Blockchain for Identity Management IBM part 1 of 3
-
Upload
mike-c -
Category
Technology
-
view
228 -
download
1
Transcript of Blockchain for Identity Management IBM part 1 of 3
© 2016 IBM Corporation
Blockchain for Identity ManagementPart 1 (of 3)
Mike Chung | Associate Partner IBM Security
November 2016 Seoul
2© 2016 IBM Corporation
Items
§ What is blockchain? Part 1
– Blockchain explained in layman’s terms
§ How can we use blockchain? Part 2 Use case A; Part 3 Use case B
– Potential applications in Identity Management
§ Whom to watch? Part 3
– Initiatives and developments
3© 2016 IBM Corporation
What is blockchain?
4© 2016 IBM Corporation
Blockchain foundations
§ Foundation in cryptography; cryptography applied
§ Concept, technology, protocol
§ Various ‘projects’ applying the blockchain e.g. Bitcoin, Ethereum, Ripple
5© 2016 IBM Corporation
Blockchain foundations
Block TBlock T – 1
Parent block for block T
Genesis block
6© 2016 IBM Corporation
Blockchain: transactions
Transactions
7© 2016 IBM Corporation
Blockchain: block
Block T
Transactions
8© 2016 IBM Corporation
Blockchain: block chained
Block T
Transactions
Transactions
Block T – 1Block T – 2
Block
Reference to previous block
9© 2016 IBM Corporation
Blockchain: proof of work
Block T
Mining
Transactions
Transactions
Block T – 1Block T – 2
Block
Reference to previous block
Proof of work
10© 2016 IBM Corporation
Blockchain: consensus and verification (confirmation)
Block T
Mining
Transactions
Transactions
Block T – 1Block T – 2
Block
Reference to previous block
Proof of workYes No
Yes
11© 2016 IBM Corporation
Blockchain: hash function explained
Text
Hash function explained by Mike
Cryptographic hash function
(SHA-2 (256) algorithm mostly used)
hash
12© 2016 IBM Corporation
Blockchain: hash function explained
Text
0362d887
Hash function explained by Mike
Digest
Cryptographic hash function
(SHA-2 (256) algorithm mostly used)
hash
13© 2016 IBM Corporation
Blockchain: hash function explained
Text
0362d887
Hash function explained by Mike
Digest
One
way
func
tion
Cryptographic hash function
(SHA-2 (256) algorithm mostly used)
hash
14© 2016 IBM Corporation
Blockchain: hash function explained
TextText
Cryptographic hash function
(SHA-2 (256) algorithm mostly used)
0362d887
Hash function explained by Mike
hash
Digest
One
way
func
tion Hash function explained
by mike
66b15569
hash
Digest
15© 2016 IBM Corporation
Blockchain: referencing to previous block
Block TBlock T – 1Block T – 2
Transaction xyz
02ac6580
hash
225f00b0
16© 2016 IBM Corporation
Blockchain: referencing to previous block
Block TBlock T – 1Block T – 2
Transaction xyz
02ac6580
Transaction bcd
225f00b0
Transaction lmn
b76dd051
hash
225f00b0 b76dd051 29b7cd0d
hash hash
17© 2016 IBM Corporation
Old-fashioned centralization
18© 2016 IBM Corporation
Centralization/middlemen issues
SPF
Lack of verifiable trails
Dependency
19© 2016 IBM Corporation
Blockchain: distributed & shared ledger
SPF
Lack of verifiable trails
Dependency
20© 2016 IBM Corporation
Blockchain: solving the issues of centralization/middlemen
SPF
Lack of verifiable trails
Dependency
DistributedVerifiable
Based on consensus
21© 2016 IBM Corporation
Blockchain: solving the issues of centralization/middlemen
22© 2016 IBM Corporation
Blockchain: distributed ledger
1
Transaction
23© 2016 IBM Corporation
Blockchain: distributed ledger
1
Transaction
2Update
24© 2016 IBM Corporation
Blockchain: distributed ledger
1
Transaction
2Update
3 Consensus and validation
25© 2016 IBM Corporation
Blockchain characteristics
§ Centralized record/ledger
– Database on a “trusted” node
§ Leaving no verifiable audit trails
– Tampering with data possible
§ Updated by a central authority
– Central point of failure
§ Decentralized/distributed record/ledger
– Database for every (untrusted) participant
§ Leaving audit trails
– Once it’s there and verified, it stays there
§ Updated by consensus of the majority
– Extremely hard/expensive to breach
Traditional concept Blockchain
26© 2016 IBM Corporation
Basic “functionality”
§ Provides data storage
§ Performs computation: e.g. verification of transactions
§ Reaches consensus about the abovementioned items
27© 2016 IBM Corporation
Blockchain types
§ Public blockchain
– Permissionless; trustless (e.g Bitcoin blockchain)
– Permissioned; trusted (e.g. Ripple)
– Bitcoin blockchain as (by far) the most secure blockchain
§ Private (internal) blockchain
– Permissioned; trusted (e.g. Bankchain)
– Bypassing the limitations/constraints of the public blockchain(s), but theoretically less secure/robust
28© 2016 IBM Corporation
Blockchain typesPublic: permissionless
29© 2016 IBM Corporation
Blockchain typesPublic: permissionless Public: permissioned
30© 2016 IBM Corporation
Blockchain typesPublic: permissionless Public: permissioned Private: permissioned
31© 2016 IBM Corporation
Using blockchain: concept/technology
Blockchain concept
32© 2016 IBM Corporation
Using blockchain: different blockchains
Bitcoin blockchain Other blockchain(s)
Blockchain concept
33© 2016 IBM Corporation
Using blockchain: different services
Bitcoin blockchain
Bitcoin Services using bitcoin blockchain
Other blockchain(s)
Blockchain concept
Other services
34© 2016 IBM Corporation
Using blockchain: different use cases
Bitcoin blockchain
Bitcoin
Financial transactions
Services using bitcoin blockchain
Use cases using bitcoin
Other blockchain(s)
Blockchain concept
Other services
Other use cases
35© 2016 IBM Corporation
Blockchain assumptions
§ Decreasing data storage prices – blockchain grows bigger with each transaction/change
§ Controllable volume/sequence of transactions/changes
§ Users are competent enough to secure their private keys
§ No or very limited service needed
§ Consensus is reached by a honest majority
§ Blockchain is with us forever
36© 2016 IBM Corporation
Contact details
Drs. Mike Chung RE CISSP
Associate Partner IBM Security
+31 6 2565 7593 (the Netherlands)
+82 10 3521 7754 (South Korea)