Abstract
Cryptocurrency applications with blockchain technology as the underlying architecture have gradually developed into a new means of payment, and are expanding to all walks of life with the support of cryptography and consensus algorithms. Due to the disadvantages of low throughput and high latency, the blockchain has seriously hindered the widespread use of upper-layer applications and cannot meet the growing demand for users and transaction volumes. Drawing on the sharding idea of traditional databases, blockchain sharding, as a representative of on-chain scaling solutions, greatly improves the throughput of the blockchain system. At present, most of the network sharding schemes in the sharded blockchain adopt a strategy based on random sharding. This strategy does not take into account the performance of the node itself, resulting in large performance differences between different shards, further reducing the throughput of the entire system. In addition, the aggregation behavior of malicious nodes may also occur, reducing the security of the system. Aiming at the performance of each node, this paper proposes a sharding strategy based on the approximate ideal solution model (TOPSIS). Through the TOPSIS model, the nodes are scored according to the hardware performance of the node, the response time to the transaction and the results, etc., and the nodes are allocated to the corresponding shards according to the scoring results. The sharding strategy based on this model balances the performance differences among shards and improves the throughput of the entire system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Qiu, M., Li, H., Sha, E.: