Knowledge Bank

Private blockchains

Understanding private and permissioned blockchain networks

Private blockchain networks

Private blockchains are permissioned networks where participation is controlled and restricted to authorized participants.

Major private networks

Enterprise Solutions

  • Hyperledger Besu
    • Enterprise Ethereum
    • EVM compatible
    • Proof of Authority
  • Quorum
    • JP Morgan fork of Ethereum
    • Privacy features
    • Enterprise focused

Consortium Networks

  • Hyperledger Fabric
    • Modular architecture
    • Channel-based privacy
    • Chaincode smart contracts
  • Corda
    • Financial services focus
    • Point-to-point transactions
    • Privacy by design

Technical deep dive

Blockchain technology, at its core, provides a decentralized digital ledger that records transactions in a secure and transparent manner . While public blockchains offer open access and broad participation, private permissioned blockchains represent a distinct category tailored for controlled environments, often operating within or between organizations . The increasing interest from businesses in private permissioned blockchains stems from their potential to offer the benefits of distributed ledger technology while addressing specific enterprise needs for data privacy, access control, and regulatory compliance . This emergence signifies a recognition that a one-size-fits-all approach to blockchain may not suit every organizational context.

Defining Characteristics of Private Permissioned Blockchains

A private blockchain, frequently termed a "trusted" or "permissioned" blockchain, operates as a closed network accessible exclusively to authorized or select verified users . This fundamental characteristic is underpinned by an additional access control layer, ensuring that only users with explicit permissions can interact with the blockchain . Furthermore, the actions that permitted users can perform are strictly defined and granted by the administrators of the ledger . To gain access and execute these authorized operations, participants are typically required to authenticate themselves through methods such as digital certificates or other digital identifiers .

Participation in a private permissioned blockchain network is restricted, with network administrators holding the authority to determine who can join . Access often involves a formal invitation process where the identity and other pertinent information of potential participants are authenticated and verified by the network operator(s) . Moreover, the system allows for the assignment of different levels of user permissions or roles, providing granular control over network interactions .

These blockchains are frequently owned and operated by specific companies or organizations for the purpose of managing sensitive data and internal information . In some cases, a single private organization may wield complete authority over the network, dictating the participants and their roles . The owner or operator may also retain the privilege to override, edit, add, or even delete records on the blockchain, depending on the network's governance model .

The degree of decentralization in a private permissioned blockchain is not a fixed attribute and can vary significantly, ranging from highly centralized systems controlled by a single entity to partially decentralized networks operating among a consortium of authorized participants . The network members typically decide on the level of decentralization and the specific mechanisms used for achieving consensus .


Transparency, a hallmark of many public blockchains, is not a mandatory feature of private permissioned blockchains and is often considered optional to enhance security . The level of transparency is usually determined by the objectives of the organization managing the blockchain network . However, regardless of the chosen level of transparency for general users, the ledger itself maintains a comprehensive record of every transaction along with the identities of the participating parties .

In contrast to the anonymity often associated with public blockchains, private permissioned blockchains generally lack anonymity. Access to the identity of each participant involved in a transaction is frequently a critical requirement for private entities seeking accountability and a verifiable chain of custody . Every modification or transaction is linked to a specific user, enabling network administrators to have immediate insight into who made a change and when .


The fundamental aspect that distinguishes these blockchains is the controlled access and the presence of an entity or group responsible for managing permissions. This fundamentally alters the trust model compared to public blockchains, where trust is distributed across a large, anonymous network. The flexibility in decentralization and transparency allows private permissioned blockchains to be adapted to specific organizational needs and regulatory requirements, offering a key advantage over the more standardized structures of public blockchains. The capability of a central authority to potentially modify the ledger introduces a trade-off between immutability and control, a balance that must be carefully considered based on the intended application.

Private Permissioned vs. Public Blockchains: A Detailed Comparison

The fundamental difference between private permissioned and public blockchains lies in their approach to access control. Private permissioned blockchains restrict participation to authorized entities who have been granted permission by a central authority or through a predefined protocol . Conversely, public blockchains are permissionless, allowing anyone to join and participate in the network's core activities .


In terms of anonymity, private permissioned blockchains generally do not offer it, as participants' identities are known and tracked to ensure accountability . Public blockchains, on the other hand, provide a degree of anonymity through the use of pseudonymous addresses, although the transactions themselves are publicly viewable .


Governance also differs significantly. In private permissioned blockchains, decisions are authorized by a specific group or the network owners through a centralized, predefined structure . Governance in these networks is often customizable . Public blockchains operate under a decentralized governance model, where no single entity controls the network or its protocols, and changes typically require consensus from the community .

The level of decentralization varies considerably. Private permissioned blockchains can range from centralized systems controlled by a single organization to partially decentralized networks managed by a consortium of authorized participants . Public blockchains are inherently decentralized, distributed across a vast network of nodes, which makes them highly resilient to single points of failure or control .

Transparency is another key differentiator. In private permissioned blockchains, transparency is optional and often limited to authorized participants, with the level being customizable . Public blockchains are highly transparent, with all transactions recorded and publicly accessible on the blockchain .


Security approaches also differ. Private permissioned blockchains rely on access control mechanisms, encryption, and potentially consensus protocols. However, they can be vulnerable if the controlling entity's systems are compromised or due to a limited number of validators . Public blockchains derive their security from the large number of participants, cryptographic hashing, and the distributed nature of the network, making them highly resistant to attacks, although this can sometimes impact speed .


Transaction speed and throughput are generally higher in private permissioned blockchains due to the smaller number of participants and the use of potentially more efficient consensus mechanisms . These networks can often be configured for high transaction throughput and even zero transaction fees . In contrast, transaction processing in public blockchains can be slower due to network congestion and the need for broad consensus among numerous participants , often involving transaction fees .

Use cases for each type of blockchain also vary. Private permissioned blockchains are well-suited for enterprise applications requiring data privacy, accountability, and controlled access, such as supply chain management, internal financial systems, healthcare data management, and collaborations between businesses . Public blockchains are ideal for applications that demand transparency, trustless environments, and broad participation, such as cryptocurrencies, decentralized finance (DeFi), and open-source projects .


Identity management is typically built into private permissioned blockchains, allowing for the definition of roles and permissions for participants . Authentication often occurs through certificates or digital identifiers . Public blockchains generally lack built-in identity management, with transactions being linked to pseudonymous wallet addresses .

Scalability in terms of transaction throughput is generally better in private permissioned blockchains compared to public blockchains due to the limited number of participants . Public blockchains can face significant scalability challenges when dealing with a high volume of transactions .


The decision of whether to use a private permissioned or a public blockchain is fundamentally driven by the specific requirements of the application, particularly the desired balance between control, privacy, transparency, and trust. Organizations must carefully assess their needs and priorities to determine which type of blockchain aligns best with their objectives.

Table 1: Comparison of Private Permissioned and Public Blockchains

FeaturePrivate Permissioned BlockchainPublic Blockchain
Access ControlRestricted, permissionedOpen, permissionless
AnonymityGenerally lacks anonymityOffers pseudonymity
GovernanceCentralized or controlled by authorized groupDecentralized, community-driven
DecentralizationVariable, can be centralized or partially decentralizedInherently decentralized
TransparencyOptional, customizable, often limited to participantsHigh, all transactions publicly viewable
SecurityRelies on access control, encryption, fewer validatorsRelies on a large number of participants, cryptography
Transaction SpeedFast, high throughput potentialCan be slower, lower throughput potential
Use CasesEnterprise applications, supply chain, internal systemsCryptocurrencies, DeFi, open-source projects
Identity ManagementBuilt-in, role-based access controlTypically lacks built-in identity management
ScalabilityGenerally more scalable in terms of transaction throughputCan face scalability challenges

Architecture of Private Permissioned Blockchain Networks

The architecture of a private permissioned blockchain network comprises several key components working in concert. Nodes are the participants in the network, each typically holding a copy of the ledger . In this controlled environment, these nodes are usually known and authorized entities . It's common to find different types of nodes within the network, each with specific roles and permissions, such as validator nodes responsible for confirming the validity of transactions .


Clients serve as the applications or interfaces that participants use to interact with the blockchain network . These clients enable users to submit transactions, query the data stored on the ledger, and potentially execute smart contracts .

The ledger is the foundational element – a distributed, immutable record that chronologically captures all transactions that have occurred on the blockchain . In private permissioned blockchains, access to view or modify the ledger is strictly controlled based on the permissions assigned to each user .


Smart contracts, which are self-executing agreements with the terms directly encoded in the program, play a crucial role in automating processes, enforcing predefined rules, and managing assets within the permissioned environment . Platforms like Hyperledger Fabric and Quorum provide robust support for the development and deployment of smart contracts .

The network structure, or topology, that connects the various nodes can vary depending on the specific design of the blockchain. Common structures include peer-to-peer networks and hub-and-spoke models . In many private permissioned blockchains, a "trusted intermediary" or a consortium of organizations might manage the core network infrastructure, overseeing the operation and governance of the blockchain . Some architectural designs involve a distinction between validator nodes, operated by the trusted intermediary, and participant nodes that may have more limited capabilities .


