Skip to main content
Log in

Enhancing blockchain scalability and security: the early fraud detection (EFD) framework for optimistic rollups

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Blockchain is an emerging technology that improves efficiency, transparency, and security in applications such as fintech, smart cities, healthcare, etc. However, blockchain technology faces scalability issues as the volume of transactions grows. One solution to enhance the scalability is offloading transactions outside the main blockchain layer using the Optimistic Rollup. In this context, we propose the Early Fraud Detection (EFD) framework that utilizes Optimistic Rollups and incorporates early fraud proofs by applying Bloom–Merkle trees that aim to reduce the challenger’s verification time and cost. The EFD framework has been tested using the Ethereum Mainnet Test Network and developed with Solidity. It demonstrates that the proposed EFD framework reduces the total cost to users by 25%. Moreover, it is robust against security threats, including Double Spending, Sybil, and Denial-of-Service (DOS) attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fig. 4
Algorithm 6
Algorithm 7
Algorithm 8
Algorithm 9
Algorithm 10
Algorithm 11
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Sultan, K., Ruhi, U., Lakhani, R.: Conceptualizing blockchains: characteristics & applications. arXiv preprint arXiv:1806.03693 (2018)

  2. Buterin, V., et al.: A next-generation smart contract and decentralized application platform. White Pap. 3(37), 2–1 (2014)

    Google Scholar 

  3. Kaur, A., Nayyar, A., Singh, P.: A path to the future. In: Cryptocurrencies and Blockchain Technology Applications, Blockchain, pp. 25–42 (2020)

  4. Georgiadis, E.: How many transactions per second can bitcoin really handle? Theoret. IACR Cryptol Eprint Arch. 2019, 416 (2019)

    Google Scholar 

  5. Bez, M., Fornari, G., Vardanega, T.: The scalability challenge of ethereum: An initial quantitative analysis. In: IEEE International Conference on Service-Oriented System Engineering (SOSE), pp. 167–176. IEEE (2019)

  6. Kuzlu, M., Pipattanasomporn, M., Gurses, L., Rahman, S., Performance analysis of a hyperledger fabric blockchain framework: throughput, latency and scalability. In: IEEE international Conference on Blockchain (Blockchain), pp. 536–540. IEEE (2019)

  7. Mehar, M.I., Shier, C.L., Giambattista, A., Gong, E., Fletcher, G., Sanayhie, R., et al.: Understanding a revolutionary and flawed grand experiment in blockchain: the DAO attack. J. Cases Inf. Technol. 21(1), 19–32 (2019)

    Article  Google Scholar 

  8. Viswanath, P.: Principles of Blockchains, Lecture 7: Liveness of Bitcoin

  9. Rahmadika, S., Noh, S., Lee, K., Kweka, B.J., Rhee, K.H.: The dilemma of parameterizing propagation time in blockchain P2P network. J. Inf. Process. Syst. 16(3), 699–717 (2020)

    Google Scholar 

  10. Bano, S., Al-Bassam, M., Danezis, G.: The road to scalable blockchain designs. USENIX Login 42(4), 31–36 (2017)

    Google Scholar 

  11. Croman, K., Decker, C., Eyal, I., Gencer, A.E., Juels,A., Kosba, A., et al.: On scaling decentralized blockchains. In: International Conference on Financial Cryptography and Data Security, pp. 106–125. Springer, New York (2016)

  12. Poon, J., Buterin, V.: Scalable autonomous smart contracts. White paper, pp. 1–47 (2017)

  13. Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments

  14. Tikhomirov, S.: Ethereum: state of knowledge and research perspectives. In: International Symposium on Foundations and Practice of Security pp. 206–221. Springer, New York (2017)

  15. Sguanci, C., Spatafora, R., Vergani, A.M.: Layer 2 blockchain scaling: a survey. arXiv preprint arXiv:2107.10881 (2021)

  16. Marukhnenko, O., Khalimov, G.: The overview of decentralized systems scaling methods. Comput. Inf. Syst. Technol. (2021)

  17. Kiong, L.V.: Investing in DeFi and NFT projects on alternative blockchains: a beginner’s guide to investing in DeFi and NFT projects on alternative blockchains other than ethereum. Liew Voon Kiong (2021)

  18. Kalodner, H., Möser, M., Lee, K., Goldfeder, S., Plattner, M., Chator, A., et al.: Blocksci: Design and applications of a blockchain analysis platform. In: 29th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 20), pp. 2721–2738 (2020)

  19. Nakamoto, S, et al.: Bitcoin. A peer-to-peer electronic cash system (2008)

  20. Singh, A.K., Gupta, R.: A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimed. Tools Appl. 81(23), 33127–33150 (2022)

    Article  Google Scholar 

  21. Laurent, N.: Optimism Monorepo. Accessed 19 July 2008. https://www.optimism.io/

  22. Kalodner, H., Goldfeder, S., Chen, X., Weinberg, S.M., Felten, E.W.: Arbitrum: Scalable, private smart contracts. In: 27th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 18), pp. 1353–1370 (2018)

  23. Teixeira, A, Nehab, D.: The Core of Cartesi

  24. Chiu, A.: The Boba Network. https://boba.network/

  25. Gupta, R., Gupta, I., Singh, A.K., Saxena, D., Lee, C.N.: An IoT-centric data protection method for preserving security and privacy in cloud. IEEE Syst. J. (2022)

  26. Gupta, R., Saxena, D., Gupta, I., Singh, A.K.: Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Netw. Lett. 4(4), 217–221 (2022)

    Article  Google Scholar 

  27. Gupta, R., Singh, A.K.: A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment. New Gener. Comput. 40(3), 737–764 (2022)

    Article  Google Scholar 

  28. paul.: The Fuel Network. https://fuel.sh/

  29. Fekete, D.L., Kiss, A.: Trust-minimized optimistic cross-rollup arbitrary message bridge. J. Netw. Comput. Appl. 221, 103771 (2024)

    Article  Google Scholar 

  30. McCorry, P., Buckland, C., Yee, B., Song, D.: SoK: validating bridges as a scaling solution for blockchains. Cryptol. ePrint Archive (2021)

  31. Gupta, R., Saxena, D., Gupta, I., Makkar, A., Singh, A.K.: Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Netw. Lett. 4(4), 174–178 (2022)

    Article  Google Scholar 

  32. Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. ACM SIGCOMM Comput. Commun. Rev. 28(4), 254–265 (1998)

    Article  Google Scholar 

  33. Ripeanu, M., Iamnitchi, A.: Bloom filters–Short tutorial. Computer Science Department, University of Chicago www cs uchicago edu/\(^\sim\) matei/PAPERS/bf doc. (2001)

  34. Tarkoma, S., Rothenberg, C.E., Lagerspetz, E.: Theory and practice of bloom filters for distributed systems. IEEE Commun. Surv. Tutor. 14(1), 131–155 (2011)

    Article  Google Scholar 

  35. Coglio, A.: Ethereum’s Recursive Length Prefix in ACL2. arXiv preprint arXiv:2009.13769 (2020)

  36. Blockchain, Urien P., IoT (BIoT): A new direction for solving Internet of Things security and trust issues. In: 3rd Cloudification of the Internet of Things (CIoT), pp. 1–4. IEEE (2018)

  37. Dameron, M.: Beigepaper: an ethereum technical specification. Ethereum Project Beige Paper (2018)

  38. Dinur, I., Dunkelman, O., Shamir, A.: New attacks on Keccak-224 and Keccak-256. In: International Workshop on Fast Software Encryption, pp. 442–461. Springer, New York (2012)

  39. Zhou, L., Qin, K., Cully, A., Livshits, B., Gervais, A.: On the just-in-time discovery of profit-generating transactions in defi protocols. arXiv preprint arXiv:2103.02228 (2021)

  40. Saad, M., Chen, S., Mohaisen, D.: SyncAttack: double-spending in Bitcoin Without Mining Power. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1668–1685 (2021)

  41. Huang, Y., Wang, W., Jiang, T., Zhang, Q.: Detecting colluding sybil attackers in robotic networks using backscatters. IEEE/ACM Trans. Netw. 29(2), 793–804 (2021)

    Article  Google Scholar 

  42. Tayyab, M., Belaton, B., Anbar, M.: ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: a review. IEEE Access. 8, 170529–170547 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

I am writing to submit our manuscript entitled, “Enhancing Blockchain Scalability and Security: The Early Fraud Detection (EFD) Framework for Optimistic Rollup”, to be considered for review and potential publication in your esteemed Journal. Our research aims to optimize the scalability challenge currently faced by blockchain systems. Currently, we have a few layer-2 solutions to counter the scalability problem and increase overall throughput, but they too face challenges. We aim to optimize one of the existing layer-2 solutions i.e Optimistic Rollups. However, these layer-2 solutions are easier to build, but transaction settlement time can take up to seven days. This is due to stringent fraud detection mechanisms. As a result, the cost of withdrawing money from the layer-1 blockchain layer is higher. EFD Framework reduces the challenger’s verification time and hence, cuts the overall cost to the user. EFD Framework uses some novel techniques like the Bloom-Merkle filter on Patricia trees and the User As Verifier model to enhance the layer-2 solutions and provide early fraud detection. We have developed a Testbed for the experiment, used smart contract endpoints, and deployed it on Ethereum Mainnet Test Network to test the feasibility of the proposed scheme. The data from the Testbed illustrate the high efficacy of the proposed approach. Our framework provides high efficiency compared with state-of-art schemes and up to 25% reduction of the total cost to users. Our framework withstands various security attacks like Double spending, Sybil attacks, Modification attack, and Denial-of-Service (DOS) attacks. We confirm that this work is original and has not been published elsewhere, nor is it currently under consideration for publication elsewhere. Please address all correspondence concerning this manuscript to me at debasis@iitj.ac.in Thank you for your consideration of this manuscript. Sincerely, Ms. Shristy Gupta Mr. Amritesh Kumar Mr. Lokendra Vishwakarma Dr. Debasis Das.

Funding

This work is partially supported by SERB (Project No. MTR/2023/001153) and DST IBITF Project (Project Number: IBITF/Note/EIR-PRAYAS/Cohort-03/SanctionLetter/2024-25/0076).

Author information

Authors and Affiliations

Authors

Contributions

EFD: A Novel Framework for Early Fraud Detection in Optimistic Rollups Author 1: Shristy Gupta Shristy Gupta is the first author of the manuscript. She conceived and designed the analysis part. She collected the data and implemented it on Amazon Web Services (AWS). She also wrote and reviewed the manuscript. Author 2: Amritesh Kumar Amritesh Kumar is the second author of the manuscript. He contributed equally to the manuscript preparation. He surveyed the state-of-the-art approaches. He contributed equally to technical content and did the security analysis. He also wrote and reviewed the manuscript. Author 3: Lokendra Vishwakarma Lokendra Vishwakarma is the third author of the paper. He contributed equally to the manuscript preparation. He contributed equally to technical content and did the performance analysis. He prepared figures from 1-7. He also wrote and reviewed the manuscript. Author 4: Debasis Das Debasis Das is the fourth author of the paper. He also contributed to the conception and design, analysis, and interpretation of the data. Drafting the article or revising it critically for important intellectual content and approval of the final version.

Corresponding author

Correspondence to Amritesh Kumar.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, S., Kumar, A., Vishwakarma, L. et al. Enhancing blockchain scalability and security: the early fraud detection (EFD) framework for optimistic rollups. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04471-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04471-x

Keywords

Navigation