{"title":"Taxonomy and Universal Success Parameters of Token Models in Distributed Ledger Systems","authors":"Philip Toepffer, Dirk Thatmann","doi":"10.1109/BRAINS49436.2020.9223298","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223298","url":null,"abstract":"Token models introduced by Distributed Ledger Systems (DLS) such as Bitcoin or Ethereum enabled a fundamental shift in the economic structures of our society. This led not only to a large number of different token models but also to a multitude of development strategies for them. However, only a few of existing tokens proved a significant success on the market. The reason for that is a missing unified understanding of parameters required for success and the lack of standardization in token economics in general. This paper derives a unified token economics taxonomy considering regulatory authorities, practitioners, and academics. The taxonomy encompasses five dimensions which are essential for classifying token economics. Finally, this work derives eight universal success parameters of a token model and in a broader sense of DLS. The clear taxonomy and parameters will enable a more efficient and expedient approach for token development.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain brings confidence to facilitate the flow of data in the agricultural field","authors":"L. Topart, Philippe Genestier, Yvan Picaud","doi":"10.1109/BRAINS49436.2020.9223315","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223315","url":null,"abstract":"In our digital world, farms are connected and produce more and more data. This source of data can be a precious input to address challenges of multi-performance agriculture. Beyond the services provided, access to farmers’ data depends on a clear understanding of their use, which must be done in a transparent way. Several codes of conduct at a national or international level push for a voluntary commitment to respect some good practices in the use of agricultural data. To provide a tool and answer farmer’s questions on the control of their data and the transparency of the data processing, we have designed an interoperable ecosystem of farmer consents management based on Blockchain, protecting farmers from no consented uses of their data.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131146506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuxi Cai, G. Fragkos, Eirini-Eleni Tsiropoulou, A. Veneris
{"title":"A Truth-Inducing Sybil Resistant Decentralized Blockchain Oracle","authors":"Yuxi Cai, G. Fragkos, Eirini-Eleni Tsiropoulou, A. Veneris","doi":"10.1109/BRAINS49436.2020.9223272","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223272","url":null,"abstract":"Many blockchain applications use decentralized oracles to trustlessly retrieve external information as those platforms are agnostic to real-world information. Some existing decentralized oracle protocols make use of majority-voting schemes to determine the outcomes and/or rewards to participants. In these cases, the awards (or penalties) grow linearly to the participant stakes, therefore voters are indifferent between voting through a single or multiple identities. Furthermore, the voters receive a reward only when they agree with the majority outcome, a tactic that may lead to herd behavior. This paper proposes an oracle protocol based on peer prediction mechanisms with non-linear staking rules. In the proposed approach, instead of being rewarded when agreeing with a majority outcome, a voter receives awards when their report achieves a relatively high score based on a peer prediction scoring scheme. The scoring scheme is designed to be incentive compatible so that the maximized expected score is achieved only with honest reporting. A non-linear stake scaling rule is proposed to discourage Sybil attacks. This paper also provides a theoretical analysis and guidelines for implementation as reference.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133197306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Soumya Purohit, P. Calyam, Songjie Wang, RajaniKanth Yempalla, Justin Varghese
{"title":"DefenseChain: Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense","authors":"Soumya Purohit, P. Calyam, Songjie Wang, RajaniKanth Yempalla, Justin Varghese","doi":"10.1109/BRAINS49436.2020.9223313","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223313","url":null,"abstract":"Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent threats, cryptojacking which threaten service availability. Recently, methods for threat information sharing and defense require co-operation and trust between multiple domains/entities. There is a need for mechanisms that establish distributed trust to allow for such a collective defense. In this paper, we present a novel threat intelligence sharing and defense system, namely “DefenseChain”, to allow organizations to have incentive-based and trustworthy co-operation to mitigate the impact of cyber attacks. Our solution approach features a consortium Blockchain platform to obtain threat data and select suitable peers to help with attack detection and mitigation. We propose an economic model for creation and sustenance of the consortium with peers through a reputation estimation scheme that uses ‘Quality of Detection’ and ‘Quality of Mitigation’ metrics. Our evaluation experiments with DefenseChain implementation are performed on an Open Cloud testbed with Hyperledger Composer and in a simulation environment. Our results show that the DefenseChain system overall performs better than state-of-the-art decision making schemes in choosing the most appropriate detector and mitigator peers. In addition, we show that our DefenseChain achieves better performance trade-offs in terms of metrics such as detection time, mitigation time and attack reoccurence rate. Lastly, our validation results demonstrate that our DefenseChain can effectively identify rational/irrational service providers.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moritz Platt, F. Pierangeli, G. Livan, Simone Righi
{"title":"Facilitating the Decentralised Exchange of Cryptocurrencies in an Order-Driven Market","authors":"Moritz Platt, F. Pierangeli, G. Livan, Simone Righi","doi":"10.1109/BRAINS49436.2020.9223286","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223286","url":null,"abstract":"This article discusses a protocol to facilitate decentralised exchanges on an order-driven market through a consortium of market services operators. We discuss whether this hybrid protocol combining a centralised initiation phase with a decentralised execution phase outperforms fully centralised exchanges with regards to efficiency and security. Here, a fully efficient and fully secure protocol is defined as one where traders incur no trading costs or opportunity costs and counterparty risk is absent. We devise a protocol addressing the main downsides in the decentralised exchange process that uses a facilitating distributed ledger, maintains an order book and monitors the order status in real-time to provide accurate exchange rate information and performance scoring of participants. We show how performance ratings can lower opportunity costs and how a rolling benchmark rate of verifiable trades can be used to establish a trustworthy exchange rate between cryptocurrencies. The formal validation of the proposed technical mechanisms is the subject of future work.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115369653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterizing relationships between primary miners in Ethereum by analyzing on-chain transactions","authors":"Daniel Rincon Silva","doi":"10.1109/BRAINS49436.2020.9223303","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223303","url":null,"abstract":"It is widely accepted that Ethereum mining is highly centralized. Nonetheless, centralization has been mostly characterized by exclusively looking at the influence that independent miners or mining pools can have over the network. Moreover, models of mining behavior assume that miners are either unrelated or only relate via mining pools under highly structured and transparent agreements. If these assumptions and the predictions they entail were to be completely accurate, there would not be any evidence of on-chain transactions between miners, other than the ones expected from mining pool payouts. By looking at on-chain transactions between miners in the Ethereum Network we find that aside from the payouts from mining pools to small miners, there are also transactions that define relationships between mining pools, independent miners and between independent miners and mining pools. Furthermore, by characterizing the topology of the network of miner transactions, we find the emergence of highly connected clusters that control significant amounts of hashing power and exhibit relationships in the opposite direction of what theoretical models predict. This more nuanced characterization of mining centralization can help identify network vulnerabilities and inform protocol redesigns.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128440290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-IOTA: an efficient and fast metamorphism for IOTA","authors":"Gewu Bu, Wassim Hana, M. Potop-Butucaru","doi":"10.1109/BRAINS49436.2020.9223294","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223294","url":null,"abstract":"IOTA opened recently a new line of research in distributed ledgers area by targeting algorithms that ensure a high throughput for the transactions generated in IoT systems. Transactions are continuously appended to an acyclic structure called Tangle. Each new transaction selects and approves, as parents, two existing transactions who have not been approved yet (called Tips). Recent research indicates that, IOTA suffers from a Fairness Problem, where a part of submitted transactions might not be approved by new coming transactions. They are called Left-Behind transactions. Recently, G-IOTA has been proposed: by using the Left-Behind Protection mechanism, G-IOTA can fix the fairness problem. G-IOTA, however, needs additional computation resources for left-behind protection mechanism, which is not suitable for an energy-aware IoT system. Furthermore, both IOTA and G-IOTA suffer from a potential security defect. This side effect reduces the Unpredictability when transactions are appended to the tangle. Leaking the unpredictability, an adversary can easily induce the tendency of transactions appending to the tangle. This approach is called Prediction Attack. In this paper, we propose E-IOTA to solve the fairness problem and at the same time, guarantee the unpredictability of the tangle. Interestingly, our real scenario simulation shows that E-IOTA offers better performance efficiency compared to G-IOTA and even original IOTA. Simultaneously, E-IOTA retains the core data structure of IOTA, which makes E-IOTA be compatible with current IOTA implementation. Our solution can therefore be a perfect alternative solution for current IOTA.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process Scheduling of Personal Identity Verification on Decentralized Trust","authors":"Koki Inoue, Dai Suzuki, T. Kurita, Satoshi Imai","doi":"10.1109/BRAINS49436.2020.9223301","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223301","url":null,"abstract":"Several working groups are coping with an ecosystem where a user manages his/her own digital identity (ID) information among different organizations or companies by decentralized manner. We have also been developing a platform for trustworthy ID exchange, named IDYX. In the platform, personal identity verification (PIV) process will be realized by verifying credentials about users’ information issued by other organizations. Thanks to that kind of the ID cooperation, the users can prove their ID online by using the credentials and will no longer need to take procedure for every organization when updating their ID information registered there. However, the organizations’ policies to identify a user and relationships among the organizations bring a complicated problem, that is, how to get a better schedule of ID cooperation around them. In this paper, we formulate the scheduling problem as an integer linear programming, and propose a heuristic method based on graph structure. Numerical experiments show that the heuristic approach has feasible scalability for practical use.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DMix: decentralized mixer for unlinkability","authors":"Fadi Barbàra, C. Schifanella","doi":"10.1109/BRAINS49436.2020.9223282","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223282","url":null,"abstract":"We present a protocol that lets participants operate a decentralized mixer to exchange coins in the Bitcoin blockchain. DMix does not need the election of any leader and respects both the unlinkability and the atomicity properties, so that there is no possibility to correlate addresses or lose funds using the protocol. We leverage the MuSig aggregate signatures. This aggregation scheme is based on the Schnorr signature scheme, a recent proposal for a ECDSA alternative, the current Bitcoin signature scheme. We also present an analysis of the method and mitigation of attacks.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134511784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI pedigree verification platform using blockchain","authors":"Yasutaka Kawamoto, Akihiro Kobayashi","doi":"10.1109/BRAINS49436.2020.9223307","DOIUrl":"https://doi.org/10.1109/BRAINS49436.2020.9223307","url":null,"abstract":"In order for AI to be accepted by society and become a social infrastructure technology, the ethical aspect of AI is also important in addition to the technical aspect of AI. This paper proposes “AI pedigree verification platform” to verify “what kind of data is used to train the AI model at hand”. Building such the system using an existing database system is problematic in terms of system availability and integrity of the registration content. Therefore, we constructed the proposed system using Hyperledger Fabric (HF), which is a blockchain infrastructure. In this way, the proposed system can ensure the availability of the system and the integrity of the registration content. To ensure the reproducibility of the AI model, the data items in the system were created based on the “Reproducibility list” proposed by authoritative society for AI. Since the integrity and reproducibility of the data in the blockchain can be ensured, this system enables automatic AI model generation using open data and automatic trading of AI models.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131740932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}