Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
The Potential of Blockchain Technology to Revolutionize Transactional Security Yusof Jaafar. Gabema Academy,Yusof5995@gmail.com Contents 1.1. Executive Summary................................................................................................. 2 1.2. Introduction ............................................................................................................. 2 1.3. Background on Blockchain Technology ................................................................. 4 1.4. Properties of Blockchain that Enhance Security ..................................................... 6 1.5. Applications to Improve Transactional Security ..................................................... 9 1.6. Future Outlook and Challenges ............................................................................. 10 1.7. Conclusion ............................................................................................................. 12 1.8. References ............................................................................................................. 14 1.1. Executive Summary This study investigates the potential for blockchain technology to revolutionise the processing of digital transactions by bringing about improvements in safety, transparency, and confidence. The use of blockchain technology results in the creation of a decentralised architecture that does away with the need for opaque third-party middlemen. Blockchain technology enables peer-to-peer transactions to take place with an unparalleled level of security assurances. These guarantees are made possible through cryptographic signature, distributed consensus, immutable ledgers, and other technological aspects. This article presents an overview of blockchain technology and discusses the ways in which its characteristics, such as decentralisation, transparency, and immutability, enhance security in comparison to more conventional systems. Following that, it investigates a variety of applications spanning banking, contracts, supply chains, voting, identification, and other domains that potentially gain higher transaction integrity with the use of blockchain technology. Despite this, blockchain is still a relatively new technology that faces obstacles in the form of scalability, interoperability, legislation, and other concerns that have yet to be resolved. If these challenges can be surmounted, blockchain technology has a tremendous potential to revolutionise the way transactions are conducted in the digital economy by enhancing its efficacy, transparency, auditability, and trustworthiness. However, careful investigation and development are still required in order to incorporate blockchain designs in a way that is complementary to preexisting systems. In general, the blockchain technology sets the groundwork for establishing extremely resilient, decentralised, and secure digital transaction processing. 1.2.Introduction Blockchain technology has emerged in recent years as a revolutionary new approach to securing digital transactions without requiring a centralized authority. At its core, a blockchain is a decentralized, distributed digital ledger that provides a way to record transactions in a verifiable, transparent, and permanent manner (Nakamoto, 2008). This contrasts significantly with previous transaction systems that rely on central intermediaries like banks and financial institutions. By allowing transactions to occur peer-to-peer between network participants directly, blockchains eliminate the vulnerabilities, overhead costs, and necessities for trust that arise when relying on opaque third parties to facilitate transactions. The groundbreaking innovation of blockchain technology stems from its use of cryptography, distributed consensus, and network architecture to enable transaction integrity and security in a decentralized environment (Crosby et al., 2016). Transactions on a blockchain are cryptographically signed by the sender's private key to authenticate transfers. Nodes in the distributed blockchain network can transparently verify the transaction signatures and ownership of funds. A consensus mechanism like proof-of-work enforces agreement on the ledger's state while preventing double spending or fraudulent transactions. Digital records are chained together in blocks with cryptographic hashes, creating an immutable, tamper-resistant ledger where historical transactions cannot be altered retroactively. These core technical properties of blockchain systems eliminate the risks of centralized data silos being altered, hacked, or corrupted, which underpin so many previous transaction methods. The first application of blockchain technology was the Bitcoin cryptocurrency system outlined initially in a 2008 whitepaper by the pseudonymous Satoshi Nakamoto. Bitcoin showed how blockchain could facilitate financial transactions of the bitcoin digital currency directly between peers, without requiring banks or other financial intermediaries (Nakamoto, 2008). Payments are broadcast to the decentralized blockchain network and verified via the consensus mechanism. The immutable ledger prevents double spending and counterfeiting while enabling transparency. This demonstrated for the first time how blockchain could securely facilitate financial transfers in a trustless, peer-to-peer manner. Since Bitcoin, many other potential applications of blockchain technology have emerged across industries, expanding far beyond just cryptocurrencies. Public blockchains like Ethereum provide a more generalized platform for blockchain-based decentralized applications that enable diverse transaction types between parties through smart contracts (Wood, 2021). Enterprises have also developed private or "permissioned" blockchains restricted within their internal business networks for applications like supply chain tracking and securities trading. The transparency, verifiability, and cryptographic security inherent to blockchain technology make it appealing for many applications where enhancing the integrity and security of transactions is beneficial. From finance to healthcare to voting systems, blockchain technology holds significant promise to transform digital transaction processing in profound ways (Crosby et al., 2016). By reducing reliance on opaque centralized intermediaries, blockchains offer the capability to facilitate transactions through decentralized, peer-to-peer networks in a tamper-proof and transparent manner. However, despite its immense potential, blockchain technology is still emerging with many challenges and open questions remaining around scalability, ecosystem maturity, regulatory uncertainty, and more. Ongoing innovations and prudent applications will clarify how blockchain can blend and evolve alongside existing transactional systems to enhance their functionality, security, and efficiency. But the fundamental security properties offered by blockchain systems provide a glimpse into a future where digital transactions and data exchange can be conducted with much higher integrity, transparency, and trust between parties across industries worldwide. 1.3. Background on Blockchain Technology The core technical foundations that enable blockchain systems to provide enhanced transaction security stem from how data is structurally organized and cryptographically chained together in blocks. As transactions occur on the network, they are validated through a decentralized consensus process. Once consensus is reached, transactions are bundled together with other data into blocks that form the sequence of the immutable ledger (Tschorsch & Scheuermann, 2016). Each block has a cryptographic hash pointer that connects to the preceding block, a timestamp, transaction data, and a solution to a cryptographic problem, as well as a solution to the riddle itself. The hash pointer is a one-way cryptographic hash of the header from the previous block, and it is used to chain together successive blocks in sequential order. This connecting together via hash pointers constitutes the fundamental backbone that makes the blockchain tamperevident and resistant to change of past data. In other words, it makes the blockchain immutable. The chain would be broken if any of the information in an earlier block was changed, since this would cause the hash for that block to become invalid. The transaction data stores the specifics of any exchanges that have taken place, while the timestamp keeps track of when the block was first generated. The cryptographic puzzle solution is generated through a process called mining. In proof-ofwork systems like Bitcoin, mining involves nodes competing to solve resource-intensive computational puzzles. The first miner to find a valid solution announces it to the network and earns the right to add the next block. This decentralized competition to add new blocks is what enables blockchain networks to function without a central authority. Mining adds new validated transactions to the ledger through consensus under the rules enforced by the network protocol (Narayanan et al., 2016). Together, these technical mechanisms allow blockchains to operate as distributed ledgers that cannot be unilaterally modified by any single party once data is committed. Several key attributes of blockchain technology stem from this underlying architecture that bolster security for transactions. First, decentralization refers to how blockchains are maintained by many distributed peers rather than a centralized intermediary. This avoids "single points of failure" and delegates trust across the decentralized network via consensus. Next, transparency comes from how all committed transactions are publicly broadcast to network participants and recorded on the ledger. This allows transactions to be viewed and audited by any party for integrity. Finally, immutability arises due to the cryptographic chaining of blocks which makes tampering with committed data prohibitively difficult (Crosby et al., 2016). These core technical properties enable blockchains to facilitate secure transactions without requiring a trusted central party. The Bitcoin cryptocurrency system, which was initially detailed in a whitepaper in 2008 under the pseudonym Satoshi Nakamoto, was the first implementation of blockchain to have a significant historical impact. This was due to the fact that Bitcoin was the first cryptocurrency system to use cryptography to verify transactions. Bitcoin was the first cryptocurrency that demonstrated how blockchain technology might be used to establish a decentralised, peer-topeer electronic payment system. Bitcoin transactions are conducted directly between users. Participants in this sort of system are able to make online payments to one another without the requirement for financial institutions to serve as intermediaries to facilitate these transactions. In an environment that was not centralised, it deployed novel solutions based on blockchain technology, public-key cryptography, and proof-of-work consensus in order to prevent double spending and maintain the integrity of transactions (Nakamoto, 2008). Transactions on the Bitcoin blockchain denote monetary transfers of the native bitcoin tokens between pseudonymous owners who are identified by cryptographic public keys. These owners may be traced back to the original transactions using their public keys. These property owners might be anybody. Users are able to generate key pairs, which allows bitcoins to be delivered to their public key and stored locally in a digital wallet. Users also have the ability to send bitcoins to other users. After that point, the sender's private key signature may be used to approve transactions, which enable coins to be transferred to the public key of another party. This is done by approving the transaction using the sender's public key. The decentralised network of miners is responsible for the validation and addition of transactions to the blockchain. This not only enables transparency but also prevents fraudulent behaviour as well as the alteration of data that has already been committed. The initial use of blockchain technology that was successful was for cryptocurrencies, which has prompted growing interest in the possible applications of blockchain technology in other areas. In the years since Bitcoin's release, blockchain has expanded far beyond just facilitating cryptocurrency transactions. Public blockchains like Ethereum implement a more generalized programming model that allows decentralized applications beyond just payments, enabled by features like smart contracts (Wood, 2021). Ethereum's decentralized finance (DeFi) ecosystem demonstrates a breadth of advanced transaction types applied to lending, derivatives, prediction markets and more. Private or "permissioned" blockchains have also emerged for controlled applications within single companies or business consortiums across industries like finance, supply chains, healthcare, and others (Vukolić, 2017). Blockchain's properties of transparency and cryptographic security hold advantages for many transactional use cases beyond cryptocurrency that could benefit from enhanced integrity, auditability, and data permanence. These use cases include those that could benefit from enhanced integrity, auditability, and data permanence. The potential of blockchain technology are fast expanding as more research and development work is done on the technology in both the private sector and academic institutions. Blockchain offers basic qualities that make it a potential strategy for reinventing transaction processing in the digital economy. These issues include scalability, interoperability, regulation, and others. Despite these challenges, blockchain continues to be a promising solution. 1.4.Properties of Blockchain that Enhance Security Blockchain technology provides unprecedented security benefits for digital transactions through its innovative blend of decentralization, cryptography, transparency, and immutable data structures (Nakamoto, 2008). This combination of technical attributes grants blockchains security capabilities that are a fundamental leap forward from previous transaction systems reliant on centralized third parties (Swan, 2015). There are several pivotal properties of blockchain systems that eliminate the inherent vulnerabilities of legacy transaction methods: First, decentralization and trust lessness refer to how blockchains do not require a central authority or intermediary to operate (Crosby et al., 2016). The peer-to-peer blockchain network relies on a distributed consensus mechanism amongst its nodes in order to verify and record transactions on the distributed ledger. This is in contrast to the conventional approach, in which a single organisation, such as a bank, is responsible for the upkeep of a centralised, closed database and serves as the only authority over transactions. Blockchains eliminate "single points of failure" by decentralising trust among all players. Single points of failure are situations in which corrupting or compromising the central party may undermine the security of the whole system (Zheng et al., 2017). The network will continue to operate successfully even if a single node experiences failure or behaves maliciously, as long as consensus is used. This removes the dangers associated with giving unrestricted authority over financial dealings to unknown persons. Next, the transparency and auditability of blockchains arise because all validated transactions are broadcast publicly to the entire network and recorded immutably in the ledger (Nofer et al., 2017). They provide a degree of visibility that is unrivalled in comparison to older systems, which usually featured transaction information and data that was compartmentalised inside proprietary centralised databases. These databases were commonly used to store the data. A public blockchain gives every node and any outside observer the opportunity to examine the history and contents of the ledger in an open and accessible way. When users are able to see and independently verify all transactions, a level of integrity can be attained that is not possible in systems that are not transparent and are controlled entirely by a single party. This level of integrity can be accomplished when users have the ability to do both. Additionally, blockchain technology provides practically unparalleled immutability and tamper-resistance for recorded data due to the cryptographic linking between blocks (Narayanan et al., 2016). After a transaction has been validated and added to the distributed ledger maintained by the blockchain, it is very difficult, if not impossible, to make any changes to the transaction in question in retrospect. Any alteration of previously stored information would need the rewriting of all subsequent blocks in the chain, which is mathematically impossible due to the requisite cryptographic puzzle solutions for each block. In stark contrast to centralised databases, which may have their contents changed, damaged, or destroyed at the whim of whomever is in charge of the database, data that has been committed is permanent. This permanence of data stands in stark contrast to the centralised databases. Because the blockchain technology is immutable, there is a much increased guarantee that completed transactions cannot be changed after the fact. Cryptographic mechanisms also play a critical role in blockchain security (Tschorsch & Scheuermann, 2016). Transactions are proven to be held by the relevant parties and granted permission to be transferred by using public-key cryptography. This allows transactions to be transferred. This is accomplished when the sender uses their private key to create a digital signature for the transaction. The linked public keys provide the role of recipient addresses, which not only enables signature verification but also enables owners to be recognised. Because of this, verification and non-repudiation will now be a part of every transaction, which will make fraudulent activity much more difficult to pull off. After a transaction has been added to the blockchain, the immutability of the transactions themselves and the fact that they cannot be altered in any way ensures that it cannot be tampered with in any way. Finally, consensus mechanisms like proof-of-work and proof-of-stake are essential to blockchain security by enabling decentralized agreement on the authoritative state of the ledger (Vukolić, 2015). Because of consensus, it is possible to prevent double spending. Additionally, consensus assures that there is agreement on the sequence of transactions and the accuracy of data. Finally, consensus makes it simpler for newcomers to join the network and participate in it securely. It makes it possible for the blockchain system to function properly even in the absence of any central authority or organisation that can be relied upon. The "trust machine" that the consensus algorithm offers in the form of cryptography assumes the role of flawed individuals functioning as the authority on transactions. Combined, these core technical attributes provide a decentralized digital ledger for transactions that is transparent, permanent, secure, and authoritative without any centralized oversight (Swan, 2015). Transactions that take place on a blockchain, as opposed to those that take place on previous systems, are confirmed, verifiable, atomic, and irreversible as a result of the underlying architecture. This is in stark contrast to the situation where transactions take place on older systems. Once a transaction has been recorded, it is impossible for any one participant to change it or remove it, offering an unparalleled level of security. These capabilities open the door to a fundamental redesign of transaction processing across all industries and use cases where there is a benefit to boosting integrity, openness, and trust. This redesign might affect everything from financial services to healthcare to government. 1.5.Applications to Improve Transactional Security The innate tamper-proof, transparent, and decentralized properties of blockchain technology make it well-suited for applications across many industries that could benefit from more secure and resilient transaction processing (Swan, 2015). Blockchains provide the power to allow transactions over peer-to-peer networks in an auditable and corruption-resistant way. This is achieved by minimising dependency on opaque third parties, which is made possible by blockchains. Some potentially fruitful areas where blockchain technology might improve the honesty and safety of transactions include the following: First, cryptocurrencies like Bitcoin and Ethereum already utilize blockchain to enable financial transfers without centralized intermediaries like banks (Nakamoto, 2008). On the blockchain network, payments are performed directly between peers, and the costs associated with these transactions are kept to a minimum. The immutable ledger eliminates the possibility of fraudulent activity using digital currency units, such as double spending. This indicates that blockchain is capable of safely facilitating the exchange of wealth in a distributed context. Next, smart contracts are self-executing code on a blockchain that can encode complex multiparty contractual logic and automatically enforce contractual terms (Szabo, 1996). The implementation of smart contracts does not need the participation of a third party arbiter, which eliminates the potential for fraud. The terms of the contract and its implementation are clear to all parties concerned, yet at the same time it is very difficult to alter in any way. This has the potential to substantially extend the use cases for digital contracts across a variety of sectors, including law, business, and others. Additionally, stock trading and securities issuance could benefit from the transparency and auditability of blockchain ledgers (Mainelli & Smith, 2015). When it comes to handling securities, the more conventional database-based techniques come with a higher risk of mistakes, tampering, or fraud. However, if shares are recorded as tokenized assets on an immutable blockchain, this risk might be reduced. Greater transparency and control of market activity might be achieved via increased visibility into trading activity and ownership. Furthermore, blockchain tracking from manufacturing to retail provides transparency on the origins and movement of goods that can greatly secure supply chains (Kshetri, 2018). Tracing the origin of components and finished goods using blockchain technology may cut down on product substitutes and counterfeiting while also making it easier to spot problems. This improves visibility and responsibility across fragmented multi-party supply networks from beginning to finish of the supply chain. Blockchain-based voting systems are also proposed to offer transparency, verifiability, and integrity around the voting process (Zhang et al., 2016). Voters would have the ability to digitally sign their ballots, and auditors would be able to total votes in a way that is auditable. The immutability of blockchain technology might provide unmatched levels of security and transparency to the voting process, all while protecting the privacy of individual voters. Lastly, self-sovereign digital identity solutions built on blockchain allow users to fully control their identity data and selectively disclose it in a cryptographically verifiable manner (Allen, 2016). When identification records are stored in separate silos inside centralised systems, there is a greater likelihood that unauthorised individuals will be able to hunt down or steal a person's personal information. Users have full control over the information that identifies them and the choices they make on information sharing. In general, these various examples highlight the many different categories of transactions that occur across industries, ranging from finance to supply chain management to identity management, that have the potential to achieve higher levels of security, integrity, and trust if blockchain architectures are prudently applied. However, further study is still required to discover the best practises for the design, implementation, and integration of blockchain systems in order to maximise advantages while minimising the emergence of new problems. If significant difficulties like scalability can be addressed, blockchain might offer the platform for revolutionising digital transactions in meaningful ways. This could be accomplished by boosting transparency, permanence, and decentralised control across essential business operations. 1.6.Future Outlook and Challenges Blockchain technology appears primed for substantial growth and broader adoption over coming years given its disruptive potential to enhance security, integrity, and trust in digital transactions (Guo & Liang, 2016). PricewaterhouseCoopers (PwC) conducted a poll, and the results indicated that 77 percent of respondents intended to use blockchain technology in some form by the year 2020. As interest in blockchain technology grows across a variety of sectors, analysts predict that total corporate and government investments in blockchain will skyrocket to more than $9.2 billion by the year 2021. However, there are still a number of significant obstacles and constraints surrounding blockchain systems, and they need be solved if the technology is to realise its full potential in the future: First, scalability issues currently inhibit performance of public blockchains as usage grows (Croman et al., 2016). Networks like as Bitcoin and Ethereum are plagued by limitations in terms of transaction throughput and latency, which prevents their widespread usage for highvolume applications. The current research being conducted on innovations like as sharding, off-chain payment channels, and layer 2 protocols has the goal of significantly improving the scalability of blockchain technology to sustain enterprise-level transaction volumes. However, much progress is still required in this very important field. Additionally, interoperability between the multitudes of disjointed blockchain platforms and protocols poses challenges (Wood, 2021). There are already hundreds of different blockchain systems that are in competition with one another, and there is very little uniformity among them. Complex multi-party business applications will absolutely need improved interoperability solutions achieved via technologies such as atomic swaps, shared standards, and chain-to-chain communication protocols. Furthermore, like any complex software system, security vulnerabilities exist in blockchain code bases, applications, and network infrastructure that can lead to exploits or data loss if not properly identified and mitigated (Li et al., 2018). It is expected that as blockchain technology becomes more widely used, the number of attack surfaces and the motivations for exploiting it will also rise. Along with the development of best practices for safe system design, continuing security analysis, testing, and monitoring are going to be very necessary. Enhancing user experience and simplicity will also be crucial for mainstream blockchain adoption among non-technical audiences (Swan, 2015). The typical user still finds key management, wallet interfaces, transaction processes, and other parts of the user experience to be time-consuming and difficult to understand. The integration with preexisting systems and accessibility to the general public both require that these characteristics be refined to a greater extent. Moreover, regulatory uncertainty remains around many blockchain applications (Mendling et al., 2018). Compliance with existing frameworks like KYC (know your customer) or AML (anti-money laundering) is still a challenge. Clarification and development of supportive regulations, standards, and appropriate governance models will help determine blockchain’s role across industries. Finally, despite optimizations like proof-of-stake, public blockchains still require substantial energy and computational resources that translate to real-world costs (Vukolić, 2015). It is a continuing challenge for researchers to find ways to make the underlying consensus procedures and infrastructure more efficient. In a nutshell, as developments continue to be made on the technological and legislative fronts, it will become clearer how blockchain systems may be integrated into current digital transaction infrastructure and how they might improve it. If certain challenges regarding scalability, interoperability, security, usability, compliance, and efficiency can be surmounted, blockchain technology has the enormous potential to profoundly revolutionise online transactions by significantly enhancing transparency, integrity, resiliency, and trust (Swan, 2015). It is possible that broad adoption of blockchain solutions, which would achieve the full disruptive and revolutionary potential of this technology across industries, might be enabled by further development of the technology and the sensible implementation of blockchain solutions. 1.7.Conclusion Blockchain technology fundamentally transforms how digital transactions can be conducted in a more secure, resilient, and trustworthy manner. By utilizing cryptography, peer-to-peer networking, decentralized consensus, and immutable data structures, blockchains introduce a novel technical architecture for digital interactions that departs starkly from previous centralized approaches (Swan, 2015). In doing so, blockchain technology effectively eliminates the systemic vulnerabilities, overhead costs, opacity, and necessities for blind trust in third parties that drag down legacy transaction systems dependent on intermediary institutions. The decentralized, transparent, and cryptographically-secured nature of blockchain networks allows digital transactions to occur in a peer-to-peer manner with unprecedented security guarantees (Nakamoto, 2008). Distributed consensus mechanisms ensure agreement and validity of the ledger while preventing fraudulent transactions or tampering. This grants blockchains an intrinsic auditability, integrity, and resilience that establishes trust between participants without requiring reliance on fallible centralized intermediaries. By spreading trust across a decentralized network, blockchains can reduce corruption, rent-seeking, and single points of failure (Davidson et al., 2016). These exceptional technical properties make blockchain technology a profoundly promising approach to re-architecting digital transactions in fields ranging from finance and banking to supply chain management, voting, contracts, and more. Blockchains allow transactions in these domains to occur transparently, immutably, and securely in purely digital form without requiring trusted human or institutional intermediaries (Swan, 2015). In effect, the decentralized "trust machine" of a blockchain supplants human trust in institutions with mathematically-verifiable software-enforced trust (Economist, 2015). However, blockchain technology remains in its infancy with less than a decade and a half since its inception. Much active research and development is still underway as innovations across cryptography, peer-to-peer systems, and consensus algorithms continue rapidly advancing blockchain capabilities (Wood, 2021). Early technical hurdles around throughput, storage, interoperability, security, and energy efficiency are being gradually overcome. Meanwhile, regulatory clarity, standards, supportive governance and policies, and appropriate applications must still be fleshed out for blockchains to integrate into the modern economy (Mendling et al., 2018). If key challenges are prudently addressed, blockchain technology holds immense promise to radically evolve transaction processing, asset ownership tracking, trust mechanisms, and business automation in the coming decades (Tapscott & Tapscott, 2016). By blending blockchain architectures with existing systems in a synergistic manner, substantial efficiency, cost, security and integrity improvements could be achieved across critical financial, governmental, corporate, and even personal transactional systems. But thoughtfully assessing and engineering appropriate applications for blockchain technology is vital to avoid overhyping the technology or applying it in a redundant or unproductive manner. Overall, blockchain's capacity to conduct highly secure, resilient, transparent, and decentralized digital transactions helps lay the foundation for profoundly transforming interactions in the emerging digital economy. After decades of ever-growing reliance on trusted third party institutions for transactions, blockchain presents a novel model for peer-to-peer exchange and trust minimization enabled by technical innovation (Davidson et al., 2016). The possibilities surrounding this technology remain vast. But through prudent research, development, and systems integration, blockchain systems seem poised to elevate digital transactions across industries to new heights of transparency, auditability, efficiency, and integrity in the years ahead. 1.8. References 1. Allen, C. (2016). The path to self-sovereign identity. Life With Alacrity. http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html 2. Croman, K., Decker, C., Eyal, I., Gencer, A. E., Juels, A., Kosba, A., ... & Song, D. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security (pp. 106-125). Springer, Berlin, Heidelberg. 3. Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2, 6-10. 4. Davidson, S., De Filippi, P., & Potts, J. (2016). Economics of blockchain. Available at SSRN 2744751. 5. Guo, Y., & Liang, C. (2016). Blockchain application and outlook in the banking industry. Financial Innovation, 2(1), 1-12. 6. Kshetri, N. (2018). 1 Blockchain's roles in meeting key supply chain management objectives. International Journal of Information Management, 39, 80-89. 7. Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2018). A survey on the security of blockchain systems. Future Generation Computer Systems, 107, 841-853. 8. Mainelli, M., & Smith, M. (2015). Sharing ledgers for sharing economies: an exploration of mutual distributed ledgers (aka blockchain technology). The Journal of Financial Perspectives, 3(3). 9. Mendling, J., Weber, I., Van Der Aalst, W., Vom Brocke, J., Cabanillas, C., Daniel, F., ... & Gal, A. (2018). Blockchains for business process management-challenges and opportunities. ACM Transactions on Management Information Systems (TMIS), 9(1), 1-16. 10. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260. 11. Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S., 2016. Bitcoin and cryptocurrency technologies. Princeton University Press, Princeton. 12. Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). Blockchain. Business & Information Systems Engineering, 59(3), 183-187. 13. Swan, M. (2015). Blockchain: Blueprint for a new economy. " O'Reilly Media, Inc.". 14. Szabo, N. (1996). Smart contracts: building blocks for digital markets. EXTROPY: The Journal of Transhumanist Thought,(16). 15. Tapscott, D., & Tapscott, A. (2016). The impact of the blockchain goes beyond financial services. Harvard Business Review, 10. 16. Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3), 2084-2123. 17. Vukolić, M. (2015). The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In International workshop on open problems in network security (pp. 112125). Springer, Cham. 18. Wood, G. (2021). Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151, 1-32. 19. Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., ... & Rimba, P. (2017). A taxonomy of blockchain-based systems for architecture design. In 2017 IEEE International Conference on Software Architecture (ICSA) (pp. 243-252). IEEE. 20. Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557-564). IEEE. 21. Zhang, F., Cecchetti, E., Croman, K., Juels, A., & Shi, E. (2016, October). Town crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 aCM sIGSAC conference on computer and communications security (pp. 270-282).