computing, trusted execution environment, and DAML for possible

integration into appropriate layers of the framework.

10. Technical challenges, resource requirements, and implementation details

toward the design and development of the National Blockchain

Framework should be included as it increases visibility and clarity.

11. Efforts should be made to include designing customized consensus

algorithms meeting the requirements of specific applications with smart

contracts.

12. The growth of computational devices to manage large storage of the

system, with complex Indian geographical dispersion, poses a challenge

to data integrity. But at the same time, the lack of scalability poses a

threat to the sustainability of any blockchain system. Hence, scalability

and sustainability aspects should be thoroughly analyzed and addressed

in the framework.

13 . It is well understood that transactions in blockchain platform takes more

time and are also computationally intensive, hence, consuming a lot of

energy. It is suggested that any application that has been visualized to be

implemented must audit its transaction time and provide the estimate of

the energy cost for the same.

Security and privacy

1. Security audit and assessment processes/ guidelines may be evolved

considering the smart contract and other specific constructs of

blockchain. Smart contract security research efforts may be initiated to

understand the threat scenario and evolve audit guidelines and processes.

2. Data localization should be enabled in the framework. This may be

achieved by hosting the blockchain infrastructure, data, and smart

contracts within the country. In the future, infrastructure from various

organizations and state data centers within the country may be

contributed

through

crowdsourcing

mechanisms

toward

the

implementation of the framework.

3 . Security and privacy should be considered as vertical components, and

they should be addressed across various layers in the blockchain

infrastructure. Personal data protection, data life cycle management,

provisions relating to the right to be forgotten/ right to erasure, and so on.