Computer Science ›› 2019, Vol. 46 ›› Issue (12): 101-107.doi: 10.11896/jsjkx.181002014

• Network & Communication • Previous Articles     Next Articles

Improved PBFT Consensus Mechanism Based on K-medoids

CHEN Zi-hao, LI Qiang   

  1. (College of Computer Science,Sichuan University,Chengdu 610065,China)
  • Received:2018-10-31 Online:2019-12-15 Published:2019-12-17

Abstract: With the popularization and development of digital currency,the blockchain technology enters the public’s vision,and has been hailed as the fourth milestone in credit history,the cornerstone of future credit[1].However,blockchain technology is also facing problems such as low efficiency of consensus and waste of computing power.The K-medoids clustering algorithm is used to cluster and hierarchically divide the large scale network nodes participating in the blockchain consensus based on features,and then the improved multi-centered PBFT (Practical Byzantine Fault Tole-rance) consensus algorithm is applied to the clustered model.Moreover,in order to improve the controllability of clustering algorithm to cluster nodes in blockchain model under various scenarios,this paper improved K-medoids algorithm.Simulation results show that when appropriate clustering features are selected to evaluate the similarity between nodes,the improved algorithm K-PBFT reduces the single-consensus time consumption by 20%,and the consensus process communication times can be reduced by three orders of magnitude.The experimental results show that K-PBFT optimizes the consensus process involving large-scale nodes,so that the blockchain technology can be applied to a wider range of application scenarios.

Key words: Blockchain, Clustering algorithm, K-medoids, Practical byzantine fault tolerance

CLC Number: 

  • TP301
[1]SWAN M.Blockchain:Blueprint for a New Economy[M]. USA:O’Reilly Media Inc,2015:45-68.
[2]中国人民银行.中国人民银行数字货币研讨会召开[OL].http://www.pbc.gov.cn/goutongjiaoliu/113456/113469/3008070/index.html.
[3]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.(in Chinese)
袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
[4]LAMPORT L,SHOSTAK R,PEASE M.The Byzantine gene- rals problem [J].ACM Transactions on Programming Languages and Systems,1982,4(3):382-401.
[5]Delegated Proof-of-Stake Consensus[EB/OL].[2018-07-10]. https://bitshares.org/technology/delegated-proof-of-stake-con-sensus/.
[6]邹均.区块链技术指南[M].北京:机械工业出版社,2016:109-128.
[7]CASTRO M,LISKOV B.Practical byzantine fault tolerance and proactive recovery[J].Acm Transactions on Computer Systems,2002,20(4):398-461.
[8]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy- perledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference.ACM,2018:30.
[9]李明轩.区块链投资人李明轩:区块链通过多中心化机制解决传统互联网问题[EB/OL].http://www.sohu.com/a/271184292_100133330.
[10]YUAN Y,NI X C,ZENG S,et al.Development Status and Prospect of Blockchain Consensus Algorithm[J].Acta Automatica Sinica,2018,44(11):2011-2022.
[11]NI X,ZENG S,HAN X,et al.Organizational management using software-defined robots based on smart contracts[C]//2018 IEEE Intelligent Vehicles Symposium (IV).IEEE,2018:274-279.
[12]WANG S,YUAN Y,WANG X,et al.An overview of smart contract:architecture,applications,and future trends[C]//2018 IEEE Intelligent Vehicles Symposium (IV).IEEE,2018:108-113.
[13]IRVING G,HOLDEN J.How blockchain-timestamped proto- cols could improve the trustworthiness of medical science[J].F1000 Research,2016,5:222.
[14]PAPADOPOULOS G.Blockchain and Digital Payments:An Institutionalist Analysis of Cryptocurrencies[M].Academic Press,2015:153-172.
[15]DADDA L,MACCHETTI M,OWEN J.The design of a high speed ASIC unit for the hash function SHA-256 (384,512)[C]//Proceedings of the conference on Design,Automation and Test in Europe.IEEE Computer Society,2004.
[16]KATZ J,LINDELL Y.Introduction to Modern Cryptography:Principles and Protocols[M].Chapman and Hall/CRC,2014:207.
[17]BRACHA G,TOUEG S.Asynchronous consensus and broad- cast protocols[J].Journal of the Acm,1985,32(4):824-840.
[18]REITER M K.A Secure Group Membership Protocol[J].IEEE Transactions on Software Engineering,1996,22(1):31-42.
[19]MAO D H.Improved Canopy-Kmeans algorithm based on Map- Reduce[J].Computer Engineering and Applications,2012,48(27):22-26.
[20]PATTABIRAMAN V,PARVATHI R,NEDUNCHEZIAN R,et al.A Novel spatial clustering with obstacles and facilitators constraint based on edge detection and k-medoids[C]//International Conference on Computer Technology and Development,2009(ICCTD’09).IEEE,2009:402-406.
[21]MA Q,XIE J Y.K-medoids clustering algorithm based on particle computing [J].Computer Applications,2012,32(7):1973-1977.
[22]ISSARIYAKUL T,HOSSAIN E.Introduction to Network Si- mulator 2 (NS2)[M]//Introduction to Network Simulator NS2.Springer,Boston,MA,2012:21-40.
[23]CALVERT K,EAGAN J,MERUGU S,et al.Extending and enhancing GT-ITM[C]//ACM SIGCOMM Workshop on Models,Methods and TOOLS for Reproducible Network Research.ACM,2003:23-27.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] CHAI Hui-min, ZHANG Yong, FANG Min. Aerial Target Grouping Method Based on Feature Similarity Clustering [J]. Computer Science, 2022, 49(9): 70-75.
[3] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[4] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[5] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[6] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[7] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[8] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[9] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[10] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[11] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[12] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[13] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[14] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[15] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!