{"title":"CSIMH: Design of an Efficient Security-Aware Customized Sidechaining Model via Iterative Meta-Heuristics","authors":"Nisha Balani, Pallavi Chavan","doi":"10.1080/19361610.2023.2264068","DOIUrl":null,"url":null,"abstract":"AbstractBlockchains are a secure alternative for long-length data storage & security deployments. Though blockchains are unbounded, their quality of service (QoS) performance reduces after adding a certain number of blocks. Thus, sidechains have become essential for making the system decentralized, secure, and effective for use thereby improving their scalability & QoS performance. Sidechains reduce data storage and extraction delays. However, all sidechains of a single blockchain are the same in size, capacity, and security. This limits their application to real-world use cases that require dynamic security. To overcome this limitation, the authors propose a meta-heuristic approach to design a system that produces customized sidechains based on the quantity and quality of data stored on the chain. The model uses a machine-learning approach to find the best possible sidechain configuration for different data types. It makes the system fast and scalable and improves storage & memory efficiency. The proposed model is tested on multiple data sets and compared with various state-of-art sidechain deployments. An improvement of 18% in terms of mining speed, 27% in terms of energy efficiency, 10% with regards to throughput, and 8% concerning packet delivery ratio is observed. The model is tested under various attacks and faulty nodes to validate its security performance. A consistent QoS performance is observed for the proposed model under these attack types, thereby validating its resiliency for different attacks. This enhancement in performance makes the proposed model eligible for deployment in high-speed, low-energy, and high-security applications like IoT, mobile ad-hoc networks, and sensor networks.Keywords: Blockchainsidechainthroughputenergy consumptionQoSmeta-heuristic","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"33 1","pages":"0"},"PeriodicalIF":1.1000,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Applied Security Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19361610.2023.2264068","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 0
Abstract
AbstractBlockchains are a secure alternative for long-length data storage & security deployments. Though blockchains are unbounded, their quality of service (QoS) performance reduces after adding a certain number of blocks. Thus, sidechains have become essential for making the system decentralized, secure, and effective for use thereby improving their scalability & QoS performance. Sidechains reduce data storage and extraction delays. However, all sidechains of a single blockchain are the same in size, capacity, and security. This limits their application to real-world use cases that require dynamic security. To overcome this limitation, the authors propose a meta-heuristic approach to design a system that produces customized sidechains based on the quantity and quality of data stored on the chain. The model uses a machine-learning approach to find the best possible sidechain configuration for different data types. It makes the system fast and scalable and improves storage & memory efficiency. The proposed model is tested on multiple data sets and compared with various state-of-art sidechain deployments. An improvement of 18% in terms of mining speed, 27% in terms of energy efficiency, 10% with regards to throughput, and 8% concerning packet delivery ratio is observed. The model is tested under various attacks and faulty nodes to validate its security performance. A consistent QoS performance is observed for the proposed model under these attack types, thereby validating its resiliency for different attacks. This enhancement in performance makes the proposed model eligible for deployment in high-speed, low-energy, and high-security applications like IoT, mobile ad-hoc networks, and sensor networks.Keywords: Blockchainsidechainthroughputenergy consumptionQoSmeta-heuristic