Details

Blockchain for Business


Blockchain for Business

How it Works and Creates Value
1. Aufl.

von: S. S. Tyagi, Shaveta Bhatia

152,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 14.01.2021
ISBN/EAN: 9781119711056
Sprache: englisch
Anzahl Seiten: 400

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>The book focuses on the power of business blockchain. It gives an overview of blockchain in traditional business, marketing, accounting and business intelligence. The book provides a detailed working knowedge of blockchain, user cases of blockchain in business, cryptocurrency and Initial Coin Offering(ICO) along with the risks associated with them. The book also covers the detailed study of decentralization, mining, consensus, smart contracts, concepts and working of distributed ledgers and hyper ledgers as well as many other important concepts. It also details the security and privacy aspects of blockchain.</p> <p>The book is beneficial for readers who are preparing for their business careers, those who are working with small scale businesses and startups, and helpful for business executives, managers, entrepreneurs, bankers, government officials and legal professionals who are looking to blockchain for secure financial transactions. The book will also be beneficial for researchers and students who want to study the latest developments of blockchain.</p>
<p>Preface xv</p> <p><b>1 Introduction to Blockchain 1<br /></b><i>Akshay Mudgal</i></p> <p>1.1 Introduction 1</p> <p>1.1.1 Public Blockchain Architecture 5</p> <p>1.1.2 Private Blockchain Architecture 5</p> <p>1.1.3 Consortium Blockchain Architecture 5</p> <p>1.2 The Privacy Challenges of Blockchain 6</p> <p>1.3 De-Anonymization 8</p> <p>1.3.1 Analysis of Network 9</p> <p>1.3.2 Transaction Fingerprinting 9</p> <p>1.3.3 DoS Attacks 9</p> <p>1.3.4 Sybil Attacks 9</p> <p>1.4 Transaction Pattern Exposure 10</p> <p>1.4.1 Transaction Graph Analysis 10</p> <p>1.4.2 AS-Level Deployment Analysis 10</p> <p>1.5 Methodology: Identity Privacy Preservation 10</p> <p>1.5.1 Mixing Services 10</p> <p>1.5.2 Ring Signature 12</p> <p>1.6 Decentralization Challenges Exist in Blockchain 14</p> <p>1.7 Conclusion 15</p> <p>1.8 Regulatory Challenges 16</p> <p>1.9 Obstacles to Blockchain Regulation 16</p> <p>1.10 The Current Regulatory Landscape 17</p> <p>1.11 The Future of Blockchain Regulation 18</p> <p>1.12 Business Model Challenges 19</p> <p>1.12.1 Traditional Business Models 19</p> <p>1.12.2 Manufacturer 19</p> <p>1.12.3 Distributor 20</p> <p>1.12.4 Retailer 20</p> <p>1.12.5 Franchise 20</p> <p>1.13 Utility Token Model 20</p> <p>1.13.1 Right 21</p> <p>1.13.2 Value Exchange 21</p> <p>1.13.3 Toll 21</p> <p>1.13.4 Function 21</p> <p>1.13.5 Currency 22</p> <p>1.13.6 Earning 22</p> <p>1.14 Blockchain as a Service 22</p> <p>1.15 Securities 23</p> <p>1.16 Development Platforms 24</p> <p>1.17 Scandals and Public Perceptions 25</p> <p>1.17.1 Privacy Limitations 26</p> <p>1.17.2 Lack of Regulations and Governance 26</p> <p>1.17.3 Cost to Set Up 26</p> <p>1.17.4 Huge Consumption of Energy 26</p> <p>1.17.5 Public Perception 27</p> <p>References 27</p> <p><b>2 The Scope for Blockchain Ecosystem 29<br /></b><i>Manisha Suri</i></p> <p>2.1 Introduction 30</p> <p>2.2 Blockchain as Game Changer for Environment 32</p> <p>2.3 Blockchain in Business Ecosystem 38</p> <p>2.3.1 Business Ecosystem 39</p> <p>2.3.1.1 What Is Business Model? 39</p> <p>2.3.1.2 Business Model—Traditional 39</p> <p>2.3.2 Are Blockchain Business Models Really Needed? 41</p> <p>2.3.2.1 Blockchain Business Model 41</p> <p>2.3.2.2 Model 1: Utility Token Model 41</p> <p>2.3.2.3 Model 2: BaaS 43</p> <p>2.3.2.4 Model 3: Securities 44</p> <p>2.3.2.5 Model 4: Development Platforms 45</p> <p>2.3.2.6 Model 5: Blockchain-Based Software Products 46</p> <p>2.3.2.7 Model 6: Blockchain Professional Services 46</p> <p>2.3.2.8 Model 7: Business Model—P2P 47</p> <p>2.4 Is Blockchain Business Ecosystem Profitable? 48</p> <p>2.5 How Do You “Design” a Business Ecosystem? 49</p> <p>2.6 Redesigning Future With Blockchain 53</p> <p>2.6.1 Is Earth Prepared for Blockchain? 53</p> <p>2.7 Challenges and Opportunities 57</p> <p>References 58</p> <p><b>3 Business Use Cases of Blockchain Technology 59<br /></b><i>Vasudha Arora, Shweta Mongia, Sugandha Sharma and Shaveta Malik</i></p> <p>3.1 Introduction to Cryptocurrency 60</p> <p>3.2 What is a Bitcoin? 60</p> <p>3.2.1 Bitcoin Transactions and Their Processing 62</p> <p>3.2.2 Double Spending Problem 65</p> <p>3.2.3 Bitcoin Mining 67</p> <p>3.3 Bitcoin ICO 69</p> <p>3.3.1 ICO Token 69</p> <p>3.3.2 How to Participate in ICO 70</p> <p>3.3.3 Types of Tokens 71</p> <p>3.4 Advantages and Disadvantages of ICO 72</p> <p>3.5 Merchant Acceptance of Bitcoin 73</p> <p>References 75</p> <p><b>4 Ethereum 77<br /></b><i>Shaveta Bhatia and S.S Tyagi</i></p> <p>4.1 Introduction 78</p> <p>4.2 Basic Features of Ethereum 78</p> <p>4.3 Difference between Bitcoin and Ethereum 79</p> <p>4.4 EVM (Ethereum Virtual Machine) 82</p> <p>4.5 Gas 85</p> <p>4.5.1 Gas Price Chart 85</p> <p>4.6 Applications Built on the Basis of Ethereum 86</p> <p>4.7 ETH 87</p> <p>4.7.1 Why Users Want to Buy ETH? 87</p> <p>4.7.2 How to Buy ETH? 88</p> <p>4.7.3 Alternate Way to Buy ETH 88</p> <p>4.7.4 Conversion of ETH to US Dollar 89</p> <p>4.8 Smart Contracts 90</p> <p>4.8.1 Government 90</p> <p>4.8.2 Management 91</p> <p>4.8.3 Benefits of Smart Contracts 91</p> <p>4.8.4 Problems With Smart Contracts 92</p> <p>4.8.5 Solution to Overcome This Problem 92</p> <p>4.8.6 Languages to Build Smart Contracts 92</p> <p>4.9 DApp (Decentralized Application or Smart Contract) 93</p> <p>4.9.1 DApp in Ethereum 93</p> <p>4.9.2 Applications of DApps 93</p> <p>4.10 Conclusion 95</p> <p>References 95</p> <p><b>5 E-Wallet 97<br /></b><i>Ms. Vishawjyoti</i></p> <p>5.1 Overview of Wallet Technology 97</p> <p>5.2 Types of Wallet 98</p> <p>5.2.1 Paper 98</p> <p>5.2.2 Physical Bitcoins 99</p> <p>5.2.3 Mobile 99</p> <p>5.2.4 Web 100</p> <p>5.2.5 Desktop 100</p> <p>5.2.6 Hardware 100</p> <p>5.2.7 Bank 101</p> <p>5.3 Security of Bitcoin Wallets 101</p> <p>5.4 Workings of Wallet Technology 101</p> <p>5.5 Create HD Wallet From Seed 102</p> <p>5.5.1 Initiation 103</p> <p>5.5.2 Steps for Creating an HD Wallet From a 24-Word Seed Phrase