Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020

Page created by Dolores Hunter
 
CONTINUE READING
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
> Blockchain
                > Cryptocurrency
        > Digital Transformation
             > Internet of Things

JANUARY 2020             www.computer.org
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
Keep Your Career
 Options Open
Upload Your Resume Today!
Whether your enjoy your current position or you
are ready for change, the IEEE Computer Society
Jobs Board is a valuable resource tool.
Take advantage of these special resources for
job seekers:

      JOB ALERTS            TEMPLATES

      CAREER                RESUMES VIEWED
      ADVICE                BY TOP EMPLOYERS           No matter
                                                       your career
      WEBINARS                                        level, the
                                                     IEEE Computer
                                                     Society Jobs
                                                    Board keeps
                                                   you connected to
                                                   workplace trends
                                                  and exciting new
                                                  career prospects.

                                   www.computer.org/jobs
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
IEEE COMPUTER SOCIETY computer.org • +1 714 821 8380

   STAFF
   Editor                                                                               Publications Portfolio Managers
   Cathy Martin                                                                         Carrie Clark, Kimberly Sperka

   Publications Operations Project Specialist                                           Publisher
   Christine Anthony                                                                    Robin Baldwin

   Production & Design                                                                  Senior Advertising Coordinator
   Carmen Flores-Garvey                                                                 Debbie Sims

   Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New
   York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380; fax +1 714 821 4010;
   IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036.
   Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at
   New York, New York, and at additional mailing offices. Printed in USA.
   Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in ComputingEdge
   does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space.
   Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit;
   2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products
   or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web servers without permission,
   provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy. An accepted manuscript is a version
   which has been revised by the author to incorporate review suggestions, but not the published version with copy-editing, proofreading, and formatting added by
   IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish
   this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE by
   writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or pubs-permissions@ieee.org. Copyright © 2020 IEEE.
   All rights reserved.
   Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per-
   copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.
   Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at help@computer.org and
   type “unsubscribe ComputingEdge” in your subject line.
   IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.

               IEEE Computer Society Magazine Editors in Chief

       Computer                                                IEEE Intelligent Systems                               IEEE Pervasive Computing
       Jeff Voas, NIST                                         V.S. Subrahmanian, Dartmouth                           Marc Langheinrich, Università
                                                               College                                                della Svizzera italiana
       Computing in Science &
       Engineering                                             IEEE Internet Computing                                IEEE Security & Privacy
       Lorena A. Barba (Interim),                              George Pallis, University                              David Nicol, University of Illinois
       George Washington University                            of Cyprus                                              at Urbana-Champaign

       IEEE Annals of the History                              IEEE Micro                                             IEEE Software
       of Computing                                            Lizy Kurian John, University                           Ipek Ozkaya, Software
       Gerardo Con Diaz, University of                         of Texas at Austin                                     Engineering Institute
       California, Davis
                                                               IEEE MultiMedia                                        IT Professional
       IEEE Computer Graphics                                  Shu-Ching Chen, Florida                                Irena Bojanova, NIST
       and Applications                                        International University
       Torsten Möller, Universität Wien

www.computer.org/computingedge                                                                                                                                            1
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
JANUARY 2020 • VOLUME 6, NUMBER 1

                                                                       From Geographic
                    From Dealing With One                              Collocation
                    Domain at a Time
                                                                      To Worldwide
                                                                      Distribution

THEME HERE
                                                            RE
                     To Dealing With
                                                        Everywhere
                     Multiple Domains
                                                                                             From Wishing for
                                                                                             Experienced End
                                          Cross-                               RE With       Users
                                        Domain RE                              Everyone      To Empowering
                                                                                             Newbies

          27                                                            36                                                   41
                                                        Ubiquitous
                                                           RE
                                                                                            From Focusing on
                   From Wishing for                                                         Software
                   Well-Understood
                                                                                            To Holistically Taking
                   Processes                                                    RE for
                                        Open RE                                             Into Consideration
                                                                              Everything
                  To Accepting                                                              People, Things, and
                  Openness                                                                  Services

                                                        Automated

 Cryptocurrencies:
             Legend:
              Gray Rectangles: Barriers
                                                     Ubiquitous
                                                           RE    From Direct Interaction With
                                                                  Representative End Users
                                                                                                                              The IoT
     Transparency                                 Requirements
              Colored Boxes: Required Transformations
              Circles: Dimensions of Ubiquity
                                                                     To Indirect Interaction With a
                                                                     Crowd                                                 and Digital
    versus Privacy                               Engineering: A                                                       Transformation:
                                             Paradigm Shift that                                                     Toward the Data-
                                               Affects Everyone                                                      Driven Enterprise
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
Blockchain
                      8   On the Origins and Variations of Blockchain
                          Technologies
                          ALAN T. SHERMAN, FARID JAVANI, HAIBIN ZHANG, AND ENIS
                          GOLASZEWSKI

                     15   BLOCKCHAIN
                          GEORGE STRAWN

                     Cryptocurrency
                     18   A Service-Oriented Perspective on Blockchain
                          Smart Contracts
                          FLORIAN DANIEL AND LUCA GUIDA

                     27   Cryptocurrencies: Transparency versus Privacy
                          NIR KSHETRI

                     Digital Transformation
                     31   Skills and Competencies for Digital Transformation
                          STEPHEN J. ANDRIOLE

                     36   Ubiquitous Requirements Engineering: A Paradigm
                          Shift that Affects Everyone
                          KARINA VILLELA, EDUARD C. GROEN, AND JOERG DOERR

                     Internet of Things
                     41   The IoT and Digital Transformation: Toward the
                          Data-Driven Enterprise
                          ALEXANDER A. PFLAUM AND PHILIPP GOLZER

                     46   Extending Patient-Chatbot Experience with Internet
                          of Things and Background Knowledge: Case
                          Studies with Healthcare Applications
                          AMIT SHETH, HONG YUNG YIP, AND SAEEDEH SHEKARPOUR

        46
                     Departments
                      4   Magazine Roundup
                      7   Editor’s Note: Blockchain to the Rescue
                     72   Conference Calendar
         Extending
   Patient-Chatbot
  Experience with
Internet of Things
  and Background      Subscribe to ComputingEdge for free at
        Knowledge     www.computer.org/computingedge.
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
CS FOCUS

      Magazine
      Roundup

                                                                                     of this article from the Septem-
                                                                                     ber/October 2019 issue of Com-
                                                                                     puting in Science & Engineering
                                                                                     eliminate the speed-limiting
                                                                                     charge iteration in MD with
                                                                                     a novel extended-Lagrangian
                                                                                     scheme. The extended-Lagrang-
                                                                                     ian reactive MD (XRMD) code

    T
                                                                                     drastically improves energy con-
               he IEEE Computer         furry friends. The authors of this           servation while substantially
               Society’s lineup of 12   article from the September 2019              reducing time-to-solution. Fur-
               peer-reviewed    tech-   issue of Computer report on an               thermore, the authors introduce
    nical magazines covers cut-         empirical study investigating                a new polarizable charge equili-
    ting-edge topics ranging from       the user perceptions of a popu-              bration (PQEq) model to accu-
    software design and computer        lar dog activity tracker. Results            rately predict atomic charges and
    graphics to Internet comput-        show that these trackers have a              polarization.
    ing and security, from scien-       positive impact on owners’ moti-
    tific applications and machine      vation to increase their physical            IEEE Annals of the
    intelligence to visualization       activities with their dogs.                  History of Computing
    and microchip design. Here are
    highlights from recent issues.      Computing in Science &                       Founding and Growing
                                        Engineering                                  Adobe Systems, Inc.
    Computer                                                                         Founded in 1982, Adobe Sys-
                                        Scalable Reactive                            tems heralded several of the
    Log My Dog: Perceived               Molecular Dynamics                           technological innovations nec-
    Impact of Dog Activity              Simulations for                              essary to precipitate the emer-
    Tracking                            Computational Synthesis                      gence of desktop publishing as
    The pet industry is catching up     Reactive molecular dynamics                  well as many features of modern
    in the wearables market, and        (MD) simulation is a power-                  office computing, digital media,
    pet activity and location track-    ful research tool for describing             and graphic arts. In this article
    ers are increasingly worn by our    chemical reactions. The authors              from the July–September 2019

4             January 2020                       Published by the IEEE Computer Society              2469-7087/20 © 2020 IEEE
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
issue of IEEE Annals of the His-        to tune two algorithms for char-        posing significant complications
tory of Computing, Adobe found-         acterizing satellite detections of      for system and algorithm design.
ers Charles Geschke and John            wildfires.                              In this article from the May/June
Warnock cover their professional                                                2019 issue of IEEE Internet Com-
history, the conception of Adobe        IEEE Intelligent Systems                puting, the authors present a
Systems, and its growth. They also                                              dynamic global manager selection
explain the technology behind the       Using Social Media to Detect            algorithm to minimize energy con-
advances in computer printing,          Socio-Economic Disaster                 sumption cost by fully exploiting
electronic file transfer, and digital   Recovery                                the system diversities in geogra-
art and photography. Adobe, its         There has been growing interest         phy and variation over time. The
products, and its engineers played      in harnessing artificial intelligence   algorithm makes real-time deci-
a key role in these developments,       (AI) to improve situational aware-      sions based on measurable system
which enabled desktop publishing        ness for disaster management.           parameters through stochastic opti-
and the publishing revolution.          As a first step toward investigat-      mization methods, while achiev-
                                        ing the possibility of developing       ing performance balance between
IEEE Computer Graphics                  an AI-based method for detecting        energy cost and latency. Extensive
and Applications                        socio-economic recovery, this arti-     trace-driven simulations verify the
                                        cle from the May/June 2019 issue        effectiveness and efficiency of the
Uncertainty-Aware                       of IEEE Intelligent Systems stud-       proposed algorithm. The authors
Visualization for Analyzing             ies the correlations between pub-       also highlight several potential
Heterogeneous Wildfire                  lic sentiment on social media and       research directions that remain
Detections                              socio-economic recovery activi-         open and require future elabora-
There is growing interest in using      ties as reflected in market data.       tions in analyzing geo-distributed
data science techniques to charac-      The result shows multiple correla-      big data.
terize and predict natural disasters    tions between sentiment on social
and extreme weather events. Such        media and the socio-economic            IEEE Micro
techniques merge noisy data gath-       recovery activities involved in
ered in the real world, from sources    restarting daily routines. Conven-      Accelerating Image-Sensor-
such as satellite detections, with      tional socio-economic recovery          Based Deep-Learning
algorithms that strongly depend         indicators, such as governmental        Applications
on the noise, resolution, and uncer-    statistical data, have a significant    In this article from the September/
tainty in these data. In this article   time lag before publishing. Using       October 2019 issue of IEEE Micro,
from the September/October 2019         public sentiment on social media        the authors review two inference
issue of IEEE Computer Graph-           instead can improve situational         accelerators that exploit value
ics and Applications, the authors       awareness in recovery operations.       properties in deep neural networks
present a visualization approach                                                (DNNs): Diffy and Tactical. Diffy
for interpolating multiresolution,      IEEE Internet Computing                 targets spatially correlated acti-
uncertain satellite detections of                                               vations in computational imag-
wildfires into intuitive visual rep-    Energy-Efficient Analytics for          ing DNNs. Tactical targets sparse
resentations. They use extrinsic,       Geographically Distributed              neural networks using a low-over-
intrinsic, coincident, and adja-        Big Data                                head hardware/software weight-
cent uncertainty representations        Big data analytics on geographi-        skipping front-end. The authors
as appropriate for understand-          cally distributed datasets (across      combine these accelerators into Di-
ing the information at each stage.      data centers or clusters) has been      Tactical to boost benefits for both
To demonstrate their approach,          attracting increased interest in        scene understanding workloads
the authors use their framework         both academia and industry,             and computational imaging tasks.

www.computer.org/computingedge                                                                                   5
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
MAGAZINE ROUNDUP

IEEE MultiMedia                          authors of this article from the        attacks show the risks associated
                                         April–June 2019 issue of IEEE Per-      with these new technologies and
A 3D Scene Management                    vasive Computing describe Eva, a        can help us articulate the need for
Method Based on the                      conversational robot developed to       better security practices.
Triangular Mesh for Large-               conduct therapeutic interventions
Scale Web3D Scenes                       for PwD. A previously reported          IEEE Software
Real-time rendering of large-scale       study conducted with Eva using a
Web3D scenes was difficult to            Wizard-of-Oz approach proved that       Perceptions of Gender
implement in virtual-reality sys-        it successfully engaged PwD with        Diversity’s Impact on Mood in
tems and geographic information          the sessions. This article reports      Software Development Teams
systems (GIS) in the past because        improvements to Eva that allow the      Gender inequality persists in IT
of the technical constraints in CPU,     robot to guide the therapy sessions     teams. The authors of this article
memory, and network bandwidth.           without human intervention and          from the September/October 2019
In this article from the July–Septem-    findings from its deployment in a       issue of IEEE Software examine
ber 2019 issue of IEEE MultiMedia, a     geriatric residence. These improve-     how gender composition affects
model management strategy is pro-        ments include the automatic gen-        the workplace atmosphere. They
posed based on triangular meshes,        eration of a therapy script tailored    discuss the problem of gender dis-
in which neighborhood buildings          to the profile and preferences of the   crimination and consider methods
are considered as nodes and con-         participants, expectations about        to reduce inequality.
nected. Each node in the mesh has        the type and length of responses
a set of level-of-detail (LOD) models,   by participants to certain queries,     IT Professional
including high-, medium-, and low-       and strategies to recover from com-
precision models. Besides a model        munication breakdowns. A user           Toward a Blockchain-Enabled
file, the high-precision LOD of the      study with five PwD shows that          Crowdsourcing Platform
node can be a subtriangular mesh.        when acting in fully autonomous         Crowdsourcing has been pursued
The 3D models in a complex scene         mode, Eva is as effective in engag-     as a way to leverage the power
can be flexibly managed with some        ing participants in the therapy as      of the crowd for many purposes
nested triangular meshes. Accord-        with the Wizard-of-Oz condition,        in diverse sectors, including col-
ing to the experimental results,         and that communication break-           lecting information, aggregating
the proposed method effectively          downs are adequately resolved.          funds, and gathering employees.
achieves the progressive download-                                               Data integrity and nonrepudiation
ing, dynamic loading, and real-time      IEEE Security & Privacy                 are of utmost importance in these
display for a large-scale 3D scene.                                              systems and are currently not guar-
Its performance is better than the       Stealing, Spying, and Abusing:          anteed. Blockchain technology has
traditional methods.                     Consequences of Attacks on              been proven to improve on these
                                         Internet of Things Devices              aspects. In this article from the
IEEE Pervasive Computing                 The authors of this article from the    September/October 2019 issue of
                                         September/October 2019 issue of         IT Professional, the authors investi-
A Conversational Robot                   IEEE Security & Privacy studied the     gate the benefits that the adoption
to Conduct Therapeutic                   security practices of a diverse set     of blockchain technology can bring
Interventions for Dementia               of Internet of Things (IoT) devices     in crowdsourcing systems. To this
Verbal communication is an essen-        with different architectures. They      end, they provide examples of real-
tial component of effective non-         found vulnerabilities that can be       life crowdsourcing use cases and
pharmacological interventions for        exploited to launch novel attacks.      explore the benefits of using block-
people with dementia (PwD). The          The real-world implications of IoT      chain, mainly as a database.

6                 ComputingEdge                                                                            January 2020
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
EDITOR’S NOTE

Blockchain to the Rescue

  M            any tough problems facing business,
               government, and individuals could
               be solved through indelible ledgers.
   Transparent, secure transaction records could help
   improve trust and efficiency in everything from
                                                                Transparency versus Privacy” warns that cyber-
                                                                criminals are sometimes able to expose the iden-
                                                                tity of cryptocurrency users despite pseudonyms
                                                                and concealed IP addresses.
                                                                    Business professionals need to understand a
   payments to voting. Enter blockchain-based sys-              variety of new technologies—not just blockchain—
   tems. This issue of ComputingEdge explores what              in order to compete. “Skills and Competencies
   makes blockchain such a powerful technology with             for Digital Transformation,” from IT Professional,
   the potential to transform numerous industries.              provides an overview of the high-tech tools that
      “On the Origins and Variations of Blockchain              companies should consider implementing. IEEE
   Technologies,” from IEEE Security & Privacy, pro-            Software’s “Ubiquitous Requirements Engineering:
   vides a history of blockchain going back to David            A Paradigm Shift that Affects Everyone,” describes
   Chaum’s 1979 vault system. The authors describe              the evolving role of software engineering in digi-
   the foundational elements of the technology and              tal transformation, particularly in addressing the
   compare the properties of diverse blockchain sys-            needs of diverse users.
   tems. IT Professional’s “BLOCKCHAIN” discusses                   The Internet of Things (IoT) is one of the cru-
   the technology’s growing popularity with busi-               cial technologies that modern businesses need to
   nesses and other organizations.                              employ. In “The IoT and Digital Transformation:
      The first modern blockchain was implemented               Toward the Data-Driven Enterprise,” from IEEE Per-
   in the cryptocurrency bitcoin, and cryptocur-                vasive Computing, the authors propose a process
   rency remains the most common application of                 for companies that want to adopt IoT solutions.
   blockchain technology. IEEE Internet Computing’s             Healthcare is among the industries that can benefit
   “A Service-Oriented Perspective on Blockchain                from the IoT, as shown in IEEE Intelligent Systems’
   Smart Contracts” examines the underlying tech-               “Extending Patient-Chatbot Experience with Inter-
   nology used in cryptocurrency platforms like Bit-            net of Things and Background Knowledge: Case
   coin and Ethereum. Computer’s “Cryptocurrencies:             Studies with Healthcare Applications.”

2469-7087/20 © 2020 IEEE          Published by the IEEE Computer Society                       January 2020           7
Blockchain Cryptocurrency Digital Transformation Internet of Things - JANUARY 2020
REAL-WORLD CRYPTO
        Editors: Peter Gutmann, pgut001@cs.auckland.ac.nz | David Naccache, david.naccache@ens.fr | Charles C. Palmer, ccpalmer@us.ibm.com

On the Origins and Variations
of Blockchain Technologies
Alan T. Sherman, Farid Javani, Haibin Zhang, and Enis Golaszewski | University of Maryland, Baltimore County

                   W        e explore the origins of
                            blockchain technologies
                   to better understand the enduring
                                                                              help people understand where
                                                                              blockchains came from, whether
                                                                              they are important, and if they will
                                                                                                                                 and controls who may update state
                                                                                                                                 and issue transactions. A private
                                                                                                                                 blockchain is a permissioned block-
                   needs they address. We identify the                        persist. (For a complete list of refer-            chain controlled by one organiza-
                   five key elements of a blockchain,                         ences, see A. Sherman et al.)1                     tion. A consortium blockchain is
                   show the embodiments of these                                                                                 a permissioned blockchain involv-
                   elements, and examine how these                            Elements of Blockchains                            ing a group of organizations. In a
                   elements come together to yield                            Blockchains provide a mechanism                    permissionless blockchain, anyone
                   important properties in selected                           through which mutually distrustful                 may potentially append new blocks,
                   systems. To facilitate comparing the                       remote parties (nodes) can reach                   with the consensus policy (e.g., a
                   many variations of blockchains, we                         consensus on the state of a ledger                 majority of participants) determin-
                   also describe the four crucial roles                       of information. To trace the origins               ing which continuation is valid.
                   of common blockchain participants.                         of these technologies, we start by                     Blockchains achieve consensus
                   Our historical exploration highlights                      identifying their essential elements               and control (and, in particular,
                   the 1979 work of David Chaum,                              informally. A blockchain is a dis-                 prevent double spending) in part
                   whose vault system embodies many                           tributed ledger comprising blocks                  through applying protocols and
                   of the elements of blockchains.                            (records) of information, includ-                  establishing high costs (both eco-
                                                                              ing information about transac-                     nomic and computational) to modify
                   Understanding                                              tions between two or more parties.                 the ledger. Typically, permissioned
                   Blockchains                                                The blocks are cryptographically                   systems run faster than permission-
                   With myriad blockchain distrib-                            linked to create an immutable led-                 less systems do because their control
                   uted ledger systems in existence,                          ger. Nodes may append informa-                     and consensus strategies depend on
                   more than 550 associated pat-                              tion to the ledger through invoking                faster fault-tolerant protocols3 rather
                   ent applications under review, and                         transactions. An access policy deter-              than on time-consuming crypto-
                   much associated hype, it can be                            mines who may read the informa-                    graphic proofs of work (PoWs), and
                   difficult to make sense of these                           tion. A control policy determines                  they usually involve fewer nodes.
                   systems, their properties, and how                         who may participate in the evolu-                  Gencer et al. show that permission-
                   they compare. Through exploring                            tion of the blockchain and how new                 less blockchains (such as Bitcoin
                   the origins of these technologies,                         blocks may potentially be appended                 and Ethereum) are much more cen-
                   including David Chaum’s 1979 vault                         to the blockchain. A consensus policy              tralized than many people assume:
                   system, we provide insights and a                          determines which state of the block-               20 mining pools control 90% of the
                   clear and useful way to think about                        chain is valid, resolving disputes                 computing power.
                   blockchains. Our historical perspec-                       should conflicting possible continu-                   Some blockchains additionally
                   tive distills important ideas, identi-                     ations appear.                                     support the idea of smart contracts,
                   fies enduring needs, and shows how                             As explained by Cachin and                     which execute terms of agreements
                   changing technologies can satisfy                          Vukolic,2 a range of control policies              between parties, possibly without
                   those needs. This perspective will                         is possible, including permissioned,               human intervention. These agree-
                                                                              consortium, private, and permis-                   ments might be embodied as arbi-
                   Digital Object Identifier 10.1109/MSEC.2019.2893730
                                                                              sionless blockchains. In a permis-                 trary computer programs including
                   Date of publication: 20 March 2019                         sioned blockchain, a body identifies               conditional statements.
8                January 2020                                                 Published by the IEEE Computer Society                           2469-7087/20 © 2020 IEEE
72                January/February 2019                                  Copublished by the IEEE Computer and Reliability Societies                  1540-7993/19©2019IEEE
Embodiments of                            PoW for both mining and achiev-          and private transaction computa-
the Elements                              ing consensus.                           tions that protects individual pri-
Although the seminal paper on Bit-            PoW aims, in part, to defend         vacy through physical security.
coin appeared in 2008 (with the           against Sybil attacks, in which adver-   The building blocks of this system
mysterious author Satoshi Naka-           saries attempt to forge multiple         include physically secure vaults,
moto), 4 most of the underlying           identities and use those forged iden-    existing cryptographic primi-
technological ideas had arisen many       tities to influence the consensus pro-   tives (symmetric and asymmetric
years earlier. A blockchain is a type     cess. With PoW, however, a node’s        encryption, cryptographic hash
of distributed database, an idea that     influence on the consensus process       functions, and digital signatures),
goes back to at least the 1970s (e.g.,    is proportional to its computational     and a new primitive introduced by
Wong11). More generally, the idea of      power: forging multiple identities       Chaum—threshold secret sharing.8
record keeping goes back millennia,       that share the adversary’s given com-    Chaum’s 1982 work went largely
including to ancient Mesopotamia.         putational power does not help. To       unnoticed, apparently because he
Kanare describes proper methods           adapt to varying amounts of avail-       never made any effort to publish it
for scientific logging, including the     able computational resources, PoW        in a conference or journal, instead
idea of preserving all transaction        systems dynamically throttle the         pursuing different approaches to
records, in addition to the history       difficulty of the PoW problem to         achieving individual privacy.
of any modifications to the collected     achieve a certain target rate at which       In Chaum’s system, each vault
data—ideas that are found in many         the problems are solved.                 signs, records, and broadcasts each
systems (e.g., Hyperledger Fabric).           Permissioned blockchains can be      transaction it processes. Chaum
    The idea of immutably chaining        modeled using the concept of (Byz-       states, “Because the aggregate
blocks of information with a cryp-        antine fault-tolerant) state machine     in cludes COMPRESSED_HIS-
tographic hash function appears           replication, a notion proposed in        TORY, the [cryptographic] check-
in the 1979 dissertation of Ralph         1978 by Lamport and, later, con-         sum is actually ‘chained’ through the
Merkle at Stanford, in which Merkle       cisely formalized by Schneider.          entire history of consensus states.”9
explains how information can be           State machine replication specifies      He further says, “Nodes remember
linked in a tree structure now known      what are the transactions and in         and will provide all messages they
as a Merkle hash tree. A linear chain     what order they are processed, even      have output—each vault saves all it
is a special case of a tree, and a tree   in the presence of (Byzantine) faults    has signed, up to some limit, and will
provides a more efficient way of          and unreliable communications.3          supply any saved thing on request;
chaining information than does a          Thereby, to achieve a strong form        only dead vaults can cause loss of
linear chain. Subsequently, in 1990,      of transaction consensus, many           recently signed things.”9
Haber and Stornetta applied these         permissioned systems build on the            Chaum’s system embodies a
ideas to time-stamp documents, cre-       ideas from the 1998 Paxos protocol       mechanism for achieving member-
ating the company Surety in 1994.         of Lamport 7 (which deals only           ship consistency: “Among other
These prior works, however, do not        with crash failures) and from the        things, the algorithms must provide a
include other elements and tech-          2002 Practical Byzantine Fault           kind of synchronization and agree-
niques of blockchain.                     Tolerance protocol of Castro and         ment among nodes about allowing
    To prevent an adversary from          Liskov. Nakamoto observed that           new nodes into the network, remov-
unduly influencing the consen-            the permissionless Bitcoin system        ing nodes from the network, and the
sus process, many permissionless          realizes Byzantine agreement in          status of nodes once in the network.”9
systems require that new blocks           open networks.                           The system also embodies a weak
include a proof of computational              Arguably, many of the elements       form of transaction consensus, albeit
work. Nakamoto’s paper cites Back’s5      of blockchains are embodied in           vaguely described and apparently
2002 effective construction from          David Chaum’s 1979 vault system,8        not supporting concurrent client re-
Hashcash. In 1992, Dwork and              described in his 1982 dissertation9      quests: “If the output of one partic-
Naor proposed proof of compu-             at Berkeley, including detailed          ular processor module is used as the
tation to combat junk mail. The           specifications. Chaum describes          output for the entire vault, the other
idea and a construction underly-          the design of a distributed com-         processors must be able to compare
ing PoW, however, may be seen in          puter system that can be estab-          their output to its output, and have
an initial form in 1974 in Merkle’s       lished, maintained, and trusted by       time to stop the output on its way
puzzles,6 which Merkle proposed           mutually suspicious groups. It is a      through the isolation devices.”9 The
to implement public-key cryptog-          public record-keeping system with        consensus algorithm involves major-
raphy. Bitcoin was the first to use       group membership consistency             ity vote of nodes based on observed
www.computer.org/computingedge                                                                                              9
www.computer.org/security                                                                                                   73
REAL-WORLD CRYPTO

                  signed messages entering and leav-           Chaum assumes, essentially, a         unique pseudonym which appears
                  ing vaults.                              best-effort broadcast model, and he       in a roster of acceptable clients.”9
                      Chaum created his vaults system      does not provide mechanisms for           To enable private transactions for
                  before the emergence of the terms        achieving consensus with unreli-          blockchains, engineers are explor-
                  permissioned and permissionless          able communications—technolo-             ing the application of trusted
                  blockchains, and his system does         gies that subsequently have been          execution environments, continu-
                  not neatly fall into either of these     developed and applied in modern           ing an approach fundamental in
                  discrete categories. In Chaum’s          permissioned systems. Chaum’s             Chaum’s vaults.
                  system, each node identifies itself      dissertation does not include the             In 1994, Szabo 10 coined the
                  uniquely by posting a public key,        ideas of PoW, dynamic throttling of       term smart contract, but the idea of
                  authenticated by level 2 trustees.       work difficulty, and explicit smart       systematically applying rules to exe-
                  For this reason, some people may         contracts (though Chaum’s vaults          cute the terms of an agreement has
                  consider Chaum’s system a permis-        support arbitrary distributed pri-        a long history in trading systems.
                  sioned blockchain.                       vate computation).                        For example, in 1949, with a system
                      This narrow view, however, dimin-        Unlike in most blockchain sys-        involving ticker tapes and humans
                  ishes the fact that each node can be     tems, nodes in Chaum’s system hold        applying rules, Future, Inc. gener-
                  authorized in a public ceremony          secret values, which necessitates a       ated buy and sell orders for com-
                  independently from any trustee.          more complex mechanism for restart-       modities. Recently, so-called hybrid
                  During this ceremony, vaults are         ing after failures. Using what Chaum      blockchains have emerged, which
                  assembled from bins of parts, which      calls partial keys, any vault can back    combine Byzantine fault-tolerant
                  the public (not necessarily nodes)       up its state securely by encrypting       state machine replication with
                  can inspect and test—a procedure         it with a key and then escrowing          defenses against Sybil attacks—for
                  that inspired Chaum to coin the          this key using what we now call           example, PeerCensus, ByzCoin,
                  more limited phrase cut and choose.      threshold secret sharing. After reading   Solidus, Hybrid Consensus, Elas-
                  Regardless of whether one views          Chaum’s February 1979 technical           tico, OmniLedger, and RapidChain.
                  some configurations of Chaum’s           report8 that describes partial keys,          Also, Hyperledger (an umbrella
                  vaults as permissionless systems,        Adi Shamir published an elegant           project involving Fabric, a system
                  the trust bestowed through the           alternate method for secret sharing       for permissioned blockchains) and
                  public ceremony creates a system         in November 1979.                         Ethereum (a platform for public
                  whose trust model is the antithesis          Chaum also notes that pseudonyms      blockchains) have joined forces.
                  of that of a private (permissioned)      can play an important role in effect-     Recently, researchers have applied
                  blockchain. For these reasons, we        ing anonymity: “Another use allows        game theory to model and analyze
                  consider Chaum’s system pub-             an individual to correspond with a        the behaviors of players and mining
                  licly permissioned.                      record keeping organization under a       pools in blockchain-based digital
                                                                                                     currencies (see Dhamal and Lewen-
                                                                                                     berg). Table 1 chronicles some
                                                                                                     of the important cryptographic
 Table 1. A timeline of selected discoveries in cryptography and blockchain technology.              discoveries underlying blockchain
 1970    James Ellis, public-key cryptography discovered at Government Communications                technologies. For example, in
         Headquarters (GCHQ) in secret                                                               2018, the European Patent Office
                                                                                                     issued the first patent on block-
 1973    Clifford Cocks, RSA cryptosystem discovered at GCHQ in secret
                                                                                                     chain—a method for enforcing
 1974    Ralph Merkle, cryptographic puzzles (paper published in 1978)                               smart contracts.
 1976    Diffie and Hellman, public-key cryptography discovered at Stanford
 1977    Rivest, Shamir, and Adleman, RSA cryptosystem invented at the Massachusetts                 Comparison of Selected
         Institute of Technology                                                                     Blockchain Systems
                                                                                                     To illustrate how the elements come
 1979    David Chaum, vaults and secret sharing (dissertation in 1982)
                                                                                                     together in actual blockchain systems,
 1982    Lamport, Shostak, and Pease, Byzantine Generals Problem                                     we compare a few selected systems,
 1992    Dwork and Naor, combating junk mail                                                         including Chaum’s vaults, Bitcoin,
 2002    Adam Bach, Hashcash                                                                         Dash, Corda, and Hyperledger Fab-
                                                                                                     ric, chosen for diversity. Table 2
 2008    Satoshi Nakamoto, Bitcoin
                                                                                                     describes how each of these sys-
 2017    Wright and Savanah, nChain European patent application (issued in 2018)                     tems carries out the four crucial
10                ComputingEdge                                                                                               January 2020
74                IEEE Security & Privacy                                                                                January/February 2019
participant roles of any blockchain      that implements policy. Despite          ledgers, they will likely be around
defined ahead. For more context,         these significant powers, the control    in various forms for a long time.
Table 3 characterizes a few important    structure is still more distributed      There are, however, some trou-
properties of these systems and of       (anyone can potentially become a         bling fundamental conflicts that
one additional system—Ethereum.          core developer) than for a permis-       have not been solved. These con-
    In his vault system, Chaum 9         sioned system controlled entirely        flicts include tensions between
identifies four crucial participant      by a prespecified entity. In Bitcoin,    the fol low ing pairs of poten-
roles of any blockchain, which           in each round, the winning miner (a      tially dissonant concerns: privacy
we call watchers, doers, executives,     doer) becomes an executive for that      and indelibility, anonymity and
and czars. The watchers passively        round. It is instructive to understand   accountability, stability and alter-
observe and check the state of the       how each blockchain system allo-         native future continuations, and
ledger. The doers (level 1 trustees)     cates the four participant roles.        current engineering choices and
carry out actions, including serving         Table 3 illustrates some of the      long-term security. For example,
state. The executives (level 2 trust-    possible variations of blockchains,      recent European privacy laws grant
ees) sign (or otherwise attest to) the   including varying control and con-       individuals the right to demand
blocks. The czars (level 3 trustees)     sensus policies as well as different     that their personal data be erased
change the executives and their pol-     types of smart contracts. Whereas        from most repositories (the right
icies. Chaum refers to these partici-    most blockchain systems maintain         to be forgotten). Satisfying this
pants as bodies,9 leaving it unclear     a single chain, Corda supports mul-      erasure requirement is highly prob-
whether they could be algorithms.        tiple independent chains, per node       lematic for indelible blockchains,
    Although most systems do not         or among subsets of nodes. Similarly,    especially for ones whose nodes
explicitly specify these roles, all      Chaum’s system also supports mul-        lack physical security.
systems embody them, though              tiple chains. While most blockchains         An attraction of blockchains is
with varying nuances. For example,       require each node to maintain the        their promise of stability enforced
many people naively think of Bit-        same state, Corda’s and Chaum’s sys-     through consensus, yet sometimes
coin as a fully distributed system       tems do not.                             the nodes cannot agree, resulting in
free of any centralized control, but,                                             a fork and associated possible splits
in fact, Bitcoin’s core developers—      Conflicts and Challenges                 in the continuations of the chain. In
as is true for all distributed sys-      Because blockchain technologies          a hard fork, level 3 trustees issue a
tems—carry out the role of czars,        address enduring needs for per -         significant change in the rules that is
changing the underlying software         manent, indelible, and trusted           incompatible with the old rules. In a

 Table 2. Alignment of participant roles across five blockchain systems.

                             Chaum, 1982        Bitcoin, 2008      Dash, 2014                     Corda, 2016         Hyperledger Fabric,
                             A flexible         A permissionless   A system that speeds up        A permissioned      2016
                             system based       system using       Bitcoin with a masternode      system with         A permissioned system
 Role                        on vaults          PoW                network                        smart contracts     with smart contracts
 Watchers                    Any computer       Nodes (distinct    Any computer online            Nodes               Peers
 Passively check state       online9            from full nodes)
 Doers                       Level 1 trustee    Full nodes         Miners                         Nodes               Peers
 Carry out actions,
 including serving state
 Executives                  Level 2 trustee    Winning miner      Winning masternode             Nodes (each         Endorsing peers
 Sign blocks (or             (promoted          (promoted          (promoted by an algorithm      node is an
 otherwise attest to         from level 1 by    from doers         from the masternode            executive for its
 them)                       czars)9            each round)        network, which anyone          Corda blocks,
                                                                   may join for 1,000 Dash)       called states)
 Czars                       Level 3            Core developers    Quorum of masternodes          Permissioning       Endorsement policies
 Change executives and       trustee9                                                             service
 their policies

www.computer.org/computingedge                                                                                                           11
www.computer.org/security                                                                                                                 75
REAL-WORLD CRYPTO

            Table 3. Three properties of several distributed ledger systems.                       T      o understand blockchain sys-
                                                                                                          tems, it is helpful to view them
                                                                                                   in terms of how the watchers, doers,
            System               Permissioned?    Basis of Consensus      Smart Contracts          executives, and czars carry out their
                                                                                                   functions under the guidance of the
            Chaum,               Permissioned,    Weak consensus;         Private arbitrary
            1982                 with option      does not handle         distributed              access, control, and consensus poli-
                                 for publicly     concurrent client       computation              cies. This systematic abstract view
                                 permissioned     requests                                         helps focus attention on crucial ele-
                                                                                                   ments and facilitates a balanced
            Bitcoin,             Permissionless   PoW                     Conditional              comparison of systems. Blockchains
            2008                                                          payment and              address many longstanding inherent
                                                                          limited smart            needs for indelible ledgers, from finan-
                                                                          contracts through        cial transactions to property records
                                                                          scripts
                                                                                                   and supply chains. With powerful
            Dash,                Combination      Proof of stake          No                       existing cryptographic techniques, a
            2014                                                                                   wide set of available variations, and a
            Ethereum,            Permissionless   PoW                     Yes, nonprivate          large amount of resources allocated to
            2014                                                          Turing complete          these technologies, blockchains hold
                                                                          objects                  significant potential.
            Hyperledger          Permissioned     Based on                Yes, off-chain
            Fabric,                               state machine                                    Acknowledgments
            2015                                  replication                                      We thank Dan Lee, Linda Oliva, and
            Corda,               Permissioned     Based on                Yes (set of              Konstantinos Patsourakos for their
            2016                                  state machine           functions),              helpful comments. Alan T. Sherman
                                                  replication             including explicit       was supported in part by the National
                                                                          links to human           Science Foundation under Scholarship
                                                                          language                 for Service grant 1241576.

                                                                                                   References
           soft fork, there is a less severe change     time (Bitcoin’s ledger is currently         1. A. Sherman, F. Javani, H. Zhang,
           in the rules for which the old system        more than 184 GB).                             and E. Golaszewski, On the ori-
           recognizes valid blocks created by               As of September 2018, the hash             gins and variations of blockchain
           the new system (but not necessar-            rate for Bitcoin exceeded 50 mil-              technologies. 2018. [Online].
           ily vice versa).                             lion TH/s, consuming more than                 Available: http://arxiv.org/abs
               Security engineers must commit           73 TWh of power per day, more                  /1810.06130
           to particular security parameters,           than the amount consumed by Swit-           2. C. Cachin and M Vukolic, “Block-
           hash functions, and digital signa-           zerland. These hashes were attempts            chain consensus protocols in the
           tures methods.                               to solve cryptographic puzzles of              wild,” in Proc. 31st Int. Symp. Distrib-
               No such choice can remain com-           no intrinsic value (finding an input           uted Computing, 2017, vol. 1, pp. 1–16.
           putationally secure forever in the           that, when hashed, produces a cer-          3. L. Lamport, R. Shostak, and M.
           face of evolving computer technol-           tain number of leading zeroes), and            Pease, “The Byzantine generals
           ogy, including quantum comput-               almost all of these computations went          problem,” ACM Trans. Program-
           ers and other technologies not yet           unused. Attempts, such as Primecoin            ming Languages Syst., vol. 4, no. 3,
           invented. The hopeful permanence             and others, to replace cryptographic           pp. 382–401, 1982. [Online]. Avail-
           of blockchains is dissonant with             hash puzzles with useful work (e.g.,           able: https://dl.acm.org/citation
           the limited-time security of today’s         finding certain types of prime inte-           .cfm?doid=357172.357176
           engineering choices.                         gers) are challenging because it is very    4. S. Nakamoto, “Bitcoin: A peer-to-
               Additional challenges faci n g           hard to find useful problems that have         peer electronic cash system,” Bitcoin,
           block chains include the huge                assured difficulty and whose level of          2008. [Online]. Available: https://
           amounts of energy spent on block-            difficulty can be dynamically throt-           bitcoin.org/bitcoin.pdf
           chain computations (especially               tled. Some researchers are exploring        5. A. Back, “Hashcash: A denial of service
           PoW), the high rates at which ledgers        alternatives to PoW, such as proof             counter-measure,” Hashcash, 2002.
           grow, and the associated increases           of space, proof of stake, and proof of         [Online]. Available: http://www
           in transaction latency and processing        elapsed time.                                  .hashcash.org/papers/hashcash.pdf

12         ComputingEdge                                                                                                       January 2020
76         IEEE Security & Privacy                                                                                        January/February 2019
This article originally appeared in
                                                                                                             IEEE Security & Privacy, vol. 17, no. 1, 2019.

6. R. C. Merkle, “Secure communi-              10. N. Szabo, “Smart contracts,” 1994. [On-              Farid Javani is a Ph.D. student at
   cations over insecure channels,”                line]. Available: http://www.fon.hum                    the University of Maryland, Bal-
   Commun. ACM, vol. 21, no. 4,                    .uva.nl/rob/Courses/Information                         timore County. Contact him at
   pp. 294–299, 1978. [Online]. Avail-             InSpeech/CDROM/Literature                               javani1@umbc.edu.
   able: https://dl.acm.org/citation               /LOTwinterschool2006/szabo.best
   .cfm?doid=359460.359473                         .vwh.net/smart.contracts.html                        Haibin Zhang is an assistant professor
7. L. Lamport, “The part-time parlia-          11. E. Wong, “Retrieving dispersed                          in the Department of Compu-
   ment,” ACM Trans. Comput. Syst., vol.           data from SDD-1: A system for                           ter Science and Electrical Engi-
   16, no. 2, pp. 133–169, 1998. [Online].         distributed databases,” in Proc. 2nd                    neering at the Univer s i t y of
   Available: https://dl.acm.org                   Berkeley Workshop Distributed Data                      Maryland, Baltimore County.
   /citation.cfm?doid=279227.279229                Management and Comput. Networks,                        Haibin received a Ph.D. from the
8. D. L. Chaum, “Computer systems                  May 1977, pp. 217–235.                                  University of Califor nia, Davis,
   established, maintained, and trusted                                                                    in 2001. His re search interests
   by mutually suspicious groups,”             Alan T. Sherman is a professor of                           include di str ibuted comput-
   Elect. Eng. Res. Lab., Univ. Cali-              computer science at the University                      i n g a n d secure blockchains.
   fornia, Berkeley, Tech. Memo.                   of Maryland, Baltimore County.                          Co ntac t h i m at hbzhang@
   UCB/ERL/M79/10, 1979.                           His research interests include                          umbc.edu.
9. D. L. Chaum, “Computer systems                  secure voting, applied cryptog-
   established, maintained and trusted by          raphy, and cybersecurity educa-                      Enis Golaszewski is a Ph.D. student
   mutually suspicious groups,” Ph.D.              tion. He is a Senior Member of the                      at the University of Maryland,
   dissertation, Dept. Comput. Sci.,               IEEE. Contact him at sherman@                           Baltimore County. Contact him
   Univ. California, Berkeley, 1982.               umbc.edu.                                               at golaszewski@umbc.edu.

                                           Call rticles
                                           f o r A
                                                                                             ing
                                                                     e   C   o  mput
                                                                 iv
                                                     EE Pervas                        n th e
                                                                                              latest
                                                   IE       , u s ef
                                                                     ul p a p
                                                                              e r s o
                                                                                                  e,
                                                             a c ce s s
                                                                          ible                             er vasiv
                                                    seek s                               men     ts in p
                                                                            d de   velop                                 s
                                                                 viewe                                        . Topic
                                                             e                                       uting
                                                      peer-r                               sc o m  p
                                                                                 uitou
                                                              e , a n d ubiq                           , s of t w
                                                                                                                    a re
                                                       mobil                          e c  h n ology
                                                                                    t
                                                                            ware                                   an d
                                                                 e hard                                nsing
                                                        includ                           - w o rld se
                                                                                       l                                   ion,
                                                                             re , re a                            terac t
                                                                  truc tu                               ter in
                                     s:                   infras                            - co m  p u
                          e li n e                                                u man
               guid                                                     ion, h                                        ding
    Au   t hor                        c/                    int e ra c t
                                                                                                    io n s, inclu
                              rg /m                                                        ider  a t                                y.
                     uter.o                                                                                                  privac
            .comp                                                                s cons                              y, and
    w  w  w
                             .htm                               n d  s y s te m                           e c u r it
                     u th o r                                 a                                      y, s
             sive /a                                                                        labilit
    p e r va
                      a       ils:                                        y m e  nt , s c a
          e     r det                                           deplo
    Furth                     uter.o
                                     rg
                                                ive
             sive@
                     co m p
                          rg/p             ervas
    p e r va
              o m puter.o
    w   w w.c
                                                                 Digital Object Identifier 10.1109/MSEC.2019.2900896

www.computer.org/computingedge                                                                                                                               13
PURPOSE: The IEEE Computer Society is the world’s largest                  EXECUTIVE COMMITTEE
association of computing professionals and is the leading provider         President: Leila De Floriani
of technical information in the field.
                                                                           President-Elect: Forrest Shull
MEMBERSHIP: Members receive the monthly magazine                           Past President: Cecilia Metra
Computer, discounts, and opportunities to serve (all activities            First VP: Riccardo Mariani; Second VP: Sy‐Yen Kuo
are led by volunteer members). Membership is open to all IEEE              Secretary: Dimitrios Serpanos; Treasurer: David Lomet
members, affiliate society members, and others interested in the           VP, Membership & Geographic Activities: Yervant Zorian
computer field.                                                            VP, Professional & Educational Activities: Sy-Yen Kuo
                                                                           VP, Publications: Fabrizio Lombardi
COMPUTER SOCIETY WEBSITE: www.computer.org
                                                                           VP, Standards Activities: Riccardo Mariani
OMBUDSMAN: Direct unresolved complaints to                                 VP, Technical & Conference Activities: William D. Gropp
ombudsman@computer.org.
                                                                           2019–2020 IEEE Division VIII Director: Elizabeth L. Burd
CHAPTERS: Regular and student chapters worldwide provide the               2020-2021 IEEE Division V Director: Thomas M. Conte
opportunity to interact with colleagues, hear technical experts,           2020 IEEE Division VIII Director-Elect: Christina M. Schober
and serve the local professional community.
AVAILABLE INFORMATION: To check membership status, report                  BOARD OF GOVERNORS
an address change, or obtain more information on any of the                Term Expiring 2020: Andy T. Chen, John D. Johnson,
following, email Customer Service at help@computer.org or call             Sy-Yen Kuo, David Lomet, Dimitrios Serpanos,
+1 714 821 8380 (international) or our toll-free number,                   Hayato Yamana
+1 800 272 6657 (US):                                                      Term Expiring 2021: M. Brian Blake, Fred Douglis,
  •   Membership applications                                              Carlos E. Jimenez-Gomez, Ramalatha Marimuthu,
  •   Publications catalog                                                 Erik Jan Marinissen, Kunio Uchiyama
  •   Draft standards and order forms                                      Term Expiring 2022: Nils Aschenbruck,
  •   Technical committee list                                             Ernesto Cuadros‐Vargas, David S. Ebert, William Gropp,
  •   Technical committee application                                      Grace Lewis, Stefano Zanero
  •   Chapter start-up procedures
  •   Student scholarship information
  •   Volunteer leaders/staff directory
                                                                           EXECUTIVE STAFF
  •   IEEE senior member grade application (requires 10 years              Executive Director: Melissa A. Russell
      practice and significant performance in five of those 10)            Director, Governance & Associate Executive Director:
                                                                           Anne Marie Kelly
PUBLICATIONS AND ACTIVITIES                                                Director, Finance & Accounting: Sunny Hwang
                                                                           Director, Information Technology & Services: Sumit Kacker
Computer: The flagship publication of the IEEE Computer Society,
                                                                           Director, Marketing & Sales: Michelle Tubb
Computer publishes peer-reviewed technical content that covers
                                                                           Director, Membership Development: Eric Berkowitz
all aspects of computer science, computer engineering,
technology, and applications.                                              COMPUTER SOCIETY OFFICES
Periodicals: The society publishes 12 magazines and 18 journals.           Washington, D.C.: 2001 L St., Ste. 700, Washington, D.C.
Refer to membership application or request information as noted            20036-4928; Phone: +1 202 371 0101; Fax: +1 202 728 9614;
above.                                                                     Email: help@computer.org
Conference Proceedings & Books: Conference Publishing                      Los Alamitos: 10662 Los Vaqueros Cir., Los Alamitos, CA 90720;
Services publishes more than 275 titles every year.                        Phone: +1 714 821 8380; Email: help@computer.org

Standards Working Groups: More than 150 groups produce IEEE
                                                                           MEMBERSHIP & PUBLICATION ORDERS
standards used throughout the world.
                                                                           Phone: +1 800 678 4333; Fax: +1 714 821 4641;
Technical Committees: TCs provide professional interaction in              Email: help@computer.org
more than 30 technical areas and directly influence computer
engineering conferences and publications.                                  IEEE BOARD OF DIRECTORS
Conferences/Education: The society holds about 200 conferences             President: Toshio Fukuda
each year and sponsors many educational activities, including              President-Elect: Susan K. “Kathy” Land
computing science accreditation.                                           Past President: José M.F. Moura
                                                                           Secretary: Kathleen A. Kramer
Certifications: The society offers three software developer
                                                                           Treasurer: Joseph V. Lillie
credentials. For more information, visit
                                                                           Director & President, IEEE-USA: Katherine J. Duncan
www.computer.org/certification.
                                                                           Director & President, Standards Association: Robert S. Fish
                                                                           Director & VP, Educational Activities: Stephen Phillips
BOARD OF GOVERNORS MEETING
                                                                           Director & VP, Membership & Geographic Activities:
22 – 23 January: Costa Mesa, California                                    Maike Luiken
                                                                           Director & VP, Publication Services & Products: Tapan Sarkar
                                                                           Director & VP, Technical Activities: Kazuhiro Kosuge

                                                revised 19 December 2019
IT and Twenty-First Century Employment

 BLOCKCHAIN
 George Strawn
 National Academies of Sciences, Engineering,
                                                                           This article originally appeared in
 and Medicine
                                                                           IT Professional, vol. 21, no. 1, 2019.

 & “YABB,” YET ANOTHER book on blockchain (to                         become disconnected from the network. (Cold War
 modify the acronym YACC—yet another complier                         worries about a nuclear arrack made this a major
 compiler), Life After Google, was published in July                  concern.) By switching packets instead of circuits
 of 2018 by the prolific author George Gilder. (Ama-                  and by distributing the switching function to every
 zon currently lists 75 books on the topic.) As                       Internet router, that goal was achieved.
 Gilder lays out in the book, he believes that the cli-                   On the other hand, very little thought was
 ent–server model of current internet usage will be                   given to other dimensions of network security,
 succeeded by a peer-to-peer (P2P) model emp-                         and so, we have been playing Internet security
 loying blockchain: the technology that enabled                       catch-up ever since. (One might say that it is an ill
 the cryptocurrency bitcoin a decade ago. Another                     wind that blows no good, since Internet security
 YABB is IBM’s short Blockchain for Dummies                           jobs are in plentiful supply.) But as increasingly
 (https://public.dhe.ibm.com/common/ssi/ecm/xi/                       more functions of society are transferred to the
 en/xim12354usen/ibm-blockchain_second-                               Internet, its lack of security has become a major
 edition_final_XIM12354USEN.pdf), which is avail-                     societal problem. Gilder and others believe that
 able for free download and has the more modest                       this lack of security is the Achilles heel of today’s
 goal of showing how blockchain for business ledg-                    Internet, and the reason that P2P architecture and
 ers is available now for practical use. In this paper,               secure blockchain technology will supersede it.
 I will review some related characteristics of the                        The original Internet architecture was in fact
 Internet, of P2P, and of blockchain. Then, I will                    P2P. This simply means that any internet node
 describe how blockchain is “ready for business                       could both provide services to other nodes and/or
 use,” and finally, I will comment on its potential                   ask them to provide services. (For more depth, see
 impact on 21st century employment and business.                      https://en.m.wikipedia.org/wiki/Peer-to-peer.) For
                                                                      example, the file transfer protocol was/is bidirec-
                                                                      tional: Any node can send and/or receive files. As
 THE INTERNET, P2P, AND                                               the Internet matured in the 1990s and 2000s, impor-
 BLOCKCHAIN                                                           tant services arose that were unidirectional, for
    One of the goals of the Internet architecture was
                                                                      example, Google searches, Amazon purchases, and
 to minimize points of failure. The switching centers
                                                                      Facebook friends. These services were provided
 that characterized the telephone network were
                                                                      by nodes that came to be called servers, and nodes
 such points of failure. If a switching center were to
                                                                      that utilized those services were called clients.
 be destroyed, the telephones in that area would                          The client–server model is subject to various
                                                                      security breaches (of course, so is P2P). For exam-
 Digital Object Identifier 10.1109/MITP.2018.2879244                  ple, distributed denial-of-service attacks flood a
 Date of current version 26 February 2019.                            server with so many requests for service that it

 January/February 2019
2469-7087/20 © 2020 IEEE
                                                      Published by the IEEE Computer Society
                                             Published by the IEEE Computer Society
                                                                                                               1520-9202  2018 IEEE
                                                                                                                    January 2020
                                                                                                                                       91   15
IT and Twenty-First Century Employment

            shuts down. Also, most servers require usernames        management, government, supply chain manage-
            and passwords from clients (and perhaps credit          ment, and health care. Since these use cases
            card numbers). So, many users (me included) have        replace (or at least reduce) the need for trusted
            hundreds of usernames and passwords, which I            third party oversight, that reduction in employ-
            am supposed to remember and never write down.           ment is obvious. Less obvious is the fact that many
            (This situation seems to me to provide more liabil-     of these use cases can contain “smart contracts”
            ity protection for the server than security for the     that automate various follow-on functions once a
            client.) And security breaches of servers are legion,   transaction has been completed (e.g., automatic
            yielding crooks millions of usernames, passwords,       payment once a shipment has been received).
            and credit card numbers. Such hacks are of incre-       Thus, the need for fewer manual steps may extend
                                                                    well beyond transaction management.
            asing importance as online banking and other
                                                                        Perhaps even more important is that these use
            significant transactions are conducted online.
                                                                    cases typically take a significant amount of time to
                Blockchain technology is simply a distribu-
                                                                    complete. The use of blockchain could cut days
            ted ledger on a P2P network whose transactions
                                                                    and weeks to hours and minutes, and since time is
            cannot be erased or altered (see https://en.m.
                                                                    money, use of this technology could be doubly
            wikipedia.org/wiki/Blockchain for implementation
                                                                    cost-saving. Of course, in addition to increasing effi-
            details). As new transactions occur and are verified,   ciency, effectiveness could be improved as well. As
            they are copied onto all copies of the ledger. It has   Chapter Three of Dummies explains, blockchain
            been said that blockchain/P2P might to for tran-        can reduce business network (information, interac-
            sactions what the Internet/Web did for Information.     tion, and innovation) frictions in a number of ways.
                                                                    Share ledgers, P2P transactions, and smart con-
            BLOCKCHAIN FOR BUSINESS                                 tracts are at the center of this business innovation.
            TRANSACTIONS                                                In a recent blockchain report (https://public.dhe.
               Speaking of transactions, they are the busi-         ibm.com/common/ssi/ecm/gb/en/gbe03835usen/
            ness activity that blockchain is ready to facilitate,   gbe03835usen-00_GBE03835USEN.pdf) drawing on
            according to IBM and others. Companies record           2965 conversations with C-suite executives, IBM
            transactions in ledgers, and traditionally, each        reported the following industry statistics: Over
            company keeps its own ledger. Blockchain tech-          one third of organizations across all industries
            nology enables a single, shared ledger for all the      and regions are already considering or are
            companies engaging in related transactions.             actively engaged with blockchain, and 66% of
            Moreover, this shared ledger has several pleasing       early adopters—or explorers—intend to adopt a
            security characteristics. First, it is copied onto      new platform business model that breaks the
            the computers of all participating companies,           boundaries of traditional market exchanges. It
            making loss of data extremely unlikely. Second,         would seem this train is moving.
            once a transaction has been “agreed to,” it cannot
            be changed or deleted. This provides a new level        WHAT IS NEXT?
            of “technological trust” that has traditionally            Blockchain burst on the scene as the bitcoin
                                                                    technology only ten years ago. It was the result
            been provided by trusted third parties. Regard-
                                                                    of innovative software, and hardware innova-
            ing how a transaction is agreed to, the business
                                                                    tions followed as the computationally expensive
            use just described requires only a simple vote by
                                                                    mining confirmation of transactions was opti-
            the companies involved rather than an expensive
                                                                    mized. On the other hand, 3-D printing (a.k.a.
            “mining” activity as in the bitcoin application.
                                                                    additive engineering) resulted from hardware
                                                                    innovations over 30 years ago and is now also
            USE CASES, EMPLOYMENT, AND                              moving (Amazon lists 100 books and gadgets on
            OTHER IMPLICATIONS                                      the subject). As Moore’s and related laws con-
               Chapter four of Blockchain for Dummies               tinue to lower the cost and raise the perfor-
            describes a plethora of transaction/ledger use          mance of IT systems, predicting what is next
            cases the fall within the sphere of blockchain.         requires matching new price points, innovative
            These use cases occur in a wide range of                thinking, and society’s needs and desires. It is an
            areas: financial services, multinational policy         exciting ride with far to go!

16
     92         ComputingEdge
                                                                                                            IT Professional
                                                                                                                January 2020
You can also read