Abstract
Recently, permissioned blockchain has been extensively explored in various fields, such as asset management, supply chain, healthcare, and many others. Many scholars are dedicated to improving its verifiability, scalability, and performance based on sharding techniques, including grouping nodes and handling cross-shard transactions. However, they ignore the node vulnerability problem, i.e., there is no guarantee that nodes will not be maliciously controlled throughout their life cycle. Facing this challenge, we propose RecAGT, a novel identification scheme aimed at reducing communication overhead and identifying potential malicious nodes. First, shard testable codes are designed to encode the original data in case of a leak of confidential data. Second, a new identity proof protocol is presented as evidence against malicious behavior. Finally, adaptive group testing is chosen to identify malicious nodes. Notably, our work focuses on the internal operation within the committee and can thus be applied to any sharding permissioned blockchains. Simulation results show that our proposed scheme can effectively identify malicious nodes with low communication and computational costs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Honest nodes are those that perform normally following the rules of the system (e.g., read, write or maintain blocks and perform or relay transactions).
- 2.
The behaviors of malicious (or Byzantine) nodes could censor, reverse, reorder or withhold specific transactions without including them in any block to interfere with the system [13].
- 3.
Generally speaking, permissioned blockchains can be divided into private and consortium blockchains since both of them only allow nodes with identity to join the network. Our study primarily focuses on consortium blockchains due to their alignment with the idea of decentralization.
References
Rebello, G.A.F., Camilo, G.F., Guimarães, L.C., de Souza, L.A.C., Duarte, O.C.M.: Security and performance analysis of quorum-based blockchain consensus protocols. In: 2022 6th Cyber Security in Networking Conference (CSNet), pp. 1–7. IEEE (2022)
Amiri, M.J., Duguépéroux, J., Allard, T., Agrawal, D., El Abbadi, A.: Separ: Towards regulating future of work multi-platform crowdworking environments with privacy guarantees. In: Proceedings of the Web Conference 2021, pp. 1891–1903 (2021)
Amiri, M.J., Agrawal, D., El Abbadi, A.: Permissioned blockchains: properties, techniques and applications. In: Proceedings of the 2021 International Conference on Management of Data, pp. 2813–2820 (2021)
Gorenflo, C., Lee, S., Golab, L., Keshav, S.: Fastfabric: scaling hyperledger fabric to 20 000 transactions per second. Int. J. Network Manage 30(5), e2099 (2020)
Corbett, J.C., et al.: Spanner: Google’s globally distributed database. ACM Trans. Comput. Syst. (TOCS) 31(3), 1–22 (2013)
Amiri, M.J., Agrawal, D., El Abbadi, A.: On sharding permissioned blockchains. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 282–285. IEEE (2019)
Amiri, M.J., Agrawal, D., El Abbadi, A.: Sharper: sharding permissioned blockchains over network clusters. In: Proceedings of the 2021 International Conference on Management of Data, pp. 76–88 (2021)
Dang, H., Dinh, T.T.A., Loghin, D., Chang, E.C., Lin, Q., Ooi, B.C.: Towards scaling blockchain systems via sharding. In: Proceedings of the 2019 International Conference on Management of Data, pp. 123–140 (2019)
Huang, H., et al.: Elastic resource allocation against imbalanced transaction assignments in sharding-based permissioned blockchains. IEEE Trans. Parallel Distrib. Syst. 33(10), 2372–2385 (2022)
Gao, J., et al.: Pshard: a practical sharding protocol for enterprise blockchain. In: Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, pp. 110–116 (2022)
Mao, C., Golab, W.: Geochain: a locality-based sharding protocol for permissioned blockchains. In: 24th International Conference on Distributed Computing and Networking, pp. 70–79 (2023)
Zheng, P., Xu, Q., Zheng, Z., Zhou, Z., Yan, Y., Zhang, H.: Meepo: multiple execution environments per organization in sharded consortium blockchain. IEEE J. Sel. Areas Commun. 40(12), 3562–3574 (2022)
Falazi, G., Khinchi, V., Breitenbücher, U., Leymann, F.: Transactional properties of permissioned blockchains. SICS Softw.-Intensive Cyber-Physical Syst. 35(1–2), 49–61 (2020)
Ekparinya, P., Gramoli, V., Jourjon, G.: The attack of the clones against proof-of-authority. arXiv preprint arXiv:1902.10244 (2019)
Saas, M., et al.: Exploring the attack surface of blockchain: a comprehensive survey. IEEE Commun. Surv. Tutorials 22(3), 1977–2008 (2020)
Davenport, A., Shetty, S., Liang, X.: Attack surface analysis of permissioned blockchain platforms for smart cities. In: 2018 IEEE International Smart Cities Conference (ISC2), pp. 1–6. IEEE (2018)
Yu, Q., Li, S., Raviv, N., Kalan, S.M.M., Soltanolkotabi, M., Avestimehr, S.A.: Lagrange coded computing: Optimal design for resiliency, security, and privacy. In: The 22nd International Conference on Artificial Intelligence and Statistics, pp. 1215–1225. PMLR (2019)
Solanki, A., Cardone, M., Mohajer, S.: Non-colluding attacks identification in distributed computing. In: 2019 IEEE Information Theory Workshop (ITW), pp. 1–5. IEEE (2019)
Hong, S., Yang, H., Lee, J.: Byzantine attack identification in distributed matrix multiplication via locally testable codes. In: 2022 IEEE International Symposium on Information Theory (ISIT), pp. 560–565. IEEE (2022)
Hong, S., Yang, H., Lee, J.: Hierarchical group testing for byzantine attack identification in distributed matrix multiplication. IEEE J. Sel. Areas Commun. 40(3), 1013–1029 (2022)
Zhao, X., Lei, Z., Zhang, G., Zhang, Y., Xing, C.: Blockchain and distributed system. In: Web Information Systems and Applications: 17th International Conference, WISA 2020, Guangzhou, China, September 23–25, 2020, Proceedings 17, pp. 629–641. Springer (2020)
Yu, Q., Maddah-Ali, M., Avestimehr, S.: Polynomial codes: an optimal design for high-dimensional coded matrix multiplication. In: Advances in Neural Information Processing Systems, 30 (2017)
Verde-Star, L.: Inverses of generalized vandermonde matrices. J. Math. Anal. Appl. 131(2), 341–353 (1988)
Kedlaya, K.S., Umans, C.: Fast polynomial factorization and modular composition. SIAM J. Comput. 40(6), 1767–1802 (2011)
Kaur, R., Kaur, A.: Digital signature. In: 2012 International Conference on Computing Sciences, pp. 295–301. IEEE (2012)
Dorfman, R.: The detection of defective members of large populations. Ann. Math. Stat. 14(4), 436–440 (1943)
Hwang, F.K.: A method for detecting all defective members in a population by group testing. J. Am. Stat. Assoc. 67(339), 605–608 (1972)
Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 583–598. IEEE (2018)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (62072321, 61972272), the Six Talent Peak Project of Jiangsu Province (XYDXX-084), the China Postdoctoral Science Foundation (2020M671597), the Jiangsu Postdoctoral Research Foundation (2020Z100), Suzhou Planning Project of Science and Technology (SS202023), the Future Network Scientific Research Fund Project (FNSRFP-2021-YB-38), Natural Science Foundation of the Higher Education Institutions of Jiangsu Province (22KJA520007, 20KJB520002), the Collaborative Innovation Center of Novel Software Technology and Industrialization, and Soochow University Interdisciplinary Research Project for Young Scholars in the Humanities.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yu, D., Wang, J., Li, L., Jiang, W., Liu, C. (2024). RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain. In: Tari, Z., Li, K., Wu, H. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2023. Lecture Notes in Computer Science, vol 14490. Springer, Singapore. https://doi.org/10.1007/978-981-97-0859-8_24
Download citation
DOI: https://doi.org/10.1007/978-981-97-0859-8_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0858-1
Online ISBN: 978-981-97-0859-8
eBook Packages: Computer ScienceComputer Science (R0)