Permanent URI for this collection
1 - 4 of 4
ItemDesign of a Forgetting Blockchain: A Possible Way to Accomplish GDPR Compatibility( 2019-01-08)Practitioners as well as academics expect that blockchain technology is a game changer for a variety of use cases. This is because of its feature of transaction immutability enabled by keeping a history of all transactions. Nevertheless, this strength can become its biggest weakness. There already exists a lively discussion on scenarios where it is necessary to delete submitted data from the chain after it is no longer needed. This becomes even more crucial with the introduction of the European General Data Protection Regulation (GDPR). In this paper we make use of a design science research (DSR) approach to design an IT artifact in form of a prototype that maintains most of the key features of blockchain technology but deletes old data. We evaluate the prototype with help of experts to investigate what to expect from blockchains that delete data and derive principles on how to design them.
ItemPushing Software-Defined Blockchain Components onto Edge Hosts( 2019-01-08)With the advent of blockchain technology, some management tasks of IoT networks can be moved from central systems to distributed validation authorities. Cloud-centric blockchain implementations for IoT have shown satisfactory performance. However, some features of blockchain are not necessary for IoT. For instance, a competitive consensus. This research presents the idea of customizing and encapsulating the features of blockchain into software-defined components to host them on edge devices. Thus, blockchain resources can be provisioned by edge devices (e-miners) working together closer to the things layer in a cooperative manner. This research uses Edison SoC as e-miners to test the software-defined blockchain components.
ItemWhat Does Not Fit Can be Made to Fit! Trade-Offs in Distributed Ledger Technology Designs( 2019-01-08)Distributed ledger technology (DLT), including blockchain, enables secure processing of transactions between untrustworthy parties in a decentralized system. However, DLT is available in different designs that exhibit diverse characteristics. Moreover, DLT characteristics have complementary and conflicting interdependencies. Hence, there will never be an ideal DLT design for all DLT use cases; instead, DLT implementations need to be configured to contextual requirements. Successful DLT configuration requires, however, a sound understanding of DLT characteristics and their interdependencies. In this manuscript, we review DLT characteristics and organize them into six groups. Furthermore, we condense interdependencies of DLT characteristics into trade-offs that should be considered for successful deployment of DLT. Finally, we consolidate our findings into DLT archetypes for common design objectives, such as security, usability, or performance. Our work makes extant DLT research more transparent and fosters understanding of interdependencies and trade-offs between DLT characteristics.
ItemIntroduction to the Minitrack on Blockchain Engineering( 2019-01-08)