A Prototype Evaluation of a Tamper-resistant High Performance Blockchain-based Transaction Log for a Distributed Database

被引:37
作者
Aniello, Leonardo [1 ]
Baldoni, Roberto [1 ]
Gaetani, Edoardo [1 ]
Lombardi, Federico [1 ]
Margheri, Andrea [2 ]
Sassone, Vladimiro [2 ]
机构
[1] CIS Sapienza Univ Rome, Rome, Italy
[2] Univ Southampton, Southampton, Hants, England
来源
2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017) | 2017年
关键词
Blockchain; Cloud Federation; BFT; DHT;
D O I
10.1109/EDCC.2017.31
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As data is having an increasingly relevant role in different business fields, ensuring integrity has become fundamental. Modern databases rely on transaction history written on redo logs to allow for data restore. However, if redo logs are (maliciously) forged, data can actually be lost or altered. Due its strong data integrity guarantees, blockchain technology can be employed to ensure log integrity, but its current performance limitations hinder actual exploitations. In previous work, we proposed a layered blockchain-based architecture for distributed (federated) database redo logs: a fast first layer blockchain, anchored to a secure second layer blockchain, based on proof-of-work to achieve strong integrity. Here, we present an implementation and an experimental evaluation of a prototype of that architecture, which employs a total consensus algorithm on the first layer blockchain. Finally, to improve availability and scalability, we refine our solution by investigating, respectively, a Byzantine Fault Tolerant consensus and a Distributed Hash Table solution to shard the first layer blockchain ledger among available nodes.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 10 条
  • [1] Practical byzantine fault tolerance and proactive recovery
    Castro, M
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
  • [2] Centrally Banked Cryptocurrencies
    Danezis, George
    Meiklejohn, Sarah
    [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [3] Gaetani E., 2017, ITA SEC, V1816
  • [4] The Bitcoin Backbone Protocol: Analysis and Applications
    Garay, Juan
    Kiayias, Aggelos
    Leonardos, Nikos
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 281 - 310
  • [5] A Secure Sharding Protocol For Open Blockchains
    Luu, Loi
    Narayanan, Viswesh
    Zheng, Chaodong
    Baweja, Kunal
    Gilbert, Seth
    Saxena, Prateek
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 17 - 30
  • [6] Nakamoto S., 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
  • [7] Schiavo F. P., 2016, CORR
  • [8] A FORMAL MODEL OF CRASH RECOVERY IN A DISTRIBUTED SYSTEM
    SKEEN, D
    STONEBRAKER, M
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1983, 9 (03) : 219 - 228
  • [9] Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues
    Sookhak, Mehdi
    Gani, Abdullah
    Talebian, Hamid
    Akhunzada, Adnan
    Khan, Samee U.
    Buyya, Rajkumar
    Zomaya, Albert Y.
    [J]. ACM COMPUTING SURVEYS, 2015, 47 (04)
  • [10] Wood G., 2014, ETHEREUM PROJECT YEL, V151, P1, DOI DOI 10.1017/CBO9781107415324.004