Computer Science ›› 2020, Vol. 47 ›› Issue (3): 273-280.doi: 10.11896/jsjkx.190100238

• Computer Network • Previous Articles     Next Articles

Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group

PAN Ji-fei,HUANG De-cai   

  1. (College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, China)
  • Received:2019-01-29 Online:2020-03-15 Published:2020-03-30
  • About author:PAN Ji-fei,born in 1993,postgraduate.His main research interest include data mining and artificial intelligence. HUANG De-cai,born in 1958,Ph.D,professor,doctoral spervisor.His main research include database,data mining,artificial intelligence and so on.
  • Supported by:
    This work was supported by Ministry of Water Resources Public Welfare Industry Research Special Fund (201401044) and Zhejiang Basic Public Welfare Research Program (GG19E090005).

Abstract: The current implementation of blockchain systems generally suffer from performance and capacity deficiencies,making it impossible to achieve deeper popularity and wider application.Sharding is considered as the most likely technology to solve the blockchain bottleneck.However,at present,the mainstream sharding schemes generally suffer from the problem of sacrificing decentralization or security to improve performance.Based on the existing sharding technology,this paper proposed the jump Hash wight asynchronous consensus group scheme,which builds shards based on jump hash and dynamic weights,to improve the efficiency and rationality of shards creation.The algorithm satisfies the characteristics of high efficiency,fairness,and adaptability.The network fragmentation efficiency is improved by 8% compared with Ethereum.The workload of node migration is reduced by 25% compared with Ethereum.The asynchronous consensus group mechanism is introduced to improve the transaction security of sharding and effectively handle cross-shard transactions.Through theoretical analysis and experiments,the maximum transaction performance of blockchain dynamic sharding model based on jump Hash and asynchronous consensus group can reach 5000 transactions per second.

Key words: Blockchain, Sharding, Jump Hash, Asynchronous consensus group, Dynamic weight

CLC Number: 

  • TP315
[1]Satoshi NAKAMOTO.Bitcoin:A Peer-to-Peer Electronic Cash System [EB/OL].https://bitcoin.org/bitcoin.pdf.
[2]BONNEAU J,MILLER A,CLARK J,et al.SoK:Research Perspectives and Challenges for Bitcoin and Cryptocurrencies[C]∥2015 IEEE Symposium on Security and Privacy (SP).IEEE Computer Society,2015.
[3]HE P,YU G,ZANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.
[4]EOS.EOSIO Technical White Paper v2[EB/OL].(2018-3-16).https://github.com/EOSIO/Documentation/blob/master/TechnicalWhitePaper.md.
[5]PAN C,LIU Z Q,LIU Z,et al.Research on Scalability of Blockchain Technology:Problems and Methods[J].Journal of Computer Research and Development,2018,5(10):2099-2010.
[6]CHIKHALE K,SHRAWANKAR U.Hybrid Multi-level Cache Management Policy[C]∥2014 Fourth International Conference on Communication Systems and Network Technologies.2014:1119-1123.
[7]Julianbrowne.Brewer’s CAP Theorem [EB/OL].http://www.julianbrowne.com/article/brewers-cap-theorem.
[8]LUU L,NARAYANAN V,ZHENG C D,et al.A Secure Sharding Protocol For Open Blockchains [C]∥Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(CCS’16).2016:17-30.
[9]KARGER D,LEHMAN E,LEIGHTON T,et al.Consistent hashing and random trees:distributed caching protocols for relieving hot spots on the World Wide Web[C]∥Proceedings of the Twenty-ninth Annual ACM Symposium on Theory of Computing.New York,USA,1997:654-663.
[10]LEE B,JEONG Y,SONG H,et al.A scalable and highly avai- lable network management architecture on consistent hashing[C]∥IEEE Globecom.2010.
[11]CASTRO M,LISKOV B.Practical Byzantine Fault Tolerance and Proactive Recovery[J].ACM Transactions on Computer Systems Association for Computing Machinery 1999,20(4):398-461.
[12]PAUL J,TOOSKA D,REZA M,et al.Parizi,Kim-Kwang Raymond Choo,A systematic literature review of blockchain cyber security[J].Digital Communications and Networks,2018,34(6):154-168.
[13]WANG M M,WU Q H,QIN B,et al.Lightweight and Manageable Digital Evidence Preservation System on Bitcoin[J].Journal of Computer Science & Technology,2018,33(3):568-586.
[14]Vitalik.EthereumSharding[EB/OL].https://github.com/ethe-reum/sharding/blob/develop/docs/doc.md.
[15]Rchain.The Rchain Technical Whitepaper [EB/OL].(2017-8-29).https://www.chainwhy.com/upload/default/20180620/c982b5a83e4fde627ca2dda33f3263bc.pdf.
[16]ZILLIQA.The ZILLIQA Technical Whitepaper[EB/OL].ht- tps://docs.zilliqa.com/whitepaper.pdf,2017-08-10.
[17]WANG J P,WANG H.Monoxide:Scale Out Blockchain with Asynchronized Consensus Zones[C]∥Networked Systems Design and Implementation.Boston MA,USA,2019.
[18]LAMPING J,VEACH E.A Fast,Minimal Memory,Consistent Hash Algorithm[J].arXiv:1406.2294,2014.
[19]Mitclub.MIT whitepaper.pdf[EB/OL].https://github.com/Mitclub/Documents/ blob/master/whitepaper.pdf.
[20]AL-BASSAM M,SONNINO A,BANO S,et al.Chainspace:A Sharded Smart Contracts Platform[C]∥Network and Distributed System Security Symposium(NDSS).San Diego:IEEE Press,2018.
[21]EYAL I,GENCER A E,SIRER G,et al. Bitcoinng:A scalable blockchain protocol∥13th USENIX Symposium on Networked Systems Design and Implementation(NSDI 2016).Santa Clara,CA,USA,2016.
[22]SHAO Q F,JIN C Q,et al.Blockchain:Architecture and Re- search Progress[J].Chinese Journal of Computers,2017,41(5):971-988.
[23]YUAN Y,NI X C,ZENG S,et al.Blockchain Consensus Algorithms:The State of the Art and Future Trends[J].Acta Automatica Sinica,2018,44(11):2011-2022.
[24]YIHUA D,JAMES W,PRADIP K,et al.Scalable practical byzantine fault tolerance with short-lived signature schemes[C]∥Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering(CASCON’18).2018:245-256.
[25]JAKOBSSON M,LEIGHTON T, MICALI S.Fractal Merkle Tree Representation and Traversal[C]∥Topics in Cryptology-CT-RSA.2003:314-326.
[26]MIN X P,LI Q Z,KONG L J,et al.Permissioned Blockchain Dynamic Consensus Mechanism Based Multi-Centers[J].Chinese Journal of Computers,2018,41(5):1005-1020.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[4] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[5] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[6] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[7] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[8] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[9] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[10] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[11] FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311.
[12] LV Jian-fu,LAI Ying-xu,LIU Jing. Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain [J]. Computer Science, 2020, 47(3): 298-303.
[13] ZHOU Chang,LU Hui-mei,XIANG Yong,WU Jing-bang. Survey on Application of Blockchain in VANET [J]. Computer Science, 2020, 47(2): 213-220.
[14] CHEN Meng-rong,LIN Ying,LAN Wei,SHAN Jin-zhao. Improvement of DPoS Consensus Mechanism Based on Positive Incentive [J]. Computer Science, 2020, 47(2): 269-275.
[15] ZHANG Peng-yi, SONG Jie. Research Advance on Efficiency Optimization of Blockchain Consensus Algorithms [J]. Computer Science, 2020, 47(12): 296-303.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .