Conference Paper

JCLedger: A Blockchain Based Distributed Ledger for JointCloud Computing

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... • Main concepts about blockchain (Bozic et al., 2016;Lee Kuo Chuen, 2015;Mougayar, 2016;Nakamoto, 2008;Nomura Research Institute, 2016;Prpić, 2017;Swan, 2015;Xiang et al., 2017;Sikorski et al., 2017;Yli-Huumo et al., 2016;Zheng et al., 2017Zheng et al., , 2016. ...
... DPoS is a protocol very similar to PoS. The main difference among them is that in DPoS the delegates to generate and validate the blocks are elected by stakeholders, and it is required fewer nodes to accomplish this, contributing to the block can be confirmed quickly (Xiang et al., 2017). In DPoS, network parameters, such as block size and block intervals can be adjusted by delegates. ...
... Furthermore, it is not necessary to worry about dishonest delegates because they could be easily removed (Zheng et al., 2017). DPOS implements a layer of technological democracy to offset the negative effects of centralisation, so DPOS is called representative democratic, while PoS is direct democratic (Xiang et al., 2017). DPOS is the backbone of the (BitShares, 2018). ...
... • Main concepts about blockchain (Bozic et al., 2016;Lee Kuo Chuen, 2015;Mougayar, 2016;Nakamoto, 2008;Nomura Research Institute, 2016;Prpić, 2017;Swan, 2015;Xiang et al., 2017;Sikorski et al., 2017;Yli-Huumo et al., 2016;Zheng et al., 2017Zheng et al., , 2016. ...
... DPoS is a protocol very similar to PoS. The main difference among them is that in DPoS the delegates to generate and validate the blocks are elected by stakeholders, and it is required fewer nodes to accomplish this, contributing to the block can be confirmed quickly (Xiang et al., 2017). In DPoS, network parameters, such as block size and block intervals can be adjusted by delegates. ...
... Furthermore, it is not necessary to worry about dishonest delegates because they could be easily removed (Zheng et al., 2017). DPOS implements a layer of technological democracy to offset the negative effects of centralisation, so DPOS is called representative democratic, while PoS is direct democratic (Xiang et al., 2017). DPOS is the backbone of the (BitShares, 2018). ...
Article
Full-text available
Since the launch of Bitcoin, the interest in Blockchain technology has grown over the years and has attracted many researchers. There are several proposals to improve the performance of the Blockchain, however these proposals bring a series of changes, which are difficult to implement and most of them are not compatible with existing applications. The current limitations prevent Blockchain from being used on a large scale for other types of applications or even replace the currently known electronic payment methods, making studies necessary to address these gaps and evolve the technology. This paper presents a literature review of Blockchain technology with focus in architecture, security, and performance, providing an understanding about the main features and exploring the current open gaps, in light of the main tools used in the systematic literature review methodology. A taxonomy is also proposed to support design solution and helping to classify Blockchain systems.
... However, the bigger capacity in a block leads to the slower propagation and verification time [38]. Decelerated propagation time in the P2P blockchain network also causes to a double-spending attack that allows malicious parties using the same coin for more than once. ...
Article
Full-text available
Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The propagation delay opens up opportunities for attackers to apply their protocol. Either by accelerating or decelerating the propagation time directly without proper calculation, it brings numerous negative impacts to the entire blockchain system. In this paper, we thoroughly review and elaborate on several parameters related to the propagation time in such a system. We describe our findings in terms of data communication, transaction propagation, and the possibility of an interference attack that caused an extra propagation time. Furthermore, we present the influence of block size, consensus, and blockchain scalability, including the relation of parameters. In the last session, we remark several points associated with the propagation time and use cases to avoid dilemmas in the light of the experiments and literary works.
... The single cloud may fail to satisfy these demands or only be proficient in some functions what IoT services need. Moreover, the development of Economic Globalization has brought the demand of transnational cooperation among various IoT devices in different countries [8][9]. Single cloud impossibly provides all devices with satisfied services due to the high cost of cloud deployment or country policy. ...
Article
The Internet of Things (IoT) is becoming mature gradually and has already entered our daily life, which interconnects more machines and makes communication more convenient and more intelligent. Massive IoT devices produce innumerable data which need to be analyzed in Joint Cloud computation (JointCloud) with diversified services. However, due to the weak security of IoT devices, the existing JointCloud architecture hardly provides a secure trusted trade environment for users which affects severely the application in IoT network. In this paper, we propose a hierarchical trust networking architecture based on permissioned blockchain to implement JointCloud (HTJC). The proposed Hyperledger fabric based architecture has a better performance than those based on Ethereum in latency. By introducing the credit bonus-penalty strategy (CBPS), HTJC can solve the trust problem and provide users with a secure trusted trade environment. The availability of proposed architecture is evaluated and compared to the existing models. The numerical results show that the HTJC can defend DDoS attacks and provide users with trusted and effective trade platform.
... By creating a distributed cloud infrastructure, the proposed model enables cost-effective high-performance computing. The provenance architecture ProvChain [124] , JointCloud [125] computing are the two papers explained the Blockchain concept integration with cloud computing environment and suggested that disadvantage of cloud computing can be overcome by using Blockchain concepts like trust, no central computing and security and privacy of the end user. Users also shown his transaction in digital ledger form in Blockchain system. ...
Article
Blockchain Technology has received a lot of attention from both industry and academia due to its decentralized, persistency, anonymity and auditability properties. In this survey, use of Blockchain technology in wide applications area and its implementation challenges have been done. A rigorous search for journal/research article related to Blockchain technology have been reviewed. We have considered �ve databases to conduct this survey namely Sciencedirect, IEEE Xplore, Web of Science, ACM Digital Library and Inderscience are being used. After initial phase elimination 135 research articles are considered in �nal databases for the survey. Main focus of the survey is to provide a comprehensive analysis on wide applications of Blockchain technology for the academic research community. In this paper challenges in implementing of Blockchian and its associated security and privacy issues have been discussed. For the �rst time a survey of this type have been done where Blockchain with application and its associated security and privacy issue have been reviewed.
... JointCloud is a new generation of cloud computing model [5]. It aims at empowering the cooperation among multiple Cloud Service Providers to provide cross-cloud services [10]. It can be considered as a large-scale, flexible, and elastic computing resource platform [11]. ...
... In particular, user-centric blockchain applications could enable end-users to control, trace and claim ownership of every piece of content they share [408]. Of particular interest are some IT-oriented blockchain applications like, for example, edge computing and the establishment of computational resource sharing systems [409,410], grid computing [411], cloud computing [412], and the use of blockchain as a software connector [413,414]. Finally, blockchain technology may also improve social sharing dynamics [415]. ...
Article
Full-text available
This work provides a systematic literature review of blockchain-based applications across multiple domains. The aim is to investigate the current state of blockchain technology and its applications and to highlight how specific characteristics of this disruptive technology can revolutionise "business-as-usual" practices. To this end, the theoretical underpinnings of numerous research papers published in high ranked scientific journals during the last decade, along with several reports from grey literature as a means of streamlining our assessment and capturing the continuously expanding blockchain domain, are included in this review. Based on a structured, systematic review and thematic content analysis of the discovered literature, we present a comprehensive classification of blockchain-enabled applications across diverse sectors such as supply chain, business, healthcare, IoT, privacy, and data management, and we establish key themes, trends and emerging areas for research. We also point to the shortcomings identified in the relevant literature, particularly limitations the blockchain technology presents and how these limitations spawn across different sectors and industries. Building on these findings, we identify various research gaps and future exploratory directions that are anticipated to be of significant value both for academics and practitioners.
Article
In the era of Internet of Things (IoTs), watching videos on mobile devices has been a popular applications in our daily life. How to recommend videos to users is one of the most concerned problem for Internet Video Service Providers (IVSPs). In order to provide better recommendation service to users, they deploy cloud servers in a Geo-distributed manner. Each server is responsible for analyzing a local area of user data. Therefore, these cloud servers form information islands and the characteristics of data present non-independent and identically distribution (non-i.i.d). In this scenario, it is difficult to provide accurate video recommendation service to the minority of users in each area. To tackle this issue, we propose JointRec, a deep learning-based joint cloud video recommendation framework. JointRec integrates the JointCloud architecture into mobile IoTs and achieves federated training among distributed cloud servers. Specifically, we first design a Dual-Convolutional Probabilistic Matrix Factorization (Dual-CPMF) model to conduct video recommendation. Based on this model, each cloud can recommend videos by exploiting the user’s profiles and description of videos that users rate, thereby providing more accurate video recommendation services. Then we present a federated recommendation algorithm which enables each cloud to share their weights and train a model cooperatively. Furthermore, considering the heavy communication costs in the process of federated training, we combine low rank matrix factorization and 8-bit quantization method to reduce uplink communication costs and network bandwidth. We validate the proposed approach on the real-world dataset, the experimental results indicate the effectiveness of our proposed approach.
Article
JCLedger is a BlockChain-based distributed ledger for JointCloud that can improve the reliability and convenience of cloud resource exchanges by empowering cooperation among multiple clouds. The biggest challenge for the implementation of JCLedger is the approach to consensus. The existing consensus algorithms for the public BlockChain, such as proof of work (PoW) or proof of stake (PoS) does not apply to the JointCloud, because they require a massive computing power with a low throughput or monopoly risk. In this paper, we propose a practical Byzantine-fault-tolerance (PBFT)-based consensus algorithm called proof of previous transactions (PoPT), in which the accountants are selected by a specific hash function from a certain number of candidates. The candidates are chosen according to the users' participation in JointCloud, and only candidates that join the PBFT-based consensus process instead of all users. We also propose a new BlockChain structure for parallel accounting to improve the scalability of JCLedger, and a consistent hashing algorithm is used to assign the transactions to different accountants. Simulation experiments show that the PoPT can shield the unequal computing power of the users to provide them equal accounting opportunities, and the parallel accounting can handle the massive and high-frequency transactions in JointCloud more efficiently.
Conference Paper
Blockchain is distributed ledger with the advantage of high security, tamper resistant and traceability. However, in the process of the growth of Blockchain, network isolation hinders the cooperative operation among different Blockchains and greatly restricts the development of Blockchain. There is an urgent need to break the barriers among Blockchains[1], thus cross-chain communication become a new trend of the Blockchain technology[2]. In this paper, we propose CVEM, a value exchange mechanism which supports different kind of tokens transfer cross-chain. First, we put the main exchange process execute off-chain and the final result on-chain. Then, we combine Revocable Sequence Maturity Contract (RSMC) with the idea of cross-token exchange of Blockchain, and use the mechanism of multi-signatures address to constrain the users' behaviors. In addition, we introduce the Simple Payment Verification Proof (SPV Proof) to verify transactions. Our work, to some degree, shortens the transaction process delay and also ensures the security and scalability of the value exchange.
Technical Report
Full-text available
Instant Payments, the digitalisation of purchases, strict regulations, payment initiation services and account information services - it is clear already today that these topics will influence the world of payments significantly in the future. However, the exact form and utilisation of these factors essentially depends on certain drivers – and their influence is much harder to predict: How strong are fintechs going to be? Which role do internet giants want to play in future? Will customers accept new payment procedures? Which authentication procedures are available? How is the willingness to cooperate going to develop in the banking industry? The study “Paying in 2025 – Scenarios for the future of the payment systems in Germany” therefore does not strive to predict the “one true” future. Rather, we used the input from our survey and various expert workshops to identify those factors that are most likely to influence the future of payment over the next decade. On this basis we developed various internally consistent scenarios of the future which can help to understand what paying in 2025 may look like. With this study, we aim to support the decision-makers in the payments sector in the analysis of the opportunities and challenges of the future payments landscape. You can reach the website of “Z_punkt The Foresight Company” and “Fraunhofer Instituts für Naturwissenschaftlich-Technische Trendanalysen INT” via z-punkt.de and int.fraunhofer.de
Conference Paper
Full-text available
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital cryptocurrencies. Although the security provisions of Bitcoin have been thoroughly analysed, the security guarantees of variant (forked) PoW blockchains (which were instantiated with different parameters) have not received much attention in the literature. This opens the question whether existing security analysis of Bitcoin's PoW applies to other implementations which have been instantiated with different consensus and/or network parameters. In this paper, we introduce a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains. Based on our framework, we devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints such as network propagation, different block sizes, block generation intervals, information propagation mechanism, and the impact of eclipse attacks. Our framework therefore allows us to capture existing PoW-based deployments as well as PoW blockchain variants that are instantiated with different parameters, and to objectively compare the tradeoffs between their performance and security provisions.
Article
Full-text available
In the context of cloud computing, no other aspect looms larger over all others than billing in Infrastructure-as-a-Service or IaaS as it is also known. This paper proposes a checklist option on IaaS Online Billing System that is described as being transparent in its computation in incorporating information on cloud resources availed and consumed, the period under consideration, and the charges accrued, thereon, for utilizing services against payment on-demand. We have discussed here, our proposed Billboard Manager with the checklist option which helps the cloud user in ascertaining how much resources have been consumed and then pay for the services enjoyed. At preset intervals of customers' choosing, a cloud service provider would be able to inform the users the actual usage. A user is required to thoroughly examine the information and approve the same, for final billing to take place. In case of discrepancy, a user would have the option to raise issues in pre-billing charge statement with the cloud service provider for mutual verification; and to arrive at the final bill. With the aid of this system, customer satisfaction could be significantly enhanced.
Article
Full-text available
This paper describes a new replication algorithm that is able to tolerate Byzantine faults. We believe that Byzantinefault -tolerant algorithms will be increasingly important in the future because malicious attacks and software errors are increasingly common and can cause faulty nodes to exhibit arbitrary behavior. Whereas previous algorithms assumed a synchronous system or were too slow to be used in practice, the algorithm described in this paper is practical: it works in asynchronous environments like the Internet and incorporates several important optimizations that improve the response time of previous algorithms by more than an order of magnitude. We implemented a Byzantine-fault-tolerant NFS service using our algorithm and measured its performance. The results show that our service is only 3% slower than a standard unreplicated NFS. 1 Introduction Malicious attacks and software errors are increasingly common. The growing reliance of industry and government on online information...
Article
Blockchain is an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies, and has recently attracted intensive attention from governments, financial institutions, high-tech enterprises, and the capital markets. Blockchain's key advantages include decentralization, time-series data, collective maintenance, programmability and security, and thus is particularly suitable for constructing a programmable monetary system, financial system, and even the macroscopic societal system. In this paper, we proposed a basic model of the blockchain system, discussed the principles, technologies, methods and applications of blockchain and the related Bitcoin systems. We also discussed the smart contract and its applications, and presented the future trends of blockchain-enabled paralleled societies. This paper is aimed at providing helpful guidance and reference for future research efforts.
Article
Extreme learning machine (ELM) has been intensively studied during the last decade due to its high efficiency, effectiveness and easy-to-implementation. Recently, many variants, such as parallel ELM (P-ELM) incremental ELM and online sequential ELM(OS-ELM), have been proposed to improve its timing performance and enable its ability of incremental learning. In this paper, we propose two parallel variants, termed as data parallel regularized ELM (DPR-ELM) and model parallel regularized ELM (MPR-ELM), to further improve the computational efficiency of ELM in handling large scale learning tasks. Collectively, these two variants are called as parallel regularized ELM (PR-ELM). Specifically, our proposed algorithms are implemented on cluster with Message Passing Interface (MPI) environment. In summary, the advantages of the proposed PR-ELM algorithms over existing variants are highlighted as follows: (1) They have better parallelism since they train each data block or each sub-model independently. (2) They dramatically reduce the requirement of huge runtime memory since the whole datasets or the whole model are split into small chunks or sub-models. (3) Both DPR-ELM and MPR-ELM have better scalability since they are able to be configured on clusters with many more computing nodes. Extensive experiments have been conducted to validate the effectiveness of the proposed algorithms. As shown, DPR-ELM and MPR-ELM achieve 5.15× and 3.5× speedup on cluster with six nodes, respectively. Moreover, the speedup of DPR-ELM increases to 5.85× with the increase of the size of dataset, and this quantity is increased to 4× for MPR-ELM with the increase of the number of hidden nodes.
Article
Infrastructure as a service (IaaS) allows users to rent resources from the Cloud to meet their various computing requirements. The pay-as-you-use model, however, poses a nontrivial technical challenge to the IaaS cloud service providers: how to fast provision a large number of virtual machines (VMs) to meet users' dynamic computing requests? We address this challenge with VMThunder, a new VM provisioning tool, which downloads data blockson demandduring the VM booting process and speeds up VM image streaming by strategically integrating peer-to-peer (P2P) streaming techniques with enhanced optimization schemes such as transfer on demand, cache on read, snapshot on local, and relay on cache. In particular, VMThunder stores the original images in a share storage and in the meantime it adopts a tree-based P2P streaming scheme so that common image blocks are cached and reused across the nodes in the cluster. We implement VMThunder in CentOS Linux and thoroughly test its performance. Comprehensive experimental results show that VMThunder outperforms the state-of-the-art VM provisioning methods, with respect to scalability, latency, and VM runtime I/O performance.
Article
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
The bitcoin lightning network: Scalable off-chain instant payments
  • Poon Joseph
  • Thaddeus Dryja
Lightning Network development discussion
  • Rusty Russel
Lightning Network development discussion
  • Amos Bairn
Delegated proof-of-stake white paper
  • D Larimer
IEEE International Workshop on Electronic Contracting (WEC)
  • Szabo Nick
A Peer to Peer Polymorphic Digital Asset Exchange
  • Daniel Larimer
  • Charles Hoskinson
  • Stan Larimer
Blockchain Challenges and Opportunities: A Survey[J]
  • Z Zheng
  • H N Xie
  • Dai