具有轻量级块验证器的快速安全联盟区块链

Weiquan Ni, Jiawen Kang, C. Maple, Zehui Xiong, Alia Asheralieva
{"title":"具有轻量级块验证器的快速安全联盟区块链","authors":"Weiquan Ni, Jiawen Kang, C. Maple, Zehui Xiong, Alia Asheralieva","doi":"10.1109/BCCA53669.2021.9656989","DOIUrl":null,"url":null,"abstract":"Due to advantages of moderate cost and easy deployment, consortium blockchains have been widely adopted in various commercial services and industrial applications. Nevertheless, because of limited number of miners, consortium blockchains are vulnerable to collusion attacks incurred by compromised block verifiers, i.e., miners verifying new blocks. To address this issue, edge devices acting as lightweight nodes can be recruited as lightweight block verifiers (LBVs) to verify the blocks together with typical miners. This increases the number of block verifiers, thereby enhancing blockchain security, but may result in a larger block verification delay. To tackle this dilemma, in this paper, we propose a computing resource management scheme to maximize the system utility related to users’ satisfaction with the blockchain services, which aims at jointly optimizing computing resources of miners and LBVs. We prove the existence and uniqueness of the optimal set of strategies of miners and LBVs, and then exploit Karush-Kuhn-Tucker (KKT) conditions to find these strategies. The numerical results demonstrate that, compared with existing schemes, the proposed scheme achieves secure block verification by involving LBVs with optimized block verification delay.","PeriodicalId":202582,"journal":{"name":"2021 Third International Conference on Blockchain Computing and Applications (BCCA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fast and Secure Consortium Blockchains with Lightweight Block Verifiers\",\"authors\":\"Weiquan Ni, Jiawen Kang, C. Maple, Zehui Xiong, Alia Asheralieva\",\"doi\":\"10.1109/BCCA53669.2021.9656989\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to advantages of moderate cost and easy deployment, consortium blockchains have been widely adopted in various commercial services and industrial applications. Nevertheless, because of limited number of miners, consortium blockchains are vulnerable to collusion attacks incurred by compromised block verifiers, i.e., miners verifying new blocks. To address this issue, edge devices acting as lightweight nodes can be recruited as lightweight block verifiers (LBVs) to verify the blocks together with typical miners. This increases the number of block verifiers, thereby enhancing blockchain security, but may result in a larger block verification delay. To tackle this dilemma, in this paper, we propose a computing resource management scheme to maximize the system utility related to users’ satisfaction with the blockchain services, which aims at jointly optimizing computing resources of miners and LBVs. We prove the existence and uniqueness of the optimal set of strategies of miners and LBVs, and then exploit Karush-Kuhn-Tucker (KKT) conditions to find these strategies. The numerical results demonstrate that, compared with existing schemes, the proposed scheme achieves secure block verification by involving LBVs with optimized block verification delay.\",\"PeriodicalId\":202582,\"journal\":{\"name\":\"2021 Third International Conference on Blockchain Computing and Applications (BCCA)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Third International Conference on Blockchain Computing and Applications (BCCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BCCA53669.2021.9656989\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Third International Conference on Blockchain Computing and Applications (BCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BCCA53669.2021.9656989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

由于成本适中、易于部署的优势,联盟区块链已广泛应用于各种商业服务和工业应用中。然而,由于矿工数量有限,联盟区块链很容易受到受损区块验证者(即验证新区块的矿工)的串通攻击。为了解决这个问题,可以招募充当轻量级节点的边缘设备作为轻量级块验证器(lbv),与典型的矿工一起验证块。这增加了区块验证者的数量,从而增强了区块链的安全性,但可能导致更大的区块验证延迟。为了解决这一困境,本文提出了一种计算资源管理方案,以最大化与用户对区块链服务满意度相关的系统效用,旨在共同优化矿工和lbv的计算资源。我们证明了矿工和lbv的最优策略集的存在性和唯一性,然后利用KKT条件来寻找这些策略。数值结果表明,与现有方案相比,该方案通过引入lbv实现了安全块验证,并优化了块验证延迟。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Fast and Secure Consortium Blockchains with Lightweight Block Verifiers
Due to advantages of moderate cost and easy deployment, consortium blockchains have been widely adopted in various commercial services and industrial applications. Nevertheless, because of limited number of miners, consortium blockchains are vulnerable to collusion attacks incurred by compromised block verifiers, i.e., miners verifying new blocks. To address this issue, edge devices acting as lightweight nodes can be recruited as lightweight block verifiers (LBVs) to verify the blocks together with typical miners. This increases the number of block verifiers, thereby enhancing blockchain security, but may result in a larger block verification delay. To tackle this dilemma, in this paper, we propose a computing resource management scheme to maximize the system utility related to users’ satisfaction with the blockchain services, which aims at jointly optimizing computing resources of miners and LBVs. We prove the existence and uniqueness of the optimal set of strategies of miners and LBVs, and then exploit Karush-Kuhn-Tucker (KKT) conditions to find these strategies. The numerical results demonstrate that, compared with existing schemes, the proposed scheme achieves secure block verification by involving LBVs with optimized block verification delay.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
[BCCA 2021 Title page] The journey of Blockchain inclusion in Vehicular Networks: A Taxonomy Towards An Enhanced Reputation System for IOTA’s Coordicide Blockchain Based Lateral Transshipment Mobile Blockchain-Empowered Federated Learning: Current Situation And Further Prospect
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1