scholarly journals Challenges of PBFT-Inspired Consensus for Blockchain and Enhancements over Neo dBFT

2020 ◽  
Vol 12 (8) ◽  
pp. 129
Author(s):  
Igor M. Coelho ◽  
Vitor N. Coelho ◽  
Rodolfo P. Araujo ◽  
Wang Yong Qiang ◽  
Brett D. Rhodes

Consensus mechanisms are a core feature for handling negotiation and agreements. Blockchain technology has seen the introduction of different sorts of consensus mechanism, ranging from tasks of heavy computation to the subtle mathematical proofs of Byzantine agreements. This paper presents the pioneer Delegated Byzantine Fault Tolerance (dBFT) protocol of Neo Blockchain, which was inspired by the Practical Byzantine Fault Tolerance (PBFT). Besides introducing its history, this study describes proofs and didactic examples, as well as novel design and extensions for Neo dBFT with multiple block proposals. Finally, we discuss challenges when dealing with strong Byzantine adversaries, and propose solutions inspired on PBFT for current weak-synchrony problems and increasing system robustness against attacks. Key Contribution: Presents an overview of the history of PBFT-inspired consensus for blockchain, highlighting its current importance on the literature, challenges and assumptions. Contributes to the field of Distributed Consensus, proposing novel extensions for the Neo dBFT (dBFT 2.0+, dBFT 3.0 and dBFT 3.0+), with new insights on innovative consensus mechanisms.

2019 ◽  
Vol 12 (4) ◽  
pp. 177 ◽  
Author(s):  
Qi Deng

The Artificial Intelligence BlockCloud (AIBC) is an artificial intelligence and blockchain technology based large-scale decentralized ecosystem that allows system-wide low-cost sharing of computing and storage resources. The AIBC consists of four layers: a fundamental layer, a resource layer, an application layer, and an ecosystem layer (the latter three are the collective “upper-layers”). The AIBC layers have distinguished responsibilities and thus performance and robustness requirements. The upper layers need to follow a set of economic policies strictly and run on a deterministic and robust protocol. While the fundamental layer needs to follow a protocol with high throughput without sacrificing robustness. As such, the AIBC implements a two-consensus scheme to enforce economic policies and achieve performance and robustness: Delegated Proof of Economic Value (DPoEV) incentive consensus on the upper layers, and Delegated Adaptive Byzantine Fault Tolerance (DABFT) distributed consensus on the fundamental layer. The DPoEV uses the knowledge map algorithm to accurately assess the economic value of digital assets. The DABFT uses deep learning techniques to predict and select the most suitable BFT algorithm in order to enforce the DPoEV, as well as to achieve the best balance of performance, robustness, and security. The DPoEV-DABFT dual-consensus architecture, by design, makes the AIBC attack-proof against risks such as double-spending, short-range and 51% attacks; it has a built-in dynamic sharding feature that allows scalability and eliminates the single-shard takeover. Our contribution is four-fold: that we develop a set of innovative economic models governing the monetary, trading and supply-demand policies in the AIBC; that we establish an upper-layer DPoEV incentive consensus algorithm that implements the economic policies; that we provide a fundamental layer DABFT distributed consensus algorithm that executes the DPoEV with adaptability; and that we prove the economic models can be effectively enforced by AIBC’s DPoEV-DABFT dual-consensus architecture.


2020 ◽  
Vol 17 (5) ◽  
pp. 2402-2404
Author(s):  
G. Subathra ◽  
A. Antonidoss

The Blockchain technology brings a rapid growth in the industry, It emphasizes the service to lead the complexity of software and malicious attack in the network. This technology is used to monitor the highly vulnerable services and it is used to increase the complexity of the warehouse data. It assures the security and consistency of data, The warehouse data has been replicated the availability and the enhancement of security in the services. This technology originated from internet sector as a decentralized, distributed ledger for data transaction. Nowadays, it is visualised as a backbone or frame work for decentralized data processing in open source network. Blockchain uses variety of consensus protocol which is reliable for nodes and communication resources that is used for data consistency. Byzantine fault tolerance algorithm has been proposed for computational cost and security also for consensus efficiency. This paper deals by proposing practical byzantine fault tolerance on edge computing networks paves away for reducing storage overhead also security purpose on edge devices. The proposed model is simulated in the constrain environment and the results are discussed. It shows that the proposed method has increase the availability and security of the stored data.


2021 ◽  
Vol 13 (11) ◽  
pp. 285
Author(s):  
Nur Arifin Akbar ◽  
Amgad Muneer ◽  
Narmine ElHakim ◽  
Suliman Mohamed Fati

Blockchain technology is a sustainable technology that offers a high level of security for many industrial applications. Blockchain has numerous benefits, such as decentralisation, immutability and tamper-proofing. Blockchain is composed of two processes, namely, mining (the process of adding a new block or transaction to the global public ledger created by the previous block) and validation (the process of validating the new block added). Several consensus protocols have been introduced to validate blockchain transactions, Proof-of-Work (PoW) and Proof-of-Stake (PoS), which are crucial to cryptocurrencies, such as Bitcoin. However, these consensus protocols are vulnerable to double-spending attacks. Amongst these attacks, the 51% attack is the most prominent because it involves forking a blockchain to conduct double spending. Many attempts have been made to solve this issue, and examples include delayed proof-of-work (PoW) and several Byzantine fault tolerance mechanisms. These attempts, however, suffer from delay issues and unsorted block sequences. This study proposes a hybrid algorithm that combines PoS and PoW mechanisms to provide a fair mining reward to the miner/validator by conducting forking to combine PoW and PoS consensuses. As demonstrated by the experimental results, the proposed algorithm can reduce the possibility of intruders performing double mining because it requires achieving 100% dominance in the network, which is impossible.


2021 ◽  
Vol 21 (1) ◽  
pp. 1-17 ◽  
Author(s):  
Xiaolong Xu ◽  
Dawei Zhu ◽  
Xiaoxian Yang ◽  
Shuo Wang ◽  
Lianyong Qi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document