T
his section will turn your attention to the definition of the term and explain its different usages. This step will present a provisional breakdown of blockchain, which will guide you through the remainder of this book. Finally, this stage explains why the management of ownership is a prominent application case of the blockchain.
In this chapter about the blockchain, the term is used as follows:
• As a name for a data structure
• As a name for an algorithm
• As a name for a group of technologies
• As an umbrella term for the purely distributed peer-to-peer systems with a common application area
A Data Structure
In computer science and software engineering, data structure is a means of organizing data regardless of their specific information content. You can imagine the data structure in terms of the floor plan of an architectural building. Floor plan for the construction of directions that separate and connect space with walls, floors, and stairs, regardless of their particular use. When used as a data structure name, the blockchain refers to the data path in units called blocks. These blocks can be thought of as books. These blocks are linked together like a chain, hence the name blockchain. Words and phrases related to a book are information that needs to be stored. They are written on different pages, rather than being written on a large circuit. The pages are interconnected by their position in the book and page numbers. You can determine if someone has deleted a page from a book by checking that the page numbers continue without leaving a number. In addition, the information is classified on the pages as well. Ordering is an important detail that will be widely used. In addition, the ordering of data blocks in the data structure is performed using a very special numbering system, which is different from page numbering in ordinary books.
An Algorithm
The term algorithm in software engineering refers to a series of instructions that a computer must complete. These instructions often include data structures. When used as an algorithm name, blockchain refers to a sequence of instructions that negotiates the information content of many blockchain data structures in a purely distributed point-to-point system, much like a democratic voting scheme.
A Group of Technologies
When used to designate a set of technologies, blockchain refers to a combination of a data chain structure, a blockchain algorithm, and a combination of cryptographic and security technologies that can be used to ensure integrity in a purely distributed architecture, even systems, regardless of the purpose of the application.
An Umbrella Term for the Purely Distributed Peer-to-Peer Systems with a Common Application Area
Blockchain can also be used as a generic term for purely distributed point-to-point books, using the Blockchain technology suite. Note that in this context, the blockchain refers to a fully distributed system as a whole, not a software unit that is part of a purely distributed system.
Provisional Definition
The following definition is incomplete. Important details that have not yet been submitted are still being lost. But this definition is a transitional step toward a more complete understanding of the term: blockchain is a purely distributed and peer-controlled system that uses a software unit consisting of an algorithm that negotiates the information content of commands commanded, and related data blocks as well as cryptographic and security technologies to achieve and maintain their integrity.
The Role of Managing Ownership
The provisional definition doesn't utter a word about Bitcoin or overseeing responsibility for cash. This may come as a shock since numerous articles and books expounded on the blockchain guarantee that its motivation is to oversee responsibility for monetary standards. In all actuality, overseeing responsibility for cash is an unmistakable and common application instance of the blockchain, yet it isn't the one and only one. The blockchain has a wide and various scope of uses. In any case, there are two reasons why the administration of responsibility for products is the most examined utilization of the blockchain.
To start with, it is the most straightforward to comprehend and to clarify. Second, it is the user type with the most effect on the economy. The idea of proprietorship and the authorization of possession rights are center elements of pretty much every human culture (even a few creatures have the idea of possession and battle about its implementation). A tremendous extent of the exercises of banks, insurance agencies, overseers, legal counselors, courts, specialists, and offices are worried about simply the administration of proprietorship rights or their requirements. Thus, overseeing proprietorship is a multibillion-dollar enterprise, and any specialized development that could change the manner in which we oversee possession will have an enormous effect. Incidentally, the blockchain can surely significantly change the manner in which we oversee possession.
The blockchain as an innovation suite is used for overseeing distributed peer-to-peer systems of records; it can have numerous particular applications, for example, overseeing proprietorship in advanced merchandise or cryptographic monetary standards. So, this book intentionally doesn't consider only one explicit utilization of the blockchain because it is not preferred not to divert the consideration from the center ideas by talking about only one explicit application case in incredible detail. In any case, so as to make it simpler for you to comprehend the blockchain, this book considers the general application instance of overseeing and explaining proprietorship, paying little respect to the particular great whose possession is overseen. Subsequently, the general objective of overseeing and explaining proprietorship will give some psychological direction through your learning way and help to make a psychological image of the blockchain.
Ownership and Witnesses
Have you ever pondered about what makes you the owner of the thing that belongs to you? Probably because in supermarket history, you always think of an apple! So what does an apple owner do in your bag? How can you make sure you didn't steal it at the supermarket? They imagine that they are before a court challenging their so-called apple theft case. How would you confirm that you own an apple? We know that in the example of a supermarket, it would be enough to prove his innocence when no one could check if he stole an apple. However, being released from jail theft does not constitute proof of ownership. Let's continue with the question of proving your property. It would be very helpful if someone could testify that you bought an apple before going to the supermarket. Fortunately, remember the store where you bought the apple, and the employee who sold you the apple is ready to testify.
In any case, you thought little of the examiner. He is conversing with your observer in the interrogation and asking your observer hard inquiries: Can he recall the apple he offered to you? Would he be able to distinguish the particular apple he offered to you as the apple found in your sack? Would he be able to distinguish you as the individual who purchased that specific apple? Lastly, for what reason does he recollect every one of these subtleties in any case? Would it be able to be conceivable that you paid the observer cash for vouching for your blamelessness? So this boils down to a fundamental rule: having one observer is great, yet having numerous independent observers is the key to persuading the investigator of your blamelessness.
The last point is critical. The more independent observers who vouch for a similar reality, the higher the possibility that this is reality. Things being what they are, this thought will be one of the central ideas of the blockchain.
Foundation of Ownership
Taking the discoveries of the past area to an increasingly conceptual level, one can express that demonstrating proprietorship includes three elements:
• A recognizable proof of the proprietor
• A recognizable proof of the item being possessed
• A mapping of the proprietor to the item
The declaration of witnesses achieves these. Truly, observers have regularly been the main wellspring of explaining these elements. Notwithstanding, depending on oral declarations of witnesses is tedious. Subsequently, these elements have been supplanted by records given by reliable elements. These days, we can distinguish people with ID cards, birth declarations, and driver's licenses. Sequential numbers, creation dates, generation endorsements, or a nitty-gritty description can be used to recognize objects. These reports don't change once they are made because the characters of people and items don't change.
The mapping among proprietors and items is normally completed with a record or register. This isn't a report that remains constant once made. Each transfer of possession should be recorded in such a register because an obsolete register or record can't be a reliable observer for affirming proprietorship. The significance of having an exceptional and precise overseen register has prompted the advancement of unique organizations in numerous social orders. The more significant specific sorts of items are, the higher the possibility for the presence of an administration directed record that archives the responsibility for objects. A large portion of these records is available to everybody so as to make it simple to confirm possession and give simple access to explain proprietorship. You may do some exploration all alone to distinguish a portion of these records in your country and to what they uphold. I discovered records for reporting responsibility for domain, licenses, boats, planes, and organizations. I even discovered registers for relationships, births, and deaths.
A Short Detour to Security
There are three majorly used security-related concepts that need to be explained in more detail, as their meaning as related to the field of software systems might be a bit different from their common usage:
• Identification
• Authentication
• Authorization
The importance and interrelation of these three ideas can be shown in a real-world example. Maybe you endeavor to purchase a jug of wine in a liquor shop. Liquor shops are not permitted to offer alcohol to individuals who are underage. How does the liquor shop guarantee that it sells wine just to the right people? The liquor shop achieves this by utilizing identification, authentication, and approval. Also, here is a clarification on how this function.
Identification
Identification simply means to claim to be someone by stating a name or whatever else that could be used as an identifier. In the liquor shop example, one could say to be someone in particular by stating a name. Identification doesn't prove that you really are who you claim to be. Identification doesn't include the proof that you are not underage. Identification just means claiming to be someone in particular.
Authentication
The motivation behind authentication is to prevent someone from claiming to be someone else. Authentication means confirming or demonstrating that you really are who you claim to be. This proof can be demonstrated by something you have or something you realize that can fill in as proof that you really are who you claim to be (e.g., an ID card, a driver's license, or a few subtleties of the life of the person you claim to be). It is significant that the proof of your claimed identity is uniquely associated with you (e.g., a photograph of your face, a unique mark, or something else that identifies you uniquely). In the liquor shop example, this means you can prove that you really are who you claimed to be by demonstrating a driver's license that contains a photograph of you. Contrasting your face and the face appeared on the photograph on the driver's license achieves the verification. In the event that you resemble the person in the photograph of the driver's license, the authentication is fruitful. Something else, the authentication comes up short. Double-checking one's face with respect to the photograph on the driver's license means to prevent someone from utilizing someone else's driver's license.
Authorization
Authorization means giving access to explicit resources or services because of the characteristics or properties of one's identity. Authorization is the result of both a fruitful authentication and an assessment of one's characteristics or rights. In the liquor store example, authorization means to decide whether you are permitted to purchase a bottle of wine dependent on the date of birth shown on your driver's license. The shop assistant will not allow you to buy you a bottle of wine in the event that you are excessively youthful, dependent on the date of birth shown on your driver's license. Note that in this case, the refusal isn't because of a failed authentication. Identification and authentication performed well, and because of the right identification, the shop assistant can identify you as an underage person. Consequently, authorization is consistently the consequence of assessing the characteristics or properties of the recently authenticated identity against certain standards.
Purposes and Properties of a Ledger
The ledger needs to satisfy two contradicting jobs. From one viewpoint, a ledger fills in as a means for proving ownership, which depends on perusing notable data protected in the ledger. Then again, the ledger needs to record any transfer of ownership, which thus infers that new data are created and kept in touch with the ledger. One of the most significant contrasts of these two purposes can be outlined in the contradicting idea of transparency and privacy. Proving ownership is simpler when the ledger is open to anybody. Consequently, transparency is the basis of proving ownership rights likewise as witnesses making a public declaration in court. So, transferring ownership must be only limited to the legal proprietor. So privacy is basically the basis of transferring ownership. Since writing in the ledger means evolving ownership, truth be told, trustful substances ought to be given writing access to ledgers. The clashing powers of transparency versus privacy, proving ownership versus transferring ownership, and perusing the ledger versus writing the ledger can likewise be found in the blockchain. For reasons unknown, the blockchain is a tremendous distributed peer-to-peer system of ledger-like data structures that can be perused by everybody.
Ownership and the Blockchain
A witness as an administration controlled ledger is the key to clarifying ownership of significant merchandise. However, what occurs if such a ledger is harmed or devastated? Or, on the other hand, what occurs if someone liable for refreshing the ledger makes a blunder or falsify it on purpose? In this case, the ledger doesn't reflect reality. This is shocking because everyone accepts that the ledger speaks to the truth, like a witness in court. The issue of having just a single ledger as the hotspot for clarifying ownership can be explained similarly as it has been understood for preliminaries in court. Putting together a decision just with respect to the declaration of one single witness is unsafe since this witness could be exploitative. Having more witnesses is better.
The more independent witnesses who are cross-examined, the higher the possibility that those realities that are reliably referenced among the majority of declarations mirror the truth. This reality can be proved by means of measurements and the law of huge numbers. Having numerous witnesses who independently mention their own objective facts free of shared impacts is the key to this approach to demystifying the truth. Applying this finding to the utilization of a ledger for clarifying ownership is direct: instead of maintaining just one single ledger that could be manufactured, one ought to use a purely distributed peer-to-peer system of ledgers and explain demands concerning ownership on that form of the reality on which the majority of peers concurs.
Characteristics of the Blockchain
The blockchain is a mainly distributed peer-to-peer data store with the following properties:
• Immutable
• Append-only
• Ordered
• Time-stamped
• Open and transparent
• Secure (identification, authentication, and authorization)
• Eventually consistent
These blockchain properties are independent of the specific data stored there. Therefore, from a simplistic point of view, blockchain can be considered as a special type of storage box for digital elements. This will open up a wide variety of blockchain applications.
Generic Application Templates
Depending on the properties of the blockchain and the characteristics of being a generic data warehouse for all types of data, we can suggest the following generic use cases:
• Proof of existence
• Proof of nonexistence
• Proof of time
• Proof of order
• Proof of identity
• Proof of authorship
• Proof of ownership
Proof of Existence
This use of blockchain focuses on storing data for the sole purpose of demonstrating its existence. As a result, this usage does not use interlace functions or timestamp block connections. Practical applications, for example, are case records that should be unique, such as trademarks, patents, license codes, and an Internet or email address.
Proof of Nonexistence
This use of the blockchain sees to the opposite of the proof of existence. It gives ways to verify whether specific entries or items do not exist in the blockchain. Concrete applications of this are the records of complaints, fines, or convictions.
Proof of Time
In this case, not just only the sheer presence of a section in the blockchain is significant but also the time when the passage was added. The blockchain can fulfill that need since the blocks of the blockchain-data-structure store the time when the process of including them began. Applications that profit by the time-stepping capabilities of the blockchain are those that track the event of occasions in time, for example, conveyance or warning following, following of installments, following of orderly opening and shutting of public bidding procedures, and management of forecasts.
Proof of Order
This pattern of use uses the ordering capability of the blockchain. Applications that benefit from that property of the blockchain are those that track the general ordering of occasions, paying little mind to their total time, for example, following application processes, reviewing public bidding procedures, and escrow services. Proving that some occasion was the first or the remnant of a dying breed is a particular example of proof of order. This sort of proof can be significant when resources are designated in a similar order where certain claims or documents are submitted, for example, school or college applications, patent applications, or copyright claims.
Proof of Identity
Proof of identity can be considered a particular case of proof of presence because it proves that a specific identity as of now exists. The blockchain fulfills that use case since it not just stores data that can be used to identify someone or something, yet in addition, it provides essential security concepts for identification and authentication. Solid applications of this use pattern are advanced identity documents for people, creatures, or merchandise. Governments could use such blockchains as part of their e-government methodology for overseeing personal documents, drivers' licenses, or travel papers.
Proof of Authorship
This utilize pattern focuses on proving that a particular person or foundation added certain data to the blockchain. The blockchain can fill that need because it not just stores data that can be identified by its unique cryptographic mark, yet additionally offers essential security concepts, for example, identification, authentication, and authorization. Identification and authentication are important to identify creators and confirm their identity. Authorization is vital in this use case so as to prevent someone from adding data to the blockchain without reserving the privilege to do so. Applications that use this pattern are, for example, electronic distributing, following of content changes in documents, content conveyance, shared altering, and ensuring copyrights.
Proof of Ownership
This use pattern focuses on overseeing and explain ownership. It depends on all recently referenced patterns, for example, proof of presence, proof of order, proof of identity, and proof of initiation together with the three essential security concepts: identification, authentication, and authorization. Applications that use this use pattern are, for example, systems for overseeing ownership of real domains, vehicles, organization shares, securities, computerized cash, or cryptographic monetary forms.