Internet DRAFT - draft-yang-usecase-din
draft-yang-usecase-din
DINRG B. Yang
Internet-Draft China Mobile
Intended status: Informational June 30, 2018
Expires: January 1, 2019
Use cases of Blockchain: Application and Interworking
draft-yang-usecase-din-01
Abstract
The purpose of this document is to analyze several important use
cases based on blockchain, including: blockchain based PKI for
security device connection, blockchain as a service, interworking
cross blockchain (exchange data and contracts cross different
chains). Through case analysis, important scenarios and specific
requirements are listed. Related solutions are also provided for
easy understanding.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 1, 2019.
Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
Yang Expires January 1, 2019 [Page 1]
Internet-Draft Use cases of Blockchain June 2018
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3
3. Terminology and Abbreviations . . . . . . . . . . . . . . . . 3
4. Use case 1: Secure connection management between devices
using blockchain based PKI . . . . . . . . . . . . . . . . . 3
4.1. Centralized connected model . . . . . . . . . . . . . . . 3
4.2. Peer-to-peer connection model . . . . . . . . . . . . . . 5
4.3. Summary . . . . . . . . . . . . . . . . . . . . . . . . . 6
5. Use case 2: Blockchain as a Service . . . . . . . . . . . . . 6
6. Use case 3: Blockchain Interworking . . . . . . . . . . . . . 6
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
8. Security Considerations . . . . . . . . . . . . . . . . . . . 7
9. Normative References . . . . . . . . . . . . . . . . . . . . 7
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 7
1. Introduction
Blockchain helps to establish cross industry mutual trust and
cooperation, and provides the transmission of value and trust on top
of current information network (i.e., Internet). The following
industries are studying the application of block chains: government,
commerce, industry, finance, insurance, medical, education,
communication, culture and art etc.
Blockchain can play the following role in a company:
o Promoting internal cooperation and optimizing the existing
process, thus improves the production efficiency. Take an
Internet service provider for example, the internal blockchain
that involves product manager, develop team, QA team and service
team, shall be able to trace each service features design,
development and market feedback easily, thus accelerate the
internal productivity.
o Improving the cooperation of eco-system players, to enlarge the
overall benefit. Take Internet service provider for example, by
using blockchain, a service provide shall be able to cooperate
with other other service providers to expand the overall business
based on trust, such as, a social network service provider can
coopertate with content (music, video, online game) providers.
o Expanding business to the whole industry, the whole society and
the world, to form new business models. For example, the social
Yang Expires January 1, 2019 [Page 2]
Internet-Draft Use cases of Blockchain June 2018
network providers shall be able to provide the capbility of user
anthertication to vertical service providers (such as freight,
supply chain, finance, rental).
In this document, several important use cases based on blockchain are
analyzed, including: blockchain based PKI system, blockchain as a
service, interworking cross blockchain (exchange data and contracts
cross chains). For easy understanding, related solutions are also
provided.
2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
3. Terminology and Abbreviations
The terminology and abbreviations used in this document are defined
in this section.
o H(e)NB: Home (e)NodeB, An eNodeB is an end device of a Radio
Access Network,it performs the same functionality of an eNodeB,
but is deployed for indoor premises or public hotspots, using the
local Internet connection to access operators' network.
o MNO: Mobile Network Operator
o SeGW: Security Gateway, an edge device that is Deployment on the
boundary of an Operator's network, to connect HeNB device
remotely.
4. Use case 1: Secure connection management between devices using
blockchain based PKI
Digital certificates are widely used to negotiate secure channels
between devices and to establish secure connections as defined in RFC
5280 [RFC5280]. Accoding to communication model, there are two
typical sceniaros: multiple devices are connected to the same
centralized node (such as H(e)NBs connected to a MNO's SeGW), peer to
peer connection (such as IoT devices).
4.1. Centralized connected model
Take the H(e)NB scenario for example, H(e)NB is a device that is
installed in the office/home where the radio signal is weak or not
covered by MNOs, to provide mobile network services (such as voice
call, messaging). H(e)NB access MNO's network via local user's
Yang Expires January 1, 2019 [Page 3]
Internet-Draft Use cases of Blockchain June 2018
Internet access (LAN), thus, security solution is needed to authorize
the H(e)NB device and to secure the connection between H(e)NB device
and MNO network border (SeGW), as shown in Figure 1.
+--------+ +--------+ +------+ +----------+
| | / \ | | / \
| | | | | || |
| H(e)NB +---------+ Internet +------+ SeGW ++ Operator's |
| | \ / | || Network |
| | +--------+ | || |
+--------+<===========================>+------+ \ /
Secure Connection Via Cert +----------+
Cert Cert
of CA1 of CA1
^ ^
| |
| +------------+ |
+-------+ CA1 +---------+
+------------+
Figure 1
Because SeGWs belongs to different operation domain, it is not
possible to have them use certificates issued by the same CA, H(e)NB
needs to configure the certificate of the SeGW that it is connected
to accordingly. Two important functions is provided by certificate,
authentication of H(e)NB devices to make sure that it is not a fake
one, and the establishment of secure end to end communication
channels between H(e)NB and SeGW under an unsafe Internet network.
For this reason, the manufacture can not preinstall any certificate
for H(e)NB, the installiation of certificate is needed in the
deploying stage. The workers manually install the certificate into
the H(e)NB. In this way, the following problems occurs: first, the
manually installiation is low efficiency and error-pronel; second,
the certificate may be leaked out by the worker. Whats more,
reconfiguration are needed each time when the certificate is expired
or withdrawn.
The solution is:
o Establish a consortium blockchain, which SHALL be used to verify
and store certificates. H(e)NB manufacturers and operator join
the chain as nodes, which are responsible for certificate
verification and storage.
o A self-signed certificate for each H(e)NB device is generated by
the manufacture when it is produced.
Yang Expires January 1, 2019 [Page 4]
Internet-Draft Use cases of Blockchain June 2018
o This certificate shall be sent to blockchain nodes to be verified.
o The certificate is verified by the verification node.
o The certificate is recorded into the blockchain if the consensus
achieved.
o At the time H(e)NB is installed and powered on, it's certificate
will be used to establish connection to operator's SeGW.
o The SeGW interacts with the operator's blockchain node to verify
the certification.
o If success, the secured connection between SeGW and H(e)NB shall
be established automatically.
o The certificate is also used to idenfity and antenticate the
H(e)NB itself.
Note: Although in this case we uses the operator's H(e)NB scenario,
this solution applies to other similar connection models, such as
home gateway.
4.2. Peer-to-peer connection model
Take IoT scenario for example. Currently, IoT devices always talk to
each other via the network server (such as IoT application server).
For privacy and security consideration, we want IoT devices that
produced by different venders to talk with each other directly in
security. But we can not assume that all these devices be
preinstalled with the certificates issued by the same CA. The
regular solution is to introduce a centralized bridge-CA. The
question is that, the bridge is lack efficiency and extensiblity.
The blockchain provides a better solution:
o Establish a consortium blockchain, which SHALL be used to verify
and store certificates. CAs join the chain as nodes, which are
responsible for certificate verification and storage.
o When a CA issue certificate for a device, the certificate shall be
sent to blockchain nodes to be verified.
o The certificate is verified by the verification node.
o The certificate is recorded into the blockchain if it achieves
consensus.
Yang Expires January 1, 2019 [Page 5]
Internet-Draft Use cases of Blockchain June 2018
o At the time devices need direct connection, they will lookup their
CA's node for centification verificaton.
o If success, the secured connection between devices directly and
automatically.
4.3. Summary
The advantages of usging blockchain based PKI includes:
o High reliability and performance: each node holds a copy of
consistent certificate data, supports multiple duplicates and
parallel queries, and better data consistency.
o Low cost: automatic operation of block chain system, low
maintenance cost; no payment needed for self signed certificate.
5. Use case 2: Blockchain as a Service
The value of blockchain in building a system of trust and
collaboration has been proved by the industry, enterprises and
industries are applying the blockchain. However, not all enterprises
are willing to establish and operate their own blockchain system
because of costs. Therefore, providing blockchain-as-a-service
solution contributes to the rapid popularization of blockchain.
The main requirements for blockchain-as-a-service may include:
o General proposed data format to support different applications,
for storage/verification/resolvation.
o Define flexible, extensible interfaces/APIs that is easy for
programming.
o Enhanced performance for future proof.
6. Use case 3: Blockchain Interworking
According to the current situation of the vertical development of the
blockchain infrastructures and applications, the cross-chain
interworking shall be a very important demand in the future. Cross
chain interoperability involves not only data, but also smart
contracts, security and other aspects.
Two OPTIONAL solutions for blockchain interworking:
o API/Interface invocation based, using interworking gateway.
Yang Expires January 1, 2019 [Page 6]
Internet-Draft Use cases of Blockchain June 2018
o Build a "meta blockchain" to coordinate interworking blockchains
7. IANA Considerations
This memo includes no request to IANA.
8. Security Considerations
TBA
9. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
Housley, R., and W. Polk, "Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation List
(CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
<https://www.rfc-editor.org/info/rfc5280>.
Author's Address
Yang Boyle
China Mobile
China
Email: boyxd@hotmail.com
Yang Expires January 1, 2019 [Page 7]