Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3289166.3289169acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaintecConference Proceedingsconference-collections
research-article

Mitigating Bitcoin Node Storage Size By DHT

Published: 12 November 2018 Publication History

Abstract

A type of Bitcoin node called "Full Node" has to hold the entire of historical transaction data called "Blockchain" to verify that new transactions are correct or not. To operate nodes as Full Nodes, the required storage size will be too large for resource-constrained devices. In this paper, to mitigate storage size, we propose a storage load balancing scheme by distributed storage based on Distributed Hash Table (DHT). By our scheme, nodes in a DHT cluster can behave like Full Nodes without holding the entire of the blockchain.

References

[1]
Maria Apostolaki, Gian Marti, Jan Müller, and Laurent Vanbever. 2018. SABRE: Protecting Bitcoin against Routing Attacks. (Aug 2018). arXiv:1808.06254 http://arxiv.org/abs/1808.06254
[2]
Massimo Bartoletti, Stefano Lande, Livio Pompianu, and Andrea Bracciali. 2017. A general framework for blockchain analytics. In Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers - SERIAL '17. ACM Press, New York, New York, USA, 1--6.
[3]
Bitcoin.org. 2018. Bitcoin Core. https://github.com/bitcoin/bitcoin
[4]
Bitcoin.org. 2018. Bitcoin wiki - Transaction. https://en.bitcoin.it/wiki/Transaction
[5]
Bitcoin.org. 2018. Simplified Payment Verification (SPV). https://bitcoin.org/en/developer-guide#simplified-payment-verification-spv
[6]
James C. Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, J. J. Furman, Sanjay Ghemawat, Andrey Gubarev, Christopher Heiser, Peter Hochschild, Wilson Hsieh, Sebastian Kanthak, Eugene Kogan, Hongyi Li, Alexander Lloyd, Sergey Melnik, David Mwaura, David Nagle, Sean Quinlan, Rajesh Rao, Lindsay Rolig, Yasushi Saito, Michal Szymaniak, Christopher Taylor, Ruth Wang, and Dale Woodford. 2013. Spanner: Google's Globally Distributed Database. ACM Transactions on Computer Systems (TOCS) 31, 3 (2013), 8.
[7]
Russ Cox, Athicha Muthitacharoen, and Robert T. Morris. 2002. Serving DNS Using a Peer-to-Peer Lookup Service. (2002), 155--165.
[8]
F. Dabek, E. Brunskill, M.F. Kaashoek, D. Karger, R. Morris, I. Stoica, and H. Balakrishnan. 2001. Building peer-to-peer systems with chord, a distributed lookup service. In Proceedings Eighth Workshop on Hot Topics in Operating Systems. IEEE Comput. Soc, Elmau, Germany, 81--86.
[9]
Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica. 2001. Wide-area cooperative storage with CFS. In Proceedings of the eighteenth ACM symposium on Operating systems principles - SOSP '01, Vol. 35. ACM Press, New York, New York, USA, 202.
[10]
Coin Dance. 2018. Bitcoin Block Details. https://coin.dance/blocks
[11]
Coin Dance. 2018. Bitcoin Nodes Summary. https://coin.dance/nodes/all
[12]
Christian Decker and Roger Wattenhofer. 2013. Information propagation in the Bitcoin network. In IEEE P2P 2013 Proceedings. IEEE, Trento, Italy, 1--10.
[13]
Ali Dorri, Salil S Kanhere, and Raja Jurdak. 2017. Towards an optimized blockchain for IoT. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. ACM, ACM, Pittsburgh, PA, USA, 173--178.
[14]
Ali Dorri, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram. 2017. Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 618--623.
[15]
Ali Dorri, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram. 2017. LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy. (Dec 2017). arXiv:1712.02969 http://arxiv.org/abs/1712.02969
[16]
Ali Dorri, Marco Steger, Salil S. Kanhere, and Raja Jurdak. 2017. BlockChain: A Distributed Solution to Automotive Security and Privacy. IEEE Communications Magazine 55, 12 (Dec 2017), 119--125.
[17]
Ethereum Foundation. 2018. ethereum/sharding docs. https://github.com/ethereum/sharding/blob/master/docs/doc.md
[18]
Davide Frey, Marc X. Makkes, Pierre-Louis Roman, François Taïani, and Spyros Voulgaris. 2016. Bringing secure Bitcoin transactions to your smartphone. In Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware - ARM 2016. ACM Press, New York, New York, USA, 1--6.
[19]
Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin Gün Sirer. 2018. Decentralization in Bitcoin and Ethereum Networks. (Jan 2018). arXiv:1801.03998 http://arxiv.org/abs/1801.03998
[20]
Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the Security and Performance of Proof of Work Blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS' 16. ACM, Vienna, Austria.
[21]
Jinyano Li, J. Stribling, R. Morris, M.F. Kaashock, and T.A. Gil. 2005. A performance vs. cost framework for evaluating DHT design tradeoffs under churn. In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., Vol. 1. IEEE, 225--236.
[22]
David Karger, Eric Lehman, Tom Leighton, Rina Panigrahy, Matthew Levine, and Daniel Lewin. 1997. Consistent hashing and random trees. In Proceedings of the twenty-ninth annual ACM symposium on Theory of computing - STOC '97. ACM Press, New York, New York, USA, 654--663.
[23]
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, and Bryan Ford. 2017. OmniLedger: A Secure, Scale-Out, Decentralized Ledger. IACR Cryptology ePrint Archive 2017 (2017), 406. https://allquantor.at/blockchainbib/pdf/kokoris2017omniledger.pdf
[24]
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, and Bryan Ford. 2017. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding. (2017). https://eprint.iacr.org/2017/406.pdf
[25]
Salma Ktari, Mathieu Zoubert, Artur Hecker, and Houda Labiod. 2007. Performance evaluation of replication strategies in DHTs under churn. In Proceedings of the 6th international conference on Mobile and ubiquitous multimedia - MUM '07. ACM Press, New York, New York, USA, 90--97.
[26]
Olaf Landsiedel, Stefan Götz, and Klaus Wehrle. 2006. A churn and mobility resistant approach for DHTs. In Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking - MobiShare 06. ACM Press, New York, New York, USA, 42.
[27]
Apostolaki Maria, Zohar Aviv, and Vanbever Laurent. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In IEEE Symposium on Security and Privacy (SP) 2017. IEEE, IEEE, SANJOSE, CA.
[28]
Petar Maymounkov and David Mazières. 2002. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. (2002), 53--65.
[29]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008). https://bitcoin.org/bitcoin.pdf
[30]
V. Pappas, D. Massey, A. Terzis, and L. Zhang. 2006. A Comparative Study of the DNS Design with DHT-Based Alternatives. In Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. IEEE, Barcelona Spain, 1--13.
[31]
Venugopalan Ramasubramanian, Emin Gün Sirer, Venugopalan Ramasubramanian, and Emin Gün Sirer. 2004. The design and implementation of a next generation name service for the internet. In Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '04, Vol. 34. ACM Press, New York, New York, USA, 331.
[32]
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Schenker. 2001. A scalable content-addressable network. In Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '01, Vol. 31. ACM Press, New York, New York, USA, 161--172.
[33]
Antony Rowstron and Peter Druschel. 2001. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. (Nov 2001), 329--350.
[34]
Kazuyuki Shudo, Yoshio Tanaka, and Satoshi Sekiguchi. 2008. Overlay Weaver: An overlay construction toolkit. Computer Communications 31, 2 (Feb 2008), 402--412.
[35]
I. Stoica, R. Morris, D. Liben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, and H. Balakrishnan. 2003. Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking 11, 1 (Feb 2003), 17--32.
[36]
Nitin Varyani, Nikhil S., and Virendra S. Shekhawat. 2016. Latency and Routing Efficiency Based Metric for Performance Comparison of DHT Overlay Networks. In 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, Crans-Montana, Switzerland, 337--342.
[37]
Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014), 1--32. http://www.cryptopapers.net/papers/ethereum-yellowpaper.pdf

Cited By

View all
  • (2024)An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret SharingEntropy10.3390/e2608069026:8(690)Online publication date: 15-Aug-2024
  • (2024)Clustering-Based Collaborative Storage for Blockchain in IoT SystemsIEEE Internet of Things Journal10.1109/JIOT.2024.343458311:20(33847-33860)Online publication date: 15-Oct-2024
  • (2024)nPPoS: Non-interactive Practical Proof-of-Storage for BlockchainBlockchain: Research and Applications10.1016/j.bcra.2024.100221(100221)Online publication date: Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
AINTEC '18: Proceedings of the 14th Asian Internet Engineering Conference
November 2018
69 pages
ISBN:9781450361316
DOI:10.1145/3289166
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 November 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Bitcoin
  2. Blockchain
  3. Distributed Hash Table
  4. Storage

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AINTEC '18
AINTEC '18: ASIAN INTERNET ENGINEERING CONFERENCE
November 12 - 14, 2018
Bangkok, Thailand

Acceptance Rates

AINTEC '18 Paper Acceptance Rate 8 of 21 submissions, 38%;
Overall Acceptance Rate 15 of 38 submissions, 39%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)4
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret SharingEntropy10.3390/e2608069026:8(690)Online publication date: 15-Aug-2024
  • (2024)Clustering-Based Collaborative Storage for Blockchain in IoT SystemsIEEE Internet of Things Journal10.1109/JIOT.2024.343458311:20(33847-33860)Online publication date: 15-Oct-2024
  • (2024)nPPoS: Non-interactive Practical Proof-of-Storage for BlockchainBlockchain: Research and Applications10.1016/j.bcra.2024.100221(100221)Online publication date: Jul-2024
  • (2024)Trustworthy Autonomous All-Domain Access Control TechnologyKey Technologies for On-Demand 6G Network Services10.1007/978-3-031-70606-6_6(121-161)Online publication date: 26-Sep-2024
  • (2023)MapChain-D: A Distributed Blockchain for IIoT Data Storage and CommunicationsIEEE Transactions on Industrial Informatics10.1109/TII.2023.323463119:9(9766-9776)Online publication date: Sep-2023
  • (2023)Optimizing Read Performance in Lightweight Blockchain with Cooperative Storage Scheme2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)10.1109/BCCA58897.2023.10338901(150-157)Online publication date: 24-Oct-2023
  • (2023)Blockchain-based Federated Learning for Decentralized Energy Management Systems2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)10.1109/BCCA58897.2023.10338852(186-193)Online publication date: 24-Oct-2023
  • (2022)Blockchain Fragment Expansion Scheme Based on Community Detection and MSR CodeProceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition10.1145/3573942.3574005(1146-1152)Online publication date: 23-Sep-2022
  • (2022)A Study on Blockchain Architecture Design Decisions and Their Security Attacks and ThreatsACM Transactions on Software Engineering and Methodology10.1145/350274031:2(1-45)Online publication date: 1-Apr-2022
  • (2022)Accelerating State Synchronization in Bitcoin Combining Secure Snapshot with IPFS2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00100(739-746)Online publication date: Dec-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media