Home News How to Achieve Data Privacy in Blockchain Ledgers

How to Achieve Data Privacy in Blockchain Ledgers

0
How to Achieve Data Privacy in Blockchain Ledgers
0

In 2017, the blockchain concept took center stage. It was suddenly everywhere in the news, and people were talking about it as if it were the Holy Grail. Just consider the constant stream of news on the Bitcoin cryptocurrency and payment system, one of the early blockchain implementations. And now people are thinking more broadly, and talking about all kinds of use cases for blockchain ledgers — from processing land titles and loans to sharing product construction plans.

That’s all exciting stuff. But the story shouldn’t stop there. There’s another side to the blockchain concept that people need to focus on: data privacy — which is currently a missing link in the blockchain.

Let’s take Bitcoin as an example. In order to let the simple smart contract of Bitcoin validate the distributed ledger continuously, all transaction data — including amount, source account and target account — must be available to all network participants in unencrypted form. This means that the much-heralded anonymity on the Bitcoin network is the more the result of massive obscurity than of real security measures like encryption and privacy.

Here’s the unvarnished truth: Massive obscurity does not equate to data privacy — and that’s an issue when it comes to almost any serious business use case for blockchain. Most use cases won’t work if you can’t secure blockchain transactions against read access from everybody out there.

Read the entire article here, How to Achieve Data Privacy in Blockchain Ledgers

Via the fine folks at Dell

Categories:
Dell Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more.

Share your view, leave a comment below:

Featured Resources:

Related Articles:

| LATEST FEATURED RESOURCES

White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]

    Downloads

      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Amazon WorkSpaces – Automatically configured session screen saver Video

          To meet the corporate security requirements and to improve user experience, a secure screen saver within Amazon WorkSpaces is required only if the endpoint doesn’t have a secure screen saver. This video is from the fine folks at deviceTRUST.

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors

          Close