Summary and conclusions

AuthorBellia, M.; Kounelis, I.; Anderberg, A.; Calès, L.; Andonova, E.; Pólvora, A.; Petracco Giudici, M.; Nascimento, S.; Inamorato dos Santos, A.; Rossetti, F.; Papanagiotou, E.; Nai Fovino, I.; Spirito, L.; Sobolewski, M.
Pages101-108
Summary and conclusions
101 101
SUMMARY AND
CONCLUSIONS
Key insights
This report underlines a series of opportunities
and challenges across sec tors brought by
blockchain technology, which may introduce
signif‌icant changes in our ind ustry, economy
and society. We of‌fer a summary of key insights
collected from our analysis of blockchain
technology and its applications across sectors.
How blockchain works
Blockchain is a tamper-resistant and time -
stamped databa se (ledger) operating through
a distributed network of multiple nodes
or users. It is, however, a particular type of
database. Transactions bet ween users do not
require intermediaries or trusted third parties.
Instead, trust is based on the rules that everyone
follows to verify, validate and add transactions
to the blockchain – a ‘consensus mechanism’.
Blockchain is based on a par ticular combination
of key features: decentralisation, tam per-resistant,
transparency, security and smart contrac ts.
The lack of a central entit y controlling the syst em
creates strong resilience against single point-
of-failure f‌laws. Since it is extremely dif‌f‌icult
to change or delete the recor d of transactions,
in this sense the records on a blockchain are
tamper-r esistant . In public or open blockchains
all transactions are transparent and visible.
All transactions are time-stamped – that is,
data such as details a bout a payment, a contr act,
transfer of ownership, etc. are linked p ublicly to
a certain date and time. A nd smart contrac ts
enable the terms of agreement between parties
to be executed and enforced w ithout the need
for human coordination or inter vention.
However, a number of challenges remain
unresolved, such as the limited scalability
and performance of public blockchains, mainly
related to the low volume of trans actions, or
the high energy consumption when deploying
current PoW consensus mechanisms. Ot her
threats can arise from potential collusion from
a majority of participant s which could overrun
the network (51 % attacks), or from the high
dependency of run ning the network on a limited
number of participant s. A major source of security
vulnerability also lies in t he added responsibility
for key management, which ca n be as simple
and serious as losing a phone or a back-up of
the credentials.
Another key issue that needs further research
is how to safeguard personal , sensitive
or conf‌idential data. Transparent data on
a blockchain might be a problem when specif‌ic
data sets are not meant to be p ublicly available,
or need to be changed due to errors, inaccuracies
or other problems in the original data ent ry.
Potential conf‌lict s between specif‌ic blockchain
architectures a nd the EU’s GDPR warrant
a wider debate.
Scanning blockchain ecosystems
To a certain degree, the hype aroun d blockchain
technology has been inf‌l uenced or shaped by
a spike in interest from f‌inancial instit utions
since 2014. However, while more well-known

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT