Computer Science ›› 2023, Vol. 50 ›› Issue (8): 365-371.doi: 10.11896/jsjkx.220900049

• Information Security • Previous Articles    

Blockchain-based Dual-branch Structure Expansion Model

WANG Junlu, LIU Qiang, ZHANG Ran, JI Wanting, SONG Baoyan   

  1. School of Information,Liaoning University,Shenyang 110036,China
  • Received:2022-09-06 Revised:2023-03-10 Online:2023-08-15 Published:2023-08-02
  • About author:WANG Junlu,born in 1988,Ph.D candidate,lecturer,is a member of China Computer Federation.His main research interests include large scale map processing techniques and big data processing techniques.
    SONG Baoyan,born in 1965,Ph.D,professor,is a member of China Computer Federation.Her main research interests include large scale map processing techniques and big data processing techniques.
  • Supported by:
    Applied Basic Research Program of Liaoning Province(2022JH2/101300250),Digital Liaoning Smart Building Strong Province(Direction of Digital Economy)(13031307053000568),National Key R&D Program of China(2021YFF0901004),Central Government Guides Local Science and Technology Development Foundation Project of Liaoning Province(2022JH6/100100032) andNatural Science Foundation of Liaoning Province(2022-KF-13-06).

Abstract: With the rapid development of blockchain technology,blockchain faces scalability challenges in terms of storage overhead and data throughput.The blockchain is affected by the consensus principle of overall consensus,and the global ledger of the entire blockchain needs to be stored between nodes,and the data storage overhead is high.At the same time,in order to maintain the consistency and credibility of transactions within the block,all nodes participate in the process of transaction verification and synchronization,the block synchronization delay in the peer-to-peer network is high.And the bandwidth requisition is blocked,which further reduces the data throughput.In response to these problems,this paper proposes a blockchain-based dual-branch structure expansion model.First,a ternary storage expansion structure of the blockchain is established.The nodes accurately divide the storage tasks and store the single,partial,and global ledger of the blockchain,which effectively reduces the storage burden of the nodes.Secondly,a dual-branch structure model is proposed,the main chain is divided into multi-channel sub-chains.And data is stored in parallel through multi-channel sub-chains,which significantly improves the data storage rate.Aiming at the compatibility problem of sub-chains after shunting,a two-way rotation mechanism is introduced to realize the fusion transition between chain structures.For the security problem of sub-chains after shunting,the gambler extension-F and gambler extension-S strategies are proposed to simulate the security attack of the two chain structures,and the mathematical modeling of the attack process is carried out.Finally,constructing the security constraints of the two models to verify the security of the dual-branch model.Experiments show that the dual-branch structure expansion model proposed in this paper can effectively resist malicious double-spending attacks,and has great advantages in storage overhead and data throughput.

Key words: Blockchain expansion, Two-degree branch chain, Ternary storage expansion, Two-way rotation mechanism, Gambler expansion mode

CLC Number: 

