Proposing 2-tier Architecture for Permission-ed and Permission-less Blockchain Consensus Algorithms Based on Voting System

M. Khalid, Mohsin Murtaza, A. Saeed, M. Raza
{"title":"Proposing 2-tier Architecture for Permission-ed and Permission-less Blockchain Consensus Algorithms Based on Voting System","authors":"M. Khalid, Mohsin Murtaza, A. Saeed, M. Raza","doi":"10.1109/CITISIA50690.2020.9371832","DOIUrl":null,"url":null,"abstract":"With the rapid use of internet technology, security and performance are always at risk. The data on the internet can be compromised and the performance can be bottlenecked. The solution to this problem is the blockchain technology. Reason for choosing this field is because blockchain is a new technology and now it is one of the most demanding field in the IT sector. Blockchain is based on peer-to-peer topology containing connected nodes. Each node has cryptographic hash of the previous node (no malicious or unauthorized node can enter the linked nodes), timestamp and relevant data. Blockchain provides resistance against the unwanted interference and modification of the data and each node has separate processing power thus enhancing security and performance of the host network. Permission-ed and Permission-less blockchain have their own properties and limitations and they can be used in different scenarios. In permission-less blockchain the nodes can be public, anyone can add nodes to increase the performance (Bitcoin), while permission-ed blockchain is used within enterprise or between enterprises where the nodes are private and new nodes need authorization to be added in link nodes. The aim of this paper is to study the permission-ed and permission less blockchain, their similarities and differences, some of the consensus algorithms they use. Outcome of the paper will be understanding of some of the consensus algorithms and proposing a two-tier architecture which will contain voting based algorithm for enhanced performance.","PeriodicalId":145272,"journal":{"name":"2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA)","volume":"7 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CITISIA50690.2020.9371832","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the rapid use of internet technology, security and performance are always at risk. The data on the internet can be compromised and the performance can be bottlenecked. The solution to this problem is the blockchain technology. Reason for choosing this field is because blockchain is a new technology and now it is one of the most demanding field in the IT sector. Blockchain is based on peer-to-peer topology containing connected nodes. Each node has cryptographic hash of the previous node (no malicious or unauthorized node can enter the linked nodes), timestamp and relevant data. Blockchain provides resistance against the unwanted interference and modification of the data and each node has separate processing power thus enhancing security and performance of the host network. Permission-ed and Permission-less blockchain have their own properties and limitations and they can be used in different scenarios. In permission-less blockchain the nodes can be public, anyone can add nodes to increase the performance (Bitcoin), while permission-ed blockchain is used within enterprise or between enterprises where the nodes are private and new nodes need authorization to be added in link nodes. The aim of this paper is to study the permission-ed and permission less blockchain, their similarities and differences, some of the consensus algorithms they use. Outcome of the paper will be understanding of some of the consensus algorithms and proposing a two-tier architecture which will contain voting based algorithm for enhanced performance.
提出基于投票系统的有权限和无权限区块链共识算法的两层架构
随着互联网技术的快速使用,安全性和性能始终处于危险之中。互联网上的数据可能会受到损害,性能可能会受到瓶颈。这个问题的解决方案是区块链技术。选择这个领域的原因是因为区块链是一项新技术,现在它是it行业中要求最高的领域之一。区块链基于点对点拓扑,包含连接的节点。每个节点都有前一个节点的加密哈希值(任何恶意或未经授权的节点都不能进入链接节点)、时间戳和相关数据。区块链提供了对不必要的干扰和数据修改的抵抗力,每个节点都有单独的处理能力,从而增强了主机网络的安全性和性能。Permission-ed和Permission-less区块链有各自的属性和限制,可以在不同的场景中使用。在无权限区块链中,节点可以是公共的,任何人都可以添加节点来提高性能(比特币),而有权限区块链用于企业内部或企业之间,其中节点是私有的,新节点需要在链路节点中添加授权。本文的目的是研究有权限的和无权限的区块链,它们的异同,以及它们使用的一些共识算法。本文的结果将是理解一些共识算法,并提出一个两层架构,该架构将包含基于投票的算法,以提高性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信