Electronicdesign 14164 Wtd Blockchains Promo 0
Electronicdesign 14164 Wtd Blockchains Promo 0
Electronicdesign 14164 Wtd Blockchains Promo 0
Electronicdesign 14164 Wtd Blockchains Promo 0
Electronicdesign 14164 Wtd Blockchains Promo 0

What’s the Difference Between Blockchains, Cryptocurrency, Audit Trails, and Databases?

Feb. 10, 2017
Find out that blockchains, cryptocurrency, audit trails, and databases have in common and what’s different and why they are important to embedded developers.
1. A blockchain system requires a collection of cooperative nodes that maintain the blockchain and accept additions to it. Digital signatures (DS) are used to authenticate the blocks.

Blockchains are nothing more signed, peer-to-peer, distributed ledger databases. Okay, we’re all done here.

No?

Alright, blockchains are a bit more complicated than that–and more useful than they might sound. Most will know blockchains from BitCoin, one of the many cryptocurrencies based on them. But cryptocurrencies are only one use for blockchains. Before getting into applications, let’s take a look at what a blockchain system looks like and how it operates.

To start, you need to know about public key encryption and digital signatures, because the blocks in a blockchain are digitally signed and the blockchain nodes are authenticated to each other (Fig. 1). This allows them to maintain their copy of the blockchain and determine whether information from other nodes is accurate. Those providing nodes to the blockchain must also have their own encryption keys so they can sign their blocks.

A blockchain is actually a logical entity maintained by a blockchain node. It is designed to be a mostly read-only database that grows over time as blocks are added (Fig.  2). Block payloads are accepted by a node and distributed to its peers. There is an acceptance process and verification of digital signatures, but eventually a block will be validated by enough nodes for the block to be permanently added to the blockchain.

2. A blockchain node keeps a collection of the blocks in the chain. The blocks are only incorporated permanently when enough nodes accept the block.

At this point, the added block will be replicated in a majority of nodes, and the rest will eventually catch up. This means that all nodes will have a moving high water mark that the collection of nodes agrees with, but the databases will probably not be identical across all the nodes at any point in time.

The idea is that the payload of a block can be accessed by an external entity and used to generate a subsequent block that will get incorporated into the blockchain. A typical example is where a block contains a logical value that is split in half and assigned to two new blocks. The signatures for these new blocks can be used to allow one of the new blocks to contain this new value. Incorporating the new blocks into the blockchain will mark the original block as used and the two new blocks as active.

The system is robust because the blockchain database is replicated. All nodes can accept new blocks and all nodes do not have to be active or accessible all the time although a quorum is needed to activate new blocks.

The challenge for blockchain systems is to maintain performance and scalability as the system grows. A lot depends upon the frequency of updates and the number of systems involved overall in addition to the network. Many blockchain systems operate on the internet, but that isn’t a requirement. They can be used in closed networks as well.

Cryptocurrency

So, back to cryptocurrencies.

A cryptocurrency is a digital asset that can be an exchange medium. These days, cyptocurrencies tend to be implemented using a blockchain. This allows transactions using the cryptocurrency to occur in a decentralized, distributed fashion. Cryptocurrencies are relatively new (the aforementioned Bitcoin started in 2009).

The payload of a block indicates the amount of money involved in a transaction. How these values are created and manipulated depend upon the system being employed and the players involved in the system. Most cryptocurrencies use a timestamping scheme so a trusted third party does not need to be involved in the system.

Most cryptocurrency systems use a proof-of-work scheme to create a new block or BitCoin. BitCoin uses proof-of-work schemes are based on SHA-256. It is also used by LiteCoin. It is also possible to use proof-of-stake schemes as well.

BitCoins are created by “mining.” This uses the hashcash proof-of-work function that is designed to take a lot of computational cycles but not much else. Specialized hardware has been developed to create BitCoins. The amount of time needed to generate just one BitCoin varies significantly depending upon the hardware used.

3. Blocks in a blockchain can include data or reference data at another location. The remote contents need to be signed so someone accessing a block can verify the remote contents.

Other Blockchain Applications

Just about any application that requires a registered ledger is a candidate for blockchain support. Many embedded applications simply need a single database, but if there is a need for a more robust solution, blockchains might make sense.

Blockchains have been touted as solutions for all sorts of applications. For example, there are a number of efforts to use them in educational environments. In this instance, the various records, testing, and certifications a person earns are tracked using blocks. This approach allows for the distribution of this information. The blocks normally do not contain all the information, but rather, links to digitally signed packages.

Blockchains can also be used for conventional ledger-based applications. These applications include backend clearing and settlement. They could be used in real estate transactions, for tracking music or other multimedia content, or even for handling contracts.

Blockchain use is still in its infancy. Security remains a key component and it should not be overlooked when considering or using this technology. Incorrect implementations can cause significant security problems. Developers also need to consider the scope of implementation, frequency of updates, and hardware and storage requirements. 

Sponsored Recommendations

Board-Mount DC/DC Converters in Medical Applications

March 27, 2024
AC/DC or board-mount DC/DC converters provide power for medical devices. This article explains why isolation might be needed and which safety standards apply.

Use Rugged Multiband Antennas to Solve the Mobile Connectivity Challenge

March 27, 2024
Selecting and using antennas for mobile applications requires attention to electrical, mechanical, and environmental characteristics: TE modules can help.

Out-of-the-box Cellular and Wi-Fi connectivity with AWS IoT ExpressLink

March 27, 2024
This demo shows how to enroll LTE-M and Wi-Fi evaluation boards with AWS IoT Core, set up a Connected Health Solution as well as AWS AT commands and AWS IoT ExpressLink security...

How to Quickly Leverage Bluetooth AoA and AoD for Indoor Logistics Tracking

March 27, 2024
Real-time asset tracking is an important aspect of Industry 4.0. Various technologies are available for deploying Real-Time Location.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!