IBM Fires Blockchain into the Cloud and into the Hands of Developers

By April 12, 2016Bitcoin Business
Click here to view original web page at www.the-blockchain.com

Share with:

Open Blockchain (OBC) is a ledger of digital events, called transactions, shared among different participants, each having a stake in the system. The ledger can only be updated by consensus of the participants, and, once recorded, information can never be altered. Each recorded event is cryptographically verifiable with proof of agreement from the participants.

From a technical standpoint, OBC is a fabric architecture that allows businesses to harness the power of cryptographically secure, immutable (append-only), distributed and peer-to-peer databases. These are commonly known as “blockchains,” pioneered by the Bitcoin and Ethereum communities.

OBC extends traditional blockchain technologies by incorporating:

  • Logic (chain code): Chain code extends traditional smart-contracts, broadly defined as self-executing agreements written in code that may be interacted with and may trigger other smart-contracts, but with further capabilities. Chain-code is executed in sandboxed Docker containers, and may interact with other hlp-fabric-golang networks or the outside world. More importantly, chain-code is immutable, may retain state, and inherits confidentiality/privacy.
  • Variable Confidentiality: Networks can limit who can view or interact at different levels of the environment. Individual transactions can even impose their own confidentiality rules.
  • Verifiable Identification: While the network can set identity obfuscation, it is possible to have 100% anonymous peers whose identity is also provable and unique with secure cryptographic techniques. If the users of a network grant permission, an auditor will be able to de-anonymize users and their transactions. This is useful for regulatory inspections and analysis.
  • Private Transactions: The details of a transaction, including but not limited to chain-code, peers, assets, and volumes are encrypted. This eliminates any pattern recognition or leaked private information to non-authorized actors on the network. Only specified actors can decrypt, view and interact/execute (with chain-code).
  • Customizable Consensus Protocols: The fabric will easily operate with almost any consensus mechanism (for example, proof-of-work, proof-of-stake, etc.). This customizable architectural design makes OBC applicable to more applications.

Share with:

From a technical standpoint, OBC is a fabric architecture that allows businesses to harness the power of cryptographically secure, immutable (append-only), distributed and peer-to-peer databases. These are commonly known as “blockchains,” pioneered by the Bitcoin and Ethereum communities.

OBC extends traditional blockchain technologies by incorporating: Logic (chain code) : Chain code extends traditional smart-contracts, broadly defined as self-executing agreements written in code that may be interacted with and may trigger other smart-contracts, but with further capabilities. Chain-code is executed in sandboxed Docker containers, and may interact with other hlp-fabric-golang networks or the outside world. More importantly, chain-code is immutable, may retain state, and inherits confidentiality/privacy.

Variable Confidentiality : Networks can limit who can view or interact at different levels of the environment. Individual transactions can even impose their own confidentiality rules.

Verifiable Identification : While the network can set identity obfuscation, it is possible to have 100% anonymous peers whose identity is also provable and unique with secure cryptographic techniques. If the users of a network grant permission, an auditor will be able to de-anonymize users and their transactions. This is useful for regulatory inspections and analysis.

Private Transactions : The details of a transaction, including but not limited to chain-code, peers, assets, and volumes are encrypted. This eliminates any pattern recognition or leaked private information to non-authorized actors on the network. Only specified actors can decrypt, view and interact/execute (with chain-code).

Customizable Consensus Protocols : The fabric will easily operate with almost any consensus […]

Leave a Reply

All Today's Crypto News In One Place