How do we achieve a world of data integrity? It's not just about the accuracy of the data but about guaranteeing that the data has not been modified—whether by accident or deliberately. Blockchain technology enables this level of data integrity.

Making the most of the IoT, cloud and big data

Imagine that you’re living in the glorious near future. Your alarm clock talks to your e-mail app (you can stay in bed a little longer if your inbox has remained empty overnight, or if there are no commuting delays). Your car talks to your wallet and to the traffic signal system (your car would talk to the traffic lights, but there no longer are traffic lights).Blockchain-ebook-data-centric-security-Ericsson-hyperscale-cloud.jpg

Your fitness heart rate monitor notices a problem, so it communicates with your doctor’s office (sends the data, makes an appointment), your doctor’s office communicates with your health insurance provider and also with your office, sending a “note” and getting you the day off. At the doctor, you don’t have to wait in line, because the schedules of all the doctor’s other patients are similarly coordinated for maximum efficiency, both for the patients and the doctor.

A world of data integrity

The reason all these things flow together so smoothly is that future-you lives in a world of data integrity. Not only is the data always as accurate as it can be, but the systems that deal with that data all treat it with equal confidence. Given the way your car, the traffic system and your doctor’s office all work together so smoothly, you might easily start to anthropomorphize these systems, assigning them personalities, and imagining that they trust each other.

But they don’t. In fact, the way they relate to each other is called a trustless system. Their data is continually verified by a system that confirms data integrity. As we’ll see, data integrity is not just about the accuracy of the data relative to whatever it’s measuring. It’s about guaranteeing that the data has not been modified—whether by accident or deliberately.

Verifying data integrity with blockchain technology

Blockchain-ebook-data-centric-security-Ericsson-hyperscale-cloud2.png

So how do we get to this world of absolute data integrity? In the ebook linked below - and in a series of posts over the next few weeks - we examine a solution based on blockchain technology by exploring the following topics:

  • What is blockchain technology, and how is it typically used today?
  • Why does the Internet of Things (IoT) need trust and integrity assurance to be successful?
  • How can you use blockchains for integrity assurance?
  • What are some other examples of how blockchain technology is being used?
  • How is Ericsson using blockchain technology to help its customers add value to their services?

Download the Blockchain and Data Integrity eBook!

Background photo by Deirdre Straughan.


Security

Michael Bennett Cohn

Michael Bennett Cohn was head of digital product and revenue operations at Condé Nast, where he created the company's first dynamic system for digital audience cross-pollination. At a traditional boutique ad agency, he founded and ran the digital media buying team, during which time he planned and executed the digital ad campaign that launched the first Amazon Kindle. At Federated Media, where he was the first head of east coast operations, he developed and managed conversational marketing campaigns for top clients including Dell, American Express, and Kraft. He also has a master's degree in cinema-television from the University of Southern California. He lives in Brooklyn.

Michael Bennett Cohn

Discussions