Proof of Fairness: Dynamic and Secure Consensus Protocol for Blockchain
Abstract
:1. Introduction
- Reason 1. The PoW and PoS approaches build their selection methodologies on the following factors: powerful computational resources and credit. Thus, these methods result in frequently selecting the same node as a miner in each mining session selection, resulting in the following issues:
- –
- Disappointed nodes: Nodes with limited computational resources will become disappointed and they may stop participating in other selection processes. Thus, this issue will lead to what is termed the ‘lazy’ issue.
- –
- Lazy node: Since only nodes with powerful computational capabilities will always succeed in being selected as miners, other nodes with limited computational capabilities will become disinclined to participate in the mining selection process.
Therefore, PoW, PoS, and similar approaches seem to fail to guarantee fairness and motivation for all nodes during the miner selection process. From another angle, a hacker can use the selection methodology as a vulnerability point to launch his attack and violate the whole system. In light of this reality, the hacker can launch the following attacks:- –
- Domination attack. Hackers equipped with supercomputing capabilities can join a blockchain system as legitimate nodes. Here, hackers will be assigned as miner nodes in many selection sessions, due to the powerful computational capabilities. Therefore, this grants them full control of most generated blocks, which can then perform various malicious behaviors.
- –
- Block Injection. Since the hackers have been assigned as miner nodes for many miner selection sessions, due to their supercomputing capabilities, they could successfully guess the puzzle algorithm. Here, a hacker can generate various attacks, such as generating a fake session for selecting a miner node and then selecting themselves to inject a fake block into a blockchain system.
- Reason 2. These approaches also provide fixed monetary rewards as compensation for the participating miner node. However, providing a merely fixed reward is not adequate to ensure the continuity of the growing blockchain system, as the blockchain will be measured by the size of its budget. For example, the total monetary rewards of the recruited miner nodes should not exceed the system budget. When the system budget is less than the allocated reward amount, the system will fail to recruit a miner for any new block. Thus, the blockchain will not be practical for adoption for most cloud-based systems.
- A reverse auction (RA) mechanism is proposed as an incentive mechanism to encourage all nodes to participate in the miner selection node process. In RA, each node draws its strategy based on its computational capability and claimed cost. It then bids with its best strategy in each selection process.
- An expressive language (EL) is designed to categorize transaction types based on their sensitivity to processing times to ensure compatibility with our miner selection process.
- A homomorphic signcryption (HSC) scheme is designed as a security and privacy scheme to protect the bidder’s data confidentiality from being disclosed.
- Inclusive validation is conducted in order to illustrate the efficiency of the proposed PoF protocol through performance evaluation and numerical analysis, demonstrating that the proposed mechanism effectively satisfies the fairness in selecting a miner node, in comparison to current PoW and PoS consensus protocols.
2. Related Work
3. Preliminaries
3.1. Blockchain Mechanism
3.2. Consensus Mechanism
- Asset: This is the main database that includes data that are prepared for processing using reading and writing operations. It can be financial data, such as bank account information, or any kind of data.
- Miner: This is a node that is responsible for verifying the transaction’s validity and generating a new proposed block in the blockchain. However, a node will only be assigned as a miner according to the consensus protocol, such as PoW or PoS.
- Verifiers: This is a group of nodes that are in charge of verifying the validity of the newly generated block [38].
3.3. Description of Transactions Classification
- Low sensitivity: Transactions with low-sensitive payloads could be assigned as low importance to the execution time. For example, the time period for generating a block of transactions with low sensitivity could be measured by days but less than a week.
- Soft sensitivity: Transactions with soft-sensitive payloads are more important, and a new block must be generated within a few hours to a maximum of a day. Thus, the node with the capability of generating a block in a day or less has a chance of being selected as a miner node.
- Hard sensitivity: Transactions with hard-sensitive payloads can be in real-time and are measured from seconds to a maximum of a few hours. The node with the capability of generating a block in a view of seconds to a few hours will have a high chance of being assigned as a miner node.
3.4. Architecture Model
- Auction mechanism: In the proposed model, one trusted node acts as the auctioneer (or multiple nodes vote on decisions), starting an auction system by announcing the task along with its time period specifications. This is done to select one winner from the connected participating nodes to act as the miner node. Indeed, for decentralization, the auctioneer role can consist of multiple nodes that vote on a decision.
- Bidding mechanism: Each node selects its best strategy according to its time capacity to generate a block. Each node sends its bidding value to the auctioneer, aiming to offer a lower cost to win the auction session.
- Winner selection mechanism: According to the nodes’ bidding values, the auctioneer determines the winner that suggests the lower cost, and is capable of generating a block within the required period.
- Payment mechanism: The winning node will be rewarded financially after performing the required task.
3.5. Auction Model
3.6. Design Objective
- The time, , is considered private data because if the time to generate the block is disclosed, it will lead to violating the node’s capability.
- The cost, , value is considered private data because if it is disclosed, it will lead to detecting the node’s best strategy, which may help other nodes set up their best cost strategies to win the session.
4. Details of the PoF Protocol
4.1. Incentive Mechanism
4.1.1. Task Announcement
4.1.2. Bidding
4.1.3. Selecting Winner Bidder (SWB)
- n denotes the number of bidder nodes.
- denotes the conflict graph, where f represents the collection of number (n) bidders and u denotes a k set of edges , where each represents m sets of that have the same period.
- Step 1: For each , sort nodes based on their neighbors’ costs, , as follows:A node with a lower cost, , will be selected as a winner in its edge, .
- Step 2: Sort all winning nodes from each according to their cost, , such that
- Step 3: The lowest cost in Step 2 will be selected as a final winner, fulfilling the following requirement:
Algorithm 1 SWB Algorithm |
Input: Task and bidder set . Output: Assignment Δ.
|
4.1.4. Fair Reward Mechanism
Algorithm 2 Fair reward algorithm |
Input: Group bidders , conflict graph, g, and assignment Δ. Output: Reward R
|
4.2. Computational Complexity
- Sorting process: In this process, the auctioneer will sort all n bidder nodes according to their similarity times. For example, it first sorts m bidder nodes that have similar time periods in their bids in a group, . This process will take time to sort each group, , according to their similarity time, and it will take time to sort all n bidder nodes, such that .
- Selection process: In this process, the auctioneer selects the bidder node with the lowest cost from each , which will take time.
5. Proposed Security Mechanism for PoF
5.1. Security and Privacy Scheme
5.1.1. Bilinear Group
- Bilinearity property: Let and , such that:
- –
- –
- Non-degeneracy property: Let , such that .
- Computational ability property: is efficiently computable.
5.1.2. Complexity Assumptions
5.2. Details of the PoF Security and Privacy Scheme
- For each node, , the auctioneer, , computes
- For each node, , the auctioneer, , computes the following:
- –
- –
It then accepts as a valid timestamp if the following equation is held: - Sort m sets of bidder nodes that have valid . Group the same in a set, , such that
- Monotonic assignment: The auctioneer, , uses its private key to obtain a cost, , value from ciphertexts, , for each node, , as follows:
- –
- –
Thus, is an encrypted value of the real cost, ; hence, the auctioneer, , knows nothing about the node, ,’s real cost, , value. Thus, the node, ,’s private cost, , is still secure.It then starts sorting nodes according to their in ascending order, such thatThe auctioneer, , selects the node with a lower cost and then deletes the other nodes. It replays this step for all groups . Finally, it sorts all winning nodes from each according to their costs, , such thatTherefore, the auctioneer, , selects the lower cost value as a winner and then assigns the winning node, , as a miner node for this session. - Critical payment: For the winning node, , the auctioneer, , determines its critical neighbor by running Algorithm 2. It then sends the to the smart payment contract.
6. Security Analysis
- Privacy and integrity: In compliance with Definition 11, the bid value is signcrypted under the assumption, which prevents a malicious node, , from disclosing or even modifying the content of any target bid value. Since each participating node, , signcrypts its bid value using a receiver’s public key, as well as random secure, , to calculate , the malicious node, , will not be able to reveal or forge any ciphertext of within a polynomial time without knowing the receiver’s private key and the random value, . In addition, the malicious node, , will not be able to generate a fake signature on any targeted bid value without reaching the sender’s private key that is utilized to generate .
- Authentication: The authentication property is guaranteed since the proposed security and privacy scheme is based on the signcryption technique. Each participating node, , authenticated itself by generating a signature on its encrypted bid, using its private key as . However, the auctioneer, , only accepts the ciphertext if it is valid according to the verification step, as illustrated in the following equation:In this work, we exploit an aggregation methodology to reduce the computational cost as used in Equation (1).
