Securing Permissioned Blockchain-Based Systems: An Analysis on the Significance of Consensus Mechanisms

被引:0
|
作者
Nasir, Norshakinah Md [1 ]
Hassan, Suhaidi [1 ,2 ]
Mohd Zaini, Khuzairi [3 ]
机构
[1] Univ Utara Malaysia UUM, Sch Comp, InterNetWorks Res Lab, Sintok 06010, Kedah, Malaysia
[2] Univ Sumatera Utara, Fac Comp Sci & Informat Technol, Medan 20155, Sumatera Utara, Indonesia
[3] Univ Utara Malaysia UUM, Inst Adv & Smart Digital Opportun, Sch Comp, Sintok 06010, Kedah, Malaysia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; Consensus protocol; Business; Peer-to-peer computing; Scalability; Fourth Industrial Revolution; Consensus algorithm; Blockchains; Fault tolerance; Blockchain; consensus mechanism; byzantine fault tolerance; distributed technology; permissioned blockchain; CHALLENGES;
D O I
10.1109/ACCESS.2024.3465869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of the Fourth Industrial Revolution (Industry 4.0), blockchain technology emerges as an innovative solution to address the challenges of digital-based business networks, such as traceability, transparency, trust, and data authenticity. This transformative technology has shown promise across diverse domains, including finance, healthcare, and supply chain, by enabling secure data transmission and trust establishment between entities. However, blockchain technology experiences an inherent trade-off issue between the core properties of security, decentralization, and scalability in its type of network. While permissionless blockchain excels in security and decentralization, such networks lack scalability and suitability for business transactions. Conversely, permissioned blockchains offer better performance, but are vulnerable to cyber-attacks due to weaknesses in consensus mechanisms. Therefore, this paper provides an analysis of blockchain technology, emphasizing the pivotal role of consensus mechanisms in ensuring security and system performance. In addition, it identifies practical threats, suggests countermeasures, and underscores the importance of resilient and secure consensus mechanisms. Furthermore, it compares and analyzes existing mechanisms for permissioned blockchains, discusses their limitations, and highlights the significance of ensuring system security and performance. Finally, it uncovers essential factors to consider when designing consensus mechanisms for specific blockchain-based applications, laying the foundation for future research in practical and secure permissioned blockchain applications.
引用
收藏
页码:138211 / 138238
页数:28
相关论文
共 50 条
  • [41] Delay Analysis of Consensus Communication for Blockchain-Based Applications Using Network Calculus
    Ma, Shengcheng
    Wang, Shuai
    Tsai, Wei-Tek
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (09) : 1825 - 1829
  • [42] A high performance two-layer consensus architecture for blockchain-based IoT systems
    Haytham Qushtom
    Jelena Mišić
    Vojislav B. Mišić
    Xiaolin Chang
    Peer-to-Peer Networking and Applications, 2022, 15 : 2444 - 2456
  • [43] A high performance two-layer consensus architecture for blockchain-based IoT systems
    Qushtom, Haytham
    Misic, Jelena
    Misic, Vojislav B.
    Chang, Xiaolin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (05) : 2444 - 2456
  • [44] Analysis on the AoI in Blockchain-based IoT Networks with Different Sensing Mechanisms
    Garcia, Julio Cesar Perez
    Benslimane, Abderrahim
    Su, Zhou
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 4763 - 4768
  • [45] Analysis of Arbitrary Content on Blockchain-Based Systems using BigQuery
    Gregoriadis, Marcel
    Muth, Robert
    Florian, Martin
    COMPANION PROCEEDINGS OF THE WEB CONFERENCE 2022, WWW 2022 COMPANION, 2022, : 478 - 487
  • [46] A Review of Blockchain-Based Systems in Transportation
    Astarita, Vittorio
    Giofre, Vincenzo Pasquale
    Mirabelli, Giovanni
    Solina, Vittorio
    INFORMATION, 2020, 11 (01)
  • [47] Securing and Trustworthy Blockchain-based Multi-Tenant Cloud Computing
    Reantongcome, Vorameth
    Visoottiviseth, Vasaka
    Sawangphol, Wudhichart
    Khurat, Assadarat
    Kashihara, Shigeru
    Fall, Doudou
    IEEE 10TH SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE 2020), 2020, : 256 - 261
  • [48] Securing blockchain-based timed data release against adversarial attacks
    Wang, Jingzhe
    Palanisamy, Balaji
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (06) : 649 - 677
  • [49] Implementation of A Blockchain-based Searchable Encryption for Securing Contact Tracing Data
    Ng, Zheng Yao
    Salam, Iftekhar
    JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (02): : 241 - 254
  • [50] Securing interim payments in construction projects through a blockchain-based framework
    Das, Moumita
    Luo, Han
    Cheng, Jack C. P.
    AUTOMATION IN CONSTRUCTION, 2020, 118