Blockchain Operations in the Presence of Security Concerns

被引:2
|
作者
He, Jiahao [1 ]
Zhang, Guangyuan [1 ]
Zhang, Jiheng [1 ]
Zhang, Rachel Q. [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Ind Engn & Decis Analyt, Kowloon, Clear Water Bay, Hong Kong, Peoples R China
关键词
service operations; queueing theory; game theory;
D O I
10.1287/msom.2023.1197
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Problem definition: A blockchain payment system, such as Bitcoin or Ethereum, validates electronic transactions and stores them in a chain of blocks without a central authority. Miners with computing power compete for the rights to create blocks according to a preset protocol, referred to as hashing or mining, and, in return, earn fees paid by users who submit transactions. Because of security concerns caused by decentralization, a transaction is confirmed after a number of additional blocks are subsequently extended to the block containing it. This confirmation latency introduces an intricate interplay between miners and users. This paper provides approximate system equilibria and studies optimal designs of a blockchain. Methodology/results: The hashing process is essentially a single-server queue with batch services based on a fee-based priority discipline, and confirmation latency adds complexity to the equilibrium behavior and optimal design. We analyze how miners' participation decisions interact with users' participation and fee decisions and identify optimal designs when the goal is to maximize the throughput or social welfare. We validate our model and conduct numerical studies using data from Bitcoin. Managerial implications: By incorporating security issues, we uncover the interdependence of the decisions between users and miners and the driver for nonzero entrance fees in practice. We show that miners and users may end up in either a vicious or virtuous cycle, depending on the initial system state. By allowing the entrance fee to be a design parameter, we are able to establish that it is optimal to simply run a blockchain system at its full capacity and a block size as small as possible.
引用
收藏
页码:1117 / 1135
页数:19
相关论文
共 50 条
  • [1] Security concerns towards Security Operations centers
    Janos, Feher David
    Nguyen Huu Phuoc Dai
    [J]. 2018 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2018, : 273 - 278
  • [2] Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review
    Alotaibi, Bandar
    [J]. IEEE SENSORS JOURNAL, 2019, 19 (23) : 10953 - 10971
  • [3] Modeling of Blockchain and Application Concerns in Blockchain Applications
    Shin, Michael
    [J]. 2023 IEEE/ACM 6TH INTERNATIONAL WORKSHOP ON EMERGING TRENDS IN SOFTWARE ENGINEERING FOR BLOCKCHAIN, WETSEB, 2023, : 37 - 43
  • [4] Blockchain Security as "People Security": Applying Sociotechnical Security to Blockchain Technology
    Nabben, Kelsie
    [J]. FRONTIERS IN COMPUTER SCIENCE, 2021, 2
  • [5] Security concerns
    Heninger, M
    [J]. INTECH, 2004, 51 (01) : 11 - 11
  • [6] Security and Privacy on Blockchain
    Zhang, Rui
    Xue, Rui
    Liu, Ling
    [J]. ACM COMPUTING SURVEYS, 2019, 52 (03)
  • [7] A Survey on Blockchain Security
    Khoshavi, Navid
    Francois, William
    Sargolzaei, Arman
    Chintakunta, Harish
    [J]. 2019 IEEE SOUTHEASTCON, 2019,
  • [8] Security and privacy of blockchain
    Shen, Meng
    Gou, Gaopeng
    Xuan, Qi
    [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2023, 4 (01):
  • [9] On the Security Risks of the Blockchain
    Zamani, Efpraxia
    He, Ying
    Phillips, Matthew
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2020, 60 (06) : 495 - 506
  • [10] Blockchain Security and Privacy
    Karame, Ghassan
    Capkun, Srdjan
    [J]. IEEE SECURITY & PRIVACY, 2018, 16 (04) : 11 - 12