5):28–37. information is not changed without a corresponding Bhowmik, D. and Feng, T. (2017). The multimedia update transaction. The same description hash is also blockchain: A distributed and tamper-proof me- stored in the blockchain, together with some basic in- dia transaction framework. In 2017 22nd Inter- formation (such as the artwork author) and its status. national Conference on Digital Signal Processing (DSP), pages 1–5. Bizer, C., Heath, T., and Berners-Lee, T. (2011). Linked data: The story so far. In Semantic services, inter- 7 CONCLUSIONS AND FUTURE operability and web applications: emerging concepts, WORK pages 205–227. IGI Global. Cachin, C. (2016). Architecture of the hyperledger In this paper we have described MApp, a blockchain fabric. In Workshop on Distributed Cryp- tocurrencies and Consensus Ledgers. blockchain-based application, aimed to be an aid for the protection of minor artworks. We have described Chiodi, S. and Fedeli, G. C. (2018). Beni culturali e conflitti armati, catastrofi naturali e disastri ambientali: le sfide numerous advantages of the use of blockchain to pro- ei progetti tra guerra, terrorismo, genocidi, criminalita` tect Cultural Heritage. First of all, a blockchain is organizzata. intrinsically distributed, in the sense that data are not Galiev, A., Prokopyev, N., Ishmukhametov, S., Stolov, E., hosted by a single central authority, thus all the in- Latypov, R., and Vlasov, I. (2018). Archain: a novel formation it stores is replicated on all the nodes of blockchain based archival system. In 2018 Second the network. This means that there is no single point World Conference on Smart Trends in Systems, Secu- of failure, so the archive is protected against acciden- rity and Sustainability (WorldS4), pages 84–89. tal data loss or malicious attempts to erase informa- Garc´ıa-Barriocanal, E., Sanchez-Alonso,´ S., and Sicilia, tion during a theft. In addition, in case of artworks M.-A. (2017). Deploying metadata on blockchain destruction, caused for example by a natural disas- technologies. In Research Conference on Metadata ter, the blockchain may contribute to keep the art- and Semantics Research, pages 38–49. Springer. works memory for an indefinite period of time. Sec- ISO (2016). ISO 15489-1/2: 2016-Information and docu- ondly, only authorized users can add/update artworks, mentation - Records management. thus preventing counterfeiting of the descriptions, and Lemieux, V. L. (2017). A typology of blockchain record- all the changes to the artwork description are doc- keeping solutions and some reflections on their im- plications for the future of archival preservation. In umented and remain traceable in case of audits. It 2017 IEEE International Conference on Big Data (Big is worth mentioning, though, that identity authenti- Data), pages 2271–2278. cation is performed by checking if a transaction is Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., signed with a correct private key. That is, identity and Njilla, L. (2017). Provchain: A blockchain- is associated with key ownership, with no guarantees based data provenance architecture in cloud environ- over the real identity of the owner of that key. As fu- ment with enhanced privacy and availability. In 2017 ture work, we would like to validate the implemented 17th IEEE/ACM International Symposium on Cluster, solution through experiments, and test it in a real use- Cloud and Grid Computing (CCGRID), pages 468– case, i.e. to store objects contained in local and small 477. museums. In addition, we would like to test the bene- Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic fits of implementing the system using another type of cash system. blockchain, such as Hyperledger14. Vishwa, A. and Hussain, F. K. (2018). A blockchain based approach for multimedia privacy protection and provenance. In 2018 IEEE Symposium Series on Com- putational Intelligence (SSCI), pages 1941–1945. ACKNOWLEDGEMENTS Weibel, S. (1997). The dublin core: a simple content description model for electronic resources. Bulletin We would like to thank Lukasz Szczygiel for his the- of the American Society for Information Science and sis work in the implementation of MApp. Technology, 24(1):9–11. Wood, G. (2014). Ethereum: A secure decentralised gen- 14 https://www.hyperledger.org/ Access Date: eralised transaction ledger. Ethereum Project Yellow 2019-07-29 Paper, 151:1–32. Zheng, Z., Xie, S., Dai, H.-N., and Wang, H. (2016). Blockchain challenges and opportunities: A survey. Work Pap.–2016.