ArticlePDF Available

Abstract and Figures

Blockchain is a revolutionary technology that gained widespread popularity since the emergence of cryptocurrencies. The potential uses of Blockchain surpassed digital currency into a wider space that includes the Internet of Things (IoT), security applications and smart embedded systems, among others. As the number of Blockchain users increases, several drawbacks start to emerge, since Blockchains consume excessive amounts of energy to store and manipulate data. Furthermore, the limited scalability nature of Blockchains due to their massive storage requirements might become an issue. To improve the overall performance, several challenges in the current Blockchain structure should be tackled. This paper presents a hybrid system architecture that combines the distributed nature of Blockchains with the centralized feature of servers. Users will connect to servers via personal Blockchains, while servers will share a chain of Blockchains to ensure integrity and security. This will significantly decrease the storage requirements of end-users and enhance the scalability of networks. Businesses will highly benefit from this proposed structure, since it creates a reliable scalable business model.
Content may be subject to copyright.
317
Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 06, No. 04, December 2020.
1. Hazem W. Marar is with Department of Electrical Engineering, Princess Sumaya University for Technology, Amman, Jordan. Email:
h.marar@psut.edu.jo
2. Rosana W. Marar is with Department of Computer Graphics and Animation, Princess Sumaya University for Technology, Amman, Jordan.
Email: r.marar@psut.edu.jo
HYBRID BLOCKCHAIN
Hazem W. Marar1 and Rosana W. Marar2
(Received: 10-May-2020, Revised: 28-Jun.-2020 and 20-Jul.-2020, Accepted: 8-Aug.-2020)
ABSTRACT
Blockchain is a revolutionary technology that gained widespread popularity since the emergence of crypto-currencies.
The potential uses of Blockchain surpassed digital currency into a wider space that includes the Internet of Things
(IoT), security applications and smart embedded systems, among others. As the number of Blockchain users increases,
several drawbacks start to emerge, since Blockchains consume excessive amounts of energy to store and manipulate
data. Furthermore, the limited scalability nature of Blockchains due to their massive storage requirements might
become an issue. To improve the overall performance, several challenges in the current Blockchain structure should
be tackled. This paper presents a hybrid system architecture that combines the distributed nature of Blockchains with
the centralized feature of servers. Users will connect to servers via personal Blockchains, while servers will share a
chain of Blockchains to ensure integrity and security. This will significantly decrease the storage requirements of end-
users and enhance the scalability of networks. Businesses will highly benefit from this proposed structure, since it
creates a reliable scalable business model.
KEYWORDS
Blockchain, Bitcoin, Crypto-currency, Distributed, E-commerce, Hybrid.
1. INTRODUCTION
Since the emergence of Bitcoin in 2008 [1], crypto-currencies and hence Blockchain technology have gained
widespread popularity. The technology features enable it to become the infrastructure for a new generation
of internet interactions that include secure online payments [2]-[3], data exchange and transaction of digital
assets [2]-[4]. Blockchain provides a decentralized, open, Byzantine fault-tolerant transaction mechanism
[5]-[7]. Users can consider Blockchain as a sort of data structure that consists of an ever increasing number
of blocks linked together through cryptography. Each block includes a cryptographic hash of the previous
block, a timestamp and data that users wish to exchange throughout the network [8]-[9]. Data blocks are
shared among users and not saved on a centralized server. The chain of blocks continuously grows when
new blocks are appended into it and this change will be reflected to all users within the chain. Hence, by
design, Blockchain is relatively resistant to data modification. However, in order to append a new block to
the chain, computers, called miners, compete and run a complex hashing algorithm trying to produce a valid
block hash. This will dissipate huge amounts of disproportionate power and time. Furthermore, the ever
increasing chain of blocks will require massive storage capabilities from all users, limiting the scalability of
such technology. Blockchains are governed by a consensus algorithm used as a mechanism to achieve the
necessary agreement on the validity of data among distributed processes. With the recent advances in
Blockchain technology, numerous consensus algorithms were proposed to make endpoints reach an
agreement on the order and state of blocks of transactions and update the distributed ledger accordingly
[10]-[11]. In this paper, a hybrid Blockchain architecture that is suitable for online banking and e-commerce
platforms is proposed. The proposed solution addresses the storage and power consumption requirements
while improving the Blockchain's integrity and security. The paper is organized as follows: Section 2
introduces the Blockchain technology and its methodology, whereas Section 3 illustrates the architecture of
the proposed hybrid solution and Section 4 concludes the paper.
318
Hybrid Blockchain, H. W. Marar and R. W. Marar.
2. BLOCKCHAIN TECHNOLOGY
Blockchain is a distributed transactional database that is governed by network consensus and secured by
advanced cryptography. As illustrated in Figure 1, a Blockchain consists of a series of datasets that are
composed of chains of data blocks. Each block holds several transactions (TXn). Once a set of transactions
is complete, an additional block is appended to the chain, hence representing a complete ledger of
transactions history. The chain of blocks continuously grows when new blocks are appended into it and this
change will be reflected to all users within the chain.
Figure 1. Basic blockchain structure.
In addition to the transactions, each block holds a Unix time timestamp which indicates the time of each
transaction. Moreover, each block has a 256-bit hash value of the previous parent block and a nonce, which
is a random number that verifies the hash. Several hashing algorithms can be used, but the SHA-256
cryptographic hash is the most common [7]. Hash values are unique and therefore, any alteration in the data
would immediately change the respective hash value. As a result, this structure ensures the security and
integrity of the entire Blockchain down to the first block known as the Genesis Block. In order to alter the
contents of any block, network consensus must be achieved. This implies that a minimum of half the
endpoints connected throughout the network reach a common agreement about the present state of the
current distributed ledger or transaction. Hence, in large networks, Blockchain is relatively resistant to data
modification due to the huge number of endpoints. On the other hand, the computational power and storage
power required are immense. Various research studies around Blockchains have been published in recent
years to analyze and tackle the issues and limitations in Blockchains and evaluate consensus algorithms.
The practical byzantine fault tolerance algorithm (PBFT), the proof-of-work algorithm (PoW), the proof-
of-stake algorithm (PoS) and the delegated proof-of-stake algorithm (DPoS) are the four main methods of
reaching consensus in the current Blockchain technology. In PBFT, each node in the network maintains an
ongoing internal state. When a message is received, nodes use the message in conjunction with their internal
state to run a computation algorithm to validate the message. After reaching a decision about the new
message, the node shares that decision with other nodes in the system. A consensus decision is determined
based on the total decisions submitted by all participating nodes. This method of establishing consensus
requires less effort than other methods. However, anonymity can be a great risk on the system.
An alternative method of reaching consensus within a Blockchain is the proof-of-work (PoW) algorithm,
which is used by Bitcoin. In contrast to PBFT, PoW does not require all nodes on the network to participate
and submit their individual conclusions in order for a consensus to be achieved. Rather, PoW is an algorithm
that uses a hash function. Transactions can then be independently verified by all other system participants.
The scheme allows for easy, broad participation while maintaining anonymity.
Proof-of-stake (PoS) algorithm is similar to PoW algorithm, but the participation in the consensus building
process is restricted to a predefined set of nodes known for having a legitimate stake in the Blockchain. The
hash function calculation is replaced with a simple digital signature which proves ownership of the stake. A
more centralized way of achieving consensus is using the delegated proof-of-stake (DPoS) system. The
algorithm works in a similar manner as in the PoS system, except that individuals choose an entity to
represent their portions of stake in the system.
In [12], a specially designed attack scenario is presented, in which collaborating miners’ revenue can be
larger than their fair share. Such attacks can have significant consequences on the Blockchain structure.
319
Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 06, No. 04, December 2020.
Miners might prefer to join the attackers and the colluding group will expand in size until it becomes a
majority. At this point, the Blockchain system ceases to be a decentralized system. In [13], a decentralized
smart contract system that does not store or show financial transactions is presented. Normally, all
transactions, including flow of money, are exposed on the Blockchain. Such information might be useful by
hackers and network attackers to track money and assets. Using such decentralized smart contract system
retains transactional privacy from the public’s view. In [14], a highlight of the weaknesses and limitations
of Bitcoin technology is presented. This includes the theft or loss of Bitcoins due to malware attacks,
structural problems and scalability issues, like delayed transaction confirmation, data retention and
communication failures. A fair exchange protocol that improves the users' anonymity is used to improve the
quality of the existing Bitcoin technology. In [15], a new mechanism for securing Blockchains' contracts is
presented. By introducing a credibility score measure, a hybrid Blockchain that prevents an attacker from
monopolizing resources is introduced. Credibility is a vital factor in any contract or transaction. Contractors
must develop a good knowledge about each other to build up credibility and trust. The more contracts a
contractor has with different people, the more credibility he/she gains. The mechanism proposed creates a
hybrid Blockchain based on the proof-of-stake and credibility score methods. The proposed system uses the
proof-of-work algorithm to introduce a hybrid solution in which power and storage requirements are
minimized while improving the network's scalability and security.
Since Blockchain is a decentralized distributed ledger, it has to be managed by a peer-to-peer network
adhering to a common protocol for communication and appending new blocks. Therefore, each peer in the
network will have a copy of the Blockchain. Any alteration in the Blockchain will involve the alteration of
all subsequent blocks, which requires consensus of the majority of the network. In its current form, the hash
value of each block is generated by miners. Mining is a process at which specialized computers compete to
solve a complex computational problem and produce a valid hash. Hence, miners secure the network and
process every transaction. The SHA-256 cryptographic hash chooses any 256-bit number ranging from 0 to
2256. The target is a 256-bit number that all Blockcahin clients share. The SHA-256 hash of a block's header
must be lower than or equal to the current target for the block to be accepted by the network. The lower the
target, the more difficult it is to generate a block. The maximum target defined by SHA256 mining devices
is illustrated in equation 1.
TMax= 0x00000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF (1)
We define (D) to be the difficulty of finding a valid hash for a given block. D can be defined as in Equation
2 [16]-[17]:   
(2)
where, TMax is the maximum target of the hash value and TCur is the current target hash that the miner found.
Difficulty can be simply defined as the ratio between the maximum target and the current target. TMax and
TCur can be expressed as in Equations 3 and 4 [16]-[17]. The maximum target is defined as (216 - 1) × 2208
or approximately 2224. Since there are 2256 different values that a hash can take, a random hash has a chance
of about 2-32 to be lower than the maximum target.
TMax =     (3)
TCur = 
(4)
The expected number of hashes (N) that a miner needs to calculate to find a block with a given difficulty
(D) is illustrated in Equation 5 [2]:
  


 
 
  (5)
Thus, every hash produced by a given miner has a probability (P) to validate a given block, as seen in
Equation 6:  
 (6)
320
Hybrid Blockchain, H. W. Marar and R. W. Marar.
Miners from all around the world compete using powerful dedicated mining computers to generate a valid
hash. From the equations above, it is evident that such process imposes high levels of power consumption.
Currently, adding a single transaction to the Bitcoin Blockchain platform consumes about 600 kWh [18]-
[19] and the annual power consumption for the Bitcoin network is about 77.78 TWh, which is comparable
to the power consumption of Chile. Furthermore, every node in the public Blockchain network has a local
copy of the entire Blockchain. This drains huge amount of storage. Currently, the Bitcoin database exceeds
250GB and is growing up in a sharp exponential rate, as seen in Figure 2. The overall Bitcoin network is
consuming more than 1000 TiB of storage per year [20] and is increasing in a sharp rate. This is due to the
increase in the number of users of the Bitcoin network. Such properties will restraint the use of this
technology in banking and commercial businesses.
Figure 2. Size of blockchain database.
3. PROPOSED HYBRID BLOCKCHAIN
To minimize the computational power and storage requirements, a hybrid Blockchain model that combines
the centralized feature of servers with the distributed nature of Blockchains is proposed. Figure 3 illustrates
the network infrastructure of the proposed system.
Figure 3. Proposed hybrid blockchain network infrastructure.
0
50000
100000
150000
200000
250000
300000
Blockchain Size in Megabytes
Year
2010 2011 2012 2013 2014
321
Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 06, No. 04, December 2020.
The proposed model can be highly beneficial to modern online businesses. Banks and e-commerce platforms
have several servers distributed over a large geographical area. Using the proposed model, two sets of
networks are defined: a personal Blockchain through which users can interface with the network servers
and a global Blockchain consisting of interconnecting servers. The global Blockchain can be viewed as a
chain of Blockchains that is distributed among servers and being updated periodically. In such scheme, users
can access their respective personal Blockchain, hence accessing their private information only. No user can
get hold of other users' personal data, which improves data privacy. Moreover, single or multiple private
miners owned or governed by the local business policies are distributed among the network. Miners control
the appending of new blocks and mapping hashes throughout the network without competing to solve a
complex mathematical formula. This scenario can improve the network's security, since securing a
Blockchain might require knowing participating miners' computational capabilities. This, in turn, aids in
detecting potential selfish mining attacks [21-[22]. Normally, miners use the Proof-of-Work (PoW) as the
security algorithm and compete trying to solve a complex computational challenge imposed by the PoW
protocol. As a result, miners consume a huge amount of power [23]-[24], [15]. The proposed design includes
single or multiple private trusted miners distributed throughout the network. Furthermore, the mining
process can be fairly distributed among miners, hence immensely reducing the power consumption
requirements of maintaining a Blockchain. Figure 4 illustrates the detailed architecture of the proposed
Hybrid Blockchain.
Figure 4. Proposed hybrid blockchain architecture.
In this scheme, every user has a copy of his/her personal Blockchain consisting of his/her personal
transactions and information. Whenever a user executes a transaction, a broadcast request message is sent
from the user's device to the miners throughout the network. Upon receiving the message, a specific miner,
based on an election algorithm, will compute and produce a global hash and a private hash which is sent
back to the user. Transactions and data blocks of the user's personal Blockchain are linked together through
the received private hash. The user's data is saved locally on his device and also broadcasted to the data
servers throughout the network. Hence, the locally saved user's Blockchain represents 50% of his/her overall
personal network. The other 50% is represented by the business's servers. Each server holds a copy of a
global Blockchain consisting of blocks from all connected users. The blocks are linked through a global
322
Hybrid Blockchain, H. W. Marar and R. W. Marar.
hash generated by the network's miner. Users can only access their respective information. Therefore, no
user can access or view other users' personal data, hence improving data privacy.
Since miners are responsible for the generation of private and global hashes, a mapping algorithm should
be used to track any network change. Mapping algorithms, in their simplest form, can be look-up-tables that
are controlled by miners to translate and govern any change in the network. Furthermore, to reduce power
consumption for maintaining the Blockchain, the mining process can be fairly distributed among miners.
The distribution process can be based on an election algorithm to assign a miner. The election algorithm
can be chosen upon the miner's geographical area, the miner's workload, user's ping signal latency or even
randomly. Figure 5 illustrates an example of an election algorithm based on a specific user's ping signal
latency.
Figure 5. A sample election algorithm based on ping signal latency.
As seen in Figure 4, the network of each user is composed of the user's personal device, representing 50%
of the network, along with the servers' network representing the remaining 50%. This scheme offers high
levels of data security. This is due to the fact that hackers need to control the majority of the network's
servers in addition to the client's device to achieve network consensus to alter or access only a single block.
Assuming that there are several servers in a network, Equation 7 describes the minimal amount of devices
"K" needed to alter a given user block, whereas Equation 8 illustrates the minimum amount of devices "K"
needed to control several blocks within the network.
 
  (7)
 
  (8)
where,
S is a server holding the chain of Blockchains.
n: Number of different users within a selected portion of the Blockchain.
To reach consensus in conventional Blockchains, attackers only need to control a half of the nodes holding
the data. Figure 6 illustrates the improved security of the proposed design against the current Blockchain
system by comparing the minimal number of devices "K" needed to control the network as the number of
users "n" increases.
Figure 7 presents the consensus algorithm used in the proposed design. Miners initiate the consensus
protocol in the network through a 'proposed' function illustrated at lines 714 of the algorithm, allowing
them to propose new blocks. Afterwards, processes within the network decide whether a new block at a
given index is valid at lines 16-23. Appending a new block is shown at line 24 depending on the function
get-main-branch( ). Line 11 maps a global hash used in the servers' network with a local hash used within
the personal network.
 
 
 



7


10

11

323
Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 06, No. 04, December 2020.
Figure 6. Number of devices to achieve network majority.
Figure 7. Consensus algorithm.
4. CONCLUSION
As centralized systems need a central owner to connect and govern all other users and devices, the system
structure is highly dependent on the network connectivity. Hence, abrupt failure of the entire system due to
connectivity or security issues is likely to occur. Therefore, decentralized systems emerged as an alternative
solution to resolve the security issues. One of the most recent promising decentralized architectures is
Blockchain technology. Ever since, Blockchain has been adopted by businesses, e-commerce platforms and
digital currencies like Bitcoin. However, as Bitcoin and related crypto-currencies have become increasingly
popular, they have hit scalability and reliability issues. The process of improving scalability has been
obstructed by an inherent trade-off between performance metrics and security requirements of the system



 
      
 


  
10
       
  
        
 
 

16
 
17

18
 
19

20


 
21

 
22

  
23
 
  
24

324
Hybrid Blockchain, H. W. Marar and R. W. Marar.
architecture. This paper proposes a hybrid Blockchain system that is suitable for banks and e-commerce
businesses. Users can connect to servers using personal Blockchains, while servers share a chain of
Blockchains throughout the business's private network. Miners governed by the business's policies control
the appending of new blocks and mapping hash values. Having private miners will dramatically reduce
power consumption demands and improve the overall quality of the Blockchain technology. This solution
diminishes the space requirements of end users and enhances the security of the system by introducing
personal networks. The proposed hybrid solution inherits the simple deployment and affordable
maintenance in centralized systems while promoting resource sharing and improved scalability and fault-
tolerance in decentralized systems.
REFERENCES
[1] S. Nakamoto, Bitcoin: Peer-to-Peer Electronic Cash System, 2008.
[2] I. Eyal, A. Efe Gencer, E. Gün Sirer and R. van Renesse, "Bitcoin-ng: A Scalable Blockchain Protocol,"
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16),
pp. 45-59, Santa Clara, CA, USA, March 1618, 2016.
[3] L. W. Cong and Z. He, "Blockchain Disruption and Smart Contracts," The Review of Financial Studies, vol.
32, no. 5, pp. 1754-1797, 2019.
[4] R. Beck, M. Avital, M. Rossi and J. B. Thatcher, "Blockchain Technology in Business and Information
Systems Research," Business & Information Systems Engineering, vol. 59, pp. 381-384, 2017.
[5] A. Wright and P. De Filippi, "Decentralized Blockchain Technology and the Rise of Lex
Cryptographia," SSRN, ID. 2580664, Elsevier, 2015.
[6] G. Zyskind, O. Nathan and A. Pentland, "Decentralizing Privacy: Using Blockchain to Protect Personal Data,"
Proc. of IEEE Security and Privacy Workshops, pp. 180-184, San Jose, CA, USA, 2015.
[7] Z. Zheng, S. Xie, H.-N. Dai, X. Chen and H. Wang, "Blockchain Challenges and Opportunities: A
Survey," International Journal of Web and Grid Services, vol. 14, no. 4, pp. 352-375, 2018.
[8] M. Nofer, P. Gomber, O. Hinz and D. Schiereck, "Blockchain," Business & Information Systems
Engineering, vol. 59, no. 3, pp. 183-187, 2017.
[9] J. Lindman, V. K. Tuunainen and M. Rossi, "Opportunities and Risks of Blockchain TechnologiesA
Research Agenda," Proceedings of the 50th Hawaii International Conference on System Sciences, pp. 1533-
1542, [Online], Available: http://hdl.handle.net/10125/41338, 2017.
[10] V. Gramoli, "From Blockchain Consensus Back to Byzantine Consensus," Future Generation Computer
Systems, vol. 107, pp. 760-769, 2020.
[11] J.-H. Huh and S.-K. Kim, "The Blockchain Consensus Algorithm for Viable Management of New and
Renewable Energies," Sustainability, vol. 11, no. 11, ID. 3184, [Online], Available: https://doi.org/10.3390/
su11113184, 2019.
[12] I. Eyal and E. Gün Sirer, "Majority Is Not Enough: Bitcoin Mining Is Vulnerable," Proc. of International
Conference on Financial Cryptography and Data Security, pp. 436-454, Springer, Berlin, Heidelberg, 2014.
[13] A. Kosba, A. Miller, E. Shi, Z. Wen and C. Papamanthou, "Hawk: The Blockchain Model of Cryptography
and Privacy-preserving Smart Contracts," Proc. of IEEE Symposium on Security and Privacy (SP), pp. 839-
858, San Jose, CA, USA, 2016.
[14] S. Barber, X. Boyen, E. Shi and E. Uzun, "Bitter to BetterHow to Make Bitcoin a Better Currency," Proc.
of the International Conference on Financial Cryptography and Data Security, pp. 399-414, Springer, Berlin,
Heidelberg, 2012.
[15] H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu and J. Kishigami, "Blockchain Contract:
Securing a Blockchain Applied to Smart Contracts," Proc. of the IEEE International Conference on Consumer
Electronics (ICCE), pp. 467-468, 2016.
[16] D. Meshkov, A. Chepurnoy and M. Jansen, "Short Paper: Revisiting Difficulty Control for Blockchain
Systems," Proc. of International Workshop on Data Privacy Management, Cryptocurrencies and Blockchain
325
Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 06, No. 04, December 2020.
Technology, pp. 429-436, Springer, Cham, 2017.
[17] D. Kraft, "Difficulty Control for Blockchain-based Consensus Systems," Peer-to-Peer Networking and
Applications, vol. 9, no. 2, pp. 397-413, 2016.
[18] H. Vranken, "Sustainability of Bitcoin and Blockchains," Current Opinion in Environmental
Sustainability, vol. 28, pp. 1-9, 2017.
[19] K. J. O'Dwyer and D. Malone, "Bitcoin Mining and Its Energy Footprint," Proc. of the 25th IET Irish Signals
& Systems Conference 2014 and 2014 China-Ireland International Conference on Information and
Communications Technologies (ISSC 2014/CIICT 2014), pp. 280-285, 2014.
[20] E. Francioni and F. Venturelli, "The Dusk Network and Blockchain Architecture," WEB3 Symposium,
Amsterdam, The Netherlands, [Online], Avaialble: https://dusk.network/uploads/dusk-whitepaperv1.pdf,
2018.
[21] P. H. Gleichauf, "Blockchain Mining Using Trusted Nodes," U.S. Patent Application Publication, Pub. no.
US 2018 / 0109541 A1, [Online], Available: https://patentimages.storage.googleapis.com/23/4f/69/4bbc9631
31ccbc67/US20180109541A1.pdf, May 14, 2019.
[22] A. Shariar, Md. A. Imran, P. Paul and A. Rahman, "A Decentralized Computational System Built on
Blockchain for Educational Institutions," Proceedings of the International Conference on Computing
Advancements, pp. 1-6, [Online], Available: https://doi.org/10.1145/3377049.3377058, 2020.
[23] M. Crosby, Nachiappan, P. Pattanayak, S. Verma and V. Kalyanaraman, "Blockchain Technology: Beyond
Bitcoin," Applied Innovation Review (AIR), no.8, pp. 6-19, June 2016.
[24] BitFury Group, "Proof of Stake versus Proof of Work," White Paper, Version 1, pp. 2-26, [Online], available:
https://pdfs.semanticscholar.org/6990/0bac4097a576414f69f1998c11089fb5bb94.pdf, September 2015.
[25] J. Spasovski and P. Eklund, "Proof of Stake Blockchain: Performance and Scalability for Groupware
Communications," Proceedings of the 9th International Conference on Management of Digital EcoSystems,
pp. 251-258, [Online], available: https://pure.itu.dk/portal/files/83126213/Proof_of_Stake_Blockchain_Perfo
rmance_and_Scalability_for_Groupware_Communications.pdf, 2017.















 
This article is an open access article distributed under the terms and conditions of the Creative
Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
... Blockchain technology has evolved to offer different types of networks, each with its unique characteristics. There are four basic types of blockchains: public [3], private [4], consortium (federated) [5] and hybrid [6]. ...
Article
Full-text available
Currently, human activity has a substantial impact on the environment, and we are responsible for determining what it will look like in a few or a dozen decades. Numerous IT solutions are being developed to reduce the negative influence on the environment. In particular, the main problem is the amount of plastic found in circulation and its recycling. Unfortunately, only few solutions exist that, on the one hand, support the reuse of the raw material and, on the other hand, give tangible benefits to users. In this work, we present a blockchain-based system for monitoring the recycling process of plastic bottles. The solution was described by technical, social, and performance characteristics. It should be emphasized that the adopted features of the new blockchain, such as a simplified code or complete decentralization, distinguish the solution from those currently created. Moreover, performance and fraud detection tests were performed. The results present that the solution for a PoW difficulty level of 3 still achieves decent times when generating a block with transactions (from the point of view of the recycling process). In addition, fraud detection tests have proven the ability to detect forged transactions. The outcomes from performed experiments show that the proposed concept can be used as an efficient and fraud-resilient solution in the case of the plastic recycling process.
Article
Today, network information control systems are a promising area for scientific research in the context of production development in accordance with the Smart Manufacturing strategy and the cloud computing technologies application. The problems of delays and failures occur. That leads to the packet loss problem which is transformed into a failure of the network node of the information control system. In this paper, an approach for determining packet losses and delays is formulated, where the problem of packet loss is converted into a failure of a network node of an information control system. The conclusion about the need to determine the state of the control object in order to solve the problems identified above is made. As a result of this study, a search for a target automata-based algorithm that minimizes the risk of a complete failure of the control system network infrastructure was proposed. This algorithm was tested by means of using theoretical and real topology. In this paper related software was also developed and described. In this article we develop architecture of application designed by means of the proposed approach. The mentioned approach designed for using RAFT consensus algorithm as based algorithm for network information control systems development. This article described basic differences and problems of most popular classes, of consensus algorithms in view point of network information control systems. This work is taking into consideration application of distributed systems concepts to network control information systems field. This article related with development distributed systems using java language and Jraft framework. In the conclusion of the research work analyzed results of tests of developed system in specially created laboratory bench.
Article
Full-text available
The fusion of blockchain and artificial intelligence (AI) marks a paradigm shift in healthcare, addressing critical challenges in securing electronic health records (EHRs), ensuring data privacy, and facilitating secure data transmission. This study provides a comprehensive analysis of the adoption of blockchain and AI within healthcare, spotlighting their role in fortifying security and transparency leading the trajectory for a promising future in the realm of healthcare. Our study, employing the PRISMA model, scrutinized 402 relevant articles, employing a narrative analysis to explore the fusion of blockchain and AI in healthcare. The review includes the architecture of AI and blockchain, examines AI applications with and without blockchain integration, and elucidates the interdependency between AI and blockchain. The major findings include: (i) it protects data transfer, and digital records, and provides security; (ii) enhances EHR security and COVID-19 data transmission, thereby bolstering healthcare efficiency and reliability through precise assessment metrics; (iii) addresses challenges like data security, privacy, and decentralized computing, forming a robust tripod. The fusion of blockchain and AI revolutionize healthcare by securing EHRs, and enhancing privacy, and security. Private blockchain adoption reflects the sector’s commitment to data security, leading to improved efficiency and accessibility. This convergence promises enhanced disease identification, response, and overall healthcare efficacy, and addresses key sector challenges. Further exploration of advanced AI features integrated with blockchain promises to enhance outcomes, shaping the future of global healthcare delivery with guaranteed data security, privacy, and innovation.
Article
Full-text available
Blockchain is a developing technology that promises advancements when it is applied to other fields. Applying blockchain to other systems requires a customized blockchain model to satisfy the requirements of different application fields. One important area is to integrate blockchain with smart spaces and the Internet of Things to process, manage, and store data. Actually, smart spaces and Internet of Things systems include various types of transactions in terms of sensitivity. The sensitivity can be considered as correctness sensitivity, time sensitivity, and specialization sensitivity. Correctness sensitivity means that the systems should accept precise or approximated data in some cases, whereas time sensitivity means that there are time bounds for each type of transaction, and specialization sensitivity applies when some transactions are processed only by specialized people. Therefore, this work introduces the smart partitioned blockchain model, where we use machine learning and deep learning models to classify transactions into different pools according to their sensitivity levels. Then, each pool is mapped to a specific part of the smart partitioned blockchain model. The parts can be permissioned or permissionless. The permissioned parts can have different sub-parts if needed. Consequently, the smart partitioned blockchain can be customized to meet application-field requirements. In the experimental results, we use bank and medical datasets with a predefined sensitivity threshold for classification accuracy in each system. The bank transactions are critical, whereas the classification of the medical dataset is speculative and less critical. The Random Forest model is used for bank-dataset classification, and its accuracy reaches 100%, whereas Sequential Deep Learning is used for the medical dataset, which reaches 91%. This means that all bank transactions are correctly mapped to the corresponding parts of the blockchain, whereas accuracy is lower for the medical dataset. However, acceptability is determined based on the predefined sensitivity threshold.
Article
Full-text available
Internet of Things (IoT) plays an essential contribution in connecting devices and enabling seamless data exchange, leading to increased efficiency and convenience. However, security concerns in IoT systems are significant, as compromised devices can lead to data breaches and privacy violations. Blockchain technology can enhance IoT security by providing decentralized consensus, immutability, and transparent transaction records, ensuring secure and trustworthy communication and data integrity. This review article gives a succinct but thorough understanding of blockchain technology, covering architecture of blockchain, working principles, types, applications, platforms, and its role in the IoT environment. The study highlights potential benefits of blockchain like enhanced security and privacy, and explores its integration with IoT. Additionally, the study discusses various real-world applications, examines blockchain platforms, and addresses the limitations and challenges associated with blockchain technology. This review serves as a valuable resource for researchers and practitioners seeking a deeper understanding of blockchain’s potential and its implications in the IoT landscape.
Article
Full-text available
With the increasing acceptance and utilization of blockchain technology, a multitude of blockchain-based systems have emerged. Consequently, the need for interoperability among these systems has become paramount, particularly in a trustless manner. To enable decentralized and secure cross-chain applications for users, the establishment of a trust-minimized interoperability solution is imperative for homogeneous blockchain-based networks. This paper presents an analysis of the current state and challenges associated with interoperability between blockchain-based systems. Building upon previous research, we propose that the set of blockchain-based networks should be narrowed down based on the same settlement layer for supporting trust-minimized interoperability. Specifically, we concentrate on the cross-rollup functionality between rollups. We have devised and implemented two similar solutions to address the aforementioned interoperability problem, employing a trust-minimized optimistic approach. Through extensive experimentation, we compare our proposed solutions with existing cross-rollup bridges in terms of gas consumption, time complexity, and newly introduced trust assumptions. Our experimental investigations concentrate on the transmission of arbitrary data utilizing non-fungible tokens. The results reveal that one of our proposed solutions offers an optimal approach for cross-rollup communication between optimistic rollups.
Article
Full-text available
The issuing and verification of higher education certificates, including all higher education documents, still functions in a costly and inappropriately bureaucratic manner. Blockchain technology provides a more secure and consistent way to revolutionize the widely used generalized mechanisms and system concepts. In this paper, the most necessary requirements are examined regarding a blockchain-based higher education system, based on the most well-known research papers. Moreover, the opportunities of working on an education system by maintaining a decentralized structure organization are recommended as well. This paper recommends the most suitable blockchain scaling solution for the architecture of an education system which uses the most state-of-the-art EVM (Ethereum virtual machine) compatible approach to implement the higher education system with all the predefined requirements. It is proven that the explained smart contract-based higher education system, which uses zkEVM (zero-knowledge Ethereum virtual machine), consists of all necessary functionalities and satisfies all predefined requirements. In fact, the recommended system, by using a modular blockchain structure, implements all the functionality and capability of the examined related works in one system, namely GDPR (General Data Protection Regulation), which is compatible and more secure.
Article
Full-text available
Efficient information flow in an intelligent system is vital for effectively controlling the entire system. Currently, intelligent systems are used in many industries related to energy production, sustainable agriculture/transport, and intelligent building/cities. Information technology (IT) and information and communication technologies (ICT) play vital roles in introducing technical or technological innovation in these industries as well as establishing a collaborative network. Also, the digitization of existing systems has been quite effective at creating a sustainable global environment as it allows more efficient and well-balanced control of socio-economic factors. However, it has become clear that adopting an intelligent system to achieve innovation, sustainability, and safety may well depend on the quality of the algorithms to be used for that very system. Despite recent controversies, new and renewable energies are considered as a realistic alternative to fossil fuels, which have been integral to modern industries but are regarded as a cause of environmental or economic problems, not to mention their limited deposits. Therefore, since renewable energies will gradually replace existing energy sources but require more time to be fully available, it is essential to find a method of managing them in a fair and transparent way. The United States, Japan, and some European countries are attempting to achieve such a goal by utilizing a blockchain system, but the issues pertaining to its functionality, security, or efficiency have yet to be addressed. This study introduces a viable consensus algorithm (Hyper Delegation Proof of Randomness, or HDPoR algorithm) for blockchain and attempts to validate its parallel computing capability through simulations. This study also attempts to design an efficient but secure peer-to-peer (P2P) transaction service model for these energies for the future where blockchain-based systems will hold a key position in the digitalized world. As its main contribution, this study introduces an effective method of applying blockchain to a new and renewable energy transaction system by presenting a consensus algorithm that can improve its infrastructure and performance.
Article
Full-text available
Blockchain technology provides decentralized consensus and potentially enlarges the contracting space through smart contracts. Meanwhile, generating decentralized consensus entails distributing information that necessarily alters the informational environment. We analyze how decentralization relates to consensus quality and how the quintessential features of blockchain remold the landscape of competition. Smart contracts can mitigate informational asymmetry and improve welfare and consumer surplus through enhanced entry and competition, yet distributing information during consensus generation may encourage greater collusion. In general, blockchains sustain market equilibria with a wider range of economic outcomes. We further discuss the implications for antitrust policies targeted at blockchain applications. (JEL C73, D82, D86, G29, L13, L86).
Article
Full-text available
Blockchain has numerous benefits such as decentralisation, persistency, anonymity and auditability. There is a wide spectrum of blockchain applications ranging from cryptocurrency, financial services, risk management, internet of things (IoT) to public and social services. Although a number of studies focus on using the blockchain technology in various application aspects, there is no comprehensive survey on the blockchain technology in both technological and application perspectives. To fill this gap, we conduct a comprehensive survey on the blockchain technology. In particular, this paper gives the blockchain taxonomy, introduces typical blockchain consensus algorithms, reviews blockchain applications and discusses technical challenges as well as recent advances in tackling the challenges. Moreover, this paper also points out the future directions in the blockchain technology.
Conference Paper
Full-text available
A blockchain is a distributed transaction ledger, a disruptive technology that creates new possibilities for digital ecosystems. The blockchain ecosystem maintains an immutable transaction record to support many types of digital services. This paper compares the performance and scalability of a web-based groupware communication application using both non-blockchain and blockchain technologies. Scalabil-ity is measured where message load is synthesized over two typical communication topologies. The first is 1 to n network – a typical client-server or star-topology with a central vertex (server) receiving all messages from the remaining n − 1 vertices (clients). The second is a more naturally occurring scale-free network topology, where multiple communication hubs are distributed throughout the network. System performance is tested with both blockchain and non-blockchain solutions using multiple cloud computing configurations. We analyze the empirical results from each configuration to identify the costs and overhead of blockchain technology.
Article
Full-text available
Consensus is a fundamental problem of distributed computing. While this problem has been known to be unsolvable since 1985, existing protocols were designed these past three decades to solve consensus under various assumptions. Today, with the recent advent of blockchains, various consensus implementations were proposed to make replicas reach an agreement on the order of transactions updating what is often referred to as a distributed ledger. Very little work has however been devoted to explore its theoretical ramifications. As a result existing proposals are sometimes misunderstood and it is often unclear whether the problems arising during their executions are due to implementation bugs or more fundamental design issues. In this paper, we discuss the mainstream blockchain consensus algorithms and how the classic Byzantine consensus can be revisited for the blockchain context. In particular, we discuss proof-of-work consensus and illustrate the differences between the Bitcoin and the Ethereum proof-of-work consensus algorithms. Based on these definitions, we warn about the dangers of using these blockchains without understanding precisely the guarantees their consensus algorithm offers. In particular, we survey attacks against the Bitcoin and the Ethereum consensus algorithms. We finally discuss the advantage of the recent Blockchain Byzantine consensus definition over previous definitions, and the promises offered by emerging consistent blockchains.
Conference Paper
The Bitcoin whitepaper [1] states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism. In this paper we introduce and analyze a new kind of attack on the mining difficulty retargeting function used in Bitcoin which we call “coin-hopping”. In a coin-hopping attack, a malicious miner increases his mining profits while at the same time increasing the average delay between blocks. We propose an alternative difficulty adjustment algorithm in order to reduce the incentive to perform a coin-hopping attack, and also decrease inter-block delays. Finally, we evaluate our proposed approach and show how its novel algorithm performs better than the original algorithm of Bitcoin.
Article
Bitcoin is an electronic currency that has become increasingly popular since its introduction in 2008. Transactions in the bitcoin system are stored in a public transaction ledger (‘the blockchain’), which is stored in a decentralized, peer-to-peer network. Bitcoin provides decentralized currency issuance and transaction clearance. The security of the blockchain depends on a compute-intensive algorithm for bitcoin mining, which prevents double spending of bitcoins and tampering with confirmed transactions. This ‘proof-of-work’ algorithm is energy demanding. How much energy is actually consumed, is subject of debate. We argue that this energy consumption currently is in the range of 100–500 MW. We discuss the developments in bitcoin mining hardware. We also briefly outline alternative schemes that are less energy demanding. We finally look at other blockchain applications, and argue that also here energy consumption is not of primary concern.