This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
en:iot-reloaded:blockchain_network_structures_and_technologies [2023/10/31 08:55] – created margus | en:iot-reloaded:blockchain_network_structures_and_technologies [2025/05/17 09:12] (current) – agrisnik | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Blockchain Network Structures and Technologies ====== | ====== Blockchain Network Structures and Technologies ====== | ||
+ | |||
+ | **Transactions** | ||
+ | |||
+ | Blockchain technology uses two main types of cryptographic keys to provide the security of transactions and data: public keys and private keys. These keys work together to protect the integrity of the blockchain, enabling secure exchanges of digital records and protecting user identities. Consider the example of a mailbox. The public key is your email ID, which everyone knows about and can send you messages. The private key, on the other hand, is like the password to that mailbox. Only you own it, and you can read the messages inside. | ||
+ | |||
+ | A public key is a cryptographic code that others share and use to interact with your blockchain account. It's generated from your private key using a specific mathematical process. Public keys are used to verify digital signatures and to encrypt data that only the private key can decrypt. This ensures that messages or transactions are intended for the correct recipient. | ||
+ | |||
+ | A private key is a secret cryptographic code that grants access to your blockchain records. It must be kept confidential because anyone accessing the private key can control the records associated with the corresponding public key. This key is used to authorise transactions on the blockchain. When it is necessary to transfer information (make a transaction), | ||
+ | |||
+ | Public and private keys work together to secure blockchain operations: | ||
+ | * Encryption and Decryption: Only the corresponding private key can decrypt data when it is encrypted using a public key. This mechanism ensures that even if the data is intercepted, | ||
+ | * Digital Signatures: When a transaction is signed with a private key, the signature can be verified by others using the public key. This verification process confirms that the transaction is authentic and has not been tampered with. | ||
+ | * Secure Transactions: | ||
+ | |||
+ | **Categories of blockchain.** | ||
+ | |||
+ | There are three categories of blockchain: | ||
+ | |||
+ | __Public blockchains__, | ||
+ | |||
+ | Public blockchains process transactions more slowly because they are decentralised; | ||
+ | |||
+ | __Private blockchains__ (sometimes referred to as managed blockchains) are closed networks accessible only to authorised or select verified users. They are often owned by companies or organisations which use them to manage sensitive data and internal information. | ||
+ | |||
+ | Private blockchain is very similar to existing databases regarding access restrictions but is implemented with blockchain technology. As a result, such networks are not aligned with the principle of decentralisation. | ||
+ | |||
+ | Since it is accessible only by certain people, there is no requirement for mining blocks (validating). As a result, such networks are faster than other types because they do not have the necessary mining, consensus, etc. | ||
+ | |||
+ | __Hybrid or consortium blockchains__ are permission-based blockchains, | ||
+ | |||
+ | **Blockchain type selection** | ||
+ | |||
+ | When choosing the right type of blockchain for a project, it's important to consider how it will be used, who will use it, and how it needs to perform. There are three main types of blockchains, | ||
+ | |||
+ | //Private Blockchain:// | ||
+ | |||
+ | When to Use: A private blockchain is the best option if the blockchain is to be used only within a single organisation by a specific group of people. | ||
+ | Advantages: It gives the organisation more control over who can join and see the data. It's suitable for internal processes like keeping track of company records or managing internal operations. | ||
+ | Performance: | ||
+ | Examples: Hyperledger Fabric, Corda. | ||
+ | |||
+ | // | ||
+ | |||
+ | When to Use: A consortium blockchain is the right choice if the blockchain will be shared by a group of companies or organisations working together. | ||
+ | Advantages: It allows several organisations to work together while controlling who can access the blockchain. This is great for industries where businesses need to collaborate and share data securely. | ||
+ | Performance: | ||
+ | Examples: R3, Quorum. | ||
+ | |||
+ | //Public Blockchain:// | ||
+ | |||
+ | When to Use: A public blockchain is the best fit if the goal is to create a completely open and decentralised system that anyone can join, such as for cryptocurrencies. | ||
+ | Advantages: It allows anyone to participate and offers complete transparency. This is perfect for digital currencies, where trust needs to be spread across everyone using them. | ||
+ | Performance: | ||
+ | Examples: Bitcoin, Ethereum. | ||
+ | |||
+ | __To summarise__ – If, in your project, the blockchain is only for internal use, go with a private blockchain. Choose a consortium blockchain if it's for a group of related businesses. And if it needs to be open to everyone, a public blockchain is the way to go. | ||