Groupchain: Towards A Scalable Public Blockchain in Fog Computing of Iot Services Computing
Groupchain: Towards A Scalable Public Blockchain in Fog Computing of Iot Services Computing
2, MARCH/APRIL 2020
Abstract—Powered by a number of smart devices distributed throughout the whole network, the Internet of Things (IoT) is supposed to
provide services computing for massive data from devices. Fog computing, an extension of cloud-based IoT-oriented solutions, has
emerged with requirements for distribution and decentralization. In this respect, the conjunction with Blockchain provides a natural
solution for decentralization, as well as potentially helps fog computing overcome some deficiencies such as security and privacy then
consequently expand the application scope of IoT. However, one of the key challenges of blockchain’s integration with fog computing is
scalability. To end this, this work proposes Groupchain, a novel scalable public blockchain of a two-chain structure suitable for fog
computing of IoT services computing. Groupchain employs the leader group to collectively commit blocks for higher transaction efficiency
and introduces bonus and deposit into the incentive mechanism to supervise behaviors of members in the leader group. Our security
analysis shows that Groupchain retains the security of Bitcoin-like blockchain and enhances defense against attacks such as
double-spend and selfish mining. We implement a prototype of Groupchain and conducted experiments. The experimental results
demonstrate that Groupchain achieves optimization on transaction throughput and confirmation latency which are argued in Bitcoin.
Index Terms—Public blockchain, two-chain, leader group, scalability, internet of things (IoT) service
1 INTRODUCTION
computing has recently witnessed an increasing overloads the Internet in both terms of efficiency and scal-
S ERVICES
number of applications across heterogeneous fields,
ranging from cloud computing, digital economy, Internet-
ability [9].
Fog computing is a distributed extension of IoT-oriented
of-Things (IoT), etc. A notable example is the IoT that cloud-based solutions for service computing, distributing
enables more effective control over the physical world cloud computation and storage gradually to the edge net-
through interconnected smart devices, including the sectors work [10]. Each fog node locates close to the IoT devices at
of manufacturing [1], healthcare [2] and energy [3]. Despite the edge network and provides different capacities of com-
its potential, there are some problems to be solved to make puting, storage and networking to support the execution of
IoT services wide its application. There are various loosely service applications. As a result, fog computing relies on fog
coupled and distributed smart devices in IoT systems that nodes to create cloud services that are distributed across
require connection, concerted operation and management edge domains. However, fog computing architecture still
[4], hence, identification and trust between each other are suffers the risk of trust-based and centralized management
essential. Traditional cloud-based IoT [5], [6] trusts some when cross-domain sharing and collaborative utilization of
centralized servers to address this problem and to process data have become an urgent demand, which brings concerns
the massive data from those devices limited by computa- on data security and privacy [11]. Data in an individual
tional resources [7], [8]. However, this kind of centralized domain can’t transfer directly between each other and must
services computing completely abandons the computational rely on trusted intermediaries to achieve data exchange. But
power of IoT devices themselves, moreover, the data trans- the administrators may disclose sensitive data, e.g., health-
mission through the Internet to the cloud is expensive that care, finance, etc., due to insider attacks. For a more scalable
and secure large-scale IoT network, it is supposed to
K. Lei, M. Du, and J. Huang are with the Shenzhen Key Lab for Information exchange and process data autonomously in a trustless envi-
Centric Networking & Blockchain Technology (ICNLAB), School of ronment and a better mechanism is required for data security
Electronics and Computer Engineering (SECE), Peking University, and privacy. It is time to consider decentralization for future
ShenZhen 518055, China, and also with the PCL Research Center of IoT services computing, and importantly, a decentralization-
Networks and Communications, Peng Cheng Laboratory, Shenzhen 518066,
China. E-mail: [email protected], {mydu, huangjiyue}@sz.pku.edu.cn. achieved system calls for distributed consensus to ensure
T. Jin was with the Shenzhen Key Lab for Cloud Computing Technology data consistency.
and Applications, School of Electronic and Computer Engineering, Peking Blockchain technology introduced by Bitcoin [12] pro-
University, ShenZhen 518055, China. E-mail: [email protected].
vides a solution for trustful peer-to-peer transactions under
Manuscript received 31 Mar. 2019; revised 2 Sept. 2019; accepted 10 Oct. the decentralized and trustless environment, tackling the
2019. Date of current version 15 Apr. 2020.
(Corresponding author: Kai Lei.) above problems of fog computing. The massive use of cryp-
Digital Object Identifier no. 10.1109/TSC.2019.2949801 tography, a key characteristic of blockchain networks, brings
1939-1374 ß 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See ht_tps://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
LEI ET AL.: GROUPCHAIN: TOWARDS A SCALABLE PUBLIC BLOCKCHAIN IN FOG COMPUTING OF IOT SERVICES COMPUTING 253
authoritativeness behind all the interactions in the network achieves a throughput of over 800 TPS with a small leader
[13]. In addition to public-announced transactions across the group size. Moreover, even in a leader group size of 100,
whole blockchain network, the consensus algorithm drives where the whole blockchain network size is 350, Group-
untrusted parties to agree on a common state. The conver- chain still presents the performance of close to 600 TPS.
gence of fog computing and blockchain can potentially build Our key contributions are as follows:
better IoT services computing. Blockchain can serve as a pub-
lic ledger of data where all the operations are immutably We propose Groupchain that employs the leader
recorded. By enabling each individual node to participate in group with a small size to reach consensus on blocks
the data maintain, blockchain achieves data exchange and to achieve high transaction efficiency and guarantee
facilitate value flow in an open trustless network [14]. As for dynamic membership under the public environment.
data consistency, the consensus algorithm of Bitcoin-derived To make up forks while preserving efficient transac-
blockchain guarantees eventual consistency [15]. tion processing, Groupchain is enhanced with a two-
However, fog computing comes at scalability challenges if chain structure.
straightforwardly conjunct with blockchain. The transaction We introduce the bonus and deposit into incentive
efficiency in the blockchain, of which key metrics are mechanism for Groupchain to regulate behaviors of
throughput and confirmation latency, is much too limited leader groups, effectively prevent malicious nodes
for fog computing. This is the scalability problem in general from joint attacks.
blockchains. Although parameter tuning can be used to scale We perform the security analysis to demonstrate the
blockchains, there exists a trade-off between block size and correctness of our solution and find that Groupchain
block interval which actually is the trade-off between system preserves Bitcoin security and mitigates attacks
performance and data consistency. When it comes to fog against Bitcoin blockchain such as selfish mining.
computing, the scalability problem also involves support for We conduct the evaluation of Groupchain with a pro-
a large number of fog nodes, and both system performance totype implementation, demonstrating that Group-
and data consistency are important for fog computing. More- chain achieves optimization on Bitcoin’s transaction
over, due to computational resource constraints, Proof-of- throughput of times and supports lower transaction
Work (PoW) is already heavy for some fog nodes, not to men- confirmation latency of only 1 blockchain generation
tion once blockchain forks occur, additional computational time.
power is required to resolve the inconsistency. In current
cloud-and-blockchain-based IoT systems, the Consortium 1.2 Structure of the Paper
Blockchain where the consensus is executed by small sets of The remainder of this paper is structured as follows:
authorized entities is the main blockchain structure. Indeed, The related works on blockchain consensus optimization
using a Byzantine Fault Tolerant (BFT) -based [15] protocol, and blockchain-enabled IoT are summarized in Section 2.
such as Practical Byzantine Fault Tolerant (PBFT) [17], with a Section 3 provides the background of blockchain and Naka-
small number of pre-designated trusted entities, can avoid moto consensus, as well as Bitcoin-NG. We outline the sys-
the problem of the low computational power of some IoT tem architecture for our research scenario and introduce the
devices and achieve higher transaction efficiency [18]. But system model in Section 4. Section 5 describes the Group-
consortium blockchains abandon open membership under a chain design in detail. In Section 6, we conduct security anal-
trust model of stronger assumptions, and it only allowed ysis for the system. Sections 7 and 8 presents a prototype
fixed devices to mine, not considering that some other devi- implementation of Groupchain, and illustrates experimental
ces are computationally capable. Although the fog nodes results and corresponding discussions to validate our solu-
have more computing power than normal IoT devices, if the tion, respectively. Finally, Section 9 draws the conclusion
decentralization and security advantages of the public block- with future research discussion.
chain are to be preserved in fog computing, the challenges of
scalability and transaction efficiency must be addressed.
2 RELATED WORK
1.1 Contributions The consensus protocol is always one of the most important
In this paper, we present Groupchain, a scalable public optimization spots to scale the blockchain. By simply improv-
blockchain of two-chain structure that is suitable for fog ing the Nakamoto consensus, the GHOST [19] protocol opti-
computing of IoT services computing. Built on the principle mizes the longest chain algorithm of origin Bitcoin with the
of reducing consensus size to achieve high transaction effi- heaviest chain algorithm, which is able to run on flexible
ciency, Groupchain employs the leader group with a small block size and achieves much higher TPS than Bitcoin. The
size to collectively commit blocks. In public/permissionless problem it brings is that miners with weaker computing
setting, the members of the leader group are dynamic and power have the chance to use selfish mining strategy to
elected via Bitcoin’s PoW under the untrusted environment. obtain benefits that are not fair to their computing power.
The idea from Bitcoin-NG of decoupling leader election and Bitcoin-NG [20] introduces high generation frequency of
transaction serialization further inspires Groupchain to microblocks for transaction commitment that facilitates high
reduce transaction confirmation latency. We improve the transaction throughput. However, the solution for forks via
chain structure and finally derive the two-chain structure. the longest chain brings security risk in its chain structure
To regulate behaviors of leader groups, bonus and deposit compared with that of Bitcoin. Other attempts [15], [21], [22]
are introduced into the incentive mechanism. Experiments hoping to replace Nakamoto consensus with classical Byzan-
with a prototype implementation show that Groupchain tine fault-tolerant (BFT), maintain relatively high throughput
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
254 IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 13, NO. 2, MARCH/APRIL 2020
3 BACKGROUND 4 PRELIMINARIES
In this section, we first briefly describe the emerging block- In this section, we shed light on the fundamental architec-
chain technology and Nakamoto consensus that is intro- ture in fog computing of IoT services computing and princi-
duced by Bitcoin. Subsequently, we discuss Bitcoin-NG ples for building the consensus protocol, and introduce the
which is one of the inspiring building blocks for our pro- system model for nodes in the fog computing to enable
posed Groupchain. decentralized distributed network based on blockchain.
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
LEI ET AL.: GROUPCHAIN: TOWARDS A SCALABLE PUBLIC BLOCKCHAIN IN FOG COMPUTING OF IOT SERVICES COMPUTING 255
Open Membership: Considering the demand for cross- 4.2 System Model
domain sharing and collaborative utilization of data We propose to enable a decentralized distributed network
in future IoT network, it is necessary to establish based on blockchain for nodes in and above the fog layer,
public/permissionless blockchain to support the that is, the nodes in the fog layer and cloud layer. Specifi-
nodes joining or leaving at any time. cally, the whole network is comprised of a set of N nodes
Efficiency: Fog computing itself is to meet the proc- under the public/permissionless setting, where there is no
essing requirements of massive IoT data in a more trusted public key infrastructure and any node can join or
efficient way. Therefore, the consensus protocol for leave at any time. Each node i 2 N has a public/private
blockchain-based fog computing is supposed to be key-pair ðpki ; ski Þ. Each individual node i has a limited
efficient. amount of computational
P power pi 0 of the entire net-
Fault Tolerance: With the growing of IoT network, it is work, where i2N pi ¼ 1. Assume that all nodes are well
hard to accurately and efficiently identify malicious connected in a peer-to-peer network.
nodes under the public/permissionless setting, and Blockchain nodes in both the fog layer and cloud layer
the fault tolerance of consensus protocol can alleviate are either honest or Byzantine. Byzantine nodes are the ones
security issues in such a large-scale network. who do not follow the consensus protocol, either
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
256 IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 13, NO. 2, MARCH/APRIL 2020
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
LEI ET AL.: GROUPCHAIN: TOWARDS A SCALABLE PUBLIC BLOCKCHAIN IN FOG COMPUTING OF IOT SERVICES COMPUTING 257
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
258 IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 13, NO. 2, MARCH/APRIL 2020
Fig. 5. Deposit for leader group members. where H1 and H2 are all honest nodes and set B are of
Byzantine nodes in cooperation.
The sequence number of final winner group block is If nodes in B want to do evil, they can propose the con-
sensus process with participants in either H1 or H2 and
i ¼ Hðbk Þ:substringð0; kÞ mod ðk 1Þ; (2)
immediately broadcast blocks, then propose a second con-
where substringðÞ is the string truncation operator from sensus with the same nodes. In this way, malicious nodes
length 0 to k. are able to gain agreement from 2/3 of nodes in the sys-
tem, ignoring members of the other one part. To win the
5.5 Incentive game, it requires
In Groupchain, the leader group has great power to commit jH1 j þ jBj n f (4)
transactions and blocks. Since the size of the leader group is
relatively small, to regulate leader groups more strictly, we jH2 j þ jBj n f: (5)
introduce deposit and bonus into the incentive mechanism
Take jBj ¼ f at the worst case, then we get (6) and (7)
in Groupchain.
The deposit is to effectively prevent malicious nodes from jH1 j n 2f (6)
conducting joint attacks and constrain behaviors of the leader
group members from beginning to end. Since viceblocks do jH2 j n 2f (7)
not require mining, a leader can conduct Denied-of-Service according to (4) and (5). So
(DoS) [33] attacks by continuously generate invalid vice-
blocks. In addition, a leader group with small size is entitled jH1 j þ jH2 j 2n 4f: (8)
to serialize transactions, which reduces consensus overhead
while making computational attacks easier. To address this Note that jH1 j þ jH2 j þ jBj ¼ n, i.e.,
problem, we need the new leader to deposit to historical
members after completing PoW for membership. The deposit jH1 j þ jH2 j ¼ n f: (9)
will be refunded only if the member behaves honestly during
Hence, (8) and (9) can be simplified as
a sufficiently long ”inspection period”, which means the
member is much less motivated to sign invalid transactions or n 3f: (10)
generate invalid group blocks, otherwise it is paid to the his-
torical members. Our prerequisite is n 3f þ 1, which contradicts with
An example of the process for deposit delivery is as fol- (10). Therefore, the leader group in Groupchain is able to
lows. Let the new groupblock is b, and its header hash is HðbÞ. provide fault tolerance if the number of Byzantine mem-
The miner intercepts g (or g mod 255 if g 256) bits of HðbÞ 3 c.
bers in a leader group is no more than f ¼ bn1 u
t
from low to high and hashes the result into Hðbg Þ, where g is
the number of current leader group. The deposit is paid to the 6.2 Leader Group Size
members of leader group Hðbg Þ mod g. Take Fig. 5 as an exam- To get the required size n of a leader group, we model the
ple. The new generated groupblock is b50d and the hash value security of leader group membership as a random sampling
of its last 50 bits is Hðbg50d Þ. Since Hðbg50d Þ mod 50 ¼ 6, the problem with two possible outcomes, i.e., honest and Byz-
miner must deposit to the members of leader group 6. antine, like in [34]. Let p be the probability of a miner is Byz-
To motivate more miners to participate in the Group- antine and consider that mining is a fair game, which
chain network and fully use the lost viceblocks in forks, we means the probability that a node is Byzantine is roughly
introduce a bonus. The remuneration in Bitcoin and Bitcoin- equal to the mining power of the miner. As mentioned in
NG is comprised of two parts: mining reward and transac- Section 6.1, the leader group guarantees fault tolerance as
tion fee. Groupchain remains these two remunerations, and long as it picks less than c ¼ bn13 c Byzantine nodes as mem-
additionally, gives a bonus to the groupblock miners who bers. Thus, using the cumulative binomial distribution, the
lost in the competition of leadership. security probability of a leader group is
X c
n k
6 SECURITY ANALYSIS AND DISCUSSION P ½X c ¼ p ð1 pÞnk : (11)
k¼0
k
In this section, we provide security analysis and discussion
on our Groupchain, presenting the security defense against Fig. 6 shows the results for the evaluation of (11), where
attacks and some details about the leader groups. the probability p of a Byzantine node varies from 0.1 to 0.3.
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
LEI ET AL.: GROUPCHAIN: TOWARDS A SCALABLE PUBLIC BLOCKCHAIN IN FOG COMPUTING OF IOT SERVICES COMPUTING 259
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
260 IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 13, NO. 2, MARCH/APRIL 2020
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
LEI ET AL.: GROUPCHAIN: TOWARDS A SCALABLE PUBLIC BLOCKCHAIN IN FOG COMPUTING OF IOT SERVICES COMPUTING 261
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.
262 IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 13, NO. 2, MARCH/APRIL 2020
[5] S. Singh, Y.-S. Jeong, and J. H. Park, “A survey on cloud comput- [31] W. Chen, Z. Zhang, Z. Hong, C. Chen, J. Wu, S. Maharjan,
ing security: Issues, threats, and solutions,” J. Netw. Comput. Appl., Z. Zheng, and Y. Zhang, “Cooperative and distributed computation
vol. 75, pp. 200–222, 2016. offloading for blockchain-empowered industrial Internet of Things,”
[6] X. Sun, N. Ansari, and R. Wang, “Optimizing resource utilization IEEE Internet Things J., vol. 6, no. 5, pp. 8433–8446, Oct. 2019.
of a data center,” IEEE Commun. Surveys Tuts., vol. 18, no. 4, [32] Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, and Y. Zhang, “Consortium
pp. 2822–2846, Fourth Quarter 2016. blockchain for secure energy trading in industrial Internet of Things,”
[7] H.-L. Truong and S. Dustdar, “Principles for engineering IoT cloud IEEE Trans. Ind. Informat., vol. 14, no. 8, pp. 3690–3700, Aug. 2018.
systems,” IEEE Cloud Comput., vol. 2, no. 2, pp. 68–76, Mar./Apr. 2015. [33] X. Luo and R. K. Chang, “On a new class of pulsing denial-of-service
[8] L. Wang and R. Ranjan, “Processing distributed internet of things attacks and the defense,” in Proc. Netw. Distrib. Syst. Security Symp.,
data in clouds,” IEEE Cloud Comput., vol. 2, no. 1, pp. 76–80, 2005.
Jan./Feb. 2015. [34] E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, E. Syta, and
[9] P. K. Sharma, M. Chen, and J. H. Park, “A software defined fog B. Ford, “OmniLedger: A secure, scale-out, decentralized ledger via
node based distributed blockchain cloud architecture for IoT,” sharding,” in Proc. IEEE Symp. Security Privacy, 2018, pp. 583–598.
IEEE Access, vol. 6, pp. 115–124, 2018. [35] J. R. Douceur, “The sybil attack,” in Proc. Int. Workshop Peer-to-Peer
[10] M. Chiang and T. Zhang, “Fog and IoT: An overview of research Syst., Oct. 2002, pp. 251–260.
opportunities,” IEEE Internet Things J., vol. 3, no. 6, pp. 854–864, [36] I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is
Dec. 2016. vulnerable,” Commun. ACM, vol. 61, no. 7, pp. 95–102, Jun. 2018.
[11] G. Sagirlar, B. Carminati, E. Ferrari, J. D. Sheehan, and E. Ragnoli, [Online]. Available: http://doi.acm.org/10.1145/3212998
“Hybrid-IoT: Hybrid blockchain architecture for Internet of Things - [37] A. Gervais, G. O. Karame, K. W€ ust, V. Glykantzis, H. Ritzdorf, and
PoW sub-blockchains,” CoRR, vol. abs/1804.03903, 2018. [Online]. S. Capkun, “On the security and performance of proof of work
Available: http://arxiv.org/abs/1804.03903 blockchains,” in Proc. ACM SIGSAC Conf. Comput. Commun. Security,
[12] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2016, pp. 3–16.
2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf [38] A. Miller, J. Litton, A. Pachulski, N. Gupta, N. Spring, B. Bhattacharjee,
[13] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts and D. Levin, “Discovering bitcoins public topology and influ-
for the internet of things,” IEEE Access, vol. 4, pp. 2292–2303, 2016. ential nodes,” 2015. [Online]. Available: https://allquantor.at/
[14] Z. Zheng, S. Xie, H.-N. Dai, X. Chen, and H. Wang, “Blockchain blockchainbib/pdf/miller2015topology.pdf
challenges and opportunities: A survey,” Int. J. Web Grid Services, [39] C. Decker and R. Wattenhofer, “Information propagation in the
vol. 14, no. 4, pp. 352–375, 2018. bitcoin network,” in Proc. IEEE Int. Conf. Peer-to-Peer Comput.,
[15] C. Decker, J. Seidel, and R. Wattenhofer, “Bitcoin meets strong Sep. 2013, pp. 1–10.
consistency,” in Proc. 17th Int. Conf. Distrib. Comput. Netw., 2016,
pp. 13:1–13:10. [Online]. Available: http://doi.acm.org/10.1145/ Kai Lei received the BS degree from Peking
2833312.2833321 University, Beijing, China, in 1998, the MS degree
[16] R. S. Leslie Lamport and M. Pease, “The byzantine generals problem,” from Columbia University, Beijing, in 1999, and the
ACM Trans. Program. Lang. Syst., vol. 4, no. 3, pp. 382–401, Jul. 1982. PhD degree from Peking University, in 2015, all in
[17] M. Castro and B. Liskov, “Practical byzantine fault tolerance,” in computer science. He is an associate professor with
Proc. 3rd Symp. Operating Syst. Design Implementation, Feb. 1999, the School of Electronics and Computer Engineering
pp. 173–186. (SECE), Peking University, Shenzhen Graduate
[18] K. Croman et al., “On scaling decentralized blockchains,” in Proc. School, and director of the Shenzhen Key Lab for
Int. Conf. Financial Cryptography Data Security, 2016, pp. 106–125. Information-Centric Networking and Blockchain
[19] Y. Sompolinsky and A. Zohar, “Secure high-rate transaction proc- Technologies (ICNLab) and Center for Internet
essing in bitcoin,” in Proc. Int. Conf. Financial Cryptography Data Research and Engineering (CIRE). He also auth-
Security, 2015, pp. 507–527. ored a book titled Information-Centric networking and Named Data network-
[20] I. Eyal, A. Efe Gencer, E. G€ un Sirer, and R. van Renesse, “Bitcoin-NG: ing in Chinese with PKU press in 2015. His recent research interests include
A scalable blockchain protocol,” in Proc. 13th USENIX Symp. Netw. future Internet architecture, blockchain, NLP, AI, and Federated Learning.
Syst. Design Implementation, 2016, pp. 45–59.
[21] L. Luu, V. Narayanan, C. Zheng, K. Baweja, S. Gilbert, and P. Saxena,
“A secure sharding protocol for open blockchains,” in Proc. ACM Maoyu Du received the BS degree in software
SIGSAC Conf. Comput. Commun. Security, 2016, pp. 17–30. engineering from the University of Electronic and
[22] R. Pass and E. Shi, “Hybrid consensus: Efficient consensus in the Technology of China, Sichuan, China. She is cur-
permissionless model,” in Proc. 31st Int. Symp. Distrib. Comput., rently working toward the MS degree with the focus
2017, pp. 39:1–39:16. on Blockchain tasks at Peking University, Shenz-
[23] R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong, hen, China. Her current research mainly focuses
“Zyzzyva: Speculative byzantine fault tolerance,” ACM SIGOPS on blockchain, including scalability and application.
Operating Syst. Rev., vol. 41, no. 6, pp. 45–58, 2007.
[24] J.-P. Martin and L. Alvisi, “Fast byzantine consensus,” IEEE Trans.
Dependable Secure Comput., vol. 3, no. 3, pp. 202–215, Jul./Aug. 2006.
[25] S. Liu, P. Viotti, C. Cachin, V. Quema, and M. Vukolic, “XFT: Prac-
tical fault tolerance beyond crashes,” in Proc. 12th USENIX Symp.
Jiyue Huang received the BS degree in electronic
Operating Syst. Design Implementation, 2016, pp. 485–500.
information engineering from Tianjin University,
[26] J. Zou, B. Ye, L. Qu, Y. Wang, M. A. Orgun, and L. Li, “A proof-of-
Tianjin, China. She is currently working toward the
trust consensus protocol for enhancing accountability in crowd-
MS degree with the focus on distributed machine
sourcing services,” IEEE Trans. Services Comput., vol. 12, no. 3,
learning methods and natural language process-
pp. 429–445, May/Jun. 2019.
ing tasks at Peking University, Shenzhen, China.
[27] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “LSB: A
In 2016, she studied with the City University of
lightweight scalable blockchain for IoT security and privacy,” J.
Hong Kong as an exchange student. Her current
Parallel Distrib. Comput., vol. 134, pp. 180–197, 2019.
research interests include distributed machine
[28] S. Biswas, K. Sharif, F. Li, B. Nour, and Y. Wang, “A scalable
learning and blockchain technology.
blockchain framework for secure transactions in IoT,” IEEE Inter-
net Things J., vol. 6, no. 3, pp. 4650–4659, Jun. 2019.
[29] Y. Liu, K. Wang, Y. Lin, and W. Xu, “LightChain: A lightweight Tong Jin received the MS degrees in computer science from Peking
blockchain system for industrial Internet of Things,” IEEE Trans. University, Beijing, China. She was with Shenzhen Key Lab for Cloud
Ind. Informat., vol. 15, no. 6, pp. 3571–3581, Jun. 2019. Computing Technology and Applications, School of Electronics and
[30] Z. Li, Z. Yang, S. Xie, W. Chen, and K. Liu, “Credit-based pay- Computer Engineering (SECE), Peking University, Shenzhen PR. China.
ments for fast computing resource trading in edge-assisted Inter- Her research interests include blockchain technology and named data
net of Things,” IEEE Internet Things J., vol. 6, no. 4, pp. 6606–6617, networking.
Aug. 2019.
" For more information on this or any other computing topic,
please visit our Digital Library at www.computer.org/csdl.
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 03:57:26 UTC from IEEE Xplore. Restrictions apply.