A Consensus Algorithm Based on Risk Assessment Model for Permissioned Blockchain

07/15/2022
by   Xiaohui Zhang, et al.
0

Blockchain technology enables stakeholders to conduct trusted data sharing and exchange without a trusted centralized institution. These features make blockchain applications attractive to enhance trustworthiness in very different contexts. Due to unique design concepts and outstanding performance, blockchain has become a popular research topic in industry and academia in recent years. Every participant is anonymous in a permissionless blockchain represented by cryptocurrency applications such as Bitcoin. In this situation, some special incentive mechanisms are applied to permissionless blockchain, such as mined native cryptocurrency to solve the trust issues of permissionless blockchain. In many use cases, permissionless blockchain has bottlenecks in transaction throughput performance, which restricts further application in the real world. A permissioned blockchain can reach a consensus among a group of entities that do not establish an entire trust relationship. Unlike permissionless blockchains, the participants must be identified in permissioned blockchains. By relying on the traditional crash fault-tolerant consensus protocols, permissioned blockchains can achieve high transaction throughput and low latency without sacrificing security. However, how to balance the security and consensus efficiency is still the issue that needs to be solved urgently in permissioned blockchains. As the core module of blockchain technology, the consensus algorithm plays a vital role in the performance of the blockchain system. Thus, this paper proposes a new consensus algorithm for permissioned blockchain, the Risk Assessment-based Consensus protocol (RAC), combined with the decentralized design concept and the risk-node assessment mechanism to address the unbalance issues of performance in speed, scalability, and security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/13/2021

A Reputation-based Approach using Consortium Blockchain for Cyber Threat Intelligence Sharing

The CTI (Cyber Threat Intelligence) sharing and exchange is an effective...
research
11/10/2017

Consensus in the Age of Blockchains

The blockchain initially gained traction in 2008 as the technology under...
research
09/21/2021

MITOSIS: Practically Scaling Permissioned Blockchains

Scalability remains one of the biggest challenges to the adoption of per...
research
02/26/2021

Building Blocks of Sharding Blockchain Systems: Concepts, Approaches, and Open Problems

Sharding is the prevalent approach to breaking the trilemma of simultane...
research
11/01/2022

Evaluation of a blockchain-enabled resource management mechanism for NGNs

A new era in ICT has begun with the evolution of Next Generation Network...
research
03/18/2022

Decentralizing Permissioned Blockchain with Delay Towers

Growing excitement around permissionless blockchains is uncovering its l...
research
05/05/2020

Mechanism Design and Blockchains

Game theory is often used as a tool to analyze decentralized systems and...

Please sign up or login with your details

Forgot password? Click here to reset