Skip to main content

RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2023)

Abstract

Recently, permissioned blockchain has been extensively explored in various fields, such as asset management, supply chain, healthcare, and many others. Many scholars are dedicated to improving its verifiability, scalability, and performance based on sharding techniques, including grouping nodes and handling cross-shard transactions. However, they ignore the node vulnerability problem, i.e., there is no guarantee that nodes will not be maliciously controlled throughout their life cycle. Facing this challenge, we propose RecAGT, a novel identification scheme aimed at reducing communication overhead and identifying potential malicious nodes. First, shard testable codes are designed to encode the original data in case of a leak of confidential data. Second, a new identity proof protocol is presented as evidence against malicious behavior. Finally, adaptive group testing is chosen to identify malicious nodes. Notably, our work focuses on the internal operation within the committee and can thus be applied to any sharding permissioned blockchains. Simulation results show that our proposed scheme can effectively identify malicious nodes with low communication and computational costs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Honest nodes are those that perform normally following the rules of the system (e.g., read, write or maintain blocks and perform or relay transactions).

  2. 2.

    The behaviors of malicious (or Byzantine) nodes could censor, reverse, reorder or withhold specific transactions without including them in any block to interfere with the system [13].

  3. 3.

    Generally speaking, permissioned blockchains can be divided into private and consortium blockchains since both of them only allow nodes with identity to join the network. Our study primarily focuses on consortium blockchains due to their alignment with the idea of decentralization.

References

  1. Rebello, G.A.F., Camilo, G.F., Guimarães, L.C., de Souza, L.A.C., Duarte, O.C.M.: Security and performance analysis of quorum-based blockchain consensus protocols. In: 2022 6th Cyber Security in Networking Conference (CSNet), pp. 1–7. IEEE (2022)

    Google Scholar 

  2. Amiri, M.J., Duguépéroux, J., Allard, T., Agrawal, D., El Abbadi, A.: Separ: Towards regulating future of work multi-platform crowdworking environments with privacy guarantees. In: Proceedings of the Web Conference 2021, pp. 1891–1903 (2021)

    Google Scholar 

  3. Amiri, M.J., Agrawal, D., El Abbadi, A.: Permissioned blockchains: properties, techniques and applications. In: Proceedings of the 2021 International Conference on Management of Data, pp. 2813–2820 (2021)

    Google Scholar 

  4. Gorenflo, C., Lee, S., Golab, L., Keshav, S.: Fastfabric: scaling hyperledger fabric to 20 000 transactions per second. Int. J. Network Manage 30(5), e2099 (2020)

    Article  Google Scholar 

  5. Corbett, J.C., et al.: Spanner: Google’s globally distributed database. ACM Trans. Comput. Syst. (TOCS) 31(3), 1–22 (2013)

    Google Scholar 

  6. Amiri, M.J., Agrawal, D., El Abbadi, A.: On sharding permissioned blockchains. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 282–285. IEEE (2019)

    Google Scholar 

  7. Amiri, M.J., Agrawal, D., El Abbadi, A.: Sharper: sharding permissioned blockchains over network clusters. In: Proceedings of the 2021 International Conference on Management of Data, pp. 76–88 (2021)

    Google Scholar 

  8. Dang, H., Dinh, T.T.A., Loghin, D., Chang, E.C., Lin, Q., Ooi, B.C.: Towards scaling blockchain systems via sharding. In: Proceedings of the 2019 International Conference on Management of Data, pp. 123–140 (2019)

    Google Scholar 

  9. Huang, H., et al.: Elastic resource allocation against imbalanced transaction assignments in sharding-based permissioned blockchains. IEEE Trans. Parallel Distrib. Syst. 33(10), 2372–2385 (2022)

    Article  Google Scholar 

  10. Gao, J., et al.: Pshard: a practical sharding protocol for enterprise blockchain. In: Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, pp. 110–116 (2022)

    Google Scholar 

  11. Mao, C., Golab, W.: Geochain: a locality-based sharding protocol for permissioned blockchains. In: 24th International Conference on Distributed Computing and Networking, pp. 70–79 (2023)

    Google Scholar 

  12. Zheng, P., Xu, Q., Zheng, Z., Zhou, Z., Yan, Y., Zhang, H.: Meepo: multiple execution environments per organization in sharded consortium blockchain. IEEE J. Sel. Areas Commun. 40(12), 3562–3574 (2022)

    Article  Google Scholar 

  13. Falazi, G., Khinchi, V., Breitenbücher, U., Leymann, F.: Transactional properties of permissioned blockchains. SICS Softw.-Intensive Cyber-Physical Syst. 35(1–2), 49–61 (2020)

    Google Scholar 

  14. Ekparinya, P., Gramoli, V., Jourjon, G.: The attack of the clones against proof-of-authority. arXiv preprint arXiv:1902.10244 (2019)

  15. Saas, M., et al.: Exploring the attack surface of blockchain: a comprehensive survey. IEEE Commun. Surv. Tutorials 22(3), 1977–2008 (2020)

    Article  Google Scholar 

  16. Davenport, A., Shetty, S., Liang, X.: Attack surface analysis of permissioned blockchain platforms for smart cities. In: 2018 IEEE International Smart Cities Conference (ISC2), pp. 1–6. IEEE (2018)

    Google Scholar 

  17. Yu, Q., Li, S., Raviv, N., Kalan, S.M.M., Soltanolkotabi, M., Avestimehr, S.A.: Lagrange coded computing: Optimal design for resiliency, security, and privacy. In: The 22nd International Conference on Artificial Intelligence and Statistics, pp. 1215–1225. PMLR (2019)

    Google Scholar 

  18. Solanki, A., Cardone, M., Mohajer, S.: Non-colluding attacks identification in distributed computing. In: 2019 IEEE Information Theory Workshop (ITW), pp. 1–5. IEEE (2019)

    Google Scholar 

  19. Hong, S., Yang, H., Lee, J.: Byzantine attack identification in distributed matrix multiplication via locally testable codes. In: 2022 IEEE International Symposium on Information Theory (ISIT), pp. 560–565. IEEE (2022)

    Google Scholar 

  20. Hong, S., Yang, H., Lee, J.: Hierarchical group testing for byzantine attack identification in distributed matrix multiplication. IEEE J. Sel. Areas Commun. 40(3), 1013–1029 (2022)

    Article  Google Scholar 

  21. Zhao, X., Lei, Z., Zhang, G., Zhang, Y., Xing, C.: Blockchain and distributed system. In: Web Information Systems and Applications: 17th International Conference, WISA 2020, Guangzhou, China, September 23–25, 2020, Proceedings 17, pp. 629–641. Springer (2020)

    Google Scholar 

  22. Yu, Q., Maddah-Ali, M., Avestimehr, S.: Polynomial codes: an optimal design for high-dimensional coded matrix multiplication. In: Advances in Neural Information Processing Systems, 30 (2017)

    Google Scholar 

  23. Verde-Star, L.: Inverses of generalized vandermonde matrices. J. Math. Anal. Appl. 131(2), 341–353 (1988)

    Article  MathSciNet  Google Scholar 

  24. Kedlaya, K.S., Umans, C.: Fast polynomial factorization and modular composition. SIAM J. Comput. 40(6), 1767–1802 (2011)

    Article  MathSciNet  Google Scholar 

  25. Kaur, R., Kaur, A.: Digital signature. In: 2012 International Conference on Computing Sciences, pp. 295–301. IEEE (2012)

    Google Scholar 

  26. Dorfman, R.: The detection of defective members of large populations. Ann. Math. Stat. 14(4), 436–440 (1943)

    Article  Google Scholar 

  27. Hwang, F.K.: A method for detecting all defective members in a population by group testing. J. Am. Stat. Assoc. 67(339), 605–608 (1972)

    Article  Google Scholar 

  28. Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 583–598. IEEE (2018)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (62072321, 61972272), the Six Talent Peak Project of Jiangsu Province (XYDXX-084), the China Postdoctoral Science Foundation (2020M671597), the Jiangsu Postdoctoral Research Foundation (2020Z100), Suzhou Planning Project of Science and Technology (SS202023), the Future Network Scientific Research Fund Project (FNSRFP-2021-YB-38), Natural Science Foundation of the Higher Education Institutions of Jiangsu Province (22KJA520007, 20KJB520002), the Collaborative Innovation Center of Novel Software Technology and Industrialization, and Soochow University Interdisciplinary Research Project for Young Scholars in the Humanities.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jin Wang or Lingzhi Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, D., Wang, J., Li, L., Jiang, W., Liu, C. (2024). RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain. In: Tari, Z., Li, K., Wu, H. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2023. Lecture Notes in Computer Science, vol 14490. Springer, Singapore. https://doi.org/10.1007/978-981-97-0859-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0859-8_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0858-1

  • Online ISBN: 978-981-97-0859-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics