3. AGENDA
1. Welcome and Introduction (Stavros, Dean, Yamiz)
2. Designs of Hyperledger Fabric, a permissioned blockchain. Experiences and lessons learned
from various real-world enterprise blockchain use cases.
3. Overview of the Hyperledger “Fabric-Samples” repository for developers available via Docker
compose and containers.
4. Integrating Splunk to instantly enable analytics and insights to a Hyperledger Fabric environment
Break and Networking
5. Showcase analytics use cases in Splunk by generating transactions and failure scenarios within
a Hyperledger Fabric deployment.
6. Bonus - Advanced Data Integrity using Blockchain, Splunk for Ethereum, Cross-chain Analytics
7. Conclusion (Dean, Stavros, Yamiz)
https://www.meetup.com/Blockchain-Analytics-AI/
5. Questions
Join our Meetup Group
hello@bloxy.info
Workshop Series
https://www.meetup.com/Blockchain-Analytics-AI/
6. Qi Zhang
IBM Research, NY, USA
q.zhang@ibm.com
Enterprise Blockchain:
Design, Use cases, and Cognitive Analytics
Blockchain
for
Business
Shared,
replicated,
permissioned
ledger
8. Business Networks, Wealth and Markets
• Business Networks benefit from connectivity
• Participants are customers, suppliers,
banks, partners
• Cross geography and regulatory boundary
• Wealth is generated by the flow of goods and
services across business network in
transactions and contracts
• Markets are central to this process:
• Public (fruit market, car auction), or
• Private (supply chain financing, bonds)
9. Enterprises Need Private Blockchain
Append-only distributed
system of record
shared across business
network
Business terms embedded
in transaction database &
executed with transactions
All parties agree to
network verified
transaction
Ensuring appropriate
visibility; transactions are
secure, authenticated
& verifiable
Privacy
Shared
Ledger
Smart
Contract
Consensus
• Blockchains for business are generally permissioned and private, and prioritize
– Identity over anonymity
– Selective endorsement over proof of work
– Assets over cryptocurrency
10. The Hyperledger Project
• An implementation of blockchain technology
that is a foundation for developing blockchain
applications
• Emphasis on ledger, smart contracts,
consensus, confidentiality, resiliency and
scalability.
• V1.4 released 2018 Q4
• Includes significant confidentiality and
service discovery improvements
• IBM is one of the many contributing
organizations
16. Food Ecosystem Today
Data sharing limited to ‘one up,
one down’ without end-to-end
transparency
Multiple data formats & sources
Lack of trusted, easily auditable records
Incomplete information &
inability to effectively
communicate with the end
consumer
17. The IBM Food Trust Solution
Future IBM Modules
Future 3rd Party Modules /
Capabilities
§Manage Recalls
§Recall Post-Analysis
§Trace-forward & back
§Recall Simulator
Trace & Recall
§Version Control
§Authenticity
§Automated lifecycle
management
§Real-time Sharing
Certificate Management
IBM Blockchain Platform
Hyperledger Fabric
§ Permissioned Data Access & Entry
§ IBM Blockchain Provenance Engine
§ Secure Document Storage
§ API Integration
Data Entry & Access
IBM Food Trust
Solution Core
25. The Different Dimensions of Our Identity
1. Me as an individual: 2. How I am represented: 3. How I interact:
• Identity: Unique traits
associated with an
individual; the owner of
personal identification
information.
• Identity Renderings: Digital or
physical (paper/plastic)
instrument as defined by
providers.
• Identity Interactions:
Situational usage such as
pay, identify, participate,
enter.
26. The Facts
175M records breached in 2017 that exposed
millions of people’s identities1
1339 breaches of data
stores of individual names,
Social Security, drivers
license number, medical
record, or financial records
in 2017 in the US alone.1
Cyber attacks cost
businesses as much as
$400 billion a year.2
Banks spend $1 billion a
year on identity
management solutions2
It could have been your identity.
[1] http://www.idtheftcenter.org/images/breach/2017Breaches/DataBreachReport_2017.pdf
[2] https://www.wired.com/beyond-the-beyond/2017/07/global-cybercrime-costs-trillion-dollars-maybe-3/
[3] https://www.accenture.com/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_9/Accenture-Future-Identity-Banking.pdf
27. Decentralized Identity
Owner/Holder
Acquires, Stores,
Presents
Verifier
Requests, Verifies
Issuer
Issues
Issues
Credentials
Presents
Credentials
Decentralized Identifiers (DIDs)
Permissioned Blockchain
Signs
Credentials
Countersigns
Credentials
Verifies
Signatures
• All interactions between entities are point to point
• The ledger serves as the distributed root of trust instead of CAs
• Credentials are accumulated over time through every peer to peer relationship