Computer Science ›› 2018, Vol. 45 ›› Issue (12): 12-18.doi: 10.11896/j.issn.1002-137X.2018.12.002

• Surveys • Previous Articles     Next Articles

Survey of Data Storage and Query Techniques in Blockchain Systems

WANG Qian-ge, HE Pu, NIE Tie-zheng, SHEN De-rong, YU Ge   

  1. (School of Computer Science and Engineering,Northeastern University,Shenyang 110169,China)
  • Received:2017-12-22 Online:2018-12-15 Published:2019-02-25

Abstract: At present,blockchain systems,represented by Bitcoin and Ethereum,are becoming more and more mature,and blockchain technology has become a hot topic in academic and industrial circles.However,in practical applications,these systems are generally faced with tough problems such as simple query function and low query performance due to the limitation of data storage scheme.This paper presented the survey and prospect of the research progress on data storage and query technology of blockchain systems.First,the data storage mechanism and query processing strategy used in current popular blockchain systems were introduced .Then,two methods of extending query processing functions on the existing system were introduced in details.The features of their query efficiency,write performance optimization,storage space occupancy,data security and availability were compared and analyzed in detail.Finally,the trend of the query technology development in the future block chain system was analyzed,and the main research direction was discussed and explored.

Key words: Blockchain, Database, Storage management, Query processing, Index structures

CLC Number: 

  • TP315
[1]HE P,YU G,ZHANG Y F,et al.Survey on blockchain techno-logy and its application prospect .Computer Science,2017,44(4):1-7.(in Chinese)
何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述.计算机科学,2017,44(4):1-7.
[2]PASS R,SEEMAN L,SHELAT A.Analysis of the Blockchain protocol in asynchronous networks[C]∥International Confe-rence on the Theory and Applications of Cryptographic Techniques.2017:643-673.
[3]ALI M,NELSON J,SHEA R,et al.Block stack:a global naming and storage system secured by block chains[C]∥USENIX Annual Technical Conference.2016:181-194.
[4]ATENIESE G,MAGRI B,VENTURI D,et al.Redactableblockchain-or-rewriting history in bitcoin and friends[C]∥European Symposium on Security and Privacy.2017.
[5]KOSBA A,MILLER A,SHI E,et al.Hawk:the blockchainmodel of cryptography and privacy-preserving smart contracts[C]∥Security and Privacy.2016:839-858.
[6]HALPIN H,PIEKARSKA M.Introduction to security and pri-vacy on the blockchain[C]∥European Symposium on Security and Privacy Workshops.2017.
[7]LUU L,NARAYANAN V,ZHENG C,et al.A secure sharding protocol for open blockchains [C]∥ACM SIGSAC Conference on Computer and Communications Security.2016:17-30.
[8]EYAL I,GENCER A E,RENESSE R V.Bitcoin-NG:a scalable blockchain protocol // Usenix Conference on Networked Systems Design and Implementation.2016:45-59.
[9]JIN H,DAI X,XIAO J.Towards a Novel Architecture for Enabling Interoperability amongst Multiple Blockchains[C]∥International Conference on Distributed Computing Systems.IEEE Computer Society,2018:1203-1211.
[10]LevelDB.http://LevelDB.org.
[11]Etherchain.https://www.etherchain.org.
[12]DINH T T A,WANG J,CHEN G,et al.BLOC-KBENCH:aframework for analyzing private blockchains[C]∥International Conference on Management of Data.2017:1085-1100.
[13]O'NEIL P,CHENG E,GAWLICK D,et al.The log-structured merge-tree (LSM-tree).Acta-Informatica,1996,33(4):351-385.
[14]Wikepedia.Berkeley_DB.https://en.wikipedia.org /wiki/Berkeley_DB.
[15]Hyperledger.https://www.hyperledger.org.
[16]SHAWN W,TOME B,JOSH B,et al.Storj A peer-to-peer cloud storage network.https://storj.io/storj.pdf.2016.
[17]Protocol Labs.Filecoin:A decentralized storage network[EB/OL].http://www.filecoin.io/fi-lecoin.pdf.2017.
[18]Wikipedia.RLP.https://github.com/ethereum/wiki/wiki/RLP.
[19]LI Y,ZHENG K,YAN Y,et al.EtherQL:a query layer forblockchain system[C]∥Data-base Systems for Advanced Applications.2017:556-567.
[20]DINH T T A,LIU R,ZHANG M,et al.Untangling blockchain:a data processing view of blockchain systems.https://arxiv.org/abs/1708.05665.
[21]DINH A,WANG J,WANG S,et al.UStore:a distributed storage with rich semantics . https://arxiv.org/abs/1702.02799.
[22]CAI W D,YU L,WANG R,et al.Blockchain application devel-opment techniques.Journal of Software,2017,28(6):1474-1487.(in Chinese)
蔡维德,郁莲,王荣,等.基于区块链的应用系统开发方法研究.软件学报,2017,28(6):1474-1487.
[23]WANG S,DINH T T A,LIN Q,et al.ForkBase:An Efficient Storage Engine for Blockchain and Forkable Applications[J].PVLDB,2018,11(10):1137-1150.
[24]KARLSSON K,JIANG W,WICKER S,et al.Vegvisir:A Partition-Tolerant Blockchain for the Internet-of-Things[C]∥International Conference on Distributed Computing Systems.IEEE Computer Society,2018:1150-1158.
[25]JIA D,XIN J,WANG Z,et al.ElasticChain:Support Very Large Blockchain by Reducing Data Redundancy[C]∥Asia-Pacific Web.Springer,Cham,2018:440-454.
[26]LIND,JOSHUA,NAOR O,et al.Teechain:Reducing StorageCosts on the Blockchain With Offline Payment Channels[C]∥ SYSTOR.2018:125-125.
[27]WU X,XU Y,SHAO Z,et al.LSM-trie:an LSM-tree-based ultra-large key-value store for small data∥USENIX Annual Technical Conference.2015.
[28]AGARWAL R,KHANDELWAL A,STOICA I.Succinct :Enabling Queries on Compressed Data∥USENIX Conference on Networked Systems Design and Implementation.2015:337 -350.
[29]WANG P,SUN G,JIANG S,et al.An efficient design and implementation of LSM-tree based key-value store on open-channel SSD[C]∥Eurosys.2014:1-14.
[30]AHN J S,SEO C,MAYURAM R,et al.Forest DB:a fast key-value storage system for variable-length string keys.IEEE Transactions on Computers,2016,65(3):902-915.
[31]LU L,PILLAI T S,ARPACI-DUSSEAU A C,et al.WiscKey:separating keys from values in SSD-conscious storage[C]∥USENIX Conference on File and Storage Technologies.2016:133-148.
[32]NAKAMOTO S.Bitcoin:a peer-to-peer electro -nic cash system.https://bitcoin.or-g/bitcoin.pdf.
[33]BUTREN V.Ethereum:A next generation smart contractanddecentralized application platform.https://github.com/ethereum/wiki/wiki/White-paper,2013.
[34]TRENT M,RODOLPHE M,ANDREAS M,et al.BigchainDB:A Scalable Blockchain Data-base.https://www.big-chaindb.com/w hitepaper/bigchaindb-whitepaper.pdf.2016.
[35]SEARS R,RAMAKRISHNAN R.bLSM:a general purpose log structured merge tree[C]∥ACM International Conference on Management of Data.2012:217-228.
[36]LIM H,FAN B,ANDERSEN D G,et al.SILT:a memory efficient,high performance key-value store[C]∥ACM Symposium on Operating Systems Principles.2011:1-13.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] TIAN Ye, SHOU Li-dan, CHEN Ke, LUO Xin-yuan, CHEN Gang. Natural Language Interface for Databases with Content-based Table Column Embeddings [J]. Computer Science, 2020, 47(9): 60-66.
[4] FENG An-ran, WANG Xu-ren, WANG Qiu-yun, XIONG Meng-bo. Database Anomaly Access Detection Based on Principal Component Analysis and Random Tree [J]. Computer Science, 2020, 47(9): 94-98.
[5] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
[6] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[7] ZHANG Shan-bin, YUAN Jin-zhao, CHEN Hui, WANG Yu-rong, WANG Jie, TU Chang-he. Vehicle Self-localization Based on Standard Road Sign [J]. Computer Science, 2020, 47(7): 97-102.
[8] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[9] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[10] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[11] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[12] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[13] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[14] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[15] FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .