Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Blockchain Development with Hyperledger

You're reading from   Blockchain Development with Hyperledger Build decentralized applications with Hyperledger Fabric and Composer

Arrow left icon
Product type Course
Published in Mar 2019
Publisher Packt
ISBN-13 9781838649982
Length 636 pages
Edition 1st Edition
Languages
Concepts
Arrow right icon
Authors (8):
Arrow left icon
Anthony O'Dowd Anthony O'Dowd
Author Profile Icon Anthony O'Dowd
Anthony O'Dowd
Petr Novotny Petr Novotny
Author Profile Icon Petr Novotny
Petr Novotny
Weimin Sun Weimin Sun
Author Profile Icon Weimin Sun
Weimin Sun
Nitin Gaur Nitin Gaur
Author Profile Icon Nitin Gaur
Nitin Gaur
Luc Desrosiers Luc Desrosiers
Author Profile Icon Luc Desrosiers
Luc Desrosiers
Venkatraman Ramakrishna Venkatraman Ramakrishna
Author Profile Icon Venkatraman Ramakrishna
Venkatraman Ramakrishna
Xun (Brian) Wu Xun (Brian) Wu
Author Profile Icon Xun (Brian) Wu
Xun (Brian) Wu
Salman A. Baset Salman A. Baset
Author Profile Icon Salman A. Baset
Salman A. Baset
+4 more Show less
Arrow right icon
View More author details
Toc

Table of Contents (25) Chapters Close

Title Page
Copyright
About Packt
Contributors
Preface
1. Blockchain - Enterprise and Industry Perspective 2. Exploring Hyperledger Fabric FREE CHAPTER 3. Setting the Stage with a Business Scenario 4. Designing a Data and Transaction Model with Golang 5. Exposing Network Assets and Transactions 6. Business Networks 7. A Business Network Example 8. Agility in a Blockchain Network 9. Life in a Blockchain Network 10. Governance, Necessary Evil of Regulated Industries 11. Hyperledger Fabric Security 12. Introduction to Blockchain Technology 13. Ethereum Fundamentals 14. Overview of Solidity Programming 15. Building an Ethereum Blockchain Application 16. Exploring an Enterprise Blockchain Application Using Hyperledger Fabric 17. Implementing Business Networks Using Hyperledger Composer 18. Blockchain Use Cases 1. Other Books You May Enjoy Index

Other considerations


There are a few other considerations to keep in mind apart from the previously mentioned aspects. They are briefly explained in the following sections.

Consensus, ACID property, and CAP

A consensus model will never go to 0 because when NoSQL became the standard, various NoSQL systems solved their problems by understanding this CAP theorem, and the RDBMS enterprise community held steadfast to their ACID properties. Blockchain might well provide the primitives to break CAP and maintain ACID. Here are some thoughts.

CAP

Cap stands for:

  • C—Consistency: Consensus guarantees only one truth of what happened and in what order
  • A—Availability: The fact that all calls to the blockchain are asynchronous allows the invoking application to make progress while ensuring consensus and durability (chaining also guarantees this)
  • P—Network partition: Consensus, again, prevents split-brain with conflicts when things get back together after a network partition

ACID

ACID stands for:

  • A—Atomicity: The chaincode programming model is an all-or-nothing behavior, which allows you to group activities together. Either everything happens, or it doesn't.
  • C—Consistency: We believe the new world of NoSQL fudges this one. I believe this means the same as the C in CAP.
  • I—Isolation: Isolation indicates that two transactions are serialized, which is exactly what block construction and chaining does.
  • D—Durability: The chaining and replication all over the network ensures that if one or more nodes go down, data won't be lost. This is why everyone wants to bring a node and why those nodes should not be not co-located.

Attestation – SSCs are signed and encrypted

In secure service containers (SSCs), the software, operating system, hypervisors, and Docker container images cannot be modified. Certificates may be included in the SSC so that they can probe themselves into being genuine to a remote a party. For example, including an SSL certificate when building SSCs helps ensure that you're speaking with a genuine instance, since the SSL certificate always stays protected (encrypted) within the SSC.

Use of HSMs

According to Wikipedia, a hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plugin card or an external device that attaches directly to a computer or network server.

Administering a high-security device such as an HSM can be a real challenge in relation to sufficient security and controls. In fact, today's standards mandate certain methods and levels of security for HSM administrative (and key management) systems.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image