A Prototype Evaluation of a Tamper-resistant High Performance Blockchain-based Transaction Log for a Distributed Database

被引:38
作者
Aniello, Leonardo [1 ]
Baldoni, Roberto [1 ]
Gaetani, Edoardo [1 ]
Lombardi, Federico [1 ]
Margheri, Andrea [2 ]
Sassone, Vladimiro [2 ]
机构
[1] CIS Sapienza Univ Rome, Rome, Italy
[2] Univ Southampton, Southampton, Hants, England
来源
2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017) | 2017年
关键词
Blockchain; Cloud Federation; BFT; DHT;
D O I
10.1109/EDCC.2017.31
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As data is having an increasingly relevant role in different business fields, ensuring integrity has become fundamental. Modern databases rely on transaction history written on redo logs to allow for data restore. However, if redo logs are (maliciously) forged, data can actually be lost or altered. Due its strong data integrity guarantees, blockchain technology can be employed to ensure log integrity, but its current performance limitations hinder actual exploitations. In previous work, we proposed a layered blockchain-based architecture for distributed (federated) database redo logs: a fast first layer blockchain, anchored to a secure second layer blockchain, based on proof-of-work to achieve strong integrity. Here, we present an implementation and an experimental evaluation of a prototype of that architecture, which employs a total consensus algorithm on the first layer blockchain. Finally, to improve availability and scalability, we refine our solution by investigating, respectively, a Byzantine Fault Tolerant consensus and a Distributed Hash Table solution to shard the first layer blockchain ledger among available nodes.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 10 条
[1]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[2]   Centrally Banked Cryptocurrencies [J].
Danezis, George ;
Meiklejohn, Sarah .
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
[3]  
Gaetani E., 2017, ITA SEC, V1816
[4]   The Bitcoin Backbone Protocol: Analysis and Applications [J].
Garay, Juan ;
Kiayias, Aggelos ;
Leonardos, Nikos .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :281-310
[5]   A Secure Sharding Protocol For Open Blockchains [J].
Luu, Loi ;
Narayanan, Viswesh ;
Zheng, Chaodong ;
Baweja, Kunal ;
Gilbert, Seth ;
Saxena, Prateek .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :17-30
[6]  
Nakamoto S., 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
[7]  
Schiavo F. P., 2016, CORR
[8]   A FORMAL MODEL OF CRASH RECOVERY IN A DISTRIBUTED SYSTEM [J].
SKEEN, D ;
STONEBRAKER, M .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1983, 9 (03) :219-228
[9]   Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues [J].
Sookhak, Mehdi ;
Gani, Abdullah ;
Talebian, Hamid ;
Akhunzada, Adnan ;
Khan, Samee U. ;
Buyya, Rajkumar ;
Zomaya, Albert Y. .
ACM COMPUTING SURVEYS, 2015, 47 (04)
[10]  
Wood G., 2014, ETHEREUM PROJECT YEL, V151, P1, DOI DOI 10.1017/CBO9781107415324.004