{"id":17667,"date":"2016-11-14T05:59:38","date_gmt":"2016-11-14T13:59:38","guid":{"rendered":"http:\/\/www.altoros.com\/blog\/?p=17667"},"modified":"2025-04-16T01:10:29","modified_gmt":"2025-04-15T23:10:29","slug":"how-hyperledger-fabric-delivers-security-to-enterprise-blockchain","status":"publish","type":"post","link":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/","title":{"rendered":"How Hyperledger Fabric Delivers Security to Enterprise Blockchain"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_79_2 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#Examining_security\" >Examining security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#Three_network_challenges\" >Three network challenges<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#On_the_way_to_transactional_privacy\" >On the way to transactional privacy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#The_Hyperledger_Fabric_model\" >The Hyperledger Fabric model<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#Trust_above_all_else\" >Trust above all else<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#Whats_next_for_Hyperlegder_Fabric\" >What&#8217;s next for Hyperlegder Fabric?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#Want_details_Watch_the_video\" >Want details? Watch the video!<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#Related_slides\" >Related slides<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#Related_reading\" >Related reading<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#About_the_speaker\" >About the speaker<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Examining_security\"><\/span>Examining security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div id=\"attachment_17669\" style=\"width: 160px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Elli-Androulaki.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-17669\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Elli-Androulaki-150x150.jpg\" alt=\"Elli Androulaki\" width=\"150\" height=\"150\" class=\"size-thumbnail wp-image-17669\" \/><\/a><p id=\"caption-attachment-17669\" class=\"wp-caption-text\"><small>Elli Androulaki<\/small><\/p><\/div>\n<p>In her session, <a href=\"https:\/\/www.linkedin.com\/in\/elli-androulaki-3a32a54\" target=\"_blank\" rel=\"noopener noreferrer\">Elli Androulaki<\/a> with IBM Research Zurich reiterated the point that blockchains are simply decentralized ledgers that have uniquely trusted ways of establishing the validity and security of transactions. As blockchains&#8217; popularity steadily increased in the past few years, she noted that many types of businesses have developed an interest in them, market valuations (especially Bitcoin) have reached into the billions of dollars, and ecosystems are starting to be created around them.<\/p>\n<p>When exploring blockchain adoption within enterprises, she highlighted the need to remove slow, cumbersome, expensive middle steps (and organizations) among a small, more-or-less trusted group of businesses.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Three_network_challenges\"><\/span>Three network challenges<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>When talking about electronic networks that transfer the ownership of assets between parties, Elli highlighted the accociated issues:<\/p>\n<ul>\n<li>inefficiency<\/li>\n<li>expense<\/li>\n<li>vulnerability<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/blockchain-for-enterprises-issues-v2.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/blockchain-for-enterprises-issues-v2.png\" alt=\"blockchain-for-enterprises-issues-v2\" width=\"640\" class=\"aligncenter size-full wp-image-17708\" \/><\/a><\/p>\n<p>Taking into account the possible impact of these factors on any enterprise, Elli outlined how blockchain addresses the existing network challenges:<\/p>\n<ul>\n<li style=\"margin-bottom: 10px;\"><strong>Simplicity.<\/strong> No centralized control points; spreading risks that results in lowered costs; hardened inside vs. perimeter.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Shared replicated ledger.<\/strong> A peer-to-peer append-only transaction database, replicated across organizational boundaries \/ legal entities.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Embedded cryptolayer.<\/strong> Supporting secure authenticated verifiable multi-party transactions via tokenization, digital identity, and digital signatures.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Business rules evolving to smart contracts.<\/strong> An ability to specify business logic, embed it in the transaction database, and couple execution of the logic with transaction processing.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"On_the_way_to_transactional_privacy\"><\/span>On the way to transactional privacy<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Specifying enterprise needs and the underlying challenges when establishing blockchain, Elli described a series of &#8220;tensions&#8221; involved. The first level of tensions implies providing <em>transactional privacy<\/em>, while also guaranteeing <em>strong identity management<\/em>, <em>non-repudiation<\/em> (the ability to thwart any attempts at reversing transactions), and <em>audit support<\/em>. Add to this the complexity of providing the scalability and performance one might expect of a multi-enterprise-grade solution and integrating that into bevies of legacy systems, and the challenge becomes clear.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/blockchain-enterprise-grade-features-and-challenges-v1.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/blockchain-enterprise-grade-features-and-challenges-v1.png\" alt=\"blockchain-enterprise-grade-features-and-challenges-v1\" width=\"640\" class=\"aligncenter size-full wp-image-17765\" \/><\/a><\/p>\n<p>In addition, Elli provided a cheat chart that can be used to to assist people and organizations in making a decision whether blockchain is a match.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/how-to-decide-if-blockchain-fits-your-enterprise-needs-v1.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/how-to-decide-if-blockchain-fits-your-enterprise-needs-v1.png\" alt=\"how-to-decide-if-blockchain-fits-your-enterprise-needs-v1\" width=\"640\" class=\"aligncenter size-full wp-image-17700\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"The_Hyperledger_Fabric_model\"><\/span>The Hyperledger Fabric model<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Treating possible ways to defuse these &#8220;tensions&#8221;, Elli overviewed how <a href=\"https:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hyperledger Fabric<\/a>\u2014an open-source blockchain implementation in the Hyperledger project\u2014may help through its key features, membership and contract confidentiality mechanisms, etc.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-fabric-model.jpg\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-fabric-model.jpg\" alt=\"Hyperledger Blockchain Elli Androulaki fabric model\" width=\"640\" class=\"aligncenter size-full wp-image-17692\" \/><\/a><\/p>\n<p>As the graphic shows, the Fabric is a permissioned system (in which all the players know each other as opposed to the anonymous world of Bitcoin), with strong identity management. In a permissioned system, there are thus distinct roles for the users and the validators. Users invoke and deploy their transactions, which are then validated to create a new version of the blockchain (i.e., ledger). The key cryptographic element is an enhanced version of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Byzantine_fault_tolerance\" target=\"_blank\" rel=\"noopener noreferrer\">Practical Byzantine Fault Tolerance (PBFT)<\/a> known as <a href=\"https:\/\/ethereum.stackexchange.com\/questions\/1446\/what-advantages-and-disadvantages-does-open-blockchain-hyperledger-fabric-ha\" target=\"_blank\" rel=\"noopener noreferrer\">Sieve<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Trust_above_all_else\"><\/span>Trust above all else<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The ultimate measure of Hyperledger projects and all blockchain technology is whether the architecture and implementation can be trusted to validate and secure transactions. With Hyperledger Fabric, the trust starts with selecting and identifying users (who can also be thought of as members in a permissioned system).<\/p>\n<p>In this case, users can prove their identity and issue two types of credentials through either transaction certificates or enrollment certificates, with the latter issued only by peers within this sort of permissioned system. Nominal credentials contain encryption and signing keys, and the designated auditors can audit certificates and ownership.<\/p>\n<p>The underlying trust in this system involves peer institutions each wanting the same clean system that disintermediates those pesky third parties while maintaining the inviolability of transactions and the system in general. A graphic of how membership works follows:<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/hyperledger-fabric-membership-blockchain-v1.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/hyperledger-fabric-membership-blockchain-v1.png\" alt=\"hyperledger-fabric-membership-blockchain-v1\" width=\"640\" class=\"aligncenter size-full wp-image-17766\" \/><\/a><\/p>\n<p>Elli noted that Hyperledger Fabric security is further taken seriously with the use of PBFT and Sieve, enhanced she said by strong identity management and privacy features. She provided an overview graphic of how Hyperledger contracts maintain confidentiality.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/contract-confidentiality-within-hyperledger-fabric-model-v1.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/contract-confidentiality-within-hyperledger-fabric-model-v1.png\" alt=\"contract-confidentiality-within-hyperledger-fabric-model-v1\" width=\"640\" class=\"aligncenter size-full wp-image-17703\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Whats_next_for_Hyperlegder_Fabric\"><\/span>What&#8217;s next for Hyperlegder Fabric?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The current Fabric implementation is v0.6. Elli concluded her session with revealing the major upcoming features of the v1.0 release:<\/p>\n<ul>\n<li style=\"margin-bottom: 10px;\">Separate the functions of validation into endorsers and consensus nodes<\/li>\n<ul>\n<li>Every chaincode may have different endorsers<\/li>\n<li>Endorsers have <em>state<\/em>, <em>run tx<\/em>, and <em>validate tx<\/em> for their chaincode\n<li style=\"margin-bottom: 10px;\">Consensus nodes order already-validated tx<\/li>\n<\/ul>\n<li style=\"margin-bottom: 10px;\">Scales better, computation effort can be distributed<\/li>\n<li style=\"margin-bottom: 10px;\">Permits confidential state on blockchain (seen only by endorsers)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/separating-transaction-endorsement-from-consensus-hyperledger-fabric-blockchain-enterprise-v1.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/separating-transaction-endorsement-from-consensus-hyperledger-fabric-blockchain-enterprise-v1.png\" alt=\"separating-transaction-endorsement-from-consensus-hyperledger-fabric-blockchain-enterprise-v1\" width=\"640\" class=\"aligncenter size-full wp-image-17857\" \/><\/a><\/p>\n<p>Read <a href=\"https:\/\/www.altoros.com\/blog\/hyperledger-approaches-version-1-0-with-better-scalability-and-security\/\">our next post<\/a> to learn more about what&#8217;s expected in Hyperledger Fabric v1.0 and when.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Want_details_Watch_the_video\"><\/span>Want details? Watch the video!<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td class=\"video-details-td\">\n<div style=\"float: right; width: 45%; padding-left: 15px; font-size: 14px;\">\n<p><strong>Table of contents<\/strong><\/p>\n<ol>\n<li style=\"margin-bottom: 12px;\">What is a blockchain system? (<a href=\"#wistia_r2l3qc3rag?time=560\">9&#8217;20&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 12px;\">What do enterprises gain from blockchain? (<a href=\"#wistia_r2l3qc3rag?time=945\">15&#8217;45&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 12px;\">What is Hyperledger? (<a href=\"#wistia_r2l3qc3rag?time=1485\">24&#8217;45&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 12px;\">What are the enterprise features of Hyperledger? (<a href=\"#wistia_r2l3qc3rag?time=2095\">34&#8217;55&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 12px;\">Q&#038;A. Is it possible to revoke permissions and how would it work? (<a href=\"#wistia_r2l3qc3rag?time=2520\">42&#8217;00&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 12px;\">Q&#038;A. How will participation work for less cooperative nodes? (<a href=\"#wistia_r2l3qc3rag?time=3315\">55&#8217;15&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 12px;\">What&#8217;s next for Hyperledger? (<a href=\"#wistia_r2l3qc3rag?time=3650\">60&#8217;50&#8221;<\/a>)<\/li>\n<\/ol>\n<\/div>\n<p><script charset=\"ISO-8859-1\" src=\"\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script><\/p>\n<div class=\"wistia_embed wistia_async_r2l3qc3rag\" style=\"height:320px;width:440px\">&nbsp;<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Related_slides\"><\/span>Related slides<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><center><iframe loading=\"lazy\" src=\"https:\/\/www.slideshare.net\/slideshow\/embed_code\/key\/w6mpsSklW8wBWO\" width=\"427\" height=\"356\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" style=\"border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;\" allowfullscreen><\/iframe><\/center><br \/>\n&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Related_reading\"><\/span>Related reading<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/hyperledger-ethereum-discussion-makes-p2p-b2b-distinction\/\">Hyperledger\/Ethereum Discussion Makes P2P\/B2B Distinction<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/technical-introduction-to-hyperledger-fabric\/\">Technical Introduction to Hyperledger Fabric<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/hyperledger-meets-ethereum-integration-future\/\">Hyperledger Meets Ethereum: Integration and the Future<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/hyperledger-blockchain-requirements-and-adoption-bottlenecks\/\">Hyperledger\/Blockchain Main Drivers, Use Cases, and Implications<\/a><\/li>\n<\/ul>\n<hr\/>\n<h3><span class=\"ez-toc-section\" id=\"About_the_speaker\"><\/span>About the speaker<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div>\n<div style=\"float: right;\"><a href=\"https:\/\/www.linkedin.com\/in\/elli-androulaki-3a32a54\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Elli-Androulaki-IBM-bio.png\" alt=\"Elli Androulaki, IBM bio\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-17677\" \/><\/a><\/div>\n<div style=\"width: 600px;\"><small><a href=\"https:\/\/www.linkedin.com\/in\/elli-androulaki-3a32a54\">Dr. Elli Androulaki<\/a> is a Research Staff Member at IBM Research Zurich. She obtained her degree from the Electrical and Computer Engineering school of National Technical University of Athens with distinction and received both her Ph.D. and MS degrees from Columbia University, New York, under the supervision of Prof. Steven Bellovin. Her thesis involved the design and analysis of protocols for privacy-preserving and accountable e-commerce operations and resulted in the protocol-oriented construction of a centralized identity management architecture. In 2011, and after her Ph.D. studies, Dr. Androulaki joined the Systems Security group at ETH Zurich as a postdoctoral researcher under the supervision of Prof. Srdjan Capkun, where she first started investigating Bitcoin and blockchain security.<\/small><\/div>\n<\/div>\n<hr \/>\n<p><center><small>This blog post was written by <a href=\"https:\/\/www.altoros.com\/blog\/author\/rstrukhoff\/\">Roger Strukhoff<\/a> and <a href=\"https:\/\/www.altoros.com\/blog\/author\/sophie.turol\/\">Sophie Turol<\/a>,<br \/>\nwith assistance from <a href=\"https:\/\/www.altoros.com\/blog\/author\/carlo\/\">Carlo Gutierrez<\/a> and <a href=\"https:\/\/www.altoros.com\/blog\/author\/alex\/\">Alex Khizhniak<\/a>.<\/small><\/center> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Examining security<\/p>\n<p id=\"caption-attachment-17669\" class=\"wp-caption-text\">Elli Androulaki<\/p>\n<p>In her session, Elli Androulaki with IBM Research Zurich reiterated the point that blockchains are simply decentralized ledgers that have uniquely trusted ways of establishing the validity and security of transactions. As blockchains&#8217; popularity steadily increased in the past few years, she noted that many types [&#8230;]<\/p>\n","protected":false},"author":9,"featured_media":17769,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[672,753],"class_list":["post-17667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-opinion","tag-blockchain","tag-hyperledger"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Hyperledger Fabric Delivers Security to Enterprise Blockchain | Altoros<\/title>\n<meta name=\"description\" content=\"Outlining key issues with transaction networks, Elli Androulaki of IBM explained how Hyperledger Fabric\u2014an open-source blockchain implementation in Hyperledger\u2014deals with permissions, roles, transactions, and consensus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hyperledger Fabric Delivers Security to Enterprise Blockchain | Altoros\" \/>\n<meta property=\"og:description\" content=\"Examining security Elli Androulaki In her session, Elli Androulaki with IBM Research Zurich reiterated the point that blockchains are simply decentralized ledgers that have uniquely trusted ways of establishing the validity and security of transactions. As blockchains&#8217; popularity steadily increased in the past few years, she noted that many types [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/\" \/>\n<meta property=\"og:site_name\" content=\"Altoros\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-14T13:59:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-15T23:10:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-feature-image.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"Roger Strukhoff\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Strukhoff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/\",\"url\":\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/\",\"name\":\"How Hyperledger Fabric Delivers Security to Enterprise Blockchain | Altoros\",\"isPartOf\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-feature-image.gif\",\"datePublished\":\"2016-11-14T13:59:38+00:00\",\"dateModified\":\"2025-04-15T23:10:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/56ea20d6f280f7a442e89e5884b06fd8\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#primaryimage\",\"url\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-feature-image.gif\",\"contentUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-feature-image.gif\",\"width\":640,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.altoros.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Hyperledger Fabric Delivers Security to Enterprise Blockchain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#website\",\"url\":\"https:\/\/www.altoros.com\/blog\/\",\"name\":\"Altoros\",\"description\":\"Insight\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.altoros.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/56ea20d6f280f7a442e89e5884b06fd8\",\"name\":\"Roger Strukhoff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/03\/roger_strukhoff_user_icon-150x150.jpg\",\"contentUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/03\/roger_strukhoff_user_icon-150x150.jpg\",\"caption\":\"Roger Strukhoff\"},\"description\":\"Roger Strukhoff is Director of Research at Altoros. He also serves as Executive Director of the Tau Institute for Global ICT Research, Conference Chair of Cloud Expo and Things Expo, Co-Chair of the Big Data World Forum, and Open-Source Chair for the global DCD Converged conference series. He received his BA from Knox College, and conducted MBA studies at California State University\/East Bay. Previously in his career, he was VP of New Products at International Data Group and Director of Global Publications at TIBCO Software.\",\"url\":\"https:\/\/www.altoros.com\/blog\/author\/rstrukhoff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Hyperledger Fabric Delivers Security to Enterprise Blockchain | Altoros","description":"Outlining key issues with transaction networks, Elli Androulaki of IBM explained how Hyperledger Fabric\u2014an open-source blockchain implementation in Hyperledger\u2014deals with permissions, roles, transactions, and consensus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/","og_locale":"en_US","og_type":"article","og_title":"How Hyperledger Fabric Delivers Security to Enterprise Blockchain | Altoros","og_description":"Examining security Elli Androulaki In her session, Elli Androulaki with IBM Research Zurich reiterated the point that blockchains are simply decentralized ledgers that have uniquely trusted ways of establishing the validity and security of transactions. As blockchains&#8217; popularity steadily increased in the past few years, she noted that many types [...]","og_url":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/","og_site_name":"Altoros","article_published_time":"2016-11-14T13:59:38+00:00","article_modified_time":"2025-04-15T23:10:29+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-feature-image.gif","type":"image\/gif"}],"author":"Roger Strukhoff","twitter_misc":{"Written by":"Roger Strukhoff","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/","url":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/","name":"How Hyperledger Fabric Delivers Security to Enterprise Blockchain | Altoros","isPartOf":{"@id":"https:\/\/www.altoros.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#primaryimage"},"image":{"@id":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-feature-image.gif","datePublished":"2016-11-14T13:59:38+00:00","dateModified":"2025-04-15T23:10:29+00:00","author":{"@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/56ea20d6f280f7a442e89e5884b06fd8"},"breadcrumb":{"@id":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#primaryimage","url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-feature-image.gif","contentUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/11\/Hyperledger-Blockchain-Elli-Androulaki-feature-image.gif","width":640,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.altoros.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Hyperledger Fabric Delivers Security to Enterprise Blockchain"}]},{"@type":"WebSite","@id":"https:\/\/www.altoros.com\/blog\/#website","url":"https:\/\/www.altoros.com\/blog\/","name":"Altoros","description":"Insight","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.altoros.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/56ea20d6f280f7a442e89e5884b06fd8","name":"Roger Strukhoff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/03\/roger_strukhoff_user_icon-150x150.jpg","contentUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/03\/roger_strukhoff_user_icon-150x150.jpg","caption":"Roger Strukhoff"},"description":"Roger Strukhoff is Director of Research at Altoros. He also serves as Executive Director of the Tau Institute for Global ICT Research, Conference Chair of Cloud Expo and Things Expo, Co-Chair of the Big Data World Forum, and Open-Source Chair for the global DCD Converged conference series. He received his BA from Knox College, and conducted MBA studies at California State University\/East Bay. Previously in his career, he was VP of New Products at International Data Group and Director of Global Publications at TIBCO Software.","url":"https:\/\/www.altoros.com\/blog\/author\/rstrukhoff\/"}]}},"_links":{"self":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/17667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/comments?post=17667"}],"version-history":[{"count":55,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/17667\/revisions"}],"predecessor-version":[{"id":67968,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/17667\/revisions\/67968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media\/17769"}],"wp:attachment":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media?parent=17667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/categories?post=17667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tags?post=17667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}