Computer Science ›› 2025, Vol. 52 ›› Issue (3): 359-365.doi: 10.11896/jsjkx.240700140

• Computer Network • Previous Articles     Next Articles

Self-learning Star Chain Space Adaptive Allocation Method

DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan   

  1. School of Information,Liaoning University,Shenyang 110031,China
  • Received:2024-07-22 Revised:2024-09-30 Online:2025-03-15 Published:2025-03-07
  • About author:DU Likuan,born in 1999,postgraduate.His main research interests include blockchain and reinforcement learning.
    SONG Baoyan,born in 1965,Ph.D,professor,Ph.D supervisor,is a member of CCF(No.08767S).Her main research interests include large-scale graph processing technology,big data processing technology and stream data processing technology.
  • Supported by:
    National Key Research and Development Program of China(2021YFF0901004),General Project(Service Local Project of Unveiling and Recruiting Talents) of Basic Scientific Research Project of Colleges and Universities of Liaoning Provincial Department of Education(Science and Engineering)(JYTMS20230761),Liaoning University Youth Scientific Research Fund Project(LDYBJB2301) and Liao-ning Provincial Applied Basic Research Program(2022JH2/101300250).

Abstract: Blockchain sharding technology is an effective method to improve the throughput of blockchain systems.Existing blockchain sharding methods mostly adopt parallel architecture sharding schemes,which have not solved the problem of high cross-shard transaction ratios,leading to reduced throughput and potential infinite transaction confirmation delays.To address these issues,a self-learning-based star chain space adaptive allocation structure is proposed.Firstly,to address the issue of high cross-shard transaction ratios in blockchain sharding systems,a beacon chain-shard chain architecture throughput model is proposed.Secondly,considering the relationship between the throughput and latency of sharded blockchain,a star chain space dyna-mic decision-making process is designed,with a reward function for star chain space.Finally,a distributed multi-agent reinforcement learning dynamic clustering method is proposed,treating each shard as an agent to collectively learn cooperative strategies.Experimental results show that the proposed method improves throughput,cross-shard transaction ratio,and transaction confirmation delay by approximately 31.74%,35.96%,and 37.13% respectively,compared with existing methods.

Key words: Blockchain, Sharding, Deep reinforcement learning, Cross-shard transaction

CLC Number: 

  • TP314
[1]LI X,DONG X,XU X,et al.A Blockchain-Based Scheme for Efficient Medical Data Sharing with Attribute-Based Hierarchical Encryption[C]//WISA.Cham:Springer International Publi-shing,2022:661-673.
[2]WEI W,ZHOU Y,LI D,et al.BEAIV:Blockchain Empowered Accountable Integrity Verification Scheme for Cross-Chain Data[C]//Web Information Systems and Applications.Singapore:Springer Nature Singapore,2023:488-500.
[3]LI X H,LI C,ZHANG G G,et al.A Survey on the Integration of Blockchain and Database Technology [J].Computer Science and Exploration,2023,17(4):761-770.
[4]WU Y,WANG Z,MA Y,et al.Deep reinforcement learning for blockchain in industrial IoT:A survey[J].Computer Networks,2021,191:108004.
[5]HUANG H W,KONG W,PENG X W,et al.Survey on block-chain sharding technology [J].Computer Engineering,2022,48(6):1-10.
[6]LIU X,XIE H,YAN Z,et al.A survey on blockchain sharding[J].ISA Transactions,2023,141:30-43.
[7]WANG J,MA J W,LUO J X.A Blockchain Sharding Schemefor Edge Computing [J].Journal of Internet of Things,2023(7):88-100.
[8]JIA L,LIU Y,WANG K,et al.Estuary:A Low Cross-Shard Blockchain Sharding Protocol Based on State Splitting[J].IEEE Transactions on Parallel and Distributed Systems,2024,35(3):405-420.
[9]ZHANG J,CHEN W,HONG Z,et al.Efficient Execution of Arbitrarily Complex Cross-Shard Contracts for Blockchain Sharding[J].IEEE Transactions on Computers,2024,73(5):1190-1205.
[10]XU Y,SHAO J,SLAATS T,et al.MWPoW+:A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding[J].ACM Transactions on Internet Technology,2023,23(2):34:1-34:27.
[11]LI M,LIN Y,ZHANG J,et al.CoChain:High ConcurrencyBlockchain Sharding via Consensus on Consensus[C]//IEEE INFOCOM 2023-IEEE Conference on Computer Communications.2023:1-10.
[12]YU B,ZHAO H,ZHOU T,et al.OverShard:Scaling blockchain by full sharding with overlapping network and virtual accounts [J].Journal of Network and Computer Applications,2023,220:103748.
[13]LIU Y,LIU J,VAZ SALLES M A,et al.Building blocks of sharding blockchain systems:Concepts,approaches,and open problems[J].Computer Science Review,2022,46:100513.
[14]MU K,WEI X.EfShard:Toward Efficient State Sharding Blockchain via Flexible and Timely State Allocation[J].IEEE Tran-sactions on Network and Service Management,2023,20(3):2817-2829.
[15]LI M,LUO X,XUE K,et al.A Secure and Efficient Blockchain Sharding Scheme via Hybrid Consensus and Dynamic Management[J].IEEE Transactions on Information Forensics and Security,2024,19:5911-5924.
[16]LUU L,NARAYANAN V,ZHENG C,et al.A Secure Sharding Protocol For Open Blockchains[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.New York,NY,USA:Association for Computing Machinery,2016:17-30.
[17]GADIRAJU D S,LALITHA V,AGGARWAL V.An Optimization Framework Based on Deep Reinforcement Learning Approaches for Prism Blockchain[J].IEEE Transactions on Ser-vices Computing,2023,16(4):2451-2461.
[18]KOKORIS-KOGIAS E,JOVANOVIC P,GASSER L,et al.OmniLedger:A Secure,Scale-Out,Decentralized Ledger via Sharding[C]//2018 IEEE Symposium on Security and Privacy(SP).2018:583-598.
[19]ZHANG J,HONG Z,QIU X,et al.SkyChain:A Deep Reinforcement Learning-Empowered Dynamic Blockchain Sharding System[C]//Proc of the 49th International Conference on Pa-rallel Processing.New York,NY,USA:Association for Computing Machinery,2020:1-11.
[20]ZHOU K,ZHANG X,WANG C,et al.Accelerating Cross-Shard Blockchain Consensus via Decentralized Coordinators Service With Verifiable Global States[J].IEEE Transactions on Ser-vices Computing,2024,17(4):1340-1353.
[1] WANG Haoyan, LI Chongshou, LI Tianrui. Reinforcement Learning Method for Solving Flexible Job Shop Scheduling Problem Based onDouble Layer Attention Network [J]. Computer Science, 2026, 53(1): 231-240.
[2] PAN Yanyang, YANG Binhao, JI Qingge. PBFT Consensus Algorithm Based on Bayesian Theory [J]. Computer Science, 2026, 53(1): 331-340.
[3] CHEN Jintao, LIN Bing, LIN Song, CHEN Jing, CHEN Xing. Dynamic Pricing and Energy Scheduling Strategy for Photovoltaic Storage Charging Stations Based on Multi-agent Deep Reinforcement Learning [J]. Computer Science, 2025, 52(9): 337-345.
[4] ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375.
[5] ZHANG Yongliang, LI Ziwen, XU Jiahao, JIANG Yuchen, CUI Ying. Congestion-aware and Cached Communication for Multi-agent Pathfinding [J]. Computer Science, 2025, 52(8): 317-325.
[6] FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392.
[7] HUO Dan, YU Fuping, SHEN Di, HAN Xueyan. Research on Multi-machine Conflict Resolution Based on Deep Reinforcement Learning [J]. Computer Science, 2025, 52(7): 271-278.
[8] WU Zongming, CAO Jijun, TANG Qiang. Online Parallel SDN Routing Optimization Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2025, 52(6A): 240900018-9.
[9] ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang. Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks [J]. Computer Science, 2025, 52(6A): 240600153-8.
[10] WANG Chenyuan, ZHANG Yanmei, YUAN Guan. Class Integration Test Order Generation Approach Fused with Deep Reinforcement Learning andGraph Convolutional Neural Network [J]. Computer Science, 2025, 52(6): 58-65.
[11] ZHAO Xuejian, YE Hao, LI Hao, SUN Zhixin. Multi-AGV Path Planning Algorithm Based on Improved DDPG [J]. Computer Science, 2025, 52(6): 306-315.
[12] WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374.
[13] LI Yuanbo, HU Hongchao, YANG Xiaohan, GUO Wei, LIU Wenyan. Intrusion Tolerance Scheduling Algorithm for Microservice Workflow Based on Deep Reinforcement Learning [J]. Computer Science, 2025, 52(5): 375-383.
[14] YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361.
[15] JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!