Comparative Analysis of Consensus Algorithms of Blockchain Technology
- 25 Downloads
In today’s era of big data and machine learning, IoT is playing a very crucial role in nearly all areas like social, economic, political, education, health care. This drastic increase in data creates security, privacy, and trust issues in the era of the Internet. The responsibility of IT is to ensure the privacy and security for huge incoming information and data due to the drastic evolution of the IoT in the coming years. The blockchain has emerged as one of the major technologies that have the potential to transform the way of sharing the huge information and increase trust among. Building trust in a distributed and decentralized environment without the call for a trusted third party is a technological challenge for researchers. Due to the emergence of IoT, the huge and critical information is available over the Internet. The trust over the information is reduced drastically, causing an increase in security and privacy concern day by day. Blockchain is one of the best-emerging technologies for ensuring privacy and security by using cryptographic algorithms and hashing. We will discuss the basics of blockchain technology, consensus algorithms, comparison of important consensus algorithms, and areas of application.
KeywordsConsensus algorithm Merkle tree Hashing DLT Hash cash
- 1.Haber, S., and W. Scott Stornetta. 1991.How to time-stamp a digital document. Journal of Cryptology 3 (2): 99–111.Google Scholar
- 2.Nakamoto, S. 2008. Bitcoin: A peer-to-peer electronic cash system, Self-published Paper, May 2008 (Online). Available: https://bitcoin.org/bitcoin.pdf.
- 3.Bentov, I., A. Gabizon, and A. Mizrahi. 2016. Cryptocurrencies without proof of work. In International conference on financial cryptography and data security, Christ Church, Barbados, 142–157,Feb 2016.Google Scholar
- 5.Dai, H., Z. Zheng, and Y. Zhang. Blockchain for ınternet of things: A survey. IEEE Internet of Things Journal. https://doi.org/10.1109/jiot.2019.2920987.
- 6.Back, Adam. Hashcash—A denial of service counter-measure. http://www.cypherspace.org/hashcash/.
- 7.Vukoli, M. 2016. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. IFIP WG 11.4 ınternational workshop on open problems in network security iNetSec 2015, 112–125, 29 Oct 2015–29 Oct 2015.Google Scholar
- 8.Jaag, C., and C. Bach. 2017. Blockchain technology and cryptocurrencies opportunities for postal financial services. In The changing postal and delivery sector, 205–221. Springer: Cham. https://doi.org/10.1007/978-3-319-46046-8_13.
- 9.Bentov, I., A. Gabizon, and A. Mizrahi. 2016. Cryptocurrencies without proof of work. Paper presented at the ınternational conference on financial cryptography and data security, 142–157. Heidelberg: Springer, February. https://doi.org/10.1007/978-3-662-53357-4_10.
- 10.Zheng, Z., S. Xie, H.-N. Dai, and H. Wang. 2016. Blockchain challenges and opportunities: Survey. School of Data and Computer Science, Sun Yat-sen University, Tech. Rep.Google Scholar
- 11.Sankar, L.S., M. Sindhu, and M. Sethumadhavan. 2017. Survey of consensus protocols on blockchain applications. In 2017 4th international conference on advanced computing and communication systems (ICACCS).Google Scholar
- 12.Larimer, D. 2018. DPOS consensus algorithm—The missing Whitepaper, Steemit (Online). Available: https://steemit.com/dpos/dantheman/dpos-consensus-algorithm-this-missingwhite-paper Accessed 03 Feb 2018.
- 13.Correia, M., G. Veronese, and L. Lung. 2010. Asynchronous Byzantine consensus with 2f + 1 processes. In Proceedings of the 2010 ACM symposium on applied computing—SAC ’10.Google Scholar
- 14.Theng, Z., S. Xie, H. Dai, X. Chen, and H. Wang. 2017. An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData Congress), Honolulu, 557–564, IEEE.Google Scholar
- 15.Zheng, Zibin, Shaoan Xie, Hong-Ning Dai, and Xiangping Chen. 2018. Blockchain challenges and opportunities: A survey. Huaimin Wang International Journal of Web and Grid Services (IJWGS) 14 (4).Google Scholar