A critical component for managing participation and access is the identity management layer. This layer is responsible for verifying the identities of participants and managing their associated permissions within the network . It handles authentication processes, determines authorization levels for various actions, and may also include mechanisms for revoking access when necessary .


The architecture of these networks is carefully crafted to strike a balance between security, control, efficiency, and performance, leading to diverse implementations based on the specific use case and the governing entity. Unlike the more standardized architecture observed in public blockchains, private permissioned blockchains offer greater flexibility in their design to cater to the unique needs of organizations. The central role of the "trusted intermediary" or the governing consortium significantly shapes the architecture, particularly concerning the distribution of responsibilities for transaction validation and overall network maintenance. This central entity introduces a degree of centralization but also establishes a clear point of accountability and control within the network.


Consensus Mechanisms in Private Permissioned Blockchains

While highly centralized private blockchains might forgo traditional consensus mechanisms, most distributed private permissioned networks rely on them to ensure agreement among authorized participants regarding the state of the ledger . Several consensus algorithms are commonly employed in these settings, each with its own technical details and trade-offs.


Raft is a consensus algorithm favored for its understandability and performance, making it suitable for permissioned environments. It operates through a leader election process where one node is chosen as the leader, responsible for proposing new blocks to the network. Follower nodes then replicate these proposals, and a block is committed to the ledger only when a majority of followers agree. Raft's primary focus is on maintaining consistency of the transaction log across all participating nodes.


Paxos represents a family of consensus algorithms renowned for their robustness and fault tolerance, even in asynchronous networks where message delivery times are not guaranteed. While more complex to understand and implement than Raft, Paxos involves distinct roles of proposers, acceptors, and learners to achieve agreement on a specific value, such as a transaction or a block. It is designed to tolerate a certain number of faulty processes within the network.


The Practical Byzantine Fault Tolerance (PBFT) algorithm is specifically engineered to tolerate Byzantine faults, where nodes can exhibit arbitrary behavior, including malicious actions . In PBFT, a round of communication occurs between a primary node and backup nodes to reach consensus. The system can guarantee safety and liveness as long as a supermajority of nodes are behaving honestly (typically 2f+1 honest nodes out of a total of 3f+1 nodes, where 'f' represents the number of potentially faulty nodes). PBFT is frequently used in permissioned blockchains where the participants might not all be fully trusted.


Federated Byzantine Consensus (FBFT) is a variation of the BFT algorithm where each node in the blockchain designates a set of trusted transaction validators who receive and order transactions . Consensus is achieved when a predefined minimum number of these validators reach an agreement. FBFT offers a compromise between full decentralization and trust by relying on a federation of known and trusted validators.


Round-Robin Consensus presents a simpler approach where nodes take turns in proposing and validating new blocks . This mechanism is particularly well-suited for highly controlled environments where all participants are considered trustworthy. While it can be very efficient in such settings, it typically offers less fault tolerance compared to BFT-based algorithms.


Some private blockchain platforms also utilize multi-party voting schemes to achieve consensus . In these systems, authorized participants cast votes on proposed transactions or blocks, and consensus is reached when a predefined threshold of votes is met. The specific voting rules and thresholds can be customized based on the network's requirements.


The selection of a particular consensus mechanism is largely dictated by the level of trust that exists among the participants and the desired degree of fault tolerance and performance for the network. In environments where participants are known and trusted, simpler and more efficient algorithms like Raft or Round-Robin may be sufficient. However, in scenarios involving potentially less trusted entities, more robust mechanisms such as PBFT or FBFT are often preferred. The emphasis on efficiency and reduced computational overhead in private permissioned blockchains often leads to the adoption of consensus mechanisms that are less resource-intensive compared to the Proof-of-Work (PoW) algorithm commonly used in many public blockchains. This contributes to the faster transaction speeds and potentially lower energy consumption observed in private networks.

Protocols in Private Permissioned Blockchains

Protocols form the backbone of any blockchain network, defining the rules and procedures that govern how participants interact and how the system operates. In private permissioned blockchains, these protocols are often tailored to meet specific organizational requirements and security considerations.


Communication protocols dictate how nodes within the network exchange information. This includes the dissemination of details about new transactions, newly formed blocks, and updates to the overall state of the ledger. While fundamental networking protocols like TCP/IP provide the underlying infrastructure, specific blockchain platforms may implement their own optimized communication protocols to enhance efficiency and security within their particular architecture and consensus framework. These protocols ensure that message passing between nodes is both secure and reliable.


Transaction processing protocols outline the precise steps involved in submitting, verifying, and ultimately committing transactions to the blockchain. This encompasses the format in which transactions are structured, the methods used for digitally signing them to ensure authenticity, and how they are propagated across the network to other participating nodes. These protocols also establish the rules for validating transactions, which may include verifying digital signatures, ensuring sufficient account balances, and confirming adherence to the logic defined within smart contracts.


Data sharing protocols are particularly important in private permissioned blockchains, where controlling access to information is a primary concern. These protocols govern how data stored on the ledger is shared among authorized participants. They can enforce granular access control policies at the level of individual data elements, ensuring that only users with the appropriate permissions can view specific pieces of information. Techniques such as state channels or private data collections might be employed to facilitate confidential data sharing within the network while still leveraging the benefits of a shared ledger.


Smart contract interaction protocols define how users and external applications can interact with smart contracts that have been deployed on the blockchain. This includes the protocols for invoking specific functions within a contract, passing the necessary parameters, and receiving the results of the contract's execution. Standardized APIs and interfaces are often used to simplify and streamline the process of interacting with smart contracts.


The protocols employed in private permissioned blockchains are carefully selected and often customized to prioritize efficiency, maintain security within a controlled environment, and ensure strict adherence to predefined access policies. Unlike the more open and standardized protocols found in public blockchains, private networks have the flexibility to implement bespoke protocols that are finely tuned to their specific use cases and the characteristics of their participants. The emphasis on data sharing protocols underscores the critical importance of granular control over information access in enterprise settings, where confidentiality and compliance with regulations are paramount. These protocols enable organizations to harness the advantages of a shared, distributed ledger while simultaneously maintaining the necessary levels of data privacy and security.

Identity Management and Access Control

In the realm of private permissioned blockchains, robust identity management and access control mechanisms are paramount for ensuring the security, integrity, and proper governance of the network . These systems control who can participate in the network and precisely define the actions each participant is authorized to perform. This is crucial for establishing accountability and maintaining a clear audit trail of all activities within the blockchain .


Permissions within these networks are typically granted by the network administrators or through the enforcement of predefined rules that are often embedded within smart contracts . A common approach involves defining different roles, each associated with a specific set of access privileges and capabilities . Access can be granted based on various criteria, including the participant's identity, their organizational affiliation, or other relevant attributes that align with the network's policies.


The enforcement of these permissions occurs at multiple layers within the blockchain infrastructure. This includes controlling access to the network itself, regulating the submission of transactions, restricting the visibility of certain data on the ledger, and governing the execution of smart contracts. Authentication mechanisms, such as digital certificates and API keys, are employed to verify the identity of each participant attempting to interact with the network . Once a user is authenticated, authorization policies are then applied to determine whether that user possesses the necessary permissions to perform the specific action they are attempting.


Private permissioned blockchains often integrate with existing enterprise-level identity management systems, allowing organizations to leverage their current infrastructure and processes for managing user identities . Additionally, some blockchain platforms offer built-in identity management features that can be configured to meet the specific needs of the network . The modular nature of many blockchain architectures also facilitates the integration of various third-party identity management solutions, providing flexibility and customization options .


Commonly used mechanisms for managing permissions within these networks include Access Control Lists (ACLs) and Role-Based Access Control (RBAC). ACLs explicitly specify which users or groups have access to particular resources within the blockchain. RBAC, on the other hand, assigns permissions to predefined roles, and users are then assigned to these roles based on their responsibilities and requirements within the network. This approach simplifies permission management and ensures consistency across the network.


The presence of strong identity management and access control is a fundamental aspect of private permissioned blockchains, distinguishing them from their public counterparts. This controlled environment ensures that the network operates according to its intended design and that sensitive data is protected from unauthorized access or modification. The ability to precisely define and enforce who can do what within the blockchain network is a key factor driving the adoption of this technology by enterprises seeking secure and auditable solutions. Furthermore, the seamless integration with existing identity management systems can significantly streamline the process of onboarding and managing users for organizations deploying private permissioned blockchains, reducing administrative overhead and leveraging existing expertise.


Scalability and Performance Considerations

Private permissioned blockchains generally exhibit higher transaction throughput and lower network latency compared to public blockchains, primarily due to the limited number of participants and the potential for employing more efficient consensus mechanisms . The absence of open competition for transaction validation and the utilization of voting-based or leader-based consensus protocols can significantly enhance processing speeds. Moreover, because these networks typically involve a smaller and often geographically localized set of participants, the time it takes for information to propagate across the network, known as network latency, tends to be lower .


Despite these inherent advantages, private permissioned blockchains are not immune to scalability challenges. As the number of participants and the volume of transactions increase, these networks can still encounter limitations. The specific consensus mechanism employed and the underlying network architecture play a crucial role in determining the scalability of a given private blockchain. For instance, some consensus algorithms, like PBFT, can experience performance degradation as the number of participating nodes grows significantly.


When compared directly with public blockchains, the differences in scalability and performance become more pronounced. Public blockchains often face scalability bottlenecks due to the sheer number of participants and the computationally intensive nature of some of their consensus mechanisms, such as Proof-of-Work . In contrast, private permissioned blockchains prioritize efficiency and immutability within a controlled environment, often at the expense of the high degree of decentralization found in public chains. This trade-off typically results in superior performance in enterprise-focused applications .


Several factors can influence the overall performance of a private permissioned blockchain. The choice of consensus algorithm is critical, as different algorithms have varying performance characteristics under different network conditions. The underlying network infrastructure, including the bandwidth and connectivity between nodes, also plays a significant role. The complexity of the smart contracts being executed on the blockchain can impact processing times, as can the hardware and software resources available to each node in the network.


The generally better scalability and performance characteristics of private permissioned blockchains make them particularly attractive for enterprise use cases where high transaction volumes and low latency are often critical requirements. This makes them well-suited for applications such as supply chain tracking, real-time payment processing, and efficient asset management within organizations or among trusted consortia. However, while generally more scalable than public chains, careful design and ongoing optimization are still essential to ensure that private permissioned blockchains can effectively handle the anticipated workload as adoption expands. Factors such as the selection of an appropriate consensus mechanism and the design of an efficient network architecture must be carefully considered to avoid potential performance bottlenecks as the network evolves.


Real-World Use Cases of Private Permissioned Blockchains

Private permissioned blockchains are finding increasing adoption across various industries, demonstrating their versatility and suitability for specific enterprise needs. In supply chain management, these blockchains enable the tracking of goods and their provenance throughout the supply chain, fostering transparency and accountability among all participating organizations . This can lead to improved efficiency, reduced instances of fraud, and enhanced visibility into complex supply networks .


The financial services sector is exploring and implementing private permissioned blockchains for several applications, including facilitating secure and efficient interbank payments and settlements . They are also being used to streamline trade finance processes, reducing the reliance on cumbersome paperwork, and for managing digital assets and tokens within a regulated framework.


In healthcare, private permissioned blockchains offer a secure and auditable way to store and share patient data among authorized healthcare providers, ensuring both privacy and interoperability . They can also be used to track the provenance of pharmaceuticals, helping to combat the issue of counterfeit drugs.


For identity management, these blockchains can be used to create secure and verifiable digital identities for both individuals and organizations, simplifying processes that require identity verification and facilitating secure access to various services and data.


Organizations are also leveraging private permissioned blockchains for internal voting systems, providing a transparent and auditable platform for decision-making within the enterprise . Similarly, they are being integrated into Enterprise Resource Planning (ERP) systems to enhance data integrity and automate various business processes .


Beyond these specific examples, private permissioned blockchains are proving valuable in logistics and accounting, improving efficiency and transparency in logistics operations and automating accounting processes while ensuring data immutability . They are also being used for securing and streamlining payroll and internal financial transactions within organizations . The ability to track the movement and ownership of various assets beyond just supply chains makes them ideal for a wide range of track and trace applications .


The suitability of private permissioned blockchains for these diverse applications stems from their fundamental ability to provide a shared, auditable ledger with strictly controlled access and robust identity management capabilities. This addresses key challenges related to data security, transparency, and operational efficiency within and between organizations. The capacity to tailor these blockchain solutions to the specific requirements of different industries makes them a highly adaptable technology for enterprise adoption.


Private permissioned blockchains offer a compelling solution for organizations seeking to leverage the benefits of distributed ledger technology within a controlled and secure environment. Their defining characteristics, including restricted access, variable decentralization, and customizable transparency, make them distinct from public blockchains and well-suited for a wide range of enterprise applications. The ability to precisely manage participant identities and permissions ensures accountability and data privacy, while the selection of efficient consensus mechanisms contributes to high transaction throughput and low latency.


These blockchain networks are particularly advantageous in scenarios where control, privacy, and performance are paramount, such as supply chain management, financial services, healthcare, and internal enterprise systems. Their real-world applications continue to expand as organizations recognize their potential to enhance efficiency, security, and transparency in various operational aspects.


However, it is important to acknowledge the trade-offs associated with deploying private permissioned blockchains. The reliance on a trusted intermediary or consortium introduces a degree of centralization, and the security of the network is heavily dependent on the robustness of the access control mechanisms and the integrity of the participating nodes. Improper implementation can lead to security vulnerabilities.