Blockchain Beyond Bitcoin. Mark O Connell

Similar documents
WHAT HAPPENS WHEN THE FLASH INDUSTRY GOES TO TLC? Luanne M. Dauber, Pure Storage

Virtualization Practices:

Analysis and Optimization. Carl Waldspurger Irfan Ahmad CloudPhysics, Inc.

How to create a synthetic workload test. Eden Kim, CEO Calypso Systems, Inc.

Virtualization Practices: Providing a Complete Virtual Solution in a Box

Tutorial. A New Standard for IP Based Drive Management. Mark Carlson SNIA Technical Council Co-Chair

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation

in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company

Facing an SSS Decision? SNIA Efforts to Evaluate SSS Performance. Ray Lucchesi Silverton Consulting, Inc.

Cloud Archive and Long Term Preservation Challenges and Best Practices

Planning For Persistent Memory In The Data Center. Sarah Jelinek/Intel Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Application Recovery. Andreas Schwegmann / HP

Multi-Cloud Storage: Addressing the Need for Portability and Interoperability

High Availability Using Fault Tolerance in the SAN. Wendy Betts, IBM Mark Fleming, IBM

Ron Emerick, Oracle Corporation

SAS: Today s Fast and Flexible Storage Fabric. Rick Kutcipal President, SCSI Trade Association Product Planning and Architecture, Broadcom Limited

Storage Performance Management Overview. Brett Allison, IntelliMagic, Inc.

SRM: Can You Get What You Want? John Webster Principal IT Advisor, Illuminata

Apples to Apples, Pears to Pears in SSS performance Benchmarking. Esther Spanjer, SMART Modular

Notes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft

SAS: Today s Fast and Flexible Storage Fabric

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain

Introduction to Bitcoin I

Tiered File System without Tiers. Laura Shepard, Isilon

A Blockchain-based Mapping System

LTFS Bulk Transfer Standard PRESENTATION TITLE GOES HERE

SRM: Can You Get What You Want? John Webster, Evaluator Group.

Adrian Proctor Vice President, Marketing Viking Technology

Consensus & Blockchain

SpaceMint Overcoming Bitcoin s waste of energy

ADVANCED DATA REDUCTION CONCEPTS

Jeff Dodson / Avago Technologies

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Use Cases for iscsi and FCoE: Where Each Makes Sense

Felix Xavier CloudByte Inc.

PRESENTATION TITLE GOES HERE. Understanding Architectural Trade-offs in Object Storage Technologies

Storage in combined service/product data infrastructures. Craig Dunwoody CTO, GraphStream Incorporated

ADVANCED DEDUPLICATION CONCEPTS. Thomas Rivera, BlueArc Gene Nagle, Exar

Tom Sas HP. Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee

Felix Xavier CloudByte Inc.

Hyperledger fabric: towards scalable blockchain for business

Architectural Principles for Networked Solid State Storage Access

Evolution of Fibre Channel. Mark Jones FCIA / Emulex Corporation

Restoration Technologies

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG

Alternatives to Blockchains. Sarah Meiklejohn (University College London)

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Deploying Public, Private, and Hybrid. Storage Cloud Environments

Proof of Stake Made Simple with Casper

ENEE 457: E-Cash and Bitcoin

Mark Rogov, Dell EMC Chris Conniff, Dell EMC. Feb 14, 2018

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

Testing. Michael Ault, IBM Oracle FlashSystem Consulting Manager

SNIA Tutorial 1 A CASE FOR FLASH STORAGE HOW TO CHOOSE FLASH STORAGE FOR YOUR APPLICATIONS

LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Ramin Elahi, Adjunct Faculty UC Santa Cruz Silicon Valley

Blockchain! What consultants should know about it. Daniel

The Benefits of Solid State in Enterprise Storage Systems. David Dale, NetApp

Expert Insights: Expanding the Data Center with FCoE

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Proof-of-Stake Protocol v3.0

Whitepaper Rcoin Global

Alternative Consensus Algorithms. Murat Osmanoglu

The game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)

Everything You Wanted To Know About Storage (But Were Too Proud To Ask) The Basics

Data Deduplication Methods for Achieving Data Efficiency

The Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service)

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

Problem: Equivocation!

OpenStack Manila An Overview of Manila Liberty & Mitaka

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

Effective Storage Tiering for Databases

BaFin-Tech 2018 BlockChain & Security (from #developerview)

I. Introduction. II. Security, Coinage and Attacks

Performance and Innovation of Storage. Advances through SCSI Express

Introduction to Blockchain

What is Proof of Work?

ASPECTS OF DEDUPLICATION. Dominic Kay, Oracle Mark Maybee, Oracle

SNIA Tutorial 3 EVERYTHING YOU WANTED TO KNOW ABOUT STORAGE: Part Teal Queues, Caches and Buffers

Bitcoin, a decentralized and trustless protocol

Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas

Storage Virtualization II Effective Use of Virtualization - focusing on block virtualization -

A Lightweight Blockchain Consensus Protocol

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures

Using Chains for what They re Good For

Algorand: Scaling Byzantine Agreements for Cryptocurrencies

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains

Transcription:

Mark O Connell mark@mkoconnell.com

SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 2

Abstract Blockchain is the name of a new class of distributed application which can coordinate independent operations across multiple machines in an untrusted network and produce a consensus result on both the correctness of the individual operations as well as the order in which the operations were executed. While the most well known use case for blockchain is Bitcoin, the technology itself has many other applications and implementations and use cases are arising in areas as diverse as international finance, B2B transactions, identity management, domain name registration, and many more. This tutorial will introduce the blockchain family of technologies, will discuss the technical aspects of the implementations and how consensus is achieved despite the lack of trust amongst the machines, will explore how this basic technology can be applied for non-currency related use cases, and will discuss alternative implementations of the technology and their advantages and disadvantages. Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 3

Definitions: Bitcoin vs Blockchain Digital currency No gov t control Cryptographically secured payments Ordered list of records Distributed ledger Decentralized Self-policing Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 4 Reserved.

How does the bitcoin blockchain work? New tx Is it valid? Create a new block with this and other txs Try to add it to the chain Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 5 Reserved. If successful, tell other blockchain nodes about the new block

Why does this work? Cryptographically signed (PKI) Sent to multiple nodes Must reference txs where money originated Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

Why does this work? Validate signature Validate origin txs Must reference txs where money originated Validated on multiple nodes Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

Why does this work? Block hash must match a certain pattern ~10 minutes to generate, by varying nonce Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

Why does this work? Other nodes validate: Txs are valid Hash matches pattern Links to final block Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

Why all the trouble? Validate multiple times? 10 minute Proof of Work? Designed for a no-trust environment Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

There s more to life than money Property deeds Artwork provenance Car title / ownership Medical history Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 11Reserved.

There s more than one way Po-tay-to? Po-tah-to? Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 12Reserved.

What makes a distributed ledger? Forgery protection Information distribution Redundant network Decentralized network Internal fraud protection Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 13Reserved.

An example + Forgery protection - PKI Information distribution nodes chatter Redundant network mining rewards Decentralized network mining rewards Internal fraud protection Proof of Work Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 14Reserved.

An example Forgery protection - PKI Information distribution nodes chatter whitelist Redundant network Interested participants Decentralized network Interested participants Internal fraud protection Whitelisted nodes Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 15Reserved.

An example Forgery protection - PKI Information distribution Known node membership Redundant network Specific named nodes Decentralized network Specific named nodes Internal fraud protection Round robin mining Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 16Reserved.

Proof of Work alternatives Once there is some trust: Round robin Proof of Stake Proportional to previously mined blocks Practical Byzantine Fault Tolerance 2/3rds of participants agree Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 17Reserved.

A world of possibilities Identity B2B Smart Contracts DRM Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 18Reserved.

Attribution & Feedback The SNIA Education Committee thanks the following Individuals for their contributions to this Tutorial. Authorship History Mark O Connell Updates: Additional Contributors Please send any questions or comments regarding this SNIA Tutorial to tracktutorials@snia.org Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 19

How does the Bitcoin blockchain work? 1. Send transaction to blockchain node (x bitcoins to Y) 2. Node validates the transaction 3. Node groups (ordered) transactions together 4. Node mines the group Competing against other miners 5. Node broadcasts its results If another miner got here first, go back to step 2 Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 20Reserved.

How does the Bitcoin blockchain work? Tx 1 Tx 2 Tx 3 Tx 4 Tx 5 Tx N-1 Tx N Hash of block Hash of prior block Nonce Tx aa Tx ab Tx ac Tx ad Tx ae Tx ay Tx az Hash of block Hash of prior block Nonce Tx zkjdaa Tx zkjdab Tx zkjdac Tx zkjdad Tx zkjdae Tx zkjday Tx zkjdaz Hash of block Hash of prior block Nonce Tx new1 Tx new2 Tx new3 Tx new4 Tx new5 Tx new N-1 Tx new N TBD hash of block Hash of prior block TBD Nonce Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 21Reserved.

How does the Bitcoin blockchain work? Tx 1 Tx aa Tx zkjdaa Tx 2 Tx ab Tx zkjdab Tx 3 Tx ac Tx zkjdac Tx 4 Tx ad Tx zkjdad Tx 5 Tx ae Tx zkjdae Tx N-1 Tx ay Tx zkjday Tx N Hash of block Tx az Hash of block Tx zkjdaz Hash of block Hash of prior block Hash of prior block Hash of prior block Nonce Nonce Nonce Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 22Reserved.

New tx Is it valid? Create a new block with this and other txs Try to add it to the chain Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 23Reserved.

How does the bitcoin blockchain work? New tx Is it valid? Create a new block with this and other txs Try to add it to the chain Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 24Reserved. If successful, tell other blockchain nodes about the new block

Tutorial Preparation Guidelines Large size slide page number is deliberate Easier for audience to follow from handouts Keep slide-count to amount you can cover in time allotted Maximum 40-45 slides for 60-minute session Maximum 30-35 slides for 45-minute session Title, boilerplate (e.g. legal, Attribution & Feedback contents, and separator slides don t count against limit You may have extra slides in an Appendix (max. of ~30% extra) 3 levels of bullets maximum 4 to 6 Bullets: use 2 column text slide Use www.snia.org scheme colors for hyperlinks AVOID Moving or resizing the text area Changing fonts, point sizes or spacing Use color, bold and italics for emphasis Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 26

Tutorial Preparation Guidelines (cont.) Title Slide: List the presentation title, presenter name/company name; if a co -presenter, list name/company name (no email addresses). Always include: Legal, Abstract, and Attribution & Feedback slides (do not delete these slides) Legal slide is #2 slide Abstract Slide is #3: View the sample abstract in SNIA Tutorial Preparation Guidelines presentation and modify your abstract to fit that format. Attribution & Feedback (authorship history & contributors) is the final slide before any appendix Please try to stay with template colors in case re-coloration is necessary. For information on approved colors, view https://members.snia.org/members/style%20guide_07.pdf Run spell check when done Choose Tools, Spelling in Powerpoint 97-2003 Choose Review, Spelling in Powerpoint 2007 Save your presentation as a Powerpoint 2007.pptx presentation file Refer to the FAQ for SNIA Tutorials General Information at http://www.snia.org/education/tutorials/faq/ Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 27

Graphics Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 28

Graphics Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 29

Graphics Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 30

Refer to Other Tutorials Use this icon to refer to other SNIA Tutorials where applicable Check out SNIA Tutorial: Enter Tutorial Title Here Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 31