Documentos de Académico
Documentos de Profesional
Documentos de Cultura
SEMINAR
BY NAGA SRAVANI MAGULURI(M-
TECH)
18L31D5803
THIS BOOK HAS THE DETAILS ABOUT TECHNICAL SEMINAR TOPICS WHICH
HAS BEEN EXPLAINED BY ME SRAVANI MAGULURI,STUDENT OF OUR
COLLEGE PURSUING M_TECH GRADUATION
Block chain technology& Bitcoin technology
MASTERS OF TECHNOLOGY
In
COMPUTER SCIENCE ENGINEERING
Submitted By
M.N.SRAVANI (18L31D5803)
Under esteemed guidance of
V.MAMATHA, M.TECH
Associate Professor
Table of Contents
1.1 INTRODUCTION........................................................................................................4
1.2 STRUCTURE...........................................................................................................4
1.2.1 BLOCKS...........................................................................................................5
1.2.2 BLOCK TIME...................................................................................................7
1.2.3 HARD FORKS..................................................................................................7
1.2.4 DECENTRALIZATION....................................................................................7
1.2.5 OPENNESS.......................................................................................................7
1.2.6 PERMISSIONLESS..........................................................................................7
1.3 PERMISSIONED(PRIVATE) BLOCKCHAIN........................................................4
1.3.1DISADVANTAGES...........................................................................................7
1.4 USES .......................................................................................................................4
1.4.1 CRYPTOCURRENCY......................................................................................7
1.4.2 SMARTCONTRACTS......................................................................................7
1.4.3 FINANCIAL SERVICES..................................................................................7
1.4.4 BLOCK CHAIN WITH VEDIO GAMES.........................................................7
1.4.5 SUPPLY CHAIN...............................................................................................7
1.4.6 BLOCKCHAIN IN SPACE...............................................................................7
1.4.7 OTHER USES...................................................................................................7
1.5 OTHER DESIGN INCLUDE ..................................................................................4
1.6 TYPES OF BLOCKCHAINS ..................................................................................4
1.6.1 PUBLIC BLOCKCHAINS................................................................................7
1.6.2 PRIVATE BLOCKCHAINS..............................................................................7
1.6.3 CONSORTIUM BLOCKCHAINS....................................................................7
1.6.4 HYBRID BLOCKCHAINS...............................................................................7
2. BITCOIN.....................................................................................................................27
2.1 INTRODUCTION..................................................................................................29
2.1 BITCOIN TRANSACTION PROPERTY..............................................................29
2.3 STORING BITCOIN?............................................................................................29
3. DNA.............................................................................................................................30
3.1 INTRODUCTION:.................................................................................................30
3.2 DNA DEFINITION:...............................................................................................30
3.3 SYNTHETIC DNA:...............................................................................................30
3.3.1 BENFITS OF SYNTHESIS DNA.....................................................................7
3.3.2 DNA SYNTHESIS............................................................................................7
3.4 SEQUENCING:.....................................................................................................30
3.5 SEQUENCING AND SYNTHESIS:......................................................................30
3.6 DNA STORAGE SYSTEM:...................................................................................30
3.7 DNA CRYPTOGRAPHY:......................................................................................30
3.8 DNA ENCRYPTION:.............................................................................................30
3.9 DNA DECRYPTION:.............................................................................................30
3.10 DIGITAL DATA STORAGE ON DNA:...............................................................30
3.11 STORAGE LIMIT:...............................................................................................30
3.12 ADVANTAGES....................................................................................................30
3.13 DISADVANTAGES:............................................................................................30
4. DAVOS BITCOIN CHALLENGE...............................................................................34
4.1 INTRODUCTION:.................................................................................................35
4.2 OBTAIN DNA SAMPLE:......................................................................................35
4.3 SEQUENCING :....................................................................................................36
4.4 READ MERGING QUALITY CONTROL............................................................36
4.5 FILTERING AND PREPROCESSING:.................................................................38
4.6 DECODING PART 1:.............................................................................................41
4.7 DECODING PART 2:.............................................................................................42
4.8 DECODING PART 3:.............................................................................................43
4.9 BREAK THROUGH:.............................................................................................44
4.10 RESULT:..............................................................................................................45
5. CONCLUSIONS..........................................................................................................46
6. REFERENCES.............................................................................................................47
ABSTRACT
A blockchain is essentially a distributed database of records or public ledger of
all transactions or digital events that have been executed and shared among
participating parties. Each transaction in the public ledger is verified by
consensus of a majority of the participants in the system. And, once entered,
information can never be erased. The blockchain contains a certain and
verifiable record of every single transaction ever made. Bitcoin, the
decentralized peertopeer digital currency, is the most popular example that uses
blockchain technology. The digital currency bitcoin itself is highly controversial
but the underlying blockchain technology has worked flawlessly and found wide
range of applications in both financial and nonfinancial world. The main
hypothesis is that the blockchain establishes a system of creating a distributed
consensus in the digital online world. This allows participating entities to know
for certain that a digital event happened by creating an irrefutable record in a
public ledger. It opens the door for developing a democratic open and scalable
digital economy from a centralized one. There are tremendous opportunities in
this disruptive technology and revolution in this space has just begun.
We report on a strong capacity boost in storing digital data in synthetic DNA. In
principle, synthetic DNA is an ideal media to archive digital data for very long
times because the achievable data density and longevity outperforms today’s
digital data storage media by far. On the other hand, neither the
synthesis, nor the amplification and the sequencing of DNA strands can be
performed error-free today and in the foreseeable future. In order to make
synthetic DNA available as digital data storage media, specifically tailored
forward error correction schemes have to be applied.For the purpose of realizing
a DNA data storage, we have developed an efficient and robust forwarderror-
correcting scheme adapted to the DNA channel. We based the design of the
needed DNA channel model on data from a proof-of-concept conducted 2012 by
a team from the Harvard Medical School [1].Our forward error correction
scheme is able to cope with all error types of today’s DNA synthesis,
amplification and sequencing processes, e.g. insertion, deletion, and swap
errors.In a successful experiment, we were able to store and retrieve error-free
22 MByte of digital data in synthetic DNA recently.
Keywords: Bio-technology, DNA, DNA synthesis and sequencing, digital data storage, data
preservation, archiving
BLOCKCHAIN TECHNOLOGY
1.1 INTRODUCTION:
Blockchain was invented by a person (or group of people) using the
name Satoshi Nakamoto in 2008 to serve as the public transaction ledger of
the cryptocurrency bitcoin. The identity of Satoshi Nakamoto is unknown. The
invention of the blockchain for bitcoin made it the first digital currency to solve
the double-spending problem without the need of a trusted authority or
central server. The bitcoin design has inspired other applications, and
blockchains which are readable by the public are widely used
by cryptocurrencies. Blockchain is considered a type of payment rail.
To start, let’s talk about the history of the blockchain. Before it was ever used in
cryptocurrency, it had humble beginnings as a concept in computer science —
particularly, in the domains of cryptography and data structures.
The very primitive form of the blockchain was the hash tree, also known as a
Merkle tree. This data structure was patented by Ralph Merkle in 1979, and
functioned by verifying and handling data between computer systems. In a peer-
to-peer network of computers, validating data was important to make sure
nothing was altered or changed during transfer. It also helped to ensure that false
data was not sent. In essence, it is used to maintain and prove the integrity of
data being shared.
In 1991, the Merkle tree was used to create a “secured chain of blocks” — a
series of data records, each connected to the one before it. The newest record in
this chain would contain the history of the entire chain. And thus, the blockchain
was created.
1.2 Structure:
A blockchain is a decentralized, distributed and public digital ledger that is used
to record transactions across many computers so that any involved record cannot
be altered retroactively, without the alteration of all subsequent blocks. [1][18] This
allows the participants to verify and audit transactions independently and
relatively inexpensively.[19] A blockchain database is managed autonomously
using a peer-to-peer network and a distributed timestamping server. They
are authenticated by mass collaboration powered by collective self-interests.
[20]
Such a design facilitates robust workflow where participants' uncertainty
regarding data security is marginal. The use of a blockchain removes the
characteristic of infinite reproducibility from a digital asset. It confirms that
each unit of value was transferred only once, solving the long-standing problem
of double spending. A blockchain has been described as a value-exchange
protocol.[21] A blockchain can maintain title rights because, when properly set up
to detail the exchange agreement, it provides a record that compels offer and
acceptance.
1.2.1 Blocks:-
Blocks hold batches of valid transactions that are hashed and encoded into
a Merkle tree.[1] Each block includes the cryptographic hash of the prior block in
the blockchain, linking the two. The linked blocks form a chain.
[1]
This iterative process confirms the integrity of the previous block, all the way
back to the original genesis block.[22]
Sometimes separate blocks can be produced concurrently, creating a temporary
fork. In addition to a secure hash-based history, any blockchain has a specified
algorithm for scoring different versions of the history so that one with a higher
value can be selected over others. Blocks not selected for inclusion in the chain
are called orphan blocks.[22] Peers supporting the database have different
versions of the history from time to time. They keep only the highest-scoring
version of the database known to them. Whenever a peer receives a higher-
scoring version (usually the old version with a single new block added) they
extend or overwrite their own database and retransmit the improvement to their
peers. There is never an absolute guarantee that any particular entry will remain
in the best version of the history forever. Blockchains are typically built to add
the score of new blocks onto old blocks and are given incentives to extend with
new blocks rather than overwrite old blocks. Therefore, the probability of an
entry becoming superseded decreases exponentially[23] as more blocks are built
on top of it, eventually becoming very low. [1][24]:ch. 08[25] For example, bitcoin uses
a proof-of-work system, where the chain with the most cumulative proof-of-
work is considered the valid one by the network. There are a number of methods
that can be used to demonstrate a sufficient level of computation. Within a
blockchain the computation is carried out redundantly rather than in the
traditional segregated and parallel manner.[26]
exploiting a vulnerability in its code. In this case, the fork resulted in a split
creating Ethereum and Ethereum Classic chains. In 2014 the Nxt community
was asked to consider a hard fork that would have led to a rollback of the
blockchain records to mitigate the effects of a theft of 50 million NXT from a
major cryptocurrency exchange. The hard fork proposal was rejected, and some
of the funds were recovered after negotiations and ransom payment.
Alternatively, to prevent a permanent split, a majority of nodes using the new
software may return to the old rules, as was the case of bitcoin split on 12 March
2013.[29]
1.2.4 Decentralization:
By storing data across its peer-to-peer network, the blockchain eliminates a
number of risks that come with data being held centrally. [1] The decentralized
blockchain may use ad-hocmessage passing and distributed networking.
Peer-to-peer blockchain networks lack centralized points of vulnerability
that computer crackers can exploit; likewise, it has no central point of failure.
Blockchain security methods include the use of public-key cryptography.
[4]:5
A public key (a long, random-looking string of numbers) is an address on the
blockchain. Value tokens sent across the network are recorded as belonging to
that address. A private key is like a password that gives its owner access to their
digital assets or the means to otherwise interact with the various capabilities that
blockchains now support. Data stored on the blockchain is generally considered
incorruptible.[1]
Every node in a decentralized system has a copy of the blockchain. Data
quality is maintained by massive database replication[8] and computational trust.
No centralized "official" copy exists and no user is "trusted" more than any
other.[4] Transactions are broadcast to the network using software. Messages are
delivered on a best-effort basis. Mining nodes validate transactions,[22] add them
to the block they are building, and then broadcast the completed block to other
nodes.[24]:ch. 08 Blockchains use various time-stamping schemes, such as proof-of-
work, to serialize changes.[30] Alternative consensus methods include proof-of-
stake.[22] Growth of a decentralized blockchain is accompanied by the risk
of centralization because the computer resources required to process larger
amounts of data become more expensive.[31]
1.2.5 Openness :
Open blockchains are more user-friendly than some traditional ownership
records, which, while open to the public, still require physical access to view.
Because all early blockchains were permissionless, controversy has arisen over
the blockchain definition. An issue in this ongoing debate is whether a private
system with verifiers tasked and authorized (permissioned) by a central
authority should be considered a blockchain.[32][33][34][35][36] Proponents of
permissioned or private chains argue that the term "blockchain" may be applied
to any data structure that batches data into time-stamped blocks. These
blockchains serve as a distributed version of multiversion concurrency
control (MVCC) in databases.[37] Just as MVCC prevents two transactions from
concurrently modifying a single object in a database, blockchains prevent two
transactions from spending the same single output in a blockchain. [38]:30–
31
Opponents say that permissioned systems resemble traditional corporate
databases, not supporting decentralized data verification, and that such systems
are not hardened against operator tampering and revision.[32][34] Nikolai Hampton
of Computerworld said that "many in-house blockchain solutions will be
nothing more than cumbersome databases," and "without a clear security model,
proprietary blockchains should be eyed with suspicion."[10][39]
1.2.6 Permissionless :
The great advantage to an open, permissionless, or public, blockchain network
is that guarding against bad actors is not required and no access control is
needed.[23] This means that applications can be added to the network without the
approval or trust of others, using the blockchain as a transport layer.[23]
Bitcoin and other cryptocurrencies currently secure their blockchain by
requiring new entries to include a proof of work. To prolong the blockchain,
bitcoin uses Hashcash puzzles. While Hashcash was designed in 1997 by Adam
Back, the original idea was first proposed by Cynthia Dwork and Moni
Naor and Eli Ponyatovski in their 1992 paper "Pricing via Processing or
Combatting Junk Mail".
Financial companies have not prioritised decentralized blockchains.[40] In
2016, venture capital investment for blockchain-related projects was weakening
in the USA but increasing in China. [41] Bitcoin and many other cryptocurrencies
use open (public) blockchains. As of April 2018, bitcoin has the highest market
capitalization.
Fig 5: Applications
1.4 Uses:
Blockchain technology can be integrated into multiple areas. The primary use of
blockchains today is as a distributed ledger for cryptocurrencies, most
notably bitcoin. There are a few operational products maturing from proof of
concept by late 2016.[41]
As of 2016, some observers remain skeptical. Steve Wilson, of Constellation
Research, believes the technology has been hyped with unrealistic claims.[49] To
mitigate risk, businesses are reluctant to place blockchain at the core of the
business structure.[50]
1.4.1 Cryptocurrencies:
Most cryptocurrencies use blockchain technology to record transactions. For
example, the bitcoin network and Ethereum network are both based on
blockchain. On May 8, 2018 Facebook confirmed that it is opening a new
blockchain group[51] which will be headed by David Marcus who previously was
in charge of Messenger. According to The VergeFacebook is planning to launch
its own cryptocurrency for facilitating payments on the platform.
Fig 6: Cryptocurrency(bitcoin)
reduce moral hazards and optimize the use of contracts in general. But "no
viable smart contract systems have yet emerged." Due to the lack of widespread
use their legal status is unclear.[54]
October 2018. Its first use case is decentralized storage of data and files in
space, but the end goal is to reduce reliance on big corporations like Google and
Facebook, who also explore ways to bring internet to everyone through satellites
in space.
Fig 12 bitcoin
Transactions are verified by network nodes through cryptography and recorded
in a public distributed ledger called a blockchain. Bitcoin was invented by an
unknown person or group of people using the name, Satoshi Nakamoto,[9] and
released as open-source software in 2009.[10] Bitcoins are created as a reward for
a process known as mining. They can be exchanged for other currencies,
products, and services.[11] Research produced by University of
Cambridge estimates that in 2017, there were 2.9 to 5.8 million unique users
using a cryptocurrency wallet, most of them using bitcoin.[12]
Bitcoin has been criticized for its use in illegal transactions, its high electricity
consumption, price volatility, thefts from exchanges, and the possibility that
bitcoin is an economic bubble.[13] Bitcoin has also been used as an investment,
although several regulatory agencies have issued investor alerts about bitcoin.[14]
1.2 Bitcoin Transactional properties:
Full client – This is like a standalone email server that handles all aspects
of the process without relying on third-party servers. Alice would control
her whole transaction from beginning to end by herself. Understandably,
this is not for beginners.
Web client – This is the opposite of “full client” and resembles webmail
in that it totally relies on a third-party server. The third party replaces
Alice and operates her entire transaction.
3.1 INTRODUCTION
DNA is found in almost every cell in the human body. It stores biological
information, such as eye color, hair color and skin tone. The genetic data
contained in DNA serves as a blueprint for each cell to perform its functions. So,
DNA essentially ‘programs’ the human body.
Bits (1001100111)
So, to store non-genetic information in DNA, we must first translate binary data
from bits to the four unit (AGCT) structure of DNA data.
Since DNA uses organic matter, DNA data storage will be far more efficient than
our current data storage mechanisms. Data stored in molecular form will use
only the bare minimum number of atoms necessary for storage.
Scientists have successfully stored data in synthetic DNA. Synthetic DNA is like
real DNA, but is created from scratch by scientists. The data stored on synthetic
DNA is kept in test tubes, and not attached to any living organisms.
There are several benefits of synthetic DNA data storage. DNA lasts for
thousands of years, whereas data in traditional hard drives can get corrupted or
damaged within 30 years.
Due to the efficiency of DNA storage, the storage capacity of DNA is massive: a
single gram of synthetic DNA can store over 215 petabytes of data!
The major drawbacks of synthetic DNA storage include prohibitive costs and
access time. While it currently costs a lot to store data in DNA form, this cost can
be expected to drop precipitously as the technology evolves. It currently takes
hours to input and retrieve data from DNA, rendering it impractical for most
real-time applications. Scientists are working on reducing this access time.
full with time but now we may not have to worry about their capacities as the
Scientists at New York Genome Center have come up with a new way to encode
digital data in DNA to create the highest density large scale data storage scheme
ever invented. It is capable of storing 215 petabytes (215 million gigabytes) in a
single gram of DNA(It means it could store every bit of datum ever recorded by
humans in a container about the size and weight of a couple of pickup trucks)
and it could potentially last for hundreds of thousands of years. Isn’t that cool?
3.10.1 How did they do it?
The DNA in our cells contains the instructions for building all the proteins that
keep us running. DNA is made up of repeating sequences of the nucleic acids
adenine, guanine, cytosine, and thymine (A, G, C, and T) which are sometimes
called base pairs. Each sequence of three bases translates to a different amino
acid, which are the building blocks of proteins. It’s data storage just like what
we do with hard drives but with much higher potential density.
The four-lettered nucleobase alphabet of DNA (A, C, G and T) can be
transformed into binary code—for example, as 00 for A, 01 for C, 10 for G and
11 for T. Scientists looked at the algorithms that were being used to encode and
decode the data and first converted the files into binary strings of 1s and 0s
compressing them into one master file and then split the data into short strings
of binary code. They devised an algorithm called a DNA Fountain which
randomly packaged the strings into droplets, to which they added extra tags to
put the file back together.
They started with six files including a full computer operating system and a
computer virus. In all, the researchers generated a digital list of 72,000 DNA
strands, each 200 bases long. They sent these as text files and later, the
sequences were fed into a computer which translated the genetic code back into
binary and used the tags to reassemble the six original files. The approach
worked so well that the new files contained no errors and were also able to make
a virtually unlimited number of error free copies of their files.
FLASH BACTERIAL
Data retention
Power usage
(watts per
Data density
It is ultracompact.
As long as human societies are reading and writing DNA, they will be
able to decode it.
DNA won’t degrade over time like cassette tapes and CDs, and it won’t
become obsolete.
3.13 Disadvantages:
High cost.
4.1 INTRODUCTION:
Almost three years later on January 19, 2018, the EBI announced that a Belgian
PhD student, Sander Wuyts of the University of Antwerp and Vrije Universiteit
Brussel, was the first one to complete the challenge. Next to the instructions on
how to claim the bitcoin (stored as a plain text and pdf file), the logo of the EBI,
the logo of the company that printed the DNA (CustomArray) and a sketch
of James Joyce were retrieved from the DNA.
However, one day later, I received a direct message from Prof. Goldman himself
who told me that if I have a good set of reasons and if I’m qualified for the
job, he might send over a DNA-sample. I drafted an e-mail and one week later
we were very lucky to receive an interesting package.
Fig 22 storage
4.3 Sequencing:
In our lab we’ve got quite some experience in 16S rRNA (microbiome) and
whole genome bacterial sequencing. Moreover, we have direct access to a
MiSeq, so sequencing the sample seemed to be very doable. Especially with the
support of my colleague Eline, who helped in choosing the best kit for the job
and loaded the MiSeq at the Center of Medical Genetics (University Hospital
Antwerp). If you’re interested in the details: in the end we used a 2 x 75 bp (150
cycle) V3 MiSeq sequencing kit, we reached a cluster density of 1,108 ± 12
K/MM² with 23 million reads passing filter. The total yield was 3.41 Gbp.
Next, a quality report was generated using FastQC. Things looked pretty good:
I was especially excited to learn that almost all sequences started with either T
or A. This is a property designed to make sure that the reads were decoded in the
right orientation. Other graphs (not shown here) showed that the reads had the
expected length of 117 nucleotides and that no undefined bases (N) were
detected.
2. Filter out reads longer or shorter than 117 nt (using the pullseq package)
2. Take the reverse complement of the reads starting with this wrong
orientation (fastarevcomp from the exonerate package)
3. Trim the first and last nucleotide which are the orientation identifiers
(fastx_trimmer from the FASTX-Toolkit)
My first job was to split the sequences as such, so that we can decode the
indexing information. This indexing information (yellow ends) contains a few
very important key features we need for further processing:
File identifier:
This piece of information will tell you to what file this DNA-fragment
belongs. In the original paper they used any number from 0 to 8, which
means that in total 9 different files could be encoded.
Index:
The index tells us at what position of the total DNA-sequence this DNA-
fragment can be found. For example, the first DNA-fragment (green in
panel d) has index 0, the second one (purple) has index 1, etc.
Parity trit:
The parity trit has been build in as a security check. Only reads that don’t
show any errors in their file identifier and index, will have the right parity
trit. Its principle is similar to a parity bit.
After I’ve split up the indexing information in these three sub parts, I
needed to translate these from DNA to the ternary system according to the
following scheme:
That’s how I ended up with 3 different ternary numbers (ID, index and Parity
trit) which I subsequently translated into the decimal system et voilà. This was
the first time I laid my eyes on information decrypted from the DNA which
was completely understandable for me. After checking the parity trit
checksum, I could figure out how many reads per sample we had:
From this graph I learned that 5/9 files were very well sequenced, while 4 of
them definitely show a much lower read count. This result was quite exciting
to me as I only expected one single file. Time to get to the real decoding!
This was definitely one of the most tricky parts of the challenge for
several reasons:
The first time I tried this, I was using the supplementary PDF of the
Nature paper. However, for the bitcoin challenge an updated version was
The script that we needed to use to remove the keystream was not
supplied as a separate script but was instead just attached in the PDF-file.
It was hard to get it out in the right format, so I just ended up copying it
word for word into a new file.
After all of this, I ended up with one long string of DNA per file. In
theory we are now only one step removed from finally reading out the
content of the files.
When running this script on my long DNA-strings, I quickly realised that their
quality was far from good. I manually had to remove some homopolymers to get
the script running and it produced an output that did not make any sense to me.
At least I did figure out that ID8 was a probably a JPEG-file due to the fact that
it started with FF D8 FF E0.
I decided that I’ve been doing too much work myself and that an extra pair of
eyes could be useful. Fortunately, my colleague Stijn was eager to help me out
again and we decided to organise a small hackathon on Saturday with the two of
us. During this hackathon he wrote two new algorithms which could potentially
make a less error prone final assembly. He also wrote those implementations in
Python (he’s a smart guy), making them at least 1 bazillion time faster than my
R algorithms. However, we both were a little bit disappointed that it did not
seem to solve our problem as the final DNA-sequence still seemed to be too
erroneous. Again we started to think that the quality of the data just was not
sufficient enough.
Despite this setback, we still managed to make some progress. One of them was
the realisation that one text file (ID0) was still encoded in hexadecimal. So after
manually removing all the homopolymers, decoding using the Python script,
we’ve put it trough an online translator:
We were psyched! This was the very first time we managed to get a readable result
out of our erroneous DNA-assemblies. However, the result was definitely not good
enough as the bitcoin’s private key was still full of unreadable characters. We had to
get a better assembly.
The next day I had a look at the results. Did my usual manual check for
homopolymers and to my surprise only a few were found. I ran the final
decoding script without any errors, which was also new to me. And there it
was. The very first fully decoded file without any obvious errors:
fig 29 ID0
At this point, I spent the next 20 minutes trying to figure out how to sweep the
bitcoin to my own wallet, in which I succeeded.
5.CONCLUSION
Blockchain has shown its potential for transforming traditional industry with its
key characteristics: decentralization, persistency, anonymity and auditability. In
this paper, we present a comprehensive overview on blockchain. We first give
an overview of blockchain technologies including blockchain architecture and
key characteristics of blockchain. We then discuss the typical consensus
algorithms used in blockchain. We analyzed and compared these protocols in
different respects. Furthermore, we listed some challenges and problems that
would hinder blockchain development and summarized some existing
approaches for solving these problems. Some possible future directions are also
proposed. Nowadays blockchainbased applications are springing up and we plan
to conduct in-depth investigations on blockchain-based applications in the
future.Synthetic DNA is an excellent candidate to become the urgently needed
long-term preservation medium for valuable digital data. DNA molecules, if
stored dry, cold, and dark, are certainly robust enough to stay intact for at least
several thousands of years, while no high data migration costs arise as with
common mass technologies. Further strong arguments to use DNA molecules to
archive digital data are the possible storage density in the order of 5 PB per
gram, the simplicity to copy DNA molecules at any time and that there is in fact
no format obsolescence risk. As proven with our here described successful 22
Mbyte experiments, the problem of intrinsic errors of the synthesizer, PCR,
sequencer, and storage chain can be solved efficiently with a robust FEC FEC
for DNA Data Storage Blawat, Gaedke, Huetter, Chen, Turczyk, Inverso, Pruitt,
Church
1020 scheme ensuring the integrity of the stored data. The achievable residual
error is in any case certainly smaller than the residual error of traditional storage
media. In an already planned next development step we will increase the amount
of stored data into the GB range. The presented FEC scheme is already designed
for such and even much higher volumes of data.Nevertheless, incremental
changes like a bigger RS block size will reduce the already achieved residual
error further.
6.REFERENCES
1. "Blockchains: The great chain of being sure about things". The
Economist. 31 October 2015. Archived from the original on 3 July 2016.
Retrieved 18 June 2016. The technology behind bitcoin lets people who
do not know or trust each other build a dependable ledger. This has
implications far beyond the crypto currency.
3. Jump up to: Popper, Nathan (21 May 2016). "A Venture Fund With
Plenty of Virtual Capital, but No Capitalist". The New York
Times. Archived from the original on 22 May 2016. Retrieved 23
May 2016.
4. Jump up to: Brito, Jerry; Castillo, Andrea (2013). Bitcoin: A Primer for
Policymakers (PDF)(Report). Fairfax, VA: Mercatus Center, George
Mason University. Archived (PDF) from the original on 21 September
2013. Retrieved 22 October 2013.
7. Extance, Andy (2016-08-31). "How DNA could store all the world's
data". Nature. 537 (7618): 22–24. doi:10.1038/537022a. ISSN 0028-
0836.
11. Jump up to:a b Goldman, N.; Bertone, P.; Chen, S.; Dessimoz, C.;
Leproust, E. M.; Sipos, B.; Birney, E. (2013). "Towards practical, high-
capacity, low-maintenance information storage in synthesized
DNA". Nature. 494 (7435): 77–
80. Bibcode:2013Natur.494...77G. doi:10.1038/nature11875. PMC 36729
58. PMID 23354052.
13. Limbachiya, D.; Dhameliya, V.; Khakhar, M.; Gupta, M. K. (25 April
2016). On optimal family of codes for archival DNA storage. 2015
Seventh International Workshop on Signal Design and its Applications in
Communications (IWSDA). pp. 123–
127. doi:10.1109/IWSDA.2015.7458386. ISBN 978-1-4673-8308-0.
14. Grass, R. N.; Heckel, R.; Puddu, M.; Paunescu, D.; Stark, W. J. (2015).
"Robust Chemical Preservation of Digital Information on DNA in Silica
with Error-Correcting Codes". Angewandte Chemie International
Edition. 54 (8): 2552–5. doi:10.1002/anie.201411378. PMID 25650567.
15. Blawat, M.; Gaedke, K.; Hütter, I.; Chen, X.-M.; Turczyk, B.; Inverso, S.;
Pruitt, B. W.; Church, G. M. (2016). "Forward Error Correction for DNA
Data Storage". Procedia Computer Science. 80: 1011–
1022. doi:10.1016/j.procs.2016.05.398.
16. Yong, Ed. "This Speck of DNA Contains a Movie, a Computer Virus, and
an Amazon Gift Card". The Atlantic. Retrieved 3 March 2017.
17. "DNA could store all of the world's data in one room". Science
Magazine. 2 March 2017. Retrieved 3 March 2017.