Pub Date : 2023-12-01DOI: 10.1016/j.bcra.2023.100164
Damiano Di Francesco Maesa, Laura Ricci
{"title":"Blockchain protocols, data analysis, and applications","authors":"Damiano Di Francesco Maesa, Laura Ricci","doi":"10.1016/j.bcra.2023.100164","DOIUrl":"10.1016/j.bcra.2023.100164","url":null,"abstract":"","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000398/pdfft?md5=ba0cca1cec506668d9bfb6bcfed91946&pid=1-s2.0-S2096720923000398-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.1016/j.bcra.2023.100152
Laveen Bhatia, Saeed Samet
Federated Learning (FL) is a type of distributed deep learning framework in which multiple devices train a local model using local data, and the gradients of the local model are then sent to a central server that aggregates them to create a global model. This type of framework is ideal where data privacy is of utmost importance because the data never leave the local device. However, a major concern in FL is ensuring the data quality of local training data. Since there is no control over the local training data, ensuring that the local model is trained on clean data becomes challenging. A model trained on poor-quality data can have a significant impact on its accuracy. In this paper, we propose a decentralized approach using blockchain to ensure local model data quality. We use miners to validate each local model by checking its accuracy against a secret testing dataset. This is done using a smart contract that the miners invoke during the mining process. The local model is aggregated with the global model only if it passes a preset accuracy threshold. We test our proposed method on two datasets: the Brain Tumor Classification dataset from Kaggle, comprised of 7000 MRI images divided into two classes (Tumor/No Tumor), and the Medical MNIST dataset, which includes 58,954 images classified into six different classes: AbdomenCT, BreastMRI, ChestCT, Chest X-ray, Hand X-ray, and HeadCT. Our results show that our method outperforms the original FL approach in all experiments.
{"title":"A decentralized data evaluation framework in federated learning","authors":"Laveen Bhatia, Saeed Samet","doi":"10.1016/j.bcra.2023.100152","DOIUrl":"10.1016/j.bcra.2023.100152","url":null,"abstract":"<div><p>Federated Learning (FL) is a type of distributed deep learning framework in which multiple devices train a local model using local data, and the gradients of the local model are then sent to a central server that aggregates them to create a global model. This type of framework is ideal where data privacy is of utmost importance because the data never leave the local device. However, a major concern in FL is ensuring the data quality of local training data. Since there is no control over the local training data, ensuring that the local model is trained on clean data becomes challenging. A model trained on poor-quality data can have a significant impact on its accuracy. In this paper, we propose a decentralized approach using blockchain to ensure local model data quality. We use miners to validate each local model by checking its accuracy against a secret testing dataset. This is done using a smart contract that the miners invoke during the mining process. The local model is aggregated with the global model only if it passes a preset accuracy threshold. We test our proposed method on two datasets: the Brain Tumor Classification dataset from Kaggle, comprised of 7000 MRI images divided into two classes (Tumor/No Tumor), and the Medical MNIST dataset, which includes 58,954 images classified into six different classes: AbdomenCT, BreastMRI, ChestCT, Chest X-ray, Hand X-ray, and HeadCT. Our results show that our method outperforms the original FL approach in all experiments.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000271/pdfft?md5=07c936a02b62c7c930cf9c4b0cd364c5&pid=1-s2.0-S2096720923000271-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47498130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.1016/j.bcra.2023.100158
P.S. Akshatha, S.M. Dilip Kumar
The rapid growth of the Internet of Things (IoT) has raised security concerns, including MQTT protocol-based applications that lack built-in security features and rely on resource-intensive Transport Layer Security (TLS) protocols. This paper presents an approach that utilizes blockchain technology to enhance the security of MQTT communication while maintaining efficiency. This approach involves using blockchain sharding, which enables higher scalability, improved performance, and reduced computational overhead compared to traditional blockchain approaches, making it well-suited for resource-constrained IoT environments. This approach leverages Ethereum blockchain's smart contract mechanism to ensure trust, accountability, and user privacy. Specifically, we introduce a shard-based consensus mechanism that enables improved security while minimizing computational overhead. We also provide a user-controlled and secured algorithm using Proof-of-Access implementation to decentralize user access control to data stored in the blockchain network. The proposed approach is analyzed for usability, including metrics such as bandwidth consumption, CPU usage, memory usage, delay, access time, storage time, and jitter, which are essential for IoT application requirements. The analysis demonstrated that the approach reduces resource consumption, and the proposed system outperforms TLS and existing blockchain approaches in these metrics, regardless of the choice of the MQTT broker. Additionally, thoroughly addressing future research directions, including issues and challenges, ensures careful consideration of potential advancements in this domain.
{"title":"MQTT and blockchain sharding: An approach to user-controlled data access with improved security and efficiency","authors":"P.S. Akshatha, S.M. Dilip Kumar","doi":"10.1016/j.bcra.2023.100158","DOIUrl":"10.1016/j.bcra.2023.100158","url":null,"abstract":"<div><p>The rapid growth of the Internet of Things (IoT) has raised security concerns, including MQTT protocol-based applications that lack built-in security features and rely on resource-intensive Transport Layer Security (TLS) protocols. This paper presents an approach that utilizes blockchain technology to enhance the security of MQTT communication while maintaining efficiency. This approach involves using blockchain sharding, which enables higher scalability, improved performance, and reduced computational overhead compared to traditional blockchain approaches, making it well-suited for resource-constrained IoT environments. This approach leverages Ethereum blockchain's smart contract mechanism to ensure trust, accountability, and user privacy. Specifically, we introduce a shard-based consensus mechanism that enables improved security while minimizing computational overhead. We also provide a user-controlled and secured algorithm using Proof-of-Access implementation to decentralize user access control to data stored in the blockchain network. The proposed approach is analyzed for usability, including metrics such as bandwidth consumption, CPU usage, memory usage, delay, access time, storage time, and jitter, which are essential for IoT application requirements. The analysis demonstrated that the approach reduces resource consumption, and the proposed system outperforms TLS and existing blockchain approaches in these metrics, regardless of the choice of the MQTT broker. Additionally, thoroughly addressing future research directions, including issues and challenges, ensures careful consideration of potential advancements in this domain.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000337/pdfft?md5=a87db6be992926cd057321b8bd24cf25&pid=1-s2.0-S2096720923000337-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134934676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.1016/j.bcra.2023.100155
Haoxiang Luo
Since the Practical Byzantine Fault Tolerance (PBFT) consensus mechanism can avoid the performance bottleneck of blockchain systems caused by Proof of Work (PoW), it has been widely used in many scenarios. However, in the blockchain system, each node is required to back up all transactions and block data of the system, which will waste a lot of storage resources. It is difficult to apply to scenarios with limited storage resources such as unmanned aerial vehicle networks and smart security protection; thus, it is often used in small-scale networks. In order to deploy PBFT-based blockchain systems in large-scale network scenarios, we propose an ultra-low storage overhead PBFT consensus (ULS-PBFT), which groups nodes hierarchically to limit the storage overhead within the group. In this paper, we first propose an optimal double-layer PBFT consensus from the perspective of minimizing the storage overhead, and prove that this consensus can significantly reduce the storage overhead. In addition, we also investigate the superiority of ULS-PBFT in terms of communication overhead while setting the security threshold in the presence of the possibility of Byzantine nodes. The simulation results demonstrate the advantages of ULS-PBFT. Then, we extend such grouping idea to the blockchain system with X-layer PBFT and analyze its storage and communication overhead. Finally, the node grouping strategy of double-layer PBFT is studied for four application scenarios when the performance of storage overhead, communication overhead, and security are considered comprehensively.
{"title":"ULS-PBFT: An ultra-low storage overhead PBFT consensus for blockchain","authors":"Haoxiang Luo","doi":"10.1016/j.bcra.2023.100155","DOIUrl":"10.1016/j.bcra.2023.100155","url":null,"abstract":"<div><p>Since the Practical Byzantine Fault Tolerance (PBFT) consensus mechanism can avoid the performance bottleneck of blockchain systems caused by Proof of Work (PoW), it has been widely used in many scenarios. However, in the blockchain system, each node is required to back up all transactions and block data of the system, which will waste a lot of storage resources. It is difficult to apply to scenarios with limited storage resources such as unmanned aerial vehicle networks and smart security protection; thus, it is often used in small-scale networks. In order to deploy PBFT-based blockchain systems in large-scale network scenarios, we propose an ultra-low storage overhead PBFT consensus (ULS-PBFT), which groups nodes hierarchically to limit the storage overhead within the group. In this paper, we first propose an optimal double-layer PBFT consensus from the perspective of minimizing the storage overhead, and prove that this consensus can significantly reduce the storage overhead. In addition, we also investigate the superiority of ULS-PBFT in terms of communication overhead while setting the security threshold in the presence of the possibility of Byzantine nodes. The simulation results demonstrate the advantages of ULS-PBFT. Then, we extend such grouping idea to the blockchain system with <em>X</em>-layer PBFT and analyze its storage and communication overhead. Finally, the node grouping strategy of double-layer PBFT is studied for four application scenarios when the performance of storage overhead, communication overhead, and security are considered comprehensively.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000301/pdfft?md5=156a29459a07f06b4350a52f6b079a43&pid=1-s2.0-S2096720923000301-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44214334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The modern pharmaceutical supply chain lacks transparency and traceability, resulting in alarming rates of counterfeit products entering the market. These illegitimate products cause harm to end users and wreak havoc on the supply chain itself, costing billions of dollars in profit loss. In this paper, in response to the Drug Supply Chain Security Act (DSCSA), we introduce Janus, a novel pharmaceutical track-and-trace system that utilizes blockchain and cloning-resistant hologram tags to prevent counterfeits from entering the pharmaceutical supply chain. We design a multi-quorum consensus protocol that achieves load balancing across the network. We perform a security analysis to show robustness against various threats and attacks. The implementation of Janus proves that the system is fair, scalable, and resilient.
{"title":"Janus: Toward preventing counterfeits in supply chains utilizing a multi-quorum blockchain","authors":"Vika Crossland , Connor Dellwo , Golam Bashar , Gaby G. Dagher","doi":"10.1016/j.bcra.2023.100157","DOIUrl":"10.1016/j.bcra.2023.100157","url":null,"abstract":"<div><p>The modern pharmaceutical supply chain lacks transparency and traceability, resulting in alarming rates of counterfeit products entering the market. These illegitimate products cause harm to end users and wreak havoc on the supply chain itself, costing billions of dollars in profit loss. In this paper, in response to the Drug Supply Chain Security Act (DSCSA), we introduce Janus, a novel pharmaceutical track-and-trace system that utilizes blockchain and cloning-resistant hologram tags to prevent counterfeits from entering the pharmaceutical supply chain. We design a multi-quorum consensus protocol that achieves load balancing across the network. We perform a security analysis to show robustness against various threats and attacks. The implementation of Janus proves that the system is fair, scalable, and resilient.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000325/pdfft?md5=32e36d92a323a5ee29c977c97650f026&pid=1-s2.0-S2096720923000325-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48459524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.1016/j.bcra.2023.100165
Amr El Koshiry , Entesar Eliwa , Tarek Abd El-Hafeez , Mahmoud Y. Shams
Blockchain is a revolutionary technology that has the potential to revolutionize various industries, including finance, supply chain management, healthcare, and education. Its decentralized, secure, and transparent nature makes it ideal for use in industries where trust, security, and efficiency are of paramount importance. The integration of blockchain technology into the education system has the potential to greatly improve the efficiency, security, and credibility of the educational process. By creating secure and transparent platforms for tracking and verifying students' academic achievements, blockchain technology can help to create a more accessible and trustworthy education system, making it easier for students to showcase their skills and knowledge to potential employers. While the potential benefits of blockchain in education are significant, there are also several challenges that must be addressed in order to fully realize the potential of this technology in the educational sector. Some of the major challenges include adoption, technical knowledge, interoperability, regulation, cost, data privacy and security, scalability, and accessibility. The necessary equipment for the implementation of blockchain technology in education is diverse and critical to the success of this innovative technology. Organizations should carefully consider this equipment when planning their implementation of blockchain technology in education to ensure the efficient and secure transfer of educational data and transactions within the blockchain network. Blockchain technology has the potential to play a significant role in promoting sustainability education and advancing the sustainability goals of both individuals and organizations. Organizations should consider incorporating blockchain technology into their sustainability education programs, in order to enhance the transparency, verifiability, and efficiency of their sustainability-related activities. While the use of blockchain technology in education is still in its early stages, the available data suggest that it has significant potential to transform the education sector and improve the efficiency and transparency of educational systems.
{"title":"Unlocking the power of blockchain in education: An overview of innovations and outcomes","authors":"Amr El Koshiry , Entesar Eliwa , Tarek Abd El-Hafeez , Mahmoud Y. Shams","doi":"10.1016/j.bcra.2023.100165","DOIUrl":"10.1016/j.bcra.2023.100165","url":null,"abstract":"<div><p>Blockchain is a revolutionary technology that has the potential to revolutionize various industries, including finance, supply chain management, healthcare, and education. Its decentralized, secure, and transparent nature makes it ideal for use in industries where trust, security, and efficiency are of paramount importance. The integration of blockchain technology into the education system has the potential to greatly improve the efficiency, security, and credibility of the educational process. By creating secure and transparent platforms for tracking and verifying students' academic achievements, blockchain technology can help to create a more accessible and trustworthy education system, making it easier for students to showcase their skills and knowledge to potential employers. While the potential benefits of blockchain in education are significant, there are also several challenges that must be addressed in order to fully realize the potential of this technology in the educational sector. Some of the major challenges include adoption, technical knowledge, interoperability, regulation, cost, data privacy and security, scalability, and accessibility. The necessary equipment for the implementation of blockchain technology in education is diverse and critical to the success of this innovative technology. Organizations should carefully consider this equipment when planning their implementation of blockchain technology in education to ensure the efficient and secure transfer of educational data and transactions within the blockchain network. Blockchain technology has the potential to play a significant role in promoting sustainability education and advancing the sustainability goals of both individuals and organizations. Organizations should consider incorporating blockchain technology into their sustainability education programs, in order to enhance the transparency, verifiability, and efficiency of their sustainability-related activities. While the use of blockchain technology in education is still in its early stages, the available data suggest that it has significant potential to transform the education sector and improve the efficiency and transparency of educational systems.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000404/pdfft?md5=cd97ade3a6e2f24bee393bddcd3c7235&pid=1-s2.0-S2096720923000404-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135412440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-23DOI: 10.1016/j.bcra.2023.100171
Sepideh HajiHosseinKhani , Arash Habibi Lashkari , Ali Mizani Oskui
Smart contracts (SCs) are crucial in maintaining trust within blockchain networks. However, existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness, while approaches based on Deep Neural Networks (DNNs) struggle with detecting complex vulnerabilities due to limited data availability. This paper proposes a novel approach for analyzing SC vulnerabilities. Our method leverages an advanced form of the Genetic Algorithm (GA) and includes the development of a comprehensive benchmark dataset consisting of 36,670 Solidity source code samples. The primary objective of our study is to profile vulnerable SCs effectively. To achieve this goal, we have devised an analyzer called SCsVulLyzer based on GAs, designed explicitly for profiling SCs. Additionally, we have carefully curated a new dataset encompassing a wide range of examples, ensuring the practical validation of our approach. Furthermore, we have established three distinct taxonomies that cover SCs, profiling techniques, and feature extraction. These taxonomies provide a systematic classification and analysis of information, improving the efficiency of our approach. Our methodology underwent rigorous testing through experimentation, and the results demonstrated the superior capabilities of our model in detecting vulnerabilities. Compared to traditional and DNN-based approaches, our approach achieved higher precision, recall, and F1-score, which are widely used metrics for evaluating model performance. Across all these metrics, our model showed exceptional results. The customization and adaptations we implemented within the GA significantly enhanced its effectiveness. Our approach detects SC vulnerabilities more efficiently and facilitates robust exploration. These promising results highlight the potential of GA-based profiling to improve the detection of SC vulnerabilities, contributing to enhanced security in blockchain networks.
智能合约(SC)对于维护区块链网络中的信任至关重要。然而,现有的分析 SC 漏洞的方法往往缺乏准确性和有效性,而基于深度神经网络(DNN)的方法由于数据可用性有限,在检测复杂漏洞方面举步维艰。本文提出了一种分析 SC 漏洞的新方法。我们的方法利用了遗传算法(GA)的高级形式,包括开发一个由 36,670 个 Solidity 源代码样本组成的综合基准数据集。我们研究的主要目标是有效地剖析易受攻击的 SC。为实现这一目标,我们设计了一种基于遗传算法的分析器 SCsVulLyzer,专门用于剖析 SC。此外,我们还精心设计了一个新的数据集,其中包含大量实例,确保我们的方法得到实际验证。此外,我们还建立了三个不同的分类标准,涵盖 SC、剖析技术和特征提取。这些分类法对信息进行了系统的分类和分析,提高了我们方法的效率。我们的方法通过实验进行了严格的测试,结果证明了我们的模型在检测漏洞方面的卓越能力。与传统方法和基于 DNN 的方法相比,我们的方法获得了更高的精确度、召回率和 F1 分数,这些都是广泛用于评估模型性能的指标。在所有这些指标中,我们的模型都取得了优异的成绩。我们在 GA 中实施的定制和调整大大提高了其有效性。我们的方法能更有效地检测 SC 漏洞,并促进稳健的探索。这些充满希望的结果凸显了基于 GA 的剖析技术在改进 SC 漏洞检测方面的潜力,有助于增强区块链网络的安全性。
{"title":"Unveiling vulnerable smart contracts: Toward profiling vulnerable smart contracts using genetic algorithm and generating benchmark dataset","authors":"Sepideh HajiHosseinKhani , Arash Habibi Lashkari , Ali Mizani Oskui","doi":"10.1016/j.bcra.2023.100171","DOIUrl":"10.1016/j.bcra.2023.100171","url":null,"abstract":"<div><p>Smart contracts (SCs) are crucial in maintaining trust within blockchain networks. However, existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness, while approaches based on Deep Neural Networks (DNNs) struggle with detecting complex vulnerabilities due to limited data availability. This paper proposes a novel approach for analyzing SC vulnerabilities. Our method leverages an advanced form of the Genetic Algorithm (GA) and includes the development of a comprehensive benchmark dataset consisting of 36,670 Solidity source code samples. The primary objective of our study is to profile vulnerable SCs effectively. To achieve this goal, we have devised an analyzer called SCsVulLyzer based on GAs, designed explicitly for profiling SCs. Additionally, we have carefully curated a new dataset encompassing a wide range of examples, ensuring the practical validation of our approach. Furthermore, we have established three distinct taxonomies that cover SCs, profiling techniques, and feature extraction. These taxonomies provide a systematic classification and analysis of information, improving the efficiency of our approach. Our methodology underwent rigorous testing through experimentation, and the results demonstrated the superior capabilities of our model in detecting vulnerabilities. Compared to traditional and DNN-based approaches, our approach achieved higher precision, recall, and F1-score, which are widely used metrics for evaluating model performance. Across all these metrics, our model showed exceptional results. The customization and adaptations we implemented within the GA significantly enhanced its effectiveness. Our approach detects SC vulnerabilities more efficiently and facilitates robust exploration. These promising results highlight the potential of GA-based profiling to improve the detection of SC vulnerabilities, contributing to enhanced security in blockchain networks.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000465/pdfft?md5=3d59e17ff3aef14044707e48b0743a5f&pid=1-s2.0-S2096720923000465-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-23DOI: 10.1016/j.bcra.2023.100170
Mariia Rodinko , Roman Oliynykov , Andrii Nastenko
We propose a new approach for a secure, decentralized, and censorless upgrade of existing cryptocurrencies to newly created tokens without interaction with any external information sources (oracles). The proposed scheme is based on the burning of existing cryptocurrency tokens and implemented via the multi-currency auction. The auction is carried out on the blockchain of the new token and implemented using a smart contract that processes participants' bids of burnt tokens of other cryptocurrencies and supports a new token price discovery algorithm for each cryptocurrency with no oracles or any other trusted source of information. Contrary to traditional ways of getting the new asset, like centralized and decentralized exchanges, our method requires no user registration (as well as no KYC — “know your customer” procedure that requires obligatory client identification) and provides a predicted supply level of the new asset for an adequate price within a model with economically rational participants. We provide the results of decentralized auction simulations implemented for several strategies of user behavior (based on bid prices with normal and log-normal distribution laws), both under the normal operation and in the presence of an adversary who follows specific strategies.
{"title":"Decentralized Proof-of-Burn auction for secure cryptocurrency upgrade","authors":"Mariia Rodinko , Roman Oliynykov , Andrii Nastenko","doi":"10.1016/j.bcra.2023.100170","DOIUrl":"10.1016/j.bcra.2023.100170","url":null,"abstract":"<div><p>We propose a new approach for a secure, decentralized, and censorless upgrade of existing cryptocurrencies to newly created tokens without interaction with any external information sources (oracles). The proposed scheme is based on the burning of existing cryptocurrency tokens and implemented via the multi-currency auction. The auction is carried out on the blockchain of the new token and implemented using a smart contract that processes participants' bids of burnt tokens of other cryptocurrencies and supports a new token price discovery algorithm for each cryptocurrency with no oracles or any other trusted source of information. Contrary to traditional ways of getting the new asset, like centralized and decentralized exchanges, our method requires no user registration (as well as no KYC — “know your customer” procedure that requires obligatory client identification) and provides a predicted supply level of the new asset for an adequate price within a model with economically rational participants. We provide the results of decentralized auction simulations implemented for several strategies of user behavior (based on bid prices with normal and log-normal distribution laws), both under the normal operation and in the presence of an adversary who follows specific strategies.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000453/pdfft?md5=db85e4c2af2921213ed1b36ead8ae0c7&pid=1-s2.0-S2096720923000453-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139301375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-10DOI: 10.1016/j.bcra.2023.100169
Ashish Rajendra Sai , Harald Vranken
There is a growing interest in understanding the energy and environmental footprint of digital currencies, specifically in cryptocurrencies such as Bitcoin and Ethereum. These cryptocurrencies are operated by a geographically distributed network of computing nodes, making it hard to estimate their energy consumption accurately. Existing studies, both in academia and industry, attempt to model cryptocurrency energy consumption often based on a number of assumptions, for instance, about the hardware in use or the geographic distribution of the computing nodes. A number of these studies have already been widely criticized for their design choices and subsequent over- or under-estimation of energy use.
In this study, we evaluate the reliability of prior models and estimates by leveraging existing scientific literature from fields cognizant of blockchain, such as social energy sciences and information systems. We first design a quality assessment framework based on existing research, and we then conduct a systematic literature review examining scientific and non-academic literature demonstrating common issues and potential avenues of addressing these issues.
Our goal with this article is to advance the field by promoting scientific rigor in studies focusing on blockchain energy footprint. To that end, we provide a novel set of codes of conduct for the five most widely used research methodologies: Quantitative energy modeling, literature reviews, data analysis and statistics, case studies, and experiments. We envision that this code of conduct would assist in standardizing the design and assessment of studies focusing on blockchain-based systems' energy and environmental footprint.
{"title":"Promoting rigor in blockchain energy and environmental footprint research: A systematic literature review","authors":"Ashish Rajendra Sai , Harald Vranken","doi":"10.1016/j.bcra.2023.100169","DOIUrl":"10.1016/j.bcra.2023.100169","url":null,"abstract":"<div><p>There is a growing interest in understanding the energy and environmental footprint of digital currencies, specifically in cryptocurrencies such as Bitcoin and Ethereum. These cryptocurrencies are operated by a geographically distributed network of computing nodes, making it hard to estimate their energy consumption accurately. Existing studies, both in academia and industry, attempt to model cryptocurrency energy consumption often based on a number of assumptions, for instance, about the hardware in use or the geographic distribution of the computing nodes. A number of these studies have already been widely criticized for their design choices and subsequent over- or under-estimation of energy use.</p><p>In this study, we evaluate the reliability of prior models and estimates by leveraging existing scientific literature from fields cognizant of blockchain, such as social energy sciences and information systems. We first design a quality assessment framework based on existing research, and we then conduct a systematic literature review examining scientific and non-academic literature demonstrating common issues and potential avenues of addressing these issues.</p><p>Our goal with this article is to advance the field by promoting scientific rigor in studies focusing on blockchain energy footprint. To that end, we provide a novel set of codes of conduct for the five most widely used research methodologies: Quantitative energy modeling, literature reviews, data analysis and statistics, case studies, and experiments. We envision that this code of conduct would assist in standardizing the design and assessment of studies focusing on blockchain-based systems' energy and environmental footprint.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000441/pdfft?md5=ec518e8f1a94419b79ef4c284293228d&pid=1-s2.0-S2096720923000441-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135615189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-09DOI: 10.1016/j.bcra.2023.100166
Paul van Vulpen , Jozef Siu , Slinger Jansen
Decentralized autonomous organizations (DAOs) have found use in the governance of open source software (OSS) projects. However, the governance of an OSS producing DAO should match the particularities of OSS production while also overcoming the existing challenges of decentralized governance. The existing decentralized governance frameworks do not include all the governance activities of OSS projects. Therefore, this study presents a governance framework for DAOs that produce OSS. The framework is built upon a total of 34 articles on DAO and OSS governance. The framework was evaluated in three leading DAOs that produce OSS. The evaluation underscores the significance of the framework and proves the potential of the systematic categorization of governance mechanisms. Finally, we list emerging governance practices in various governance domains in this developing field.
在开放源码软件(OSS)项目的管理中,已经发现了分散自治组织(DAOs)的应用。然而,开放源码软件生产 DAO 的治理应与开放源码软件生产的特殊性相匹配,同时还要克服现有的分散治理挑战。现有的分散治理框架并不包括开放源码软件项目的所有治理活动。因此,本研究为生产开放源码软件的 DAOs 提出了一个治理框架。该框架建立在总共 34 篇关于 DAO 和开放源码软件治理的文章之上。该框架在三个领先的生产开放源码软件的 DAO 中进行了评估。评估强调了该框架的重要性,并证明了对治理机制进行系统分类的潜力。最后,我们列出了这一发展中领域中各个治理领域的新兴治理实践。
{"title":"Governance of decentralized autonomous organizations that produce open source software","authors":"Paul van Vulpen , Jozef Siu , Slinger Jansen","doi":"10.1016/j.bcra.2023.100166","DOIUrl":"10.1016/j.bcra.2023.100166","url":null,"abstract":"<div><p>Decentralized autonomous organizations (DAOs) have found use in the governance of open source software (OSS) projects. However, the governance of an OSS producing DAO should match the particularities of OSS production while also overcoming the existing challenges of decentralized governance. The existing decentralized governance frameworks do not include all the governance activities of OSS projects. Therefore, this study presents a governance framework for DAOs that produce OSS. The framework is built upon a total of 34 articles on DAO and OSS governance. The framework was evaluated in three leading DAOs that produce OSS. The evaluation underscores the significance of the framework and proves the potential of the systematic categorization of governance mechanisms. Finally, we list emerging governance practices in various governance domains in this developing field.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000416/pdfft?md5=c52dda3836a3c81f10a1c9da2144a0f6&pid=1-s2.0-S2096720923000416-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135566440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}