簡易檢索 / 詳目顯示

研究生: 江念庭
Nien-Ting Chiang
論文名稱: 使用改進分片共識協議以增強區塊鏈系統之擴展性
Enhancing Scalability in the Blockchain System with an Improved Sharding Consensus Protocol
指導教授: 馮輝文
Huei-Wen Ferng
口試委員: 馮輝文
Huei-Wen Ferng
羅乃維
Nai-Wei Lo
胡誌麟
Chih-Lin Hu
鄭傑
Jay Cheng
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2020
畢業學年度: 108
語文別: 中文
論文頁數: 30
中文關鍵詞: 區塊鏈分片技術擴展性
外文關鍵詞: Blockchain, Sharding Technology, Scalability
相關次數: 點閱:245下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在當今的區塊鏈(Blockchain)系統中,要設計與中心化支付系統(Centralized Payment System)具相同安全且高吞吐量(Throughput)將是一大挑戰,而其中一種解決方案(Solution)就是使用分片(Sharding )技術。而本論文的目標則是針對分片技術做改進,以提升吞吐量及具備可延展性(Scalability)。其將透過引入分片控制器(Shard Controller)來管理(Manage)、接收(Accept)與終止(Abort)交易(Transaction),以有效減少分片之間相互傳遞訊息的額外費用(Overhead),進而減少延遲(Latency),並且達到吞吐量的提升。最後,透過亞馬遜網頁服務(Amazon Web Service, AWS)彈性雲端運算(Elastic Compute Cloud, EC2)平台進行評估(Evaluation)和測試(Test);結果顯示,本論文所提機制較文獻上相近機制在吞吐量與延遲方面均有顯著改善。


    In today's blockchain system, it is a big challenge to have the same security level and high throughput as the centralized payment system. One of the solutions to achieve this goal is to use the technology of sharding. Therefore, the goal of this thesis lies in improving throughput and achieving scalability for the blockchain system with sharding. By introducing a shard controller to manage, accept, and abort transaction messages to the blockchain system with sharding to effectively reduce the overhead of transferring messages between shards, latency is then reduced, increasing throughput accordingly. Finally, evaluation and test are arranged on the elastic compute cloud (EC2) platform of the Amazon web service (AWS). Our results show that our proposed mechanism outperforms the related mechanism in the literature in terms of throughput and latency.

    論文指導教授推薦書............................... i 考試委員審定書.................................. ii 中文摘要 ..................................... iii 英文摘要 ..................................... iv 誌謝........................................ v 目錄........................................ vi 圖目錄....................................... viii 第一章、簡介................................... 1 第二章、相關研究................................ 4 2.1 區塊鏈之可擴展性 ........................... 4 2.2 使用分片的區塊鏈系統......................... 5 第三章、方法設計................................ 7 3.1 節點分配至分片............................. 7 3.2 處理跨分片交易............................. 7 第四章、系統評估 ................................ 12 4.1 實驗設置 ................................ 12 4.2 效能評估 ................................ 13 4.3 系統之可擴展性............................. 15 第五章、結論................................... 17 參考文獻 ..................................... 18

    [1] M. Al-Bassam, A. Sonnino, S. Bano, D. Hrycyszyn, and G. Danezis, “Chainspace: A Sharded Smart Contracts Platform,” in Proc. USENIX Net- work and Distributed System Security Symposium(NDSS), Feb. 2018.
    [2] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” Bitcoin. – URL: https://www.bitcoin.org/bitcoin.pdf, 2009.
    [3] W. Wang, D. T. Hoang, P. Hu, Z. Xiong, D. Niyato, P. Wang, Y. Wen, and D. I. Kim, “A Survey on Consensus Mechanisms and Mining Strategy Man- agement in Blockchain Networks,” IEEE Access, Jan. 2019.
    [4] Wikipedia, “Scalability — Wikipedia, the free encyclopedia,” http://en. wikipedia.org/w/index.php?title=Scalability&oldid=920351560, 2019, [On- line; accessed 15-November-2019].
    [5] Wikipedia contributors, “Ethereum — Wikipedia, the free encyclopedia,” 2020, [Online; accessed 30-August-2020]. [Online]. Available: https: //en.wikipedia.org/w/index.php?title=Ethereum&oldid=974857360
    [6] M. Castro and B. Liskov, “Practical Byzantine Fault Tolerance,” in Proc. USENIX Symposium on Operating Systems Design and Implementation
    (OSDI), Feb. 1999, pp. 173–186.
    [7] G.Bracha,“AnO(Logn)ExpectedRoundsRandomizedByzantineGenerals
    Protocol,” J. ACM, vol. 34, no. 4, p. 910–920, Oct. 1987.
    [8] E. K. Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, and B. Ford, “Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing,” in Proc. USENIX Security Symposium (USENIX Secu- rity 16), Aug. 2016, pp. 279–296.
    [9] I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse, “Bitcoin-NG: A Scalable Blockchain Protocol,” in in Proc. USENIX Conference on Networked Systems Design and Implementation, Mar. 2016, pp. 45–59.
    [10] J. C. Corbett, J. Dean, M. Epstein, A. Fikes, C. Frost, J. J. Furman, S. Ghe- mawat, A. Gubarev, C. Heiser, P. Hochschild et al., “Spanner: Google’s Globally Distributed Database,” ACM Transactions on Computer Systems (TOCS), vol. 31, no. 3, pp. 1–22, Aug. 2013.
    [11] M. Zamani, M. Movahedi, and M. Raykova, “RapidChain: Scaling Blockchain via Full Sharding,” in Proc. ACM SIGSAC Conference on Computer and Communications Security, Jan. 2018, pp. 931–948.
    [12] L. Luu, V. Narayanan, C. Zheng, K. Baweja, S. Gilbert, and P. Saxena, “A Secure Sharding Protocol For Open Blockchains,” in Proc. ACM SIGSAC Conference on Computer and Communications Security, Oct. 2016, pp. 17– 30.
    [13] G. Danezis and S. Meiklejohn, “Centrally Banked Cryptocurrencies,” in Proc. EATCS Network and Distributed System Security Symposium(NDSS), Feb. 2016.
    [14] E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, E. Syta, and B. Ford, “OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding,” in Proc. IEEE Symposium on Security and Privacy (SP), May 2018, pp. 583– 598.
    [15] I. Abraham, D. Malkhi, K. Nayak, L. Ren, and A. Spiegelman, “Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus,” in Proc. International Conference on Principles of Distributed Systems (OPODIS), Mar. 2018, pp. 25:1–25:19.
    [16] R. Pass and E. Shi, “Hybrid Consensus: Efficient Consensus in the Permissionless Model,” in Proc. EATCS International Symposium on Dis- tributed Computing (DISC), Oct. 2017, pp. 39:1–39:16.
    [17] J. Poon and T. Dryja, “The Bitcoin Lightning Network: Scalable Off- Chain Instant Payments,” The Bitcoin Lightning Network. –URL: https://light- ning.network/lightning-network-paper.pdf, Jan. 2016.
    [18] A. BBack, M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, A. Miller, A. Poelstra, J. Timón, and P. Wuille, “Enabling Blockchain Innovations with Pegged Sidechains,” URL: https://blockstream.com/sidechains.pdf, Oct. 2014.
    [19] P. Otte, M. de Vos, and J. Pouwelse, “Trustchain: A Sybil-Resistant Scalable Blockchain,” Future Generation Computer Systems, vol. 107, pp. 770–780, Jun. 2020.
    [20] F. Cristian, H. Aghili, R. Strong, and D. Dolev, “Atomic Broadcast: From Sim- ple Message Diffusion to Byzantine Agreement,” Information and Computa- tion, vol. 118, no. 1, pp. 158–179, Jul. 1995.
    [21] S. Micali, M. Rabin, and S. Vadhan, “Verifiable Random Functions,” in Proc. IEEE Annual Symposium on Foundations of Computer Science, Oct. 1999, pp. 120–130.
    [22] E. Syta, P. Jovanovic, E. K. Kogias, N. Gailly, L. Gasser, I. Khoffi, M. J. Fischer, and B. Ford, “Scalable Bias-Resistant Distributed Randomness,” in Proc. IEEE Symposium on Security and Privacy (SP), May 2017, pp. 444– 460.
    [23] J.GrayandL.Lamport,“ConsensusonTransactionCommit,”ACMTransac- tions on Database Systems (TODS), vol. 31, no. 1, pp. 133–160, Mar. 2006.
    [24] P. L’Ecuyer, “Random Number Generation, in Handbook of Computational Statistics,” Springer Handbooks of Computational Statistics, pp. 35–71, Jan. 2012.
    [25] L. Gudgeon, P. Moreno-Sanchez, S. Roos, P. McCorry, and A. Gervais, “Sok: Layer-Two Blockchain Protocols,” in Proc. International Conference on Financial Cryptography and Data Security, Jul. 2020, pp. 201–226.
    [26] Wikipedia contributors, “Unspent transaction output — Wikipedia, the free encyclopedia,” 2020, [Online; accessed 29-August-2020]. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Unspent_transaction_ output&oldid=960105291
    [27] L. Kiffer, R. Rajaraman, and A. Shelat, “A Better Method to Analyze Blockchain Consistency,” in Proc. ACM SIGSAC Conference on Computer and Communications Security, Jan. 2018, pp. 729–744.
    [28] R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Computing Surveys (CSUR), vol. 52, no. 3, pp. 1–34, Aug. 2019.

    QR CODE