Through Particl-qt Tool 104</p> <p>5.5.3 Steps for Encrypting the HD Wallet 106</p> <p>5.5.4 Utilization 108</p> <p>5.5.5 Steps for Generating Address to Access Transactions on the HD Wallet 108</p> <p>5.6 Navigating HD Wallet 109</p> <p>5.7 Conclusion 110</p> <p>References 110</p> <p><b>6 Blockchain and Governance: Theory, Applications and Challenges 113<br /></b><i>Bhavya Ahuja Grover, Bhawna Chaudhary, Nikhil Kumar Rajput and Om Dukiya</i></p> <p>6.1 Introduction 114</p> <p>6.2 Governance: Centralized vs Decentralized 115</p> <p>6.3 Blockchain’s Features Supportive of Decentralization 117</p> <p>6.4 Noteworthy Application Areas for Blockchain-Based Governance 119</p> <p>6.4.1 Public Service Governance 119</p> <p>6.4.2 Knowledge and Shared Governance 121</p> <p>6.4.3 Governance in Supply Chain 123</p> <p>6.4.4 Governance of Foreign Aid 124</p> <p>6.4.5 Environmental Governance 125</p> <p>6.4.6 Corporate Governance 126</p> <p>6.4.7 Economic Governance 128</p> <p>6.5 Scopes and Challenges 128</p> <p>6.6 Conclusion 136</p> <p>References 137</p> <p><b>7 Blockchain-Based Identity Management 141<br /></b><i>Abhishek Bhattacharya</i></p> <p>7.1 Introduction 141</p> <p>7.2 Existing Identity Management Systems and Their Challenges 142</p> <p>7.3 Concept of Decentralized Identifiers 144</p> <p>7.4 The Workflow of Blockchain Identity Management Systems 145</p> <p>7.5 How Does it Contribute to Data Security? 148</p> <p>7.6 Trending Blockchain Identity Management Projects 150</p> <p>7.7 Why and How of Revocation 152</p> <p>7.8 Points to Ponder 154</p> <p>7.8.1 Comparison Between Traditional and Blockchain-Based Identity Management Systems 156</p> <p>7.9 Conclusion 157</p> <p>References 158</p> <p><b>8 Blockchain & IoT: A Paradigm Shift for Supply Chain Management 159<br /></b><i>Abhishek Bhattacharya</i></p> <p>8.1 Introduction 159</p> <p>8.2 Supply Chain Management 160</p> <p>8.2.1 The Aspects of a Supply Chain 161</p> <p>8.2.2 Supply Chain Performance Dimensions 162</p> <p>8.2.3 Supply Chain Migration Towards Digitalization 163</p> <p>8.3 Blockchain and IoT 164</p> <p>8.3.1 What Makes Blockchain Suitable for SCM? 166</p> <p>8.3.1.1 Shared Ledger 167</p> <p>8.3.1.2 Permissions 168</p> <p>8.3.1.3 Consensus 168</p> <p>8.3.1.4 Smart Contracts 169</p> <p>8.3.2 The Role of Blockchain in Achieving the SCM Performance Dimensions 170</p> <p>8.3.3 The Role of IoT in the Implementation of Blockchain Technology 171</p> <p>8.4 Blockchain Technology and IoT Use Cases in Supply Chain Management 172</p> <p>8.5 Benefits and Challenges in Blockchain-Based Supply Chain Management 173</p> <p>8.6 Conclusion 176</p> <p>References 176</p> <p><b>9 Blockchain-Enabled Supply Chain Management System 179<br /></b><i>Sonal Pathak</i></p> <p>9.1 Introduction 180</p> <p>9.1.1 Supply Chain Management 180</p> <p>9.2 Blockchain Technology 184</p> <p>9.3 Blockchain Technology in Supply Chain Management 186</p> <p>9.4 Elements of Blockchain That Affects Supply Chain 190</p> <p>9.4.1 Bitcoin 195</p> <p>9.5 Challenges in Implementation of Blockchain-Enabled Supply Chain 197</p> <p>9.6 Conclusion 197</p> <p>References 199</p> <p><b>10 Security Concerns of Blockchain 201<br /></b><i>Neha Jain and Kamiya Chugh</i></p> <p>10.1 Introduction: Security Concerns of Blockchain 201</p> <p>10.2 Cryptocurrencies Scenarios 202</p> <p>10.3 Privacy Challenges of Blockchain 203</p> <p>10.3.1 Protection Problems in Blockchain 203</p> <p>10.3.2 Privacy-Preserving Mechanisms Analysis 207</p> <p>10.3.3 Data Anonymization-Mixing 207</p> <p>10.4 Decentralization in Blockchain 208</p> <p>10.4.1 Role of Decentralization in Blockchain 209</p> <p>10.4.2 Analysis of PoS and DPoS 210</p> <p>10.4.3 Problems With Decentralization 210</p> <p>10.4.4 Decentralization Recovery Methods 212</p> <p>10.5 Legal and Regulatory Issues in Blockchain 213</p> <p>10.5.1 Legal Value of Blockchain and its Problems 214</p> <p>10.6 Smart Contracts 218</p> <p>10.7 Scandals of Blockchain 220</p> <p>10.7.1 Blockchain Technologies as Stumbling Blocks to Financial Legitimacy 223</p> <p>10.8 Is Blockchain the Rise of Trustless Trust? 223</p> <p>10.8.1 Why Do We Need a System of Trust? 226</p> <p>10.9 Blockchain Model Challenges 227</p> <p>References 229</p> <p><b>11 Acceptance and Adoption of Blockchain Technology: An Examination of the Security & Privacy Challenges 231<br /></b><i>Amandeep Dhaliwal and Sahil Malik</i></p> <p>11.1 Introduction 231</p> <p>11.1.1 Research Methodology 233</p> <p>11.1.2 Analysis 233</p> <p>11.2 Security Issues of Blockchain 233</p> <p>11.2.1 The Majority Attack (51% Attacks) 233</p> <p>11.2.2 The Fork Problems 234</p> <p>11.2.2.1 Hard Fork 234</p> <p>11.2.2.2 Soft Fork 235</p> <p>11.2.3 Scale of Blockchain 235</p> <p>11.2.4 Time Confirmation of Blockchain Data— Double-Spend Attack/Race Attack 235</p> <p>11.2.5 Current Regulations Problems 236</p> <p>11.2.6 Scalability and Storage Capacity 236</p> <p>11.2.7 DOS Attack/Sybil Attack/Eclipse Attack/Bugs 237</p> <p>11.2.8 Legal Issues 237</p> <p>11.2.9 Security of Wallets 238</p> <p>11.2.10 The Increased Computing Power 238</p> <p>11.3 Privacy Challenges of Bitcoin 238</p> <p>11.3.1 De-Anonymization 239</p> <p>11.3.1.1 Network Analysis 239</p> <p>11.3.1.2 Address Clustering 239</p> <p>11.3.1.3 Transaction Finger Printing 240</p> <p>11.3.2 Transaction Pattern Exposure 240</p> <p>11.3.2.1 Transaction Graph Analysis 240</p> <p>11.3.2.2 Autonomous System-Level Deployment Analysis 241</p> <p>11.4 Blockchain Application-Based Solutions 241</p> <p>11.4.1 Bitcoins 241</p> <p>11.4.2 IoT 242</p> <p>11.4.2.1 MyBit 242</p> <p>11.4.3 Aero Token 242</p> <p>11.4.4 The Chain of Things 243</p> <p>11.4.5 The Modum 243</p> <p>11.4.6 Twin of Things 243</p> <p>11.4.7 The Blockchain of Things 244</p> <p>11.4.8 Blockchain Solutions: Cloud Computing 244</p> <p>11.5 Conclusion and Future Work 245</p> <p>References 245</p> <p><b>12 Deficiencies in Blockchain Technology and Potential Augmentation in Cyber Security 251<br /></b><i>Eshan Bajal, Madhulika Bhatia, Lata Nautiyal and Madhurima Hooda</i></p> <p>12.1 Introduction 252</p> <p>12.2 Security Issues in Blockchain Technology 252</p> <p>12.3 Privacy Challenges 253</p> <p>12.3.1 BGP Hijacking Attack 255</p> <p>12.3.2 BDoS (Blockchain Denial of Service) 255</p> <p>12.3.3 Forcing Other Miners to Stop Mining 256</p> <p>12.4 Decentralization Challenges 256</p> <p>12.5 Regulatory Challenges 260</p> <p>12.5.1 Principles to Follow While Regulating 262</p> <p>12.5.1.1 Flexible to Legal Innovation 262</p> <p>12.5.1.2 Experimentation Should be Encouraged 263</p> <p>12.5.1.3 Focus on the Immediate Implications 264</p> <p>12.5.1.4 Regulators Should Engage in a Transnational Conversation 264</p> <p>12.5.2 Regulatory Strategies 265</p> <p>12.5.2.1 Wait-and-See 265</p> <p>12.5.2.2 Imposing Narrowing and Broadening Guidance 266</p> <p>12.5.2.3 Sandboxing 266</p> <p>12.5.2.4 Issue a New Legislation 267</p> <p>12.5.2.5 Use Blockchain in Regulation 268</p> <p>12.6 Business Model Challenges 269</p> <p>12.7 Scandals and Public Perception 271</p> <p>12.8 Why Blockchain is Trustless 277</p> <p>12.8.1 Trust Mechanism 278</p> <p>12.8.2 Anonymity 279</p> <p>12.8.3 Use in Digital Wallets 279</p> <p>12.8.4 Forgery Resistance 279</p> <p>12.9 Use of Blockchain in Cybersecurity 280</p> <p>12.9.1 Blockchain Database 281</p> <p>12.9.2 DNS Security 283</p> <p>12.9.3 IoT Security 283</p> <p>12.9.4 DDoS Prevention 286</p> <p>12.9.5 CDN (Content Delivery Network) 286</p> <p>12.9.6 SMS Authentication 287</p> <p>References 288</p> <p><b>13 Internet of Things and Blockchain 295<br /></b><i>Priyanka Sharma</i></p> <p>13.1 History of ‘Internet of Things’ 296</p> <p>13.2 IoT Devices 298</p> <p>13.3 Sensors and Actuators 302</p> <p>13.4 Cloud and Haze-Based Engineering 307</p> <p>13.5 Blockchain and IoT 315</p> <p>13.6 Edge Computing 321</p> <p>13.7 Contextual Analyses 324</p> <p>13.8 Fate of Blockchain and IoT 332</p> <p>References 332</p> <p><b>14 Blockchain Applications 337<br /></b><i>Boby Singh, Rohit Pahwa, Hari Om Tanwar and Nikita Gupta</i></p> <p>14.1 Introduction to Blockchain 337</p> <p>14.1.1 Uses of Blockchain in Administration 339</p> <p>14.2 Blockchain in Big Data Predictive Task Automation 340</p> <p>14.2.1 How Can Blockchain Help Big Data? 341</p> <p>14.2.2 Blockchain Use Cases in Big Data 341</p> <p>14.3 Digital Identity Verification 342</p> <p>14.3.1 Why Digital Identity Matters? 343</p> <p>14.3.2 Blockchain (Definition and its Features) 343</p> <p>14.3.3 Why do we Need Blockchain in Digital Identity? 344</p> <p>14.3.4 How Does a Blockchain Works? 345</p> <p>14.3.5 Why is a Blockchain Secure? 345</p> <p>14.3.6 What’s Blockchain Identification Management? 346</p> <p>14.3.7 Advantages 347</p> <p>14.4 Blockchain Government 348</p> <p>14.4.1 Decentralized Government Services 349</p> <p>14.4.2 Liquid Democracy and Random Sample Election 350</p> <p>14.5 Blockchain Science 351</p> <p>14.5.1 FoldingCoin 351</p> <p>14.5.2 GridCoin (GRC) 352</p> <p>14.5.3 Global Public Health 353</p> <p>14.5.4 Bitcoin Genomics 354</p> <p>14.6 Blockchain Health 355</p> <p>14.6.1 Health Coin 355</p> <p>14.6.2 EMR on Blockchain 355</p> <p>14.6.3 Bit Coin Health Notary 356</p> <p>14.7 Blockchain Learning 357</p> <p>14.7.1 Bitcoin MOOCs 357</p> <p>14.7.2 Smart Contract Literacy 357</p> <p>14.7.3 LearnCoin 359</p> <p>References 359</p> <p><b>15 Advance Concepts of Blockchain 361<br /></b><i>Raj Kumar</i></p> <p>15.1 Community Supercomputing 361</p> <p>15.2 Blockchain Genomics 364</p> <p>15.3 Blockchain Learning 365</p> <p>15.4 Community Coin 366</p> <p>15.4.1 Monetary and Non-Monetary Currencies 367</p> <p>15.4.2 Difference Between Monetary and Non-Monetary Assets 369</p> <p>15.4.3 Currency Multiplicity 369</p> <p>15.4.4 List of Some Prominent Alternate Coins is Given Below 370</p> <p>15.5 Demurrage Currencies 371</p> <p>Reading List 371</p> <p>Index 373</p>
<p><b>S.S. Tyagi</b> is a Professor of Computer Engineering and Dean at Manav Rachna International Institute of Research & Studies, Faridabad, India. He obtained his PhD from Kururkshetra University in 2010 in Computer Technology. He has more than 28 years of teaching and research experience and has authored many research publications in high indexed journals. <p><b>Shaveta Bhatia</b> is Professor of Faculty of Computer Applications, Manav Rachna International Institute of Research & Studies. She has more than 17 years of academic and research experience. She has authored many research papers and published over a span of her teaching career in various reputed journals and conferences.
<p><b>The book gives insight to blockchain in business and covers the conceptual and technical fundamentals of blockchain, demonstrates the user cases of blockchain in business, start-ups, enterprises and institutions/organizations and also focuses on the potential and threats of blockchain along with the economic impacts in corporate and other sectors.</b> <p>The availability of blockchain technologies is transforming business. It is real technology which is being tested with proof of concept in many different industries around the world. Blockchain has an impact on the economy by the decentralization of money raised in private and public sectors. <p>The approach followed in the book is that of a reference manual and focuses on the power of blockchain adopted by business. It gives an overview of blockchain in traditional business, marketing, accounting and business intelligence. The book provides a detailed working knowledge of blockchain, user cases of blockchain in business, cryptocurrency and Initial Coin Offering (ICO) along with the risks associated with them. The book also covers the detailed study of decentralization, mining, consensus, smart contracts, concepts and working of distributed ledgers and hyper ledgers as well as many other important concepts. It also details the security and privacy aspects of blockchain. In addition, the book takes a deep dive into the inclusion of other technologies, such as the Internet of Things, to discuss the changes rendered in such areas as supply chain management and identity management. <p><b>Audience</b> <p>The book is written for researchers in information technology and artificial intelligence, financial advisors, technical and non-technical managers, industrialists and entrepreneurs.

Diese Produkte könnten Sie auch interessieren:

Quantifiers in Action
Quantifiers in Action
von: Antonio Badia
PDF ebook
96,29 €
Managing and Mining Uncertain Data
Managing and Mining Uncertain Data
von: Charu C. Aggarwal
PDF ebook
96,29 €