- Secure winner selection: The proposed security and privacy scheme is based on a signcryption technique with a concept of a homomorphic technique in order to propose a security mechanism for PoF. According to Definitions 11, and 12, the auctioneer, , first sorts all bidders according to their time period, sorting bidders that provide the same period in a group and selecting a bidder with a lower cost as a winner from each group. Finally, it sorts all winners in descending order, according to their costs, and then selects a lower cost. The auctioneer, , performs all selecting winner processes without disclosing the bidders’ actual time periods and their real costs under the .
7. Performance Evaluation
7.1. Numerical Analysis
7.1.1. Participating Node’s Satisfaction
- denotes with hard sensitivity, where there is a short period of execution.
- denotes with soft sensitivity, where there is a medium period of execution.
- denotes with low sensitivity, where there is a long period of execution.
7.1.2. Auctioneer’s Satisfaction
7.2. Parameter Setting and Platform
- Cryptographic system parameter. The proposed security and privacy cryptographic scheme is executed on the type A of the JPBC (http://gas.dia.unisa.it/projects/jpbc (accessed on 18 October 2023)) library based on a security parameter, , over the elliptic curve, , and field, , with the embedding degree, . The operation is executed using Java programming language.
- Blockchain system parameter. A simulation of the proposed scheme is used to determine its actual fairness in the mining process. In the simulation setting, we instantiate 100 virtual node servers. We assume that the 100 nodes randomly send their bidding values in each mining session, including their costs and time periods to the auctioneer. For a real simulation, we use a private blockchain network using the Hyperledger Besu (https://www.hyperledger.org (accessed on 21 October 2023)). This is an open-service platform that provides web client management and monitoring tools based on Java and JavaScript. The parameter settings are built on three servers for the test chain. The first server node is installed to manage the HTTP execution based on next.js (https://nextjs.org/ (accessed on 21 October 2023)). The second node is a truffle server installed to manage the Ethereum. The third node is the nginx server installed to act as an auctioneer server.
7.3. Performance of PoF Protocol
A Fairness of Selecting Miner Node
7.4. Comparisons of Effectiveness
Time Cost of Miner Node Selection
- Time of computational cost: Comparing PoF to PoW and PoS protocols, we observe that, with increasing the number, n, of bidder nodes, the computational costs linearly increase in PoW and PoS protocols compared to our proposed PoF protocol, as illustrated in Figure 6a. This is because, with increasing n bidder nodes, the complexity of the mathematical puzzle in the PoW protocol will also be increased, which increases the computational cost of solving the puzzle. Additionally, within the PoS protocol, the computational cost for counting and collecting the amount of cryptocurrency will increase by increasing n bidder nodes.
- Time cost of transmission message: As shown in Figure 6b, the proposed PoF protocol has a lower transmission cost compared with PoW and PoS protocols. The transmission cost in the PoW protocol increases linearly with the cost of the mathematical puzzle. As discussed previously, with the increasing number of bidders, the complexity of the puzzle will also increase. Thus, this will also increase the size of the message length, and the transmission time cost will increase. In addition, in the PoS protocol, the transmission cost also increases linearly when increasing the amount of cryptocurrency. When increasing the number of bidders, each node will increase its amount of cryptocurrency to win the session.
7.5. Performance of a Security and Privacy Scheme of PoF Protocol
7.5.1. Computational Cost
- Bidding phase : In this phase, each node, , encrypts its best strategy, which generates nine multiplication operations, , in .
- Verification phase : In this phase, the auctioneer will take three bilinear pairing for n nodes to verify their validation.
- Sorting phase : In this phase, the auctioneer will also take three bilinear pairing to sort nodes based on their time and social costs.
- Selecting the winner phase : In this phase, the auctioneer needs to compute three multiplication operations, in .
7.5.2. Communication Cost
8. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260. [Google Scholar]
- Hakak, S.; Khan, W.Z.; Gilkar, G.A.; Assiri, B.; Alazab, M.; Bhattacharya, S.; Reddy, G.T. Recent advances in blockchain technology: A survey on applications and challenges. Int. J. Ad Hoc Ubiquitous Comput. 2021, 38, 82–100. [Google Scholar] [CrossRef]
- Tang, Y.; Xiong, J.; Becerril-Arreola, R.; Iyer, L. Ethics of blockchain: A framework of technology, applications, impacts, and research directions. Inf. Technol. People 2020, 33, 602–632. [Google Scholar] [CrossRef]
- Buterin, V. A next-generation smart contract and decentralized application platform. White Paper 2014, 3, 1–2. [Google Scholar]
- Miao, J.; Wang, Z.; Wu, Z.; Ning, X.; Tiwari, P. A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things. Expert Syst. Appl. 2024, 237, 121329. [Google Scholar] [CrossRef]
- Assiri, B.; Khan, W.Z. Enhanced and lock-free tendermint blockchain protocol. In Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), Tianjin, China, 9–11 August 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 220–226. [Google Scholar]
- Alamer, A.M.A. A secure and privacy blockchain-based data sharing scheme in mobile edge caching system. Expert Syst. Appl. 2024, 237, 121572. [Google Scholar] [CrossRef]
- Zhang, S.; Lee, J.H. Analysis of the main consensus protocols of blockchain. ICT Express 2020, 6, 93–97. [Google Scholar] [CrossRef]
- Assiri, B.; Busch, C. Approximately opaque multi-version permissive transactional memory. In Proceedings of the 2016 45th International Conference on Parallel Processing Workshops (ICPPW), Philadelphia, PA, USA, 16–19 August 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 393–402. [Google Scholar]
- Assiri, B.; Busch, C. Approximate count and queue objects in transactional memory. In Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Lake Buena Vista, FL, USA, 29 May–2 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 894–903. [Google Scholar]
- Li, Q.; Jia, X.; Huang, C. A truthful dynamic combinatorial double auction model for cloud resource allocation. J. Cloud Comput. 2023, 12, 106. [Google Scholar] [CrossRef]
- Alamer, A.; Basudan, S. An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing. Eng. Appl. Artif. Intell. 2020, 91, 103583. [Google Scholar] [CrossRef]
- Pawar, V.; Sachdeva, S. ParallelChain: A scalable healthcare framework with low-energy consumption using blockchain. Int. Trans. Oper. Res. 2023. [Google Scholar] [CrossRef]
- Chaudhary, R.; Jindal, A.; Aujla, G.S.; Aggarwal, S.; Kumar, N.; Choo, K.K.R. BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Comput. Secur. 2019, 85, 288–299. [Google Scholar] [CrossRef]
- Mingxiao, D.; Xiaofeng, M.; Zhe, Z.; Xiangwei, W.; Qijun, C. A review on consensus algorithm of blockchain. In Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, Canada,, 5–8 October 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 2567–2572. [Google Scholar]
- Creydt, M.; Fischer, M. Blockchain and more-Algorithm driven food traceability. Food Control 2019, 105, 45–51. [Google Scholar] [CrossRef]
- Gervais, A.; Karame, G.O.; Wüst, K.; Glykantzis, V.; Ritzdorf, H.; Capkun, S. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 3–16. [Google Scholar]
- Gupta, D.; Saia, J.; Young, M. Proof of work without all the work. In Proceedings of the 19th International Conference on Distributed Computing and Networking, Varanasi, India, 4–7 January 2018; pp. 1–10. [Google Scholar]
- Barhanpure, A.; Belandor, P.; Das, B. Proof of stack consensus for blockchain networks. In Proceedings of the Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, 19–22 September 2018; Revised Selected Papers 6. Springer: Berlin/Heidelberg, Germany, 2019; pp. 104–116. [Google Scholar]
- Gaži, P.; Kiayias, A.; Zindros, D. Proof-of-stake sidechains. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 139–156. [Google Scholar]
- Saad, S.M.S.; Radzi, R.Z.R.M. Comparative review of the blockchain consensus algorithm between proof of stake (pos) and delegated proof of stake (dpos). Int. J. Innov. Comput. 2020, 10. [Google Scholar]
- Ren, L.; Devadas, S. Proof of space from stacked expanders. In Proceedings of the Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, 31 October–3 November 2016; Proceedings, Part I 14. Springer: Berlin/Heidelberg, Germany, 2016; pp. 262–285. [Google Scholar]
- De Angelis, S.; Aniello, L.; Baldoni, R.; Lombardi, F.; Margheri, A.; Sassone, V. PBFT vs. Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain. In Proceedings of the 2nd Italian Conference on Cyber Security ITASEC-2018, Milan, Italy, 6–9 February 2018; CEUR-WS: Aachen, Germany, 2018. [Google Scholar]
- Schwartz, D.; Youngs, N.; Britto, A. The ripple protocol consensus algorithm. Ripple Labs Inc. White Pap. 2014, 5, 151. [Google Scholar]
- Assiri, B. Using leader election and blockchain in E-health. Adv. Sci. Technol. Eng. Syst. J. 2020, 5, 46–54. [Google Scholar] [CrossRef]
- Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
- Bhaskar, P.; Tiwari, C.K.; Joshi, A. Blockchain in education management: Present and future applications. Interact. Technol. Smart Educ. 2021, 18, 1–17. [Google Scholar] [CrossRef]
- Cho, S.; Lee, S. Survey on the Application of BlockChain to IoT. In Proceedings of the 2019 International Conference on Electronics, Information, and Communication (ICEIC), Auckland, New Zealand, 22–25 January 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–2. [Google Scholar]
- Alam, S.; Shuaib, M.; Khan, W.Z.; Garg, S.; Kaddoum, G.; Hossain, M.S.; Zikria, Y.B. Blockchain-based initiatives: Current state and challenges. Comput. Netw. 2021, 198, 108395. [Google Scholar] [CrossRef]
- Khubrani, M.M.; Alam, S. A detailed review of blockchain-based applications for protection against pandemic like COVID-19. TELKOMNIKA (Telecommun. Comput. Electron. Control) 2021, 19, 1185–1196. [Google Scholar] [CrossRef]
- Syed, T.A.; Alzahrani, A.; Jan, S.; Siddiqui, M.S.; Nadeem, A.; Alghamdi, T. A comparative analysis of blockchain architecture and its applications: Problems and recommendations. IEEE Access 2019, 7, 176838–176869. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 557–564. [Google Scholar]
- Zhang, R.; Xue, R.; Liu, L. Security and privacy on blockchain. ACM COmputing Surv. (CSUR) 2019, 52, 1–34. [Google Scholar] [CrossRef]
- Sheneamer, A.; Roy, S.; Kalita, J. An effective semantic code clone detection framework using pairwise feature fusion. IEEE Access 2021, 9, 84828–84844. [Google Scholar] [CrossRef]
- Basudan, S. A Scalable Blockchain Framework for Secure Transactions in IoT-Based Dynamic Applications. IEEE Open J. Commun. Soc. 2023, 4, 1931–1945. [Google Scholar] [CrossRef]
- Basudan, S. A puncturable attribute-based data sharing scheme for the Internet of Medical Robotic Things. Libr. Hi Tech 2022, 40, 1064–1080. [Google Scholar] [CrossRef]
- Assiri, B.; Busch, C. Transactional Memory Scheduling Using Machine Learning Techniques. In Proceedings of the 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), Heraklion, Greece, 17–19 February 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 718–725. [Google Scholar]
- Alamer, A.; Basudan, S. A Security and Privacy-Preserving Accessing Data Protocol in Vehicular Crowdsensing Using Blockchain. In Proceedings of the Seventh International Congress on Information and Communication Technology: ICICT 2022, London, UK, 21–24 February 2022; Springer: Berlin/Heidelberg, Germany, 2022; Volume 2, pp. 315–327. [Google Scholar]
- Alamer, A.M.A.; Basudan, S.A.M.; Hung, P.C. A privacy-preserving scheme to support the detection of multiple similar request-real-time services in IoT application systems. Expert Syst. Appl. 2023, 214, 119005. [Google Scholar] [CrossRef]
- Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. SIAM J. Comput. 2003, 32, 586–615. [Google Scholar] [CrossRef]
Operations | ||||
Max Time | 16.20 ms | 27.85 ms | 461.20 ms | 5.30 ms |
Min Time | 13.70 ms | 20.80 ms | 189.5 ms | 3.50 ms |
Average Time | 14.61 ms | 22.70 ms | 276.30 ms | 4.10 ms |
Max Time | 16.91 ms | 28.10 ms | 635.50 ms | 5.62 ms |
Min Time | 13.70 ms | 21.66 ms | 337 ms | 3.50 ms |
Average Time | 14.75 ms | 23.10 ms | 454 ms | 4.80 ms |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alamer, A.; Assiri, B. Proof of Fairness: Dynamic and Secure Consensus Protocol for Blockchain. Electronics 2024, 13, 1056. https://doi.org/10.3390/electronics13061056
Alamer A, Assiri B. Proof of Fairness: Dynamic and Secure Consensus Protocol for Blockchain. Electronics. 2024; 13(6):1056. https://doi.org/10.3390/electronics13061056
Chicago/Turabian StyleAlamer, Abdulrahman, and Basem Assiri. 2024. "Proof of Fairness: Dynamic and Secure Consensus Protocol for Blockchain" Electronics 13, no. 6: 1056. https://doi.org/10.3390/electronics13061056
APA StyleAlamer, A., & Assiri, B. (2024). Proof of Fairness: Dynamic and Secure Consensus Protocol for Blockchain. Electronics, 13(6), 1056. https://doi.org/10.3390/electronics13061056