Story image

Huawei Cloud launches international blockchain service

04 Dec 2018

Huawei Cloud officially launched its Blockchain Service (BCS) for global use, after launching it for commercial use in China on October 10th this year.

Now available on the international Huawei Cloud website, the service supposedly helps global enterprises and developers create, deploy, and manage blockchain applications quickly on Huawei Cloud. Its global launch lays the foundations for a distributed global blockchain platform.

Being proactive is essential to building a blockchain ecosystem

Blockchain features decentralisation, tamper resistance, and traceability, and builds trust between transaction participants. 

As such, blockchain generates value when used in enterprise applications in specific industry scenarios. 

Enterprises in various industries are currently exploring the applications of the blockchain, but deploying a blockchain on a cloud is no mean feat. Indeed, developers need to have a thorough understanding of blockchain technologies. Deployment is also time-consuming.

As early as 2016, Huawei joined Hyperledger hosted by the Linux Foundation. 

For its continuous technical and code contributions in two sub-projects, Fabric and STL, Huawei has been recognized as a key Hyperledger maintainer. Huawei is also the only maintainer from Asia in these sub-projects.

BCS is a cloud service that capitalises on the advantages of Huawei Cloud's container and security technologies, among others. It is easy to use, efficient, and universally applicable, and can be used in data applications, the Internet of Things (IoT), finance, and other fields. 

The scenarios it can be used in cover data transactions, identity authentication, proof of information (such as real estate and education), remote healthcare, food source tracing, the Internet of Vehicles (IoV), and IoT device management. 

It offers substantial assistance for establishing a technological ecosystem and digitally transforming industries.

BCS has significant advantages

Huawei Cloud is now focused on developing its blockchain platform to offer technical support for enterprises that develop blockchain applications and solutions.

BCS has the following advantages:

Open and easy to use

Built-in compliance with Hyperledger Fabric 1.1 and Kubernetes, featuring a simple configuration, deployment in minutes, and automatic multi-angle E2E O&M.

Flexible and efficient

Multiple efficient consensus algorithms (5,000+ TPS) and flexible switching, dynamic joining or quitting of multi-role nodes and members, and container-based physical resource management.

Cost-effective

Lower development and deployment costs, pay-per-use convenience, reduced O&M costs with unified management, and auto-scaling and upgrade/rollback on demand.

Robust security and privacy protections

Complete management and isolation of users, keys, and permissions; multi-layer encryption and privacy assurance; fully demonstrated cybersecurity infrastructure.

Huawei Cloud BCS is supposedly dedicated to providing enterprises with a solid foundation for innovation and development. 

Using BCS, a company can establish a blockchain system suited to its own business.

Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.