CMSS: A High-Performance Blockchain Storage System with Horizontal Scaling Support DOI Open Access

Wenjin Yang,

Meng Ao,

Mingzhi Gao

et al.

Electronics, Journal Year: 2024, Volume and Issue: 13(10), P. 1854 - 1854

Published: May 10, 2024

As a decentralized system, blockchain has been widely used in numerous areas and become hot topic both industry academia. The increasing demand for causes heavy storage consumption which seriously affects the performance of blockchain, especially context massive volumes data. To solve these problems, many related systems like sharding sidechain have proposed to improve efficiency scalability blockchain. However, practical deployment scenarios, still such as low read–write performance, reorganization synchronization ledger data after expansion, cause system’s expansion difficult time-consuming large-scale systems. Facing this paper we propose ChainMaker Storage System (CMSS). CMSS is system with high read-and-write horizontal scaling support. It most popular permissioned ChainMaker. There are three contributions our CMSS: (i) new block workflow achieve performance; (ii) Meta File (MFS) support storage; (iii) hot–cold separation reduce resource usage economic costs. evaluate CMSS, compare Hyperledger Fabric (HLF), platform. We select five well-known cloud service providers calculate cost real production environment. results show that better read write than HLF advantages capacity price.

Language: Английский

Secure blockchain-based reputation system for IIoT-enabled retail industry with resistance to sybil attack DOI
Wenjia Zhao, Yang Xu, Saiyu Qi

et al.

Future Generation Computer Systems, Journal Year: 2025, Volume and Issue: unknown, P. 107705 - 107705

Published: Jan. 1, 2025

Language: Английский

Citations

2

RPL-based attack detection approaches in IoT networks: review and taxonomy DOI Creative Commons

Nadia A. Alfriehat,

Mohammed Anbar, Mohammad Adnan Aladaileh

et al.

Artificial Intelligence Review, Journal Year: 2024, Volume and Issue: 57(9)

Published: Aug. 12, 2024

The Routing Protocol for Low-Power and Lossy Networks (RPL) plays a crucial role in the Internet of Things (IoT) Wireless Sensor Networks. However, ensuring RPL protocol's security is paramount due to its susceptibility various attacks. These attacks disrupt data transmission can substantially damage network topology by depleting critical resources. This paper presents comprehensive survey addressing several key components response this challenge. Firstly, it categorizes potential targeting protocol based on their impact performance explores effective mechanisms secure against them. study identifies most destructive problematic threats affecting functionality. Furthermore, provides valuable insights into challenges discusses real-world implications deploying maintaining IoT sensor networks. To underscore uniqueness survey, we offer qualitative comparison with other surveys same field. While acknowledges certain limitations, such as intentionally focusing only reviewing RPL-specific attacks, reference future researchers seeking comprehend mitigate RPL. It also suggests areas further research domain.

Language: Английский

Citations

8

A Survey of Blockchain Applicability, Challenges, and Key Threats DOI Creative Commons

Catalin Daniel Morar,

Daniela Elena Popescu

Computers, Journal Year: 2024, Volume and Issue: 13(9), P. 223 - 223

Published: Sept. 6, 2024

With its decentralized, immutable, and consensus-based validation features, blockchain technology has grown from early financial applications to a variety of different sectors. This paper aims outline various the blockchain, systematically identify general challenges key threats regarding adoption. The are organized into even broader groups, allow clear overview identification interconnected issues. Potential solutions introduced discussion, addressing their possible ways mitigating these forward-looking effects in fostering adoption technology. also highlights some potential directions for future research that may overcome unlock further applications. More generally, article attempts describe transformational implications technology, through manner which it contribute advancement diversity industries.

Language: Английский

Citations

6

The real estate time-stamping and registration system based on Ethereum blockchain DOI Open Access
Liyuan Zhang,

Limian Ci,

Yonghong Wu

et al.

