IBM targets governments with secure blockchain service


IBM has announced a new framework for securely operating blockchain networks, as well as new services on the IBM Cloud that are designed to meet existing regulatory and security requirements.

Blockchain networks are built on the notion of decentralised control, but some cloud environments leave back doors open to vulnerabilities that allow tampering and unauthorised access. Working with teams of security experts, cryptographers, hardware experts and researchers, IBM has created new cloud services for tamper-resistant, trusted blockchain networks.



After working with hundreds of clients, startups and developers building blockchain applications, IBM is addressing their security needs in several ways, including cloud services with the highest Federal Information Processing Standards (FIPS 140-2) and Evaluation Assurance Levels (EAL) in the industry to support the use of blockchain in government, financial services and healthcare. The company is also making it easier to use IBM’s code based on the Linux Foundation Hyperledger Project in any environment, and offering services on Bluemix, IBM’s cloud platform, to help developers quickly build applications.

“Clients tell us that one of the inhibitors of the adoption of blockchain is the concern about security,” said Jerry Cuomo, vice president, Blockchain, IBM. “While there is a sense of urgency to pioneer blockchain for business, most organisations need help to define the ideal cloud environment that enables blockchain networks to run securely in the cloud.”


Secure in the cloud

As a result, new cloud services have been optimised for cloud-based blockchain networks by providing an auditable operating environment with comprehensive log data that supports forensics and compliance. Tamper-resistant storage of crypto keys and complete protection around the cryptographic module detects and responds to unauthorised attempts at physical access. Additionally, the IBM Cloud services enable blockchain peers to run in protected environments to prevent leaks through shared memory or hardware.

Related reading