|
|
The governance technology for blockchain systems: a survey |
Guocheng ZHU1, Debiao HE1,2(), Haoyang AN1, Min LUO1, Cong PENG1 |
1. School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China 2. Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan 250014, China |
|
|
Abstract After the Ethereum DAO attack in 2016, which resulted in significant economic losses, blockchain governance has become a prominent research area. However, there is a lack of comprehensive and systematic literature review on blockchain governance. To deeply understand the process of blockchain governance and provide guidance for the future design of the blockchain governance model, we provide an in-depth review of blockchain governance. In this paper, first we introduce the consensus algorithms currently used in blockchain and relate them to governance theory. Second, we present the main content of off-chain governance and investigate two well-known off-chain governance projects. Third, we investigate four common on-chain governance voting techniques, then summarize the seven attributes that the on-chain governance voting process should meet, and finally analyze four well-known on-chain governance blockchain projects based on the previous research. We hope this survey will provide an in-depth insight into the potential development direction of blockchain governance and device future research agenda.
|
Keywords
blockchain governance
off-chain governance
on-chain governance
voting
|
Corresponding Author(s):
Debiao HE
|
About author: Peng Lei and Charity Ngina Mwangi contributed equally to this work. |
Just Accepted Date: 02 August 2023
Issue Date: 17 November 2023
|
|
1 |
Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, 2008, 2120
|
2 |
G Wood . Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014, 151: 1–32
|
3 |
S, Bhattacharya N, Victor R, Chengoden M, Ramalingam G C, Selvi P K R, Maddikunta P K, Donta S, Dustdar R H, Jhaveri T R Gadekallu . Blockchain for internet of underwater things: State-of-the-art, applications, challenges, and future directions. Sustainability, 2022, 14( 23): 15659
|
4 |
G N, Nguyen Viet N H, Le M, Elhoseny K, Shankar B B, Gupta A A A El-Latif . Secure blockchain enabled cyber–physical systems in healthcare using deep belief network with resnet model. Journal of Parallel and Distributed Computing, 2021, 153: 150–160
|
5 |
S, Rani H, Babbar G, Srivastava T R, Gadekallu G Dhiman . Security framework for internet-of-things-based software-defined networks using blockchain. IEEE Internet of Things Journal, 2023, 10( 7): 6074–6081
|
6 |
, Mamta B B, Gupta K C, Li V C M, Leung K E, Psannis S Yamaguchi . Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA Journal of Automatica Sinica, 2021, 8( 12): 1877–1890
|
7 |
B B, Gupta , Mamta R, Mehla W, Alhalabi H Alsharif . Blockchain technology with its application in medical and healthcare systems: a survey. International Journal of Intelligent Systems, 2022, 37( 11): 9798–9832
|
8 |
Lin J H, Primicerio K, Squartini T, Decker C, Tessone C J. Lightning network: a second path towards centralisation of the Bitcoin economy*. New Journal of Physics, 2020, 22(8): 083022
|
9 |
N Webb . A fork in the blockchain: income tax and the bitcoin/bitcoin cash hard fork. North Carolina Journal of Law & Technology, 2018, 19( 4): 283–311
|
10 |
Cash Bitcoin . Bitcoin cash. See bitcoincash website, 2019
|
11 |
Castillo M del . The DAO attacked: Code issue leads to $60 million ether theft. See baypayforumblockchain-coins/the-dao-attacked-code-issue-leads-to-60-million-ether-theft website, 2016
|
12 |
Classic Ethereum . Ethereum classic. Ethereum Classic. See ethereumclassic.github website, 2017
|
13 |
P Weill . DonâĂŹt just lead, govern: how top-performing firms govern it. MIS Quarterly Executive, 2004, 3( 1): 1–17
|
14 |
Posthumus S, Von Solms R. A framework for the governance of information security. Computers & security, 2004, 23(8): 638-646
|
15 |
Micheli M, Ponti M, Craglia M, Berti Suman A. Emerging models of data governance in the age of datafication. Big Data & Society, 2020, 7(2): 2053951720948087
|
16 |
Reddy S, Allan S, Coghlan S, Cooper P. A governance model for the application of AI in health care. Journal of the American Medical Informatics Association, 2020, 27(3): 491-497
|
17 |
Y, Liu Q, Lu L, Zhu H Y, Paik M Staples . A systematic literature review on blockchain governance. Journal of Systems and Software, 2023, 197: 111576
|
18 |
Y, Liu Q, Lu G, Yu H Y, Paik H, Perera L Zhu . A pattern collection for blockchain governance. 2022, arXiv preprint arXiv: 2203.00268
|
19 |
Y, Liu Q, Lu G, Yu H Y, Paik L Zhu . Defining blockchain governance principles: a comprehensive framework. Information Systems, 2022, 109: 102090
|
20 |
A, Kiayias P Lazos . SoK: blockchain governance. In: Proceedings of the 4th ACM Conference on Advances in Financial Technologies. 2022, 61−73
|
21 |
Pelt R, van S, Jansen D, Baars S Overbeek . Defining blockchain governance: A framework for analysis and comparison. Information Systems Management, 2021, 38( 1): 21–41
|
22 |
F, Schuh D Larimer . Bitshares 2.0: general overview. See cb-dev-platform-images.s3.eu-west-1.amazonaws.com/project/whitepaper/bitshares website, 2017
|
23 |
Duffield E, Diaz D. Dash: a privacy-centric crypto-currency. See exodus.com/assets/docs/dash-whitepaper website, 2015
|
24 |
Kim M S, Chung J Y. Sustainable growth and token economy design: the case of steemit. Sustainability, 2018, 11(1): 167
|
25 |
C Jepson . Dtb001: Decred technical brief. See decred.org/dtb001 website, 2015
|
26 |
L M Goodman . Tezos-a self-amending crypto-ledger white paper. See tezos.com/whitepaper website, 2014
|
27 |
Elrom E. EOS.IO Wallets and Smart Contracts. The Blockchain Developer, 2019, 213–256
|
28 |
I, Bentov C, Lee A, Mizrahi M Rosenfeld . Proof of activity: extending bitcoin’s proof of work via proof of stake [extended abstract]y. ACM SIGMETRICS Performance Evaluation Review, 2014, 42( 3): 34–37
|
29 |
Alves D. Proof-of-Concept (POC) of Restaurant’s food requests in the Lisk Blockchain/sidechain. Journal of Physics: Conference Series, 2021, 1828(1): 012110
|
30 |
Hanke T, Movahedi, M., Williams D. DFINITY technology overview series consensus system, 2018
|
31 |
T, Dursun B B Üstündağ . A novel framework for policy based on-chain governance of blockchain networks. Information Processing & Management, 2021, 58( 4): 102556
|
32 |
Pasquini R. Quadratic funding under constrained matching funds. SSRN Electronic Journal, 2020, doi: 10.2139/ssrn.3702318
|
33 |
Abdullah M A, Ibrahim M A R, Shapiee M N A, et al. The classification of skateboarding tricks via transfer learning pipelines, PeerJ Computer Science, 2021, 7: e680
|
34 |
Fan X, Chai Q, Zhong Z. MULTAV: a multi-chain token backed voting framework for decentralized blockchain governance. In: Proceedings of the 3rd International Conference on Blockchain. 2020, 33−47
|
35 |
Merrill P, Austin T H, Rietz J, Pearce J. Ping-pong governance: token locking for enabling blockchain self-governance. In: Proceedings of the 1st Mathematical Research for Blockchain Economy. 2020, 13−29
|
36 |
T, Groves J O Ledyard . Some limitations of demand revelaing processes. Public Choice, 1977, 29( 2): 107–124
|
37 |
Berg A, Berg C, Novak M. Crypto Public Choice. SSRN Electronic Journal, 2018, doi: 10.2139/ssrn.3236025
|
38 |
E A, Posner E G Weyl . Quadratic voting and the public good: introduction. Public Choice, 2017, 172( 1): 1–22
|
39 |
E G Weyl . The robustness of quadratic voting. Public Choice, 2017, 172( 1): 75–107
|
40 |
Demers A, Greene D, Hauser C, Irish W, Larson J, Shenker S, Sturgis H, Swinehart D, Terry D. Epidemic algorithms for replicated database maintenance. In: Proceedings of the 6th Annual ACM Symposium on Principles of Distributed Computing. 1987, 1−12
|
41 |
M, Becze H Jameson . Eip-1: Eip purpose and guidelines. See eips.ethereum.org/EIPS/eip-1 website, 2015
|
42 |
D L Chaum . Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 1981, 24( 2): 84–90
|
43 |
D, Chaum Heyst E van . Group signatures. In: Proceedings of Workshop on the Theory and Application of of Cryptographic Techniques. 1991, 257−265
|
44 |
R L, Rivest A, Shamir Y Tauman . How to leak a secret. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 552−565
|
45 |
O, Kulyk S, Neumann K, Marky J, Budurushi M Volkamer . Coercion-resistant proxy voting. Computers & Security, 2017, 71: 88–99
|
46 |
Clarkson M R, Chong S, Myers A C. Civitas: toward a secure voting system. In: Proceedings of 2008 IEEE Symposium on Security and Privacy (sp 2008). 2008, 354−368
|
47 |
Zhao C, Zhao S, Zhao M et al. Secure multi-party computation: theory, practice and applications. Information Sciences, 2019, 476: 357-372
|
48 |
Allombert V, Bourgoin M, Tesson J. Introduction to the Tezos blockchain. In: Proceedings of 2019 International Conference on High Performance Computing & Simulation (HPCS). 2019, 1-10
|
49 |
M H, Everts F Muller . Will that smart contract really do what you expect it to do?. Groningen: TNO, 2018
|
50 |
Khan N, Kchouri B, Yatoo N A, Kräussl Z, Patel A, State R. Tokenization of sukuk: Ethereum case study. Global Finance Journal, 2022, 51: 100539
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|