Blockchain Research and Applications, Journal Year: 2023, Volume and Issue: 5(1), P. 100175 - 100175

Published: Dec. 13, 2023

In recent years, there has been a growing interest in real estate investments that utilize blockchain technology. Traditional usually involve third-party intermediaries for verifying and recording informal transactions. This paper proposes blockchain-based investment model presents detailed description of the register authentication aspect model. The uses technology to create tamper-evident records transactions provide secure verification Meanwhile, each transaction is recorded block, all are kept on blockchain. means inventors can access these verify their authenticity validity. system also use smart contracts automate process transactions, which further improves efficiency reduces costs. Further, model's timestamp mechanism eliminate ensure validity through distributed ledgers mechanisms. Overall, systems offer advantages security, transparency, efficiency, cost reduction. With ongoing advancements, expected play crucial role future

Language: Английский

Citations

16

Empirical Performance Analysis of Hyperledger Fabric DOI
Shampa Rani Das,

Noor Zaman,

David Asirvatham

et al.

Published: Jan. 1, 2025

Language: Английский

Citations

0

Blockchain-Based Decentralised Authentication in Closed Environments DOI Creative Commons

Wata Kanjanapruthipong,

Sirapat Boonkrong

Future Internet, Journal Year: 2025, Volume and Issue: 17(3), P. 98 - 98

Published: Feb. 21, 2025

Traditional authentication systems with an server that handles requests from many clients have a major weakness, i.e., single point of failure. This study presents paradigm based on blockchain, which provides decentralised and distributed mechanism for processing authentication. The security the proposed design protocol was evaluated using Gong–Needham–Yahalom (GNY) logic. results indicated secure against various attacks. has significant potential enhancing identity management in sectors where privacy data integrity are most important.

Language: Английский

Citations

0

MedAccessX: A Blockchain-Enabled Dynamic Access Control Framework for IoMT Networks DOI Creative Commons

Guoyi Shi,

Minfeng Qi, Qi Zhong

et al.

Sensors, Journal Year: 2025, Volume and Issue: 25(6), P. 1857 - 1857

Published: March 17, 2025

The integration of Internet Things (IoT) devices in healthcare has enhanced medical efficiency but poses challenges such as data privacy risks and internal abuse. Traditional IoT access frameworks suffer from centralization, limited scalability, static permission controls. To address these issues, we propose MedAccessX, a blockchain-based control framework combining attribute-based (ABAC) role-based (RBAC). MedAccessX utilizes four types smart contracts: user management contract (UMC) for managing operations, (MDMC) handling data, policy (PC) rights, an (ACC) enforcing permissions facilitating sharing. Our evaluation, conducted on private Ethereum blockchain network with multiple nodes, assesses security, deployment cost, gas consumption, throughput, response time. Comparative analysis demonstrates that achieves lower costs higher outperforming existing solutions.

Language: Английский

Citations

0

Future of cyberspace: A critical review of standard security protocols in the post-quantum era DOI
Milad Taleby Ahvanooey, Wojciech Mazurczyk, Jun Zhao

et al.

Computer Science Review, Journal Year: 2025, Volume and Issue: 57, P. 100738 - 100738

Published: March 18, 2025

Language: Английский

Citations

0

The New CAP Theorem on Blockchain Consensus Systems DOI Creative Commons
Aristidis G. Anagnostakis, Euripidis Glavas

Future Internet, Journal Year: 2025, Volume and Issue: 17(4), P. 157 - 157

Published: April 2, 2025

One of the most emblematic theorems in theory distributed databases is Eric Brewer’s CAP theorem. It stresses tradeoffs between Consistency, Availability, and Partition states that it impossible to guarantee all three them simultaneously. Inspired by this, we introduce new theorem for autonomous consensus systems, demonstrate that, at most, two elementary properties, Consensus achievement (C), Autonomy (A), entropic Performance (P) can be optimized simultaneously generic case. This provides a theoretical limit Blockchain systems’ decentralization, impacting their scalability, security, real-world adoption. To formalize analyze this tradeoff, utilize IoT micro-Blockchain as universal, minimal, consensus-enabling framework. We define set quantitative functions relating each properties number event witnesses system. identify existing mutual exclusions, formally prove one homogenous system consideration, cannot suggests requirement concurrent optimization satisfied case reveals an intrinsic limitation on design mechanisms. Our findings are proved utilizing framework validated through empirical data benchmarking large-scale i.e., Bitcoin, Ethereum, Hyperledger Fabric.

Language: Английский

Citations

0

A survey on quantum-safe blockchain security infrastructure DOI
Arya Wicaksana

Computer Science Review, Journal Year: 2025, Volume and Issue: 57, P. 100752 - 100752

Published: April 10, 2025

Language: Английский

Citations

0