Enterprise Blockchain Is Ready to Go Live in 2018

Talk to enterprise blockchain enthusiasts and they will tell you about the potential use cases in their industries and the proofs-of-concept they have run to prove blockchain value in the enterprise.

Ask them about production deployments… and they demur, pointing out implementation challenges and production-readiness gaps.

Will this change in 2018 and will we see a significant shift from experimentation to production deployments of enterprise blockchains?

In numerous customer conversations during 2017, the challenges to moving even successful use cases from successful PoCs to pilots and production boil down to five areas of enterprise-grade requirements: performance at scale, operational resilience, security and confidentiality, supportability and management, and enterprise integration.

Enterprises experimenting with blockchain use cases are recognizing the need to address these challenges, and in 2017, some vendors, (including my company, Oracle), announced blockchain platforms focused on these requirements.

With all of the enhancements coming in enterprise blockchain platforms, 2018 will be the year enterprise blockchain goes live and businesses can move from experimenting to production.

Performance at scale

Many enterprise systems handle business transactions at a rate of hundreds or thousands per second. For example, a large Asian telecom handles more than 100,000 billing and mobile payments transactions per second (tps), and a major credit card processor was running over 13,000 tps at peak a number of years ago. Naturally enterprises are concerned about creating large blockchain networks with hundreds or thousands of members, handling growing transaction volumes, and providing sub-second transaction latency.

While today’s blockchain applications may not require these throughput levels, most real-world blockchains do not even approach 100 tps – bitcoin averages 7 tps and ethereum is about twice that, while the transaction wait times (latency) can run into minutes or hours. Enterprise blockchains not only need much higher throughput, but also transaction latency of less than a second for many businesses use cases.

Reaching beyond these limitations requires an architectural approach that uses separation of concerns (different types of work are done in separate, independently scalable servers or containers), leverages asynchronous flows, exploits parallelization, uses faster consensus protocols, and runs on optimized execution environments.

Some of these architectural principles are already present in Hyperledger Fabric, a Linux Foundation project that Oracle joined in 2017, but more can be done leveraging the experience from those same systems delivering hundreds and thousands of tps at many enterprises to reach the transaction throughput and latency enterprises need.

In addition, scaling a permissioned blockchain, where all members are linked to legal entities, to dozens or hundreds of participants also requires a robust and efficient on-boarding process. Enterprise PoCs rarely include more than a dozen participants on a single blockchain.

Some onboarding processes make assumptions and take short cuts that do not withstand real-world scrutiny, so effective tools will be required to handle adding organizations onto the business network in production, with all the necessary verification and approvals processes, and in a streamlined way that can leverage established identity management services.

Joining members must be able to deploy their validating nodes using multiple, highly available resource pools across distributed cloud or on-site data centers in an open, hybrid environment.


Enterprise systems are built to avoid downtime with highly available services and to recover rapidly when (not if) some components fail. Avoiding small issues leading to major outages and quick recovery from failure are key to ensuring high availability in any business-critical system. Software and hardware is subject to failures – and the first design principle of resilient systems is to assume failures will happen and to be prepared to keep the overall system running in these situations.

Traditional enterprise software from Oracle and others use replication of services and redundancy to ensure that the system survives an outage of any single and even multiple components. Similarly, deploying redundant peer nodes per member organization, clustered ordering service, and replicating other blockchain network components is an important foundation for resilient blockchain infrastructure, which is enabled with Hyperledger Fabric’s architecture.

Beyond redundancy, autonomous monitoring and recoverability of failed components, as well as continuous embedded backup of configuration information and ledger data can ensure rapid autonomous resolution of most glitches without manual intervention.

Minimizing intervention is an important aspect, as research shows that around 70 percent of outages are due to human error introduced while correcting other issues or adjusting configuration.

Security and confidentiality

Security assessments of blockchain deployments look at how blockchain can restrict transactions and ledger access to authorized participants, ensure encryption of data in-transit and at-rest, and verify that network messages are tamper-proof and their digital signatures are valid.

Enterprise blockchains start with a permissioned network model, meaning that all members are known legal entities and must be enrolled though membership services, which issue enrollment certificates. These cryptographically signed certificates securely link member identity and authorization attributes with the cryptographic key that enables authentication of their digitally signed messages.

Digital signatures applied to all network messages enable all nodes and clients to verify the sender and validate message integrity. This is coupled with transport security to authenticate the communications end points and encrypt the message traffic.

Further, automatically applying encryption for the stored data completes the best practices for encrypting data in transit and at rest. When this foundation is used transparently and pervasively for all secure communications and stored ledger data, it’s a big step forward in maintaining the integrity and security of the blockchain network, preventing most hacking attacks.

When a blockchain certificate authority enrolls a new member organization and issues its digital certificates, the underlying process depends on properly authenticating the organization’s identity and access privileges. This requires strong identity management and key management capabilities.

Moreover, since even in secure environments credentials can be stolen via spearfishing or social engineering attacks, a certificate revocation mechanism must be available as an integral part of the solution to prevent the use of compromised certificates…

Read Full: Enterprise Blockchain Is Ready to Go Live in 2018