SnapshotPrune: A Novel Bitcoin-Based Protocol Toward Efficient Pruning and Fast Node Bootstrapping

被引:0
作者
Huang, Pengfei [1 ]
Ren, Xiaojun [1 ]
Huang, Teng [1 ]
Voundi Koe, Arthur Sandor [1 ,2 ]
Wong, Duncan S. [1 ]
Jiang, Hai [1 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Peoples R China
[2] Pazhou Lab, Guangzhou 510330, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2024年 / 29卷 / 04期
关键词
blockchain; Unspent Transaction Output (UTXO) pruning; snapshot; fast bootstrapping; synchronization; BLOCKCHAIN; INTERNET;
D O I
10.26599/TST.2023.9010014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Node synchronization is essential for the stability of the Bitcoin network. Critics have raised doubts about the ability of a new node to quickly and efficiently synchronize with the Bitcoin network and alleviate the storage pressure from existing full nodes to stockpile new data. Basic pruning and other techniques have been explored to address these concerns but have been insufficient to reduce node synchronization delay and effectively suppress the growth of synchronized data. In this study, we propose SnapshotPrune, a novel pruning and synchronization protocol that achieves fast node bootstrapping in the Bitcoin blockchain. Real Bitcoin historical data are leveraged to measure the synchronization time and monitor the network traffic during node bootstrapping. The protocol requires data downloads that are 99.70% less than Bitcoin Core, 81% less than CoinPrune, and 60% less than SnapshotSave, thereby saving 97.23% of download time. Findings show that the proposed design enhances the storage efficiency and reduces the node synchronization delay compared with existing techniques. We hypothesize that the efficiency of this protocol increases with the block height.
引用
收藏
页码:1037 / 1052
页数:16
相关论文
共 50 条
  • [21] Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks
    Li, Wenjuan
    Meng, Weizhi
    Wang, Yu
    Li, Jin
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 624 - 635
  • [22] Challenge-based collaborative intrusion detection in software-defined networking: an evaluation
    Li, Wenjuan
    Wang, Yu
    Jin, Zhiping
    Yu, Keping
    Li, Jin
    Xiang, Yang
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 257 - 263
  • [23] DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks
    Liu, Wai-xi
    Cai, Jun
    Chen, Qing Chun
    Wang, Yu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 177
  • [24] A Secure Sharding Protocol For Open Blockchains
    Luu, Loi
    Narayanan, Viswesh
    Zheng, Chaodong
    Baweja, Kunal
    Gilbert, Seth
    Saxena, Prateek
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 17 - 30
  • [25] CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively
    Matzutt, Roman
    Kalde, Benedikt
    Pennekamp, Jan
    Drichel, Arthur
    Henze, Martin
    Wehrle, Klaus
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 3064 - 3078
  • [26] Matzutt R, 2020, 2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), P298
  • [27] Mettler M., 2016, PROC IEEE 18 INT C E, P1
  • [28] Mitra D, 2019, CONF REC ASILOMAR C, P1734, DOI [10.1109/ieeeconf44664.2019.9048887, 10.1109/IEEECONF44664.2019.9048887]
  • [29] Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy
    Mo, Kanghua
    Tang, Weixuan
    Li, Jin
    Yuan, Xu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 758 - 768
  • [30] Querying little is enough: Model inversion attack via latent information
    Mo, Kanghua
    Liu, Xiaozhang
    Huang, Teng
    Yan, Anli
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (02) : 681 - 690