Computer Science ›› 2023, Vol. 50 ›› Issue (10): 350-361.doi: 10.11896/jsjkx.220800193

• Information Security • Previous Articles     Next Articles

Grouping Storage Optimization Method for Blockchain Ledger Based on Erasure Code

ZHANG Yushu1, HE Xiaotong1, XIAO Xiangli1, ZHU Youwen1, WANG Liangming2   

  1. 1 College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
    2 School of Cyber Science and Engineering,Southeast University,Nanjing 211189,China
  • Received:2022-08-22 Revised:2022-12-04 Online:2023-10-10 Published:2023-10-10
  • About author:ZHANG Yushu,born in 1987,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include blockchain,multimedia information security and artificial intelligence.
  • Supported by:
    National Key Research and Development Program of China(2020YFB1005500).

Abstract: The traditional blockchain system adopts the full copy redundant storage mode and each node stores the same ledger,so the blockchain storage burden is very large.At present,the relevant blockchain storage optimization methods can reduce the data storage overhead,but still have the problems of poor scalability and low availability.Thus,this paper proposes a grouping storage optimization method for blockchain ledger based on erasure code.This method introduces a new blockchain node,i.e.,grouping storage(GS) node,to solve the above problems.Since the blockchain ledger storage cost is mainly in the block file,the GS node uses the erasure code to encode the block file,and stores the encoded block file in groups.In this way,each organization maintains the same ledger,which greatly reduces the storage overhead of the blockchain and improves the availability of the blockchain.For the storage expansion of the consortium blockchain,this paper improves and expands the file system of hyperle-dger fabric based on the GS node,and redesigns its process of storing,recovering,and synchronizing block files,which enables the scheme to work on the actual blockchain architecture.Finally,theoretical analysis and experimental results show that the proposed GS node has made significant progress in storage overhead,and performs well in scalability and availability.

Key words: Blockchain, Storage optimization, Erasure code, Hyperledger fabric, Grouping storage

CLC Number: 

  • TP311
[1]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[J].Decentralized Business Review,2008:37(13):2889-2897.
[2]LI S,SONG B Y,LI D,et al.Composite blockchain associatedevent tracing method for financial activities[J].Computer Science,2022,49(3):346-353.
[3]GUO X,WANG Y Y,FENG T,et al.Blockchain-based role-delegation access control for industrial control system[J].Computer Science,2021,48(9):306-316.
[4]ZHOU H,JIANG H,ZHAO Y,et al.Study on optimal scheduling of power blockchain system for consensus transaction of each unit[J].Computer Science,2022,49(6A):771-776.
[5]ETHERSCAN.Ethereum Full Node Sync(Archive) Chart[EB/OL].https://etherscan.io/chartsync/chainarchive.
[6]PERARD D,LACAN J,BACHY Y,et al.Erasure code-basedlow storage blockchain node[C]//2018 IEEE International Conference on Internet of Things(iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber,Physical and Social Computing(CPSCom) and IEEE Smart Data(SmartData).IEEE,2018:1622-1627.
[7]WILKINSON S,BOSHEVSKI T,BRANDOFF J,et al.Storj a peer-to-peer cloud storage network [EB/OL].https://www.storj.io/storjv2.pdf.
[8]TRÓN V,FISCHER A,NAGY D A,et al.Swap,swear,andswindle:Incentive system for swarm[EB/OL].https://ethersphere.github.io/swarm-home/ethersphere/orange-papers/1/sw%5E3.pdf.
[9]ZHAO G F,ZHANG M C,ZHOU J H,et al.Research and application of block file storage model based on blockchain system of erasure code[J].Netinfo Security,2019,19(2):28-35.
[10]YIN F R,ZHU C Y,ZHAO B,et al.Erasure code partition sto-rage based on CITA blockchain[J].Journal of East China Normal University(Natural Science),2021(5):48-59.
[11]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger Fabric:A distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference.2018:1-15.
[12]BENET J.IPFS-content addressed,versioned,P2P file system[J].arXiv:1407.3561,2014.
[13]SUN X Z,ZHANG X,XIANG F,et al.Survey of storage sca-lability on blockchain[J].Journal of Software,2021,32(1):1-20.
[14]ZHENG Q,LI Y,CHEN P,et al.An innovative IPFS-basedstorage model for blockchain[C]//2018 IEEE/WIC/ACM International Conference on Web Intelligence(WI).IEEE,2018:704-708.
[15]SHARMA P,JINDAL R,BORAH M D.Blockchain technology for cloud storage:A systematic literature review[J].ACM Computing Surveys(CSUR),2020,53(4):1-32.
[16]WANG Y J,XU F L,PEI X Q.Resarch on erasure code-based fault-tolerant technology for distributed storage[J].Chinese Journal of Computers,2017,40(1):236-255.
[17]PLANK J S.A tutorial on Reed-Solomon coding for fault-tole-rance in RAID-like systems[J].Software:Practice and Expe-rience,1997,27(9):995-1012.
[18]TIAN J,DAI Y F.Study on durable peer-to-peer storage techniques[J].Journal of Software,2007(6):1379-1399.
[19]TAN S,JIA Y,HAN W H.Research and development of pro-vable data integrity in cloud storage [J].Chinese Journal of Computers,2015,38(1):164-177.
[20]CAI Z H,LIN J Y,LIU F.Blockchain storage:Technologies and challenges[J].Chinese Journal of Network and Information Security,2020,6(5):11-20.
[21]GALLAGER R.Low-Density Aarity-Check codes [J].IEEETransactions on Information Theory,1962,8(1):21-28.
[22]LIANG T,ZHANG P,LIU C,et al.Efficient encoding of quasi-cyclic low-density parity-check codes[C]//2018 IEEE 3rd Advanced Information Technology,Electronic and Automation Control Conference(IAEAC).IEEE,2018:1189-1193.
[23]NGUYEN T T B,NGUYEN TAN T,LEE H.Efficient QC-LDPC encoder for 5G new radio[J].Electronics,2019,8(6):668.
[24]XIE T,LI B,YANG M,et al.Memory compact high-speed QC-LDPC decoder[C]//2017 IEEE International Conference on Signal Processing,Communications and Computing(ICSPCC).IEEE,2017:1-5.
[25]LIN S,COSTELLO D J.Error control coding,second edition[M].Prentice-Hall,Inc.2004.
[26]BOSE R C.On the construction of balanced incomplete block designs[J].Annals of Eugenics,1939,9(4):353-399.
[27]ZHANG F,MAO X,ZHOU W,et al.Girth-10 LDPC codesbased on 3-D cyclic lattices[J].IEEE Transactions on Vehicular Technology,2008,57(2):1049-1060.
[1] TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25.
[2] WANG Junlu, LIU Qiang, ZHANG Ran, JI Wanting, SONG Baoyan. Blockchain-based Dual-branch Structure Expansion Model [J]. Computer Science, 2023, 50(8): 365-371.
[3] YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7.
[4] TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi. Overview of Blockchain Consensus Algorithms [J]. Computer Science, 2023, 50(6A): 220400200-12.
[5] HUANG Baohua, PENG Li, ZHAO Weihong, CHEN Ningjiang. Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions [J]. Computer Science, 2023, 50(6A): 220300064-6.
[6] LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9.
[7] PAN Lu, LUO Tao, NIU Xinzheng. Restart and Recovery Algorithm Based on Distributed Cluster Nodes [J]. Computer Science, 2023, 50(6A): 220300205-6.
[8] XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312.
[9] LIU Wei, GUO Lingbei, XIA Yujie, SHE Wei, TIAN Zhao. Raft Consensus Algorithm Based on Credit Evaluation Model [J]. Computer Science, 2023, 50(6): 322-329.
[10] ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347.
[11] LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322.
[12] CHEN Ruixiang, JIAO Jian, WANG Ruohua. Smart Contract Vulnerability Detection System Based on Ontology Reasoning [J]. Computer Science, 2023, 50(10): 336-342.
[13] LI Bei, WU Hao, HE Xiaowei, WANG Bin, XU Ergang. Survey of Storage Scalability in Blockchain Systems [J]. Computer Science, 2023, 50(1): 318-333.
[14] CHEN Yan, LIN Bing, CHEN Xiaona, CHEN Xing. Blockchain-based Trusted Service-oriented Architecture [J]. Computer Science, 2023, 50(1): 342-350.
[15] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!