Using blockchain to share verifiable manufacturing data for sourcing

via The Next Web

Researchers at North Carolina State University are proposing the creation of a public, open-source network that uses blockchains – the technology behind cryptocurrencies – to share verifiable manufacturing data.

The system could be used as a peer-to-peer network that allows companies to find small- and medium-sized manufacturers that are capable of producing specific components on a reliable basis.

“Small- and medium-scale manufacturers often lack the resources and network reach necessary to make all of their potential clients aware of their manufacturing capabilities,” says Binil Starly, corresponding author of a paper on the work and head of NC State’s Data Intensive Manufacturing Environment Lab.

“A public network like the one we’re proposing would help potential clients find manufacturers with relevant expertise and equipment in an efficient way,” says Starly, who is an associate professor in NC State’s Edward P. Fitts Department of Industrial & Systems Engineering.

“Our approach, called FabRec, would allow companies to automatically report about their manufacturing activities: which machines are being used, what materials they are working with, raw material inventory levels, whether the work is being completed on time, and so on,” says Atin Angrish, a Ph.D. student at NC State and first author of the paper.

“Because these updates are automated, users can be fairly certain that the information is accurate,” Angrish says. “And because it’s being done through the blockchain, which allows event logs to be traced to their source, there is accountability. So clients can find the right manufacturers, and manufacturers can find new clients, without relying solely on claims made in marketing materials.”

To demonstrate the viability of the concept, the researchers created FabRec – a publicly-accessible, prototype network that currently accepts input from a handful of machines.

“Our network shows that the concept is viable, but the next step would be to establish agreed-upon protocols with participating manufacturers,” Starly says. “That would allow the creation of code that permits users to report – and search for – any given set of parameters, such as type of product, production time, cost, and so on.”

“Future steps also include developing software that would allow us to authenticate sources entering data into the system – as well as identifying any unreliable sources,” Angrish says.

“We are now looking for manufacturers and IT sector partners to help us build up the network and establish it as a reliable, publicly accessible resource for supply chain professionals,” Starly says.

Learn more: Researchers Propose a Blockchain Data Network to Boost Manufacturing


The Latest on: Blockchain

via  Bing News


How blockchains are redefining cyber security

‘Where individuals, businesses and governments are constantly locked in a battle against bugs, fraud and malicious actors, blockchains propose an alternative’ - via

‘Where individuals, businesses and governments are constantly locked in a battle against bugs, fraud and malicious actors, blockchains propose an alternative’ – via

Blockchains are more than just Bitcoin – they’re a whole new way of looking at cyber security, writes Vijay Michalik, research analyst for digital transformation at Frost & Sullivan

Blockchains are a nebulous concept. You’ll have heard of Bitcoin already, and may understand that a blockchain, in the technical sense, is the foundation. Blockchains don’t just encompass this breakthrough technology, but a spectrum of business models, organisational structures and radical ideas.

Bitcoin is the first truly successful blockchain application, a digital currency, and it occupies an important space within this spectrum. Its technological capabilities are matched with a carefully balanced incentive structure. It also fosters a community around its open-source development, and third-party businesses creating applications and integrations.

Blockchains are built on a history of security research

Far from being an unprecedented breakthrough, with unintended consequences, the blockchain technology stack is a culmination of decades of cryptography and security research.

The 1970s cryptography breakthrough of the Merkle tree and the distributed hash tables of the 1990s combine to create autonomy, fault tolerance and scalability for distributed systems. They’re the tools that built famous decentralised applications like BitTorrent, Napster and Freenet.

Bitcoin’s most impressive contribution is recognising the synergies between this field of distributed communications and file sharing systems, and digital currencies, which had seen many false starts prior to Bitcoin’s success since 2009.

The key was Hashcash, a system proposed in 1997 to limit and suppress email spam and denial-of-service attacks. Hashcash is an algorithm that requires the sacrifice of processing power as a security mechanism. This proof-of-work creates the incentive structure and network verification that now powers cryptocurrencies.

The final step is the addition of smart contracts to the blockchain stack, a name coined by Nick Szabo as early as 1993. Smart contracts are algorithmic; a type of self-executing code which enables more complex asset transfer and the automated exchange of rights. These are the building blocks of a complete programming language, and the more advanced blockchain applications such as those envisioned by Ethereum.

What we get is a set of security tools that are very good at coordination between mutually unknown actors and secure data or value transfer. We think of blockchains as having four key characteristics to this end: they’re cryptography-based, distributed, peer to peer, and, in many cases, open source.

Innovative blockchain applications in security

As with many open source movements, we’re seeing the different stages of the blockchain ecosystem build out in waves: first the core protocols (Bitcoin, Ethereum and other platforms); now middleware, from Consensys; and then applications.

There’s been some degree of consolidation on blockchain development around Bitcoin and Ethereum over the past year, although Ethereum isn’t the second biggest token by market capitalisation.

Bitcoin’s first mover-advantage and financial specialisation has granted it momentum and early market interest, while Ethereum’s Turing-complete programming capabilities enable many other truly disruptive opportunities.

Guardtime’s security solution runs on a private blockchain, and features a cross-vertical solution replacing RSA digital signatures: its KSI (Keyless Signature Infrastructure), which uses only hash-function cryptography for signing. This prepares digital identity systems for the security necessities of the future – where quantum computers make factorisation problems like those that RSA relies on trivial.

Inter Planetary File System (IPFS) is a new core internet protocol that is designed to supplant the Hypertext Transfer Protocol (HTTP). IPFS can address some of the most difficult security challenges that the HTTP-based internet faces: centralised hosting and distribution, and weak application of content-signing protection.

Using context-driven storage, self-certification and an incentivised blockchain mechanism, IPFS becomes a secure, permanent web, resilient against server failure.

MIT’s Enigma, based on the Bitcoin blockchain, enables any code to be run on encrypted data. In its model, data can be stored, shared and analysed without being fully revealed to a single third party, enabling trustless sharing of data and distributed computation without resorting to full transparency. This grants blockchains, even in a permissionless setup, access to the full spectrum of data visibility from fully private to public.

Read more: How blockchains are redefining cyber security



The Latest on: Blockchains

via  Bing News