  • TP311
[1]KUZNETSOV A,LUTSENKO M,KUZNETSOVA K,et al.Statistical Testing of Blockchain Hash Algorithms[C]//CMiGIN.2019:67-79.
[2]WANG J S,LI L L,YAN Y,et al.Security Incidents and Solutions of Blockchain Technology Application[J].Computer Science,2018,45(6A):352-355.
[3]NERURKAR P,PATEL D,BUSNEL Y,et al.Dissectingbitcoin blockchain:Empirical analysis of bitcoin network[J].Journal of Network and Computer Applications,2021,177:102940.
[4]RAMAN R K,VARSHNEY L R.Distributed storage meets secret sharing on the blockchain[C]//2018 Information Theory and Applications Workshop(ITA).IEEE,2018:1-6.
[5]BACH L M,MIHALJEVIC B,ZAGAR M.Comparative analysis of blockchain consensus algorithms[C]//2018 41st International Convention on Information and Communication Technology,Electronics and Microelectronics(MIPRO).2018:1545-1550.
[6]LEPORE C,CERIA M,VISCONTI A,et al.A survey on blockchain consensus with a performance comparison of PoW,PoS and pure PoS[J].Mathematics,2020,8(10):1782.
[7]XIE M,LIAO Z,HUANG L.Data Security Based on Blockchain Digital Currency[C]//2020 3rd International Conference on Smart BlockChain(SmartBlock).IEEE,2020:5-10.
[8]SCHÄR F.Decentralized finance:On blockchain-and smart contract-based financial markets[J].FRB of St.Louis Review,2021,103(2):153-174.
[9]DIALLO E,DIB O,ZEMA N R,et al.When Proof-of-Work(PoW) based blockchain meets VANET environments[C]//2021 12th International Conference on Information and Communication Systems(ICICS).IEEE,2021:336-343.
[10]ALDRIGHETTI A,CANAVARI M,HINGLEY M K.A Delphi Study on Blockchain Application to Food Traceability[J].International Journal on Food System Dynamics,2021,12(1):6-18.
[11]LIU Q,SONG B Y,JI W T,et al.Research on malicious attack model of blockchain multi-mining pools [J].Journal of Frontiers of Computer Science & Technology,2021:1-11.
[12]YIU N C K.An Overview of Forks and Coordination in Blockchain Development[J].arXiv:2102.10006,2021.
[13]MIN X P,LI Q Z,KONG L J,et al.License chain multi-center dynamic consensus mechanism[J].Chinese Journal of Compu-ters,2018,41(5):1005-1020.
[14]JIA D Y,XIN J C,WANG Z Q,et al.Blockchain storage capacity scalable model[J].Journal of Frontiers of Computer Science &Technology,2018,12(4):525-535.
[15]FADHIL M,OWENSON G,ADDA M.A bitcoin model forevaluation of clustering to improve propagation delay in bitcoin network[C]//2016 IEEE International Conference on Computational Science and Engineering(CSE).IEEE,2016:468-475.
[16]MEI H,GAO Z,GUO Z,et al.Storage mechanism optimization in blockchain system based on residual number system[J].IEEE Access,2019,7:114539-114546.
[17]WANG J L,LIU Q,SONG B Y.Research on the Optimization Model of Blockchain Hierarchical Proxy[J].IEEE Access,2021,9:144327-144340.
[1] DU Ming, YANG Wen, ZHOU Junfeng. Maximum Influential Community Search in Heterogeneous Information Network [J]. Computer Science, 2023, 50(8): 16-26.
[2] WANG Xu, WU Yanxia, ZHANG Xue, HONG Ruize, LI Guangsheng. Survey of Rotating Object Detection Research in Computer Vision [J]. Computer Science, 2023, 50(8): 79-92.
[3] XING Linquan, XIAO Yingmin, YANG Zhibin, WEI Zhengmin, ZHOU Yong, GAO Saijun. Spacecraft Rendezvous Guidance Method Based on Safe Reinforcement Learning [J]. Computer Science, 2023, 50(8): 271-279.
[4] ZHU Pengzhe, YAO Yuan, LIU Zijing, XI Ruicheng. Compiler-supported Program Stack Space Layout Runtime Randomization Method [J]. Computer Science, 2023, 50(8): 314-320.
[5] XUE Yuanzhou, YANG Shuo, MAO Xinjun. Adjoint Observation Schemes and Software Implementation Framework for Autonomous Robots [J]. Computer Science, 2023, 50(7): 1-9.
[6] DU Hao, WANG Yunchao, YAN Chenyu, LI Xingwei. Test Cases Generation Techniques for Root Cause Location of Fault [J]. Computer Science, 2023, 50(7): 10-17.
[7] LIU Ziwen, YU Lijuan, SU Yixing, ZHAO Yao, SHI Zhu. Test Case Generation Based on Web Application Front-end Behavior Model [J]. Computer Science, 2023, 50(7): 18-26.
[8] CHEN Zhifei, HAO Yang, CHEN Lin, XIAO Liang. Rule-based Technique for Detecting Risky Dynamic Typing Code [J]. Computer Science, 2023, 50(7): 27-37.
[9] WANG Mingxia, XIONG Yun. Disease Diagnosis Prediction Algorithm Based on Contrastive Learning [J]. Computer Science, 2023, 50(7): 46-52.
[10] SHAN Xiaohuan, SONG Rui, LI Haihai, SONG Baoyan. Event Recommendation Method with Multi-factor Feature Fusion in EBSN [J]. Computer Science, 2023, 50(7): 60-65.
[11] WEI Sen, ZHOU Haoran, HU Chuang, CHENG Dazhao. Implementation and Optimization of Apache Spark Cache System Based on Mixed Memory [J]. Computer Science, 2023, 50(6): 10-21.
[12] YU Ting, WANG Lisong, QIN Xiaolin. Lock-free Parallel Semi-naive Algorithm Based on Multi-core CPU [J]. Computer Science, 2023, 50(6): 29-35.
[13] LIU Renyu, XU Zhiqian, SHANG Honghui, ZHANG Yunquan. Study of Iterative Solution Algorithm of Response Density Matrix in Density Functional Perturbation Theory [J]. Computer Science, 2023, 50(6): 81-85.
[14] ZHANG Yaqing, SHAN Zhongyuan, ZHAO Junfeng, WANG Yasha. Intelligent Mapping Recommendation-based Knowledge Graph Instance Construction and Evolution Method [J]. Computer Science, 2023, 50(6): 142-150.
[15] ZHANG Zelun, YANG Zhibin, LI Xiaojie, ZHOU Yong, LI Wei. Machine Learning Based Environment Assumption Automatic Generation for Compositional Verification of SCADE Models [J]. Computer Science, 2023, 50(6): 297-306.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!