PPoS : Practical Proof of Storage for Blockchain Full Nodes

被引:3
作者
Heo, Jun Wook [1 ]
Ramachandran, Gowri [1 ]
Jurdak, Raja [1 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Trusted Networks Lab, Brisbane, Qld, Australia
来源
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC | 2023年
关键词
blockchain; proof of storage (PoS); distributed storage; blockchain scalability; blockchain decentralisation;
D O I
10.1109/ICBC56567.2023.10174897
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain is a distributed and immutable ledger managed by all participants. The full nodes which store the entire ledger play an essential role in managing it in a transparent and decentralised manner. However, it is difficult t o v erify that full nodes store the entire ledger in their dedicated storage due to Sybil, outsourcing, or generation attacks. Existing work on proving storage for cloud computing and remote data storage applications has high latency for decryption, and its impact on decentralisation is unclear, rendering it impractical for use in blockchain. In this paper, we propose a decentralised Practical Proof of Storage (PPoS) solution for blockchain full nodes with asymmetric latencies for encryption and decryption, which introduces a chained encryption and decryption architecture. To generate a unique replica of a block, each full node performs encryption with its own address and a previously encrypted block, storing the unique block in its dedicated storage. In PPoS, encryption is expensive and time consuming, enabling it to detect outsourcing and generation attacks and to deter Sybil attacks. Simultaneously, decryption is about 25 times faster than encryption, resulting in minimal performance overhead. The proof process is also decentralised by randomly selecting provers, verifiers, a nd e ncrypted b locks. Our e xperiments u se u p t o 720 real BitCoin blocks to evaluate the performance and quantify the decentralisation of PPoS. Our results show that PPoS's asymmetric design reduces decryption time 25-fold over existing approaches, while maintaining a high degree of decentralisation, confirming i ts s uitability f or b lockchain f ull nodes.
引用
收藏
页数:9
相关论文
共 22 条
  • [1] MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
    Albrecht, Martin
    Grassi, Lorenzo
    Rechberger, Christian
    Roy, Arnab
    Tiessen, Tyge
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 191 - 219
  • [2] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [3] Proof of Storage-Time: Efficiently Checking Continuous Data Availability
    Ateniese, Giuseppe
    Chen, Long
    Etemad, Mohammard
    Tang, Qiang
    [J]. 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [4] Ben-Sasson E, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P781
  • [5] Benet J., 2018, SECURITY PROTOCOL LA
  • [6] Benet J., 2017, PROTOCOL LABS, V27, P20
  • [7] Buterin V., 2017, STARKS 2
  • [8] Daepp U., 2011, READING WRITING PROV, P315
  • [9] Dorri A., 2021, 2021 IEEE INT C BLOC, P1
  • [10] Filecoin docs, 2022, FIL DOCS