The default method for a user to interact with specific data on the ledger is determined by blockchain wallets. Wallets, in theory, provide a layer of well-defined data access based on the appropriate features that must be made available to users that log in the blockchain network. However, in permissioned networks, data access is controlled by the corresponding tools that are made available to the interested users who have an obligation to adopt and utilize in every situation of network design and deployment. Pledger Wallet constitutes a custom private-access wallet that permits trusted users to access sensitive data, addressing the research trend toward standardizing blockchain data access with strong confidentiality characteristics.
Trusted users participate in respective project scenarios that include blockchain interaction and on-chain data access through Pledger Wallet. For instance, a trustworthy user is permitted to check their on-chain balance within the context of an SLA they are engaged in Pledger through their wallet. Furthermore, in corresponding use case situations, a trusted user is given access to the particular ledger data that is kept on-chain for the specific case while the user is also able to complete range queries on the relevant informational data.Smart contracts, transactions, and DApps constitute dedicated blockchain operations that are available to the trusted users through Pledger Wallet while executed on the permissioned network. The trusted user can easily access the dedicated ledger data through the Pledger Wallet user interface. The user logs in by providing their specific login information for the asymmetric cryptography system provided to them.
On-chain confidentiality of the ledger data is assured through the administrative deployment of various private-access environments on the permissioned chain. By organizing the data access capabilities with respect to the users’ cryptographic keys, the private-access feature is deployed as an on-chain structure. As a result, the blockchain network stores different groups of informational data, and the trusted users can be granted only dedicated access.