How to control a malicious user in hyperledger fabric

0 votes
Suppose in the network, there is a malicious user who is doing some malicious activities, how can I handle it?
Jun 29, 2018 in Blockchain by slayer
• 29,350 points
845 views

1 answer to this question.

0 votes
Best answer
Fabric is an implementation of blockchain. Blockchain guarantees safety because it is decentralized. Any activity on the network will be noticed by all the other nodes. And a block in a block chain contains information/data regarding the previous node and that previous node contains data about its previous node and so on. So, for a user to change the data in the block, he has to modify all the block right from the beginning of the chain. And to approve this, the malicious node has to have a majority of at least 51% of the network. All this makes it difficult for malicious activity.

And to answer your question, you can use to following approach to handle malicious node in the network.

1. You can control throughput and a potential maximum per port or user per second.
2. Create a transaction fee which would limit the limit the malicious activity.
3. Once you detect which node is malicious, remove that node from the network.
answered Jun 29, 2018 by Omkar
• 69,210 points

selected Jun 29, 2018 by slayer

Related Questions In Blockchain

0 votes
1 answer

How to register a user in Hyperledger Fabric?

Best practice would be to leverage an ...READ MORE

answered Sep 5, 2018 in Blockchain by Christine
• 15,790 points
1,546 views
0 votes
1 answer
+1 vote
2 answers

How to return value from a chaincode in Hyperledger Fabric?

Hyperledger Fabric supports only 2 types of ...READ MORE

answered Jun 13, 2018 in Blockchain by Perry
• 17,100 points
2,600 views
0 votes
1 answer

How to control visibility of assets in Hyperledger Fabric?

you can use proof of Authority consensus ...READ MORE

answered Jul 10, 2018 in Blockchain by digger
• 26,740 points
636 views
0 votes
1 answer

Hyperledger Sawtooth vs Quorum in concurrency and speed Ask

Summary: Both should provide similar reliability of ...READ MORE

answered Sep 26, 2018 in IoT (Internet of Things) by Upasana
• 8,620 points
1,232 views
+1 vote
4 answers

How PBFT algorithm works?

PBFT is a way for a distributed ...READ MORE

answered Apr 25, 2019 in Blockchain by Kiran
7,601 views
0 votes
1 answer

What do we mean by a validating peer?

The term validating peer was used in ...READ MORE

answered Apr 19, 2018 in Blockchain by Christine
• 15,790 points
893 views
0 votes
1 answer

Hyperledger Fabric : How to initialise a 2D array in .cto file?

You could try something like this, with ...READ MORE

answered Oct 30, 2018 in Blockchain by Omkar
• 69,210 points
564 views
+15 votes
5 answers
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP