Renovating Blockchain with Distributed Database: An Open Source System

Slides:



Advertisements
Similar presentations
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
Advertisements

1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
Applying Genetic Algorithms to Decision Making in Autonomic Computing Systems Authors: Andres J. Ramirez, David B. Knoester, Betty H.C. Cheng, Philip K.
12006/9/26 Load Balancing in Dynamic Structured P2P Systems Brighten Godfrey, Karthik Lakshminarayanan, Sonesh Surana, Richard Karp, Ion Stoica INFOCOM.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Can Cloud Computing be Used for Planning? An Initial Study Authors: Qiang Lu*, You Xu†, Ruoyun Huang†, Yixin Chen† and Guoliang Chen* from *University.
1 Optimal Resource Placement in Structured Peer-to-Peer Networks Authors: W. Rao, L. Chen, A.W.-C. Fu, G. Wang Source: IEEE Transactions on Parallel and.
Load Balancing in Protection Switching of Optical Networks Hongkyu Jeong, Gyu-Myoung Lee Information and Communications Univ. (ICU) Student ID : ,
PR SM A Secure Code Deployment Scheme for Active Networks Amdjed Mokhtari Leïla Kloul 22 November 2005.
National Chi Nan University Study of Network Performance Measurement Based on SNMP The 8 th International Conference on Computer Supported Cooperative.
Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees Adam J. Lee, Kazuhiro Minami, and Marianne Winslett University.
Ad Hoc Mobility Management With Uniform Quorum Systems Zygmunt J. Haas, Senior Member, IEEE and Ben Liang, Student Member, IEEE Networking, IEEE/ACM Transactions.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Research of P2P Architecture based on Cloud Computing Speaker : 吳靖緯 MA0G0101.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
An Efficient Quorum-based Fault- Tolerant Approach for Mobility Agents in Wireless Mobile Networks Yeong-Sheng Chen Chien-Hsun Chen Hua-Yin Fang Department.
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
1 DCMP: A Distributed Cycle Minimization Protocol for Peer- to-Peer Networks Authors: Zhenzhou Zhu, Panos Kalnis and Spiridon Bakiras Source: IEEE Transactions.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Communication Scheme for Loosely Coupled Mobile User Groups in Wireless Sensor Fields Euisin Lee, Soochang Park, Fucai Yu, Min-Sook Jin, and Sang-Ha Kim.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
Non-PKI Methods for Public Key Distribution
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Reporter :Chien-Wen Huang
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Trustworthiness Management in the Social Internet of Things
JPEG Compressed Image Retrieval via Statistical Features
Evaluation Forms for Blockchain- Based System ver. 1.0
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A secure and traceable E-DRM system based on mobile device
Der-Chyuan Lou and Jiang-Lung Liu,
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Security of a Remote Users Authentication Scheme Using Smart Cards
Efficient Time-Bound Hierarchical Key Assignment Scheme
Methods for Preventing Unauthorized Software Distribution
Advanced Cryptography Protocols
Focus Group 3: Blockchain and digitalisation
DISTRIBUTED CLUSTERING OF UBIQUITOUS DATA STREAMS
Outline Distributed Mutual Exclusion Distributed Deadlock Detection
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
Multi-party Authentication in Web Services
Distributed Ledger Technology (DLT) and Blockchain
2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
ScroogeCoin Client-server architecture N1 N2 N3 N6 N4 N5
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
A Small and Fast IP Forwarding Table Using Hashing
Decentralized Energy Demand Regulation in Smart Homes
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: IEEE Access, Vol. 5, pp –14767, July 2017.
Source: Energies, vol. 10, no. 12, pp. 1-22, November 2017
Kai Bu 04 Blockchain Kai Bu
Source: Energies, Vol. 10, No. 12, November 2017
TrustChain: A Sybil-resistant scalable blockchain
Blockchains and Smart Contracts for the Internet of Things
Source: Pattern Recognition Letters 29 (2008)
Designing Blockchain-based Applications a Case Study for Imported
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: Journal of Systems and Software, Vol. 140, pp , June 2018
Source:Journal of Systems and Software, vol. 140, pp , June 2018
An imperceptible spatial domain color image watermarking scheme
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
Color Image Retrieval based on Primitives of Color Moments
Presentation transcript:

Renovating Blockchain with Distributed Database: An Open Source System Source: Future Generation Computer Systems, Vol. 90, No. 9, pp. 105-117, Jan. 2019 Author: Muhammad Muzammal, Qiang Qu, and Bulat Nasrulin Speaker: Ren-Kai Yang Date: 04/11/2019

Outline Introduction Related Works Proposed Scheme Performance Evaluation Conclusions

Quick Query Processing Introduction CHAINSQL Blockchain Distributed Database Advantage Immutable High Throughput Quick Query Processing Disadvantage Low Throughput Deficient in Search Reliability Blockchain Distributed Database = Immutable + High Throughput + Quick Query Processing

Related Works(1/4) - Distributed Database ID Name Location 01 Alice Taipei 02 Bob ID Name Location 01 Alice Taipei 02 Bob 03 Carol Kaohsiung 04 David ID Name Location 03 Carol Kaohsiung 04 David

Related Works(2/4) - Blockchain Overview of the Blockchain

Related Works(3/4) - Blockchain(Cryptography & Validation) Asymmetric cryptography Achieve Integrity Non-Forgeability Non-Repudiation OK Hash Function

Related Works(4/4) - Blockchain(Network & Consensus & Datastore) P2P Network Consensus & Datastore Partial Synchrony Process Reliability Algorithm(i.e. Proof-of Work, Proof-of-Stake) PoS: $20 $30 $25 $15 $10

Proposed Scheme(1/7) Overview of the CHAINSQL

Proposed Scheme(2/7) Flowchart

Proposed Scheme(3/7) Usera tx1 tx2 tx3 tx4 tx5 tx6 tx7 Userb Usere Consensus Algorithm Usera tx1 tx2 tx3 tx4 tx5 tx6 tx7 Userb Usere Userc Userd

Proposed Scheme(4/7) tx1: 1 tx2: 1 tx3: 1 tx4: 1 tx5: 1 Round 1 Usera Unique Node List (UNL) Addressa Addressb Addressc Addressd Addresse tx1: 1 tx2: 1 tx3: 1 tx4: 1 tx5: 1 Round 1 Usera tx1: 1 tx2: 1 tx3: 1 tx1: 1 tx2: 1 tx3: 1 tx4: 1 Userb Usere tx1 tx2 tx3 tx4 tx5 tx6 tx7 tx1: 1 tx2: 1 tx3: 1 tx1: 1 tx2: 1 tx3: 1 tx4: 1 tx5: 1 tx6: 1 tx7: 1 Userd Userc

Proposed Scheme(5/7) tx1: 5 tx2: 5 tx3: 5 tx4: 3 tx5: 2 tx6: 1 tx7: 1 Round 1 (cont.) Usera Threshold = 2.5 tx1: 5 tx2: 5 tx3: 5 tx4: 3 tx5: 2 tx6: 1 tx7: 1 tx1: 5 tx2: 5 tx3: 5 tx4: 3 tx5: 2 tx6: 1 tx7: 1 Userb Usere tx1 tx2 tx3 tx4 tx5 tx6 tx7 tx1: 5 tx2: 5 tx3: 5 tx4: 3 tx5: 2 tx6: 1 tx7: 1 tx1: 5 tx2: 5 tx3: 5 tx4: 3 tx5: 2 tx6: 1 tx7: 1 Userd Userc

Proposed Scheme(6/7) tx5: 2 tx6: 1 tx7: 1 Round 2 Usera tx5: 2 tx6: 1 Unique Node List (UNL) Addressa Addressb Addressc Addressd Addresse tx5: 2 tx6: 1 tx7: 1 Round 2 Usera tx5: 2 tx6: 1 tx7: 1 tx5: 2 tx6: 1 tx7: 1 Userb Usere tx1 tx2 tx3 tx4 tx5 tx6 tx7 tx5: 2 tx6: 1 tx7: 1 tx5: 2 tx6: 1 tx7: 1 Userd Userc

Proposed Scheme(7/7) tx5: 6 tx6: 5 tx7: 5 Round 2 (cont.) Usera Threshold = 3 tx5: 6 tx6: 5 tx7: 5 tx5: 6 tx6: 5 tx7: 5 Userb Usere tx1 tx2 tx3 tx4 tx5 tx6 tx7 tx5: 6 tx6: 5 tx7: 5 tx5: 6 tx6: 5 tx7: 5 Userd Userc

Performance Evaluation(1/2) Throughput vs. Number of Nodes Throughput vs. Transactions Per Proposal

Performance Evaluation(2/2) Mean Latency vs. Number of User Requests Convergence Time vs. Acceptance Step

Conclusions Tamper-resistant Recovery backup