Home News How to Achieve Data Privacy in Blockchain Ledgers

How to Achieve Data Privacy in Blockchain Ledgers

How to Achieve Data Privacy in Blockchain Ledgers

In 2017, the blockchain concept took center stage. It was suddenly everywhere in the news, and people were talking about it as if it were the Holy Grail. Just consider the constant stream of news on the Bitcoin cryptocurrency and payment system, one of the early blockchain implementations. And now people are thinking more broadly, and talking about all kinds of use cases for blockchain ledgers — from processing land titles and loans to sharing product construction plans.

That’s all exciting stuff. But the story shouldn’t stop there. There’s another side to the blockchain concept that people need to focus on: data privacy — which is currently a missing link in the blockchain.

Let’s take Bitcoin as an example. In order to let the simple smart contract of Bitcoin validate the distributed ledger continuously, all transaction data — including amount, source account and target account — must be available to all network participants in unencrypted form. This means that the much-heralded anonymity on the Bitcoin network is the more the result of massive obscurity than of real security measures like encryption and privacy.

Here’s the unvarnished truth: Massive obscurity does not equate to data privacy — and that’s an issue when it comes to almost any serious business use case for blockchain. Most use cases won’t work if you can’t secure blockchain transactions against read access from everybody out there.

Read the entire article here, How to Achieve Data Privacy in Blockchain Ledgers

Via the fine folks at Dell

Dell Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more.

Share your view, leave a comment below:

Featured Resources:

Related Articles:


White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]


      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        Latest Videos

          OS Imaging and Deployment with ManageEngine Desktop Central – Creation of bootable PXE media

          This video will demonstrate the steps to create bootable PXE media. Learn more page: https://www.manageengine.com/products/desktop-central/os-deployment.html?pxevideo This video is from the fine folks at ManageEngine

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors