Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2019, Vol. 13 Issue (6) : 1151-1165    https://doi.org/10.1007/s11704-018-6345-4
RESEARCH ARTICLE
System architecture for high-performance permissioned blockchains
Libo FENG1,2, Hui ZHANG1,2,3(), Wei-Tek TSAI1,2,4, Simeng SUN1
1. State Key Laboratory of Software Development Environment, Beihang University, Beijing 100191, China
2. Digital Society & Blockchain Laboratory, School of Computer Science, Beihang University, Beijing 100191, China
3. Beijing Advanced Innovation Center for Big Data and Brain Computing, Beihang University, Beijing 100191, China
4. School of Computing, Informatics and Decision Systems Engineering, Arizona State University, Tempe, USA
 Download: PDF(695 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Blockchain(BC), as an emerging distributed database technology with advanced security and reliability, has attracted much attention from experts who devoted to e-finance, intellectual property protection, the internet of things (IoT) and so forth. However, the inefficient transaction processing speed, which hinders the BC’s widespread, has not been well tackled yet. In this paper, we propose a novel architecture, called Dual-Channel Parallel Broadcast model (DCPB), which could address such a problem to a greater extent by using three methods which are dual communication channels, parallel pipeline processing and block broadcast strategy. In the dual-channel model, one channel processes transactions, and the other engages in the execution of BFT. The parallel pipeline processing allows the system to operate asynchronously. The block generation strategy improves the efficiency and speed of processing. Extensive experiments have been applied to BeihangChain, a simplified prototype for BC system, illustrates that its transaction processing speed could be improved to 16K transaction per second which could well supportmany real-world scenarios such as BC-based energy trading system andMicro-film copyright trading system in CCTV.

Keywords blockchain      concurrency      performance      dualchannel model      parallel pipeline      consensus algorithm     
Corresponding Author(s): Hui ZHANG   
Just Accepted Date: 09 February 2018   Online First Date: 04 September 2018    Issue Date: 19 July 2019
 Cite this article:   
Libo FENG,Hui ZHANG,Wei-Tek TSAI, et al. System architecture for high-performance permissioned blockchains[J]. Front. Comput. Sci., 2019, 13(6): 1151-1165.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-018-6345-4
https://academic.hep.com.cn/fcs/EN/Y2019/V13/I6/1151
1 J Garay, A Kiayias, N Leonardos. The bitcoin backbone protocol: analysis and applications. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2015, 281–310
https://doi.org/10.1007/978-3-662-46803-6_10
2 T Florian, S Björn. Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Communications Surveys and Tutorials, 2016, 18(3): 2084–2123
https://doi.org/10.1109/COMST.2016.2535718
3 W T Tsai, R Blower, Y Zhu. A system view of financial blockchains. In: Proceedings of IEEE Service-Oriented System Engineering. 2016, 450–457
https://doi.org/10.1109/SOSE.2016.66
4 W T Tsai, L B Feng, H Zhang. Intellectual-property blockchain-based protection model for microfilms. In: Proceedings of IEEE Service- Oriented System Engineering. 2017, 174–178
https://doi.org/10.1109/SOSE.2017.35
5 G Danezis, S Meiklejohn. Centrally banked cryptocurrencies. In: Proceedings of ISOC Network and Distributed System Security Symposium. 2016, 1–14
https://doi.org/10.14722/ndss.2016.23187
6 M Coeckelbergh, W Reijers. Cryptocurrencies as narrative technologies. In: Proceedings of ACM SIGCAS Computers and Society, 2015, 172–178
7 P Koshy, D Koshy, P McDaniel. An analysis of anonymity in bitcoin using P2P network traffic. In: Proceedings of International Conference on Financial Cryptography and Data Security. 2014, 469–483
8 B Preneel. Cryptographic hash functions. Transactions on Emerging Telecommunications Technologies, 1994, 5(4): 431–448
https://doi.org/10.1002/ett.4460050406
9 E B Sasson, A Chiesa, C Garman. Zerocash: decentralized anonymous payments from bitcoin. In: Proceedings of the IEEE Symposium on Security and Privacy. 2014, 459–474
https://doi.org/10.1109/SP.2014.36
10 G D Hoang, K N Wee. Blockchain-based system for secure data storage with private keyword search. In: Proceedings of IEEEWorld Congress on Services. 2017, 90–93
11 C Decker, J Seidel, R Wattenhofer. Bitcoin meets strong consistency. In: Proceedings of the 17th International Conference on Distributed Computing and Networking. 2016, 13–21
https://doi.org/10.1145/2833312.2833321
12 D Kraft. Difficulty control for blockchain-based consensus systems. Peer-to-Peer Networking and Applications, 2016, 9(2): 397–413
https://doi.org/10.1007/s12083-015-0347-x
13 A Maurer, S Tixeuil. Self-stabilizing byzantine broadcast. In: Proceedings of International Symposium on Reliable Distributed Systems. 2014, 152–160
https://doi.org/10.1109/SRDS.2014.10
14 J H Ziegeldorf, J Henrik, F Grossmann. Coinparty: secure multi-party mixing of bitcoins. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. 2015, 75–86
https://doi.org/10.1145/2699026.2699100
15 V Hooff, M Kaashoek, N Zeldovich. Versum: verifiable computations over large public logs. In: Proceedings of the 2014 ACMSIGSAC Conference on Computer and Communications Security. 2014, 1304–1316
16 Y Lewenberg, Y Sompolinsky, A Zohar. Inclusive blockchain protocols. In: Proceedings of International Conference on Financial Cryptography and Data Security. 2015, 528–547
https://doi.org/10.1007/978-3-662-47854-7_33
17 V Buterin. A next-generation smart contract and decentralized application platform. White Paper, 2014, 1–36
18 I Sarr, H Naacke, I Gueye. Blockchain-based model for social transactions processing. In: Proceedings of the 4th International Conference on Data Management Technologies and Applications. 2015, 309–315
https://doi.org/10.5220/0005519503090315
19 V L Lemieux. Trusting records: is blockchain technology the answer? Records Management Journal, 2016, 26(2): 110–139
https://doi.org/10.1108/RMJ-12-2015-0042
20 S T Ali, P McCorry, P H J Lee, H Feng. Zombiecoin: powering nextgeneration botnets with bitcoin. In: Proceedings of International Conference on Financial Cryptography and Data Security. 2015, 34–48
https://doi.org/10.1007/978-3-662-48051-9_3
21 Y Zhang, J T Wen. An IoT electric business model based on the protocol of bitcoin. In: Proceedings of the 18th International Conference on Intelligence in Next Generation Networks. 2015, 184–191
https://doi.org/10.1109/ICIN.2015.7073830
22 J Herrera-Joancomartí, C Pérez-Solà. Privacy in bitcoin transactions: new challenges from blockchain scalability solutions. In: Proceedings of International Conference on Modeling Decisions for Artificial Intelligence. 2016, 26–44
23 R Pass, L Seeman, A Shelat. Analysis of the blockchain protocol in asynchronous networks. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2016, 643–673
24 J E Pazmiño, C K S Rodrigues. Simply dividing a bitcoin network node may reduce transaction verification time. The SIJ Transactions on Computer Networks & Communication Engineering, 2015, 3(2): 17–21
25 D Ron, A Shamir. Quantitative analysis of the full bitcoin transaction graph. In: Proceedings of International Conference on Financial Cryptography and Data Security. 2013, 6–24
https://doi.org/10.1007/978-3-642-39884-1_2
26 Y Sompolinsky, A Zohar. Secure high-rate transaction processing in bitcoin. In: Proceedings of International Conference on Financial Cryptography and Data Security. 2015, 507–527
https://doi.org/10.1007/978-3-662-47854-7_32
27 I Eyal, A E Gencer, E G Sirer. Bitcoin-NG: a scalable blockchain protocol. In: Proceedings of USENIX Symposium on Networked Systems Design and Implementation. 2016, 45–59
28 E D Zamani, K N Kypriotaki, G M Giaglis. From bitcoin to decentralized autonomous corporations extending the application scope of decentralized peer-to-peer networks and blockchains. In: Proceedings of the 18th International Conference on Enterprise Information Systems. 2015, 284–290
29 E Heilman, F Baldimtsi, S Goldberg. Blindly signed contracts: anonymous on-blockchain and off-blockchain bitcoin transactions. In: Proceedings of International Conference on Financial Cryptography and Data Security. 2016, 43–60
https://doi.org/10.1007/978-3-662-53357-4_4
30 V Buterin, J Coleman, M Wampler-Doty. Notes on scalable blockchain protocols. Ethereum Foundation, 2015, 31
31 M Vukolíc. The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Proceedings of International Workshop on Open Problems in Network Security. 2015, 112–125
32 I Bentov. C Lee, A Mizrahi. Proof of activity: extending bitcoin’s proof of work via proof of stake. ACM SIGMETRICS Performance Evaluation Review, 2014, 42(3): 34–37
https://doi.org/10.1145/2695533.2695545
33 M Castro, B Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems, 2002, 20(4): 398–461
https://doi.org/10.1145/571637.571640
34 L Lamport, D Malkhi, L Zhou. Vertical paxos and primary-backup replication. In: Proceedings of the 28th ACM Symposium on Principles of Distributed Computing. 2009, 312–313
https://doi.org/10.1145/1582716.1582783
35 R Dennis, G Owen. Rep on the block: a next generation reputation system based on the blockchain. In: Proceedings of International Conference on Internet Technology and Secured Transactions. 2015, 131–138
https://doi.org/10.1109/ICITST.2015.7412073
36 J Herbert, A Litchfield. A novel method for decentralized peer-to-peer software license validation using cryptocurrency blockchain technology. In: Proceedings of the 38th Australasian Computer Science Conference. 2015, 27–35
[1] Zeli WANG, Hai JIN, Weiqi DAI, Kim-Kwang Raymond CHOO, Deqing ZOU. Ethereum smart contract security research: survey and future research opportunities[J]. Front. Comput. Sci., 2021, 15(2): 152802-.
[2] Jian SUN, Pu-Feng DU. Predicting protein subchloroplast locations: the 10th anniversary[J]. Front. Comput. Sci., 2021, 15(2): 152901-.
[3] Jiangfan LI, Chendie YAO, Junxu XIA, Deke GUO. Guaranteeing the response deadline for general aggregation trees[J]. Front. Comput. Sci., 2020, 14(6): 146504-.
[4] Yuling MA, Chaoran CUI, Jun YU, Jie GUO, Gongping YANG, Yilong YIN. Multi-task MIML learning for pre-course student performance prediction[J]. Front. Comput. Sci., 2020, 14(5): 145313-.
[5] Samuel IRVING, Bin LI, Shaoming CHEN, Lu PENG, Weihua ZHANG, Lide DUAN. Computer comparisons in the presence of performance variation[J]. Front. Comput. Sci., 2020, 14(1): 21-41.
[6] Tianyong WU, Xi DENG, Jun YAN, Jian ZHANG. Analyses for specific defects in Android applications: a survey[J]. Front. Comput. Sci., 2019, 13(6): 1210-1227.
[7] Yu ZHANG, Yuxing HAN, Jiangtao WEN. SMER: a secure method of exchanging resources in heterogeneous internet of things[J]. Front. Comput. Sci., 2019, 13(6): 1198-1209.
[8] Yan ZHU, Khaled RIAD, Ruiqi GUO, Guohua GAN, Rongquan FENG. New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain[J]. Front. Comput. Sci., 2019, 13(6): 1182-1197.
[9] Lian YU, Wei-Tek TSAI. State synchronization in process-oriented chaincode[J]. Front. Comput. Sci., 2019, 13(6): 1166-1181.
[10] Linjun MEI, Dan FENG, Lingfang ZENG, Jianxi CHEN, Jingning LIU. Exploiting flash memory characteristics to improve performance of RAIS storage systems[J]. Front. Comput. Sci., 2019, 13(5): 913-928.
[11] Xiaodong MENG, Chentao WU, Minyi GUO, Long ZHENG, Jingyu ZHANG. PAM: an efficient power-aware multilevel cache policy to reduce energy consumption of storage systems[J]. Front. Comput. Sci., 2019, 13(4): 850-863.
[12] Thierry GAUTIER, Clément GUY, Alexandre HONORAT, Paul LE GUERNIC, Jean-Pierre TALPIN, Loïc BESNARD. Polychronous automata and their use for formal validation of AADL models[J]. Front. Comput. Sci., 2019, 13(4): 677-697.
[13] Jingyu ZHANG, Chentao WU, Dingyu YANG, Yuanyi CHEN, Xiaodong MENG, Liting XU, Minyi GUO. HSCS: a hybrid shared cache scheduling scheme for multiprogrammed workloads[J]. Front. Comput. Sci., 2018, 12(6): 1090-1104.
[14] Diming ZHANG, Fei XUE, Hao HUANG, Shaodi YOU. VBMq: pursuit baremetal performance by embracing block I/O parallelism in virtualization[J]. Front. Comput. Sci., 2018, 12(5): 873-886.
[15] Hai WANG, Shao-Bo WANG, Yu-Feng LI. Instance selection method for improving graph-based semi-supervised learning[J]. Front. Comput. Sci., 2018, 12(4): 725-735.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed