skip to main content
10.1145/3376044.3376050acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbtaConference Proceedingsconference-collections
research-article
Open Access

Fractional Reservation Based Mempool Processing in Blockchains

Authors Info & Claims
Published:20 March 2020Publication History

ABSTRACT

A massive traffic events that impact all the nodes in the distributed system may cause a Denial of Service (DoS). Managing DoS attacks is even harder in peer-to-peer projects because of multiple equal in rights nodes (miners or maintainers) that communicate across the globe to secure the network. In most blockchains, users can send transactions. Moreover, as a systems throughput is limited, the ability to send transactions should be limited in some honest and transparent way. Otherwise, the pool of unconfirmed (pending) transactions mempool could be overloaded, and it may cause DoS. In Bitcoin, users pay a fee for each transaction to address this issue. Steem.io introduced an alternative approach based on the fractional reservation of the blockchain block space. This approach is an adaptation of similar ones from the network routing and banking systems. The block space fractional reservation for blockchains in terms of a score function is introduced in this paper. Authors made a private blockchain project demo on Exonum framework. The score function influences only on mempool processing, and other blockchains can also make use of it.

References

  1. J. Dollimore, T. Kindberg, and G. Coulouris, "Distributed Systems: Concepts and Design," p. 944, 2005.Google ScholarGoogle Scholar
  2. NCCIC, "Understanding denial-of-service attacks," 2009. [Online]. Available: https: //www.us-cert.gov/ncas/tips/ST04-015Google ScholarGoogle Scholar
  3. E. Kaspersky, "A Brief History of DDoS Attacks," 2016. [Online]. Available: https://eugene.kaspersky.com/2016/12/06/a-brief-history-of-ddos-attacks/Google ScholarGoogle Scholar
  4. A. Lloyd, "The Effects of DDoS Attacks on Essential Services," 2018. [Online]. Available: https://www.corero.com/blog/887-the-effects-of-ddos-attacks-on-essential-services.htmlGoogle ScholarGoogle Scholar
  5. S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," www.bitcoin.org, pp. 1--9, 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdfGoogle ScholarGoogle Scholar
  6. M. Swan, "Summary for Policymakers," in Climate Change 2013 - The Physical Science Basis, Intergovernmental Panel on Climate Change, Ed. Cambridge: Cambridge University Press, 2015, pp. 1--30.Google ScholarGoogle Scholar
  7. M. Pilkington, "Blockchain Technology: Principles and Applications," in Research Handbook on Digital Transformations. Springer, 2016, pp. 225--253.Google ScholarGoogle ScholarCross RefCross Ref
  8. H. M. Kim and M. Laskowski, "Towards an Ontology-Driven Blockchain Design for Supply Chain Provenance," SSRN Electronic Journal, vol. 25, no. 1, pp. 18--27, 8 2016. [Online]. Available: http://www.ssrn.com/abstract=2828369Google ScholarGoogle Scholar
  9. T.-T. Kuo, H.-E. Kim, and L. Ohno-Machado, "Blockchain distributed ledger technologies for biomedical and health care applications," Journal of the American Medical Informatics Association, vol. 24, no. 6, pp. 1211--1220, 11 2017.Google ScholarGoogle ScholarCross RefCross Ref
  10. S. Angraal, H. M. Krumholz, and W. L. Schulz, "Blockchain Technology," Circulation: Cardiovascular Quality and Outcomes, vol. 10, no. 9, pp. 5665--5690, 9 2017.Google ScholarGoogle ScholarCross RefCross Ref
  11. P. Mamoshina, L. Ojomoko, Y. Yanovich, A. Ostrovski, A. Botezatu, P. Prikhodko, E. Izumchenko, A. Aliper, K. Romantsov, A. Zhebrak, I. O. Ogu, and A. Zhavoronkov, "Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare," Oncotarget, vol. 9, no. 5, pp. 5665--5690, 1 2018. [Online]. Available: http://www.oncotarget.com/fulltext/22345Google ScholarGoogle ScholarCross RefCross Ref
  12. Y. Yanovich, I. Shiyanov, T. Myaldzin, I. Prokhorov, D. Korepanova, and S. Vorobyov, "Blockchain-Based Supply Chain for Postage Stamps," Informatics, vol. 5, no. 4, p. 42, 11 2018.Google ScholarGoogle ScholarCross RefCross Ref
  13. N. Alzahrani and N. Bulusu, "Block-Supply Chain: A New Anti-Counterfeiting Supply Chain Using NFC and Blockchain," in Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems - CryBlock'18. New York, New York, USA: ACM Press, 2018, pp. 30--35.Google ScholarGoogle Scholar
  14. Bitfury Group and J. Garzik, "Public versus Private Blockchains. Part 1: Permissioned Blockchains,"bitfury.com, pp. 1--23, 2015. [Online]. Available: http://bitfury.com/content/5-white-papers-research/public-vs-private-pt1-1.pdfGoogle ScholarGoogle Scholar
  15. "Public versus Private Blockchains Part 2: Permissionless Blockchains," bitfury.com, pp. 1--20, 2015. [Online]. Available: http://bitfury.com/content/5-white-papers-research/public-vs-private-pt2-1.pdfGoogle ScholarGoogle Scholar
  16. C. Cachin, "Architecture of the Hyperledger Blockchain Fabric," IBM Research, vol. July, 2016.Google ScholarGoogle Scholar
  17. Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends," in 2017 IEEE International Congress on Big Data (BigData Congress). IEEE, 6 2017, pp. 557--564. [Online]. Available: http://ieeexplore.ieee.org/document/8029379/Google ScholarGoogle Scholar
  18. D. M. Khaled Baqer, Danny Yuxing Huang and N. Weaver, "Stressing Out: Bitcoin Stress Testing," in Financial Cryptography Workshops 2016, 2016.Google ScholarGoogle Scholar
  19. M. T. Marie Vasek and T. Moore, "Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem," in Financial Cryptography and Data Security, 10 2014, pp. 57--71.Google ScholarGoogle ScholarCross RefCross Ref
  20. D. Gilbert, "Blockchain Complaints Hit Record Level As Bitcoin Transaction Times Grow And Fees Rise," 2016. [Online]. Available: https://www.ibtimes.com/ blockchain-complaints-hit-record-level-bitcoin-transaction-times-grow-fees-rise-2332196Google ScholarGoogle Scholar
  21. S. Choi and K. G. Shin, "Predictive and adaptive bandwidth reservation for hand-offs in QoS-sensitive cellular networks," in Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication -SIGCOMM '98, vol. 28, no. 4. New York, New York, USA: ACM Press, 1998, pp. 155--166.Google ScholarGoogle Scholar
  22. A. B. Abel, B. Bernanke, and D. D. Croushore, Macroeconomics. Pearson, 2014.Google ScholarGoogle Scholar
  23. Steemit, "Steem: An incentivized, blockchain-based, public content platform." Steem.io, pp. 1--32, 2017. [Online]. Available: https://steem.io/SteemWhitePaper.pdfGoogle ScholarGoogle Scholar
  24. F. Vogelsteller and V. Buterin, "ERC-20 Token Standard," 2015. [Online]. Available: https://github.com/ethereum/EIPs/blob/master/EIPS/eip-20.mdGoogle ScholarGoogle Scholar
  25. E. Lombrozo, J. Lau, and P. Wuille, "Segregated Witness (Consensus layer)," 2015. [Online]. Available: https://github.com/bitcoin/bips/blob/master/bip-0141.mediawikiGoogle ScholarGoogle Scholar
  26. D. Starodubov, "Steam: Motivated Social Media Blockchain Platform (russian)," 2017.Google ScholarGoogle Scholar
  27. Y. Yanovich, I. Ivashchenko, A. Ostrovsky, A. Shevchenko, and A. Sidorov, "Exonum: Byzantine fault tolerant protocol for blockchains," 2018.Google ScholarGoogle Scholar

Index Terms

  1. Fractional Reservation Based Mempool Processing in Blockchains

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICBTA '19: Proceedings of the 2019 2nd International Conference on Blockchain Technology and Applications
        December 2019
        135 pages
        ISBN:9781450377430
        DOI:10.1145/3376044

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 March 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)41
        • Downloads (Last 6 weeks)4

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader