Skip to main content
Log in

Storage efficient blockchain models for constrained applications

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The growing chain’s storage requirement is always an issue with blockchain platforms, and devices may not allocate the required storage to replicate an entire blockchain instance. To overcome this issue, we propose storage-efficient blockchain models that divide the growing blockchain into fixed-size sets of blocks, excluding the genesis block and allowing the participating nodes to store the recent blocks according to their storage capacity. Suppose a node, according to its storage capacity, decides not to replicate a few sets of old blocks to accommodate the new blocks. In that case, it stores the corresponding set’s last block hash and a hash of the XOR of the remaining blocks’ hashes and then drops those blocks. When required, nodes receive blocks equivalent to the deleted blocks from other nodes. They validate the received blocks by comparing the previous set’s last block hash with the received set’s first block parent hash and the XOR hash with the block hashes. If they match, the node will accept the equivalent set of deleted blocks; otherwise, reject. This will guarantee to avoid any uncertainty, single collision multi-block replacement and network diversion attack. The analysis and experimental results show that the proposed models are storage efficient and need less overhead. The proposed models provide security equivalent to the traditional blockchain and allow the storage-constrained devices to participate in the application for a long time compared with the other models. Also, we introduced the conceptual blockchain storage framework by combining traditional and lightweight schemes to allow nodes to choose and switch the storage model according to requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data Availibility

Not Applicable

References

  1. Alazab, M., Alhyari, S., Awajan, A., Abdallah, A.B.: Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance. Clust. Comput. 24(1), 83–101 (2021)

    Article  Google Scholar 

  2. Alfandi, O., Khanji, S., Ahmad, L., Khattak, A.: A survey on boosting iot security and privacy through blockchain: exploration, requirements, and open issues. Clust. Comput. 24, 37–55 (2021)

    Article  Google Scholar 

  3. Dang, H., Dinh, T.T.A., Loghin, D., Chang, E.-C., Lin, Q., Ooi, B.C.: Towards scaling blockchain systems via sharding. In: Proceedings of the 2019 international conference on management of data, pp. 123–140 (2019)

  4. Sharding-faqs | ethereum wiki. https://eth.wiki/sharding/Sharding-FAQs. Accessed 10 Nov 2021

  5. Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukolić, M., Cocco, S.W., Yellick, J.: Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Association for Computing Machinery, New York, NY (2018). https://doi.org/10.1145/3190508.3190538

  6. Rajendra, Y., Sahu, S., Subramanian, V., Shukla, S.K.: A storage efficient blockchain model for constrained applications. In: Third International Conference on Blockchain Computing and Applications (BCCA), vol. 2021, pp. 73–80 (2021)

  7. Li, R., Song, T., Mei, B., Li, H., Cheng, X., Sun, L.: Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput. 12(5), 762–771 (2019)

    Article  Google Scholar 

  8. Singh, J., Sinha, A., Goli, P., Subramanian, V., Shukla, S.K., Vyas, O.P.: Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology. Int. J. Inf. Secur. 21, 527–546 (2021)

    Article  Google Scholar 

  9. Subramanian, V., Rajendra, Y., Sahai, S., Shukla, S.K.: Decentralized device authentication model using the trust score and blockchain technology for dynamic networks. In: 2020 IEEE International Conference on Blockchain (Blockchain), pp. 116–125. IEEE (2020)

  10. Li, H., Pei, L., Liao, D., Wang, X., Xu, D., Sun, J.: Bddt: use blockchain to facilitate iot data transactions. Clust. Comput. 24, 459–473 (2021)

    Article  Google Scholar 

  11. Popov, S.: The tangle, white paper. iota.org (2018)

  12. Ethereum.: Light ethereum subprotocol. https://github.com/ethereum/wiki/wiki/Light-client-protocol

  13. Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, vol. 151, pp. 1–32 (2014)

  14. Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008)

  15. Light client protocol. ethereum/wiki wiki.github. https://github.com/ethereum/wiki/wiki/Light-client-protocol. Accessed 17 June 2021

  16. Pyoung, C.K., Baek, S.J.: Blockchain of finite-lifetime blocks with applications to edge-based iot. IEEE Internet Things J. 7(3), 2102–2116 (2019)

    Article  Google Scholar 

  17. Garlapati, S.: Trade-offs in the design of blockchain of finite-lifetime blocks for edge-iot applications. In: 2020 29th International Conference on Computer Communications and Networks (ICCCN), pp. 1–7. IEEE (2020)

  18. Johri, E., Sarkara, D., Shaha, K., Motaa, M.: Addressing scalability and storage issues in block chain using sharding. In: International Conference on Advancements in Computing & Management (ICACM-2019), pp. 209–214 (2019)

  19. Wang, X., Wang, W., Zeng, Y., Yang, T., Zheng, C.: A state sharding model on the blockchain. Clust. Comput. 25, 1969–1979 (2022)

    Article  Google Scholar 

  20. Perard, D., Lacan, J., Bachy, Y., Detchart, J.: Erasure code-based low storage blockchain node. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1622–1627. IEEE (2018)

  21. Hassanzadeh-Nazarabadi, Y., Küpçü, A., Özkasap, Ö.: Lightchain: scalable dht-based blockchain. IEEE Trans. Parallel Distrib. Syst. 32(10), 2582–2593 (2021)

    Article  Google Scholar 

  22. Nartey, C., Tchao, E.T., Gadze, J.D., Yeboah-Akowuah, B., Nunoo-Mensah, H., Welte, D., Sikora, A.: Blockchain-iot peer device storage optimization using an advanced time-variant multi-objective particle swarm optimization algorithm. EUROSIP J. Wirel. Commun. Netw. (2022). https://doi.org/10.1186/s13638-021-02074-3

  23. Zhang, J., Zhong, S., Wang, J., Yu, X., Alfarraj, O.: A storage optimization scheme for blockchain transaction databases. Comput. Syst. Sci. Eng. 36, 3 (2021)

    Google Scholar 

  24. Ethereum Foundation.: Geth v1.9.0,” Mar 2022. https://blog.ethereum.org/2019/07/10/geth-v1-9-0. Accessed 14 Mar 2022

  25. Kadianakis, G., Lightclient, Stokes, A.: Eip-4444: bound historical data in execution clients. https://eips.ethereum.org/EIPS/eip-4444. Accessed 27 Mar 2022

  26. Bandara, E., Tosh, D., Foytik, P., Shetty, S., Ranasinghe, N., Zoysa, K.D.: Tikiri-towards a lightweight blockchain for iot. Futur. Gener. Comput. Syst. 119, 154–165 (2021)

    Article  Google Scholar 

  27. YCharts.: Ethereum blocks per day. https://ycharts.com/indicators/ethereumblocks_per_day

  28. goethereum.: Goethereum. https://github.com/ethereum/go-ethereum

Download references

Funding

This work is part of a project titled Development of Secure IoT Communication using the Blockchain Technology funded by Department of Science and Technology (DST), Ministry of Science and Technology, Government of India under the Cyber Security (CS) Research of Interdisciplinary Cyber-Physical Systems (ICPS) . We also thank the Ministry of Education, Government of India, for the support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuvaraj Rajendra.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest in the presented work. All authors contributed to the paper.

Ethical approval

This article does not contain any studies performed by any of the authors with human participants or animals.

Informed consent

Not Applicable

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajendra, Y., Sahu, S., Subramanian, V. et al. Storage efficient blockchain models for constrained applications. Cluster Comput 26, 2163–2181 (2023). https://doi.org/10.1007/s10586-022-03804-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03804-y

Keywords

Navigation