14.11.2016 Views

3FOOD

TIR-CG_Luxembourg-Final-Report_Long-Version

TIR-CG_Luxembourg-Final-Report_Long-Version

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Third Industrial Revolution Consulting Group<br />

important. Rather than “Band-Aid” solutions to increasingly vulnerable centralized databases,<br />

the Blockchain embeds security into its core distributed architecture.<br />

Amid the shift to the device identity model, users will demand a mix of multi-factor<br />

authentication, likely including encrypted biometrics, to secure their exclusive access to each<br />

device. The information and protocols pertaining to those factors cannot reside on the device<br />

itself, but neither can it be stored in centralized database, which would recreate a vulnerable<br />

attack vector for the most sensitive of all personal information. Instead, the Blockchain could be<br />

used to mediate permissions via each actor’s unique private key access, keeping sensitive data<br />

outside of hackers’ reach.<br />

The Blockchain can also greatly enhance security within the data vault infrastructure itself. Data<br />

vault models such as those developed by Oracle rely on the dynamic management of database<br />

access privileges. But decisions to review, revoke and grant access, as well as changes to each<br />

privileged user’s modes of authentication, need to be auditable without giving away the<br />

underlying information. When combined with privacy-enhancing tools such as homomorphic or<br />

zero-proof encryption, the Blockchain’s time-stamped, immutable sequence of ledger entries<br />

can create an automatic, unbreakable audit trail. (It’s also relevant to numerous other<br />

Luxembourg initiatives described below, especially within the context of anchoring.) This will<br />

give citizens the highest level of confidence possible that administrators of the data vault aren’t<br />

abusing their power and that information residing within it can be trusted.<br />

Getting these digital identity principles right is critical. Identity is the bedrock upon which so<br />

much else of Luxembourg’s future digital economy will be based. Securely identifying the digital<br />

actors, be they human or device will be essential for any expansion of smart contracts,<br />

micropayments, programmable money and machine-to-machine transactions. These are the<br />

kinds of interactions that will give rise to smart electricity grids, smart transportation systems<br />

and the other infrastructure components of an Internet of Things ecosystem. But they must be<br />

secure from attack and protect privacy. A blockchain-based model will be a vital part of that.<br />

2.2 Anchoring/Auditability<br />

A key reason why the Blockchain is described as immutable or tamper-proof is because proofof-work<br />

mining is cumulative. In order to persuade the network to change an old transaction on<br />

the Blockchain, a rogue actor would need to present more computational work than the ledger<br />

has benefitted from since that transaction. The current computing power of the Bitcoin<br />

Blockchain’s network is about 15 million petaFLOPS, or 15 zettaFLOPS. The current market price<br />

of computing power, according to Wiikipedia, is $0.08 per gigaflop. If we take this estimate, it<br />

would take roughly $1.2 Trillion ($1,200,000,000,000) worth of computing power to be<br />

297

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!