We’ve been often approached by clients that don’t feel comfortable with having some of their data shared with the world but are deluded with some myths on the Internet about how a private blockchain is created and works. This article will break some of the myths and try to answer most common questions.
Public vs Private vs Permissioned blockchain network
Let’s do this briefly.
Public networks are good because they are completely decentralized and therefore most secure. One of their finest use case is cutting off the middleman completely and having users interacting globally.
Private networks work almost the same way as the public ones do but they are usually managed only by a few entities which makes consensus and therefore transactions faster. Network is then usually configured and managed by those entities in the way they want. In terms of privacy, by default, such networks only disallow non-participants to be able to view the network’s participants and contracts. However, they don’t offer any extra privacy features but this is rather built in as an extra layer of the application.
Private networks can also be permissioned by having access control mechanism included in the protocol as well as the private transactions which are only visible to the authorized network participants. However, because of the private transactions that are hidden to majority of network, this doesn’t rarely end up as traditional centralized system as it creates blind transparency and breaks some of the blockchain key features.
Ok, I need my network to be a private one.
First question that usually arises here is: “How many miners do I need?”. You don’t need any mining power since proof of work is not the only way to reach network consensus! Meet the new kid on the block — Proof of Authority. Instead of electricity or money, entities that confirm transactions “stake” their identity so such entities are usually companies and some kind of organisations that don’t want to be discarded from the network or publicly ashamed for the attempt of a network fraud. Those authorities (validators) can be defined on network initialisation or voted in later. Majority of validators’ signatures is needed to run a secure network. In case of a dishonest signer, there can’t be much damage done before being kicked out as each signer can only sign once every N/2 + 1 blocks. PoA, because of the it’s convenience, became pretty popular with the new Ethereum testnets and other private networks in enterprise companies.
And what about transaction fees? Since you are building your own network, you can set the gas price to be 0. This way the participants won’t need to spend ETH to make transactions.
How many transactions will the network be able to process? Transactions capacity depends on the block gas limit and block time. That means you either put more transactions in a block or make block issuing faster. Depending on the architecture, if overdoing those setting, these things could affect stability and make nodes out of sync. To acknowledge this is done by trial and error. Another consequence are hardware limits, especially storage size since empty block is around 1MB. Default settings with 5s block time can provide transaction speed of 40–50 tx/s.
So, who has the permissions to read or write? For both, only participants of the network is the answer. For writing, permissions are handled through smart contracts with programmed access control but reading is done on another layer. Private transactions that are only visible to a set of participants (usually two of them) and not to the rest of the network can be ensured through the concept of channels. However, privacy on blockchain is a new concept on which community is working and we will be able to see soon practical usage of zero knowledge for this i.e. zk-SNARKs and AZTEC Protocol.
Privacy of data
First of all, large portions of data were not meant to be stored on any blockchain network by the design. In spite of that, there are other opportunities how you can connect your data with the blockchain network. Since blockchain is immutable ledger, you can guarantee data integrity by storing cryptographic hash (digest) of data that only changes value if that data is changed. This makes data verifiable meaning that the downloaded file is the same one as it has been uploaded.
Data must be encrypted to ensure that it can be read only between the right participants. Encryption functions are complex calculations to be done onchain so you can’t really do that through smart contracts. However, with the previously combined method of verification, you can store files encrypted offchain and hash onchain. Asynchronous encryption can be used to encrypt data with receiver’s public key and then to be able to decrypt it with receiver’s private key only known to receiver. This kind of flow is represented in the following schema.
What if you can combine both in-house flexibility and global participants in economies of scale? A bridge between your private network and mainnet can be created so that users can convert their real ETH to a private network’s token or ETH and vice versa. Not only that offers lower transaction fees and faster transactions unaffected by mainnet congestion, but it also provides possibilities of economic incentives and the security of a mainnet network.
This article mostly explains how private networks are done with the Ethereum blockchain but we are working on implementations using other networks too, so in the upcoming articles we will cover more about our experience with Hyperledger Fabric and Quorum.
NodeFactory is a blockchain development company that provides adoption, integration and realization of decentralized applications. We are always looking for new adventures so let us know about your project by contacting us using the form below.
Also, we are part of the team that is working on a new PoA network that will serve as a public testnet, so stay tuned for more information about Lisinski!