Blockchain Technology Adoption Status and Strategies
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Virtual Currencies and Terrorist Financing : Assessing the Risks And
DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc. -
Beauty Is Not in the Eye of the Beholder
Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period. -
Asymmetric Proof-Of-Work Based on the Generalized Birthday Problem
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich University of Luxembourg University of Luxembourg [email protected] [email protected] Abstract—The proof-of-work is a central concept in modern Long before the rise of Bitcoin it was realized [20] that cryptocurrencies and denial-of-service protection tools, but the the dedicated hardware can produce a proof-of-work much requirement for fast verification so far made it an easy prey for faster and cheaper than a regular desktop or laptop. Thus the GPU-, ASIC-, and botnet-equipped users. The attempts to rely on users equipped with such hardware have an advantage over memory-intensive computations in order to remedy the disparity others, which eventually led the Bitcoin mining to concentrate between architectures have resulted in slow or broken schemes. in a few hardware farms of enormous size and high electricity In this paper we solve this open problem and show how to consumption. An advantage of the same order of magnitude construct an asymmetric proof-of-work (PoW) based on a compu- is given to “owners” of large botnets, which nowadays often tationally hard problem, which requires a lot of memory to gen- accommodate hundreds of thousands of machines. For prac- erate a proof (called ”memory-hardness” feature) but is instant tical DoS protection, this means that the early TLS puzzle to verify. Our primary proposal Equihash is a PoW based on the schemes [8], [17] are no longer effective against the most generalized birthday problem and enhanced Wagner’s algorithm powerful adversaries. -
Banking on Bitcoin: BTC As Collateral
Banking on Bitcoin: BTC as Collateral Arcane Research Bitstamp Arcane Research is a part of Arcane Crypto, Bitstamp is the world’s longest-running bringing data-driven analysis and research cryptocurrency exchange, supporting to the cryptocurrency space. After launch in investors, traders and leading financial August 2019, Arcane Research has become institutions since 2011. With a proven track a trusted brand, helping clients strengthen record, cutting-edge market infrastructure their credibility and visibility through and dedication to personal service with a research reports and analysis. In addition, human touch, Bitstamp’s secure and reliable we regularly publish reports, weekly market trading venue is trusted by over four million updates and articles to educate and share customers worldwide. Whether it’s through insights. their intuitive web platform and mobile app or industry-leading APIs, Bitstamp is where crypto enters the world of finance. For more information, visit www.bitstamp.net 2 Banking on Bitcoin: BTC as Collateral Banking on bitcoin The case for bitcoin as collateral The value of the global market for collateral is estimated to be close to $20 trillion in assets. Government bonds and cash-based securities alike are currently the most important parts of a well- functioning collateral market. However, in that, there is a growing weakness as rehypothecation creates a systemic risk in the financial system as a whole. The increasing reuse of collateral makes these assets far from risk-free and shows the potential instability of the financial markets and that it is more fragile than many would like to admit. Bitcoin could become an important part of the solution and challenge the dominating collateral assets in the future. -
Using Blockchain Technology to Secure the Internet of Things
Using Blockchain Technology to Secure the Internet of Things Presented by the Blockchain/ Distributed Ledger Working Group © 2018 Cloud Security Alliance – All Rights Reserved. You may download, store, display on your computer, view, print, and link to Using Blockchain Technology to Secure the Internet of Things subject to the following: (a) the Document may be used solely for your personal, informational, non- commercial use; (b) the Report may not be modified or altered in any way; (c) the Document may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Document as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Using Blockchain Technology to Secure the Internet of Things paper. Blockchain/Distributed Ledger Technology Working Group | Using Blockchain Technology to Secure the Internet of Things 2 © Copyright 2018, Cloud Security Alliance. All rights reserved. ABOUT CSA The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org and follow us on Twitter @cloudsa. Blockchain/Distributed Ledger Technology Working Group | Using Blockchain Technology to Secure the Internet of Things 3 © Copyright 2018, Cloud Security Alliance. All rights reserved. -
Models to Evaluate Service Provisioning Over Cloud
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Archives of the Faculty of Veterinary Medicine UFRGS Revista de Informatica´ Teorica´ e Aplicada - RITA - ISSN 2175-2745 Vol. 26, Num. 3 (2019) 65-74 RESEARCH ARTICLE Models to evaluate service Provisioning over Cloud Computing Environments - A Blockchain-As-A-Service case study Modelos para o provimento de Servic¸os em Ambientes de Computac¸ao˜ em Nuvem - Um estudo de caso aplicado a Blockchain como Servic¸o Carlos Melo1*, Jamilson Dantas2, Paulo Pereira3, Ronierison Maciel4, Paulo Maciel5 Abstract: The strictness of the Service Level Agreements (SLAs) is mainly due to a set of constraints related to performance and dependability attributes, such as availability. This paper shows that system’s availability values may be improved by deploying services over a private environment, which may obtain better availability values with improved management, security, and control. However, how much a company needs to afford to keep this improved availability? As an additional activity, this paper compares the obtained availability values with the infrastructure deployment expenses and establishes a cost × benefit relationship. As for the system’s evaluation technique, we choose modeling; while for the service used to demonstrate the models’ feasibility, the blockchain-as-a-service was the selected one. This paper proposes and evaluate four different infrastructures hosting blockchains: (i) baseline; (ii) double redundant; (iii) triple redundant, and (iv) hyper-converged. The obtained results pointed out that the hyper-converged architecture had an advantage over a full triple redundant environment regarding availability and deployment cost. -
A Scoping Review of Integrated Blockchain-Cloud (Bcc) Architecture for Healthcare: Applications, Challenges and Solutions
sensors Review A Scoping Review of Integrated Blockchain-Cloud (BcC) Architecture for Healthcare: Applications, Challenges and Solutions Leila Ismail 1,2,∗ , Huned Materwala 1,2 and Alain Hennebelle 3 1 Intelligent Distributed Computing and Systems Research Laboratory, Department of Computer Science and Software Engineering, College of Information Technology, United Arab Emirates University, Al Ain, Abu Dhabi 15551, United Arab Emirates; [email protected] 2 National Water and Energy Center, United Arab Emirates University, Al Ain, Abu Dhabi 15551, United Arab Emirates 3 Independent Researcher, Al Ain, Abu Dhabi 15551, United Arab Emirates; [email protected] * Correspondence: [email protected] Abstract: Blockchain is a disruptive technology for shaping the next era of a healthcare system striving for efficient and effective patient care. This is thanks to its peer-to-peer, secure, and transparent characteristics. On the other hand, cloud computing made its way into the healthcare system thanks to its elasticity and cost-efficiency nature. However, cloud-based systems fail to provide a secured and private patient-centric cohesive view to multiple healthcare stakeholders. In this situation, blockchain provides solutions to address security and privacy concerns of the cloud because of its decentralization feature combined with data security and privacy, while cloud provides solutions to the blockchain scalability and efficiency challenges. Therefore a novel paradigm of blockchain-cloud integration (BcC) emerges for the domain of healthcare. In this paper, we provide an in-depth Citation: Ismail, L.; Materwala, H.; analysis of the BcC integration for the healthcare system to give the readers the motivations behind Hennebelle, A. -
A Centralized Ledger Database for Universal Audit and Verification
LedgerDB: A Centralized Ledger Database for Universal Audit and Verification Xinying Yangy, Yuan Zhangy, Sheng Wangx, Benquan Yuy, Feifei Lix, Yize Liy, Wenyuan Yany yAnt Financial Services Group xAlibaba Group fxinying.yang,yuenzhang.zy,sh.wang,benquan.ybq,lifeifei,yize.lyz,[email protected] ABSTRACT certain consensus protocol (e.g., PoW [32], PBFT [14], Hon- The emergence of Blockchain has attracted widespread at- eyBadgerBFT [28]). Decentralization is a fundamental basis tention. However, we observe that in practice, many ap- for blockchain systems, including both permissionless (e.g., plications on permissioned blockchains do not benefit from Bitcoin, Ethereum [21]) and permissioned (e.g., Hyperledger the decentralized architecture. When decentralized architec- Fabric [6], Corda [11], Quorum [31]) systems. ture is used but not required, system performance is often A permissionless blockchain usually offers its cryptocur- restricted, resulting in low throughput, high latency, and rency to incentivize participants, which benefits from the significant storage overhead. Hence, we propose LedgerDB decentralized ecosystem. However, in permissioned block- on Alibaba Cloud, which is a centralized ledger database chains, it has not been shown that the decentralized archi- with tamper-evidence and non-repudiation features similar tecture is indispensable, although they have been adopted to blockchain, and provides strong auditability. LedgerDB in many scenarios (such as IP protection, supply chain, and has much higher throughput compared to blockchains. It merchandise provenance). Interestingly, many applications offers stronger auditability by adopting a TSA two-way peg deploy all their blockchain nodes on a BaaS (Blockchain- protocol, which prevents malicious behaviors from both users as-a-Service) environment maintained by a single service and service providers. -
CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility
CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility Marc J. Randazza Rule 1.1 Comment 8 To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Crypto Currency 1. What is Crypto Currency? 2. How does it work? 3. How could you screw this up? Blockchain •Decentralized •Transparent •Immutable Blockchain Blockchain • Time-stamped series of immutable records of data • Managed by a cluster of de-centralized computers • Each block is secured and bound to another, cryptographically • Shared • Immutable • Open for all to see – how you keep it honest Blockchain Blockchain • Transparent but also pseudonymous • If you look on the ledger, you will not see “Darren sent 1 BTC to Trixie” • Instead you will see “1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC” • But, if you know someone’s wallet ID, you could trace their transactions Crypto Roller Coaster – 5 years Crypto Roller Coaster – 1 day How can you screw this up? Quadriga You can lose it & Bankruptcy Your mind • C$190 million turned to digital dust • Thrown away with no back up • Death of CEO turned death of • $127 million in the trash – gone business • 7,500 BTC – Fluctuates WILDLY Ethical Considerations You might be surprised at what violates Rule 1.8 Which Rules? Rule 1.2 (d) – Criminal or Fraudulent Activity Rule 1.5 (a) – Reasonable Fee Rule 1.6 – Confidentiality Rule 1.8 (a) – Business Dealings With Clients Rule 1.8(f) – Compensation From Other Than Your Client Rule 1.15 (a) – Safekeeping Property Rule 1.15 (c) – Trust Accounts Rule 1.2(d) – Criminal or Fraudulent Activity • Crypto *can* be used for criminal activity • Tends to be difficult, but not A lawyer shall not .. -
Accelerating Software Delivery with Cloudbees
BLOCKCHAIN-AS-A-SERVICE ACCELERATINGTaking POCs to production with SOFTWARE BlockApps and Red DELIVERY Hat WITH CLOUDBEES JENKINS & RED HAT OPENSTACK SOLUTION BRIEF SOLUTION BRIEF BLOCKAPPS EXPERIENCE BUILD AND TEST NEW ENTERPRISE BLOCKCHAIN APPS RAPIDLY • Over 1,000 BlockApps blockchain Pressure to meet the growing demands of international customers are driving financial services organi- projects in development zations to look for innovative software solutions to distinguish themselves in the marketplace. One of the • Over 100 enterprises building most significant technologies to emerge is the blockchain application, a disruptive shift in architecture solutions on BlockApps that will change how enterprises manage their data, applications, transactions, and business processes. • Contributing member of Ethereum developer community Until now, it has been costly to test and prove the value of blockchain applications in a secure, enterprise- ready environment built on proprietary software. Red Hat and BlockApps are removing those barriers. We have joined forces to help you build innovative proofs-of-concepts and enterprise-ready blockchain applications— RED HAT OPENSHIFT all running on Red Hat® Enterprise Linux® in an OpenShift container. BUSINESS VALUE According to IDC,1 Red Hat The BlockApps STRATO Blockchain Platform includes Ethereum-based features and tools that are designed OpenShift customers experienced: specifically for enterprise businesses to build proofs-of-concepts (POCs) quickly and cost-effectively. Using Red • 66% faster application Hat Enterprise Linux and Red Hat OpenShift Container Platform, you can seamlessly move from development development life cycles and test to full production of your blockchain applications. • 35% less IT staff per applications • 38% lower IT infrastructure costs per application BLOCKAPPPS STRATO BLOCKCHAIN PLATFORM The BlockApps STRATO Blockchain Platform offers customizable transaction processing capabilities and con- 1 IDC White Paper – “The Business Value of Red Hat OpenShift,” Oct. -
Blockchain Deployment Toolkit
Redesigning Trust: Blockchain Deployment Toolkit Supply Chain Focus April 2020 EXPERIENCE THE INTERACTIVE VERSION AT: wef.ch/blockchain-toolkit World Economic Forum 91-93 route de la Capite CH-1223 Cologny/Geneva Switzerland Tel.: +41 (0)22 869 1212 Fax: +41 (0)22 786 2744 Email: [email protected] www.weforum.org © 2020 World Economic Forum. This publication has been published by the World Economic Forum All rights reserved. No part of this as a contribution to a project, insight areas or interaction. The publication may be reproduced findings, interpretations and conclusions expressed herein area or transmitted in any form or by result of a collaborative process facilitated and endorsed by the any means, including World Economic Forum, but whose results do not necessarily photocopying and recording, or represent the views of the World Economic Forum, nor the entirety of by any information storage and its Members, Partners or other stakeholders. retrieval system. Preface The emergence of blockchain technology holds great promise for supply-chain organisations, perhaps as much as any new development in the industry’s infrastructure since it switched to standardised containers decades ago. The case for blockchain is stronger as the COVID-19 pandemic underscores the need for more resilient global supply chains, trusted data and an economic recovery enabled through trade digitization. At the same time, blockchain may engender a fair share of puzzlement and anxiety among supply-chain leaders unfamiliar with it as a new and unfamiliar digitisation tool. This toolkit is designed to help with the deployment journey, whether your organisation is seeking to gain increased efficiency, greater trust with counterparties, or other potential benefits offered by blockchain technology. -
Blockchain As a Service for Iot Cloud Versus Fog
2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) Blockchain as a Service for IoT Cloud versus Fog Mayra Samaniego, Uurtsaikh Jamsrandorj Ralph Deters Department of Computer Science Department of Computer Science University of Saskatchewan University of Saskatchewan Saskatoon, Canada Saskatoon, Canada [email protected], [email protected] [email protected] Abstract—A blockchain is a distributed and decentralized ledger that preceding block is entered. Once a new block is formed, any contains connected blocks of transactions. Unlike other ledger changes to a previous block would result in different hashcode approaches, blockchain guarantees tamper proof storage of approved transactions. Due to its distributed and decentralized organization, and would thus be immediately visible to all participants in the blockchain is beeing used within IoT e.g. to manage device configuration, blockchain. Consequently, blockchains are considered store sensor data and enable micro-payments. A key challenge in the tamperproof distributed transaction ledgers. Originally deployment of blockchain technology is the hosting location. This paper designed as the distributed transaction ledger for BitCoin [3], evaluates the use of cloud and fog as hosting platforms. the idea of using blockchains has spread. Keywords—IoT, Virtual Resource, Software-Defined IoT, Edge The ability to create/store/transfer digital assets in a distributed, Computing, Multi-Tenancy decentralized and tamper-proof way is of a large practical value for IoT systems. While micro-payments in IoT may be the most obvious use of blockchain technology, we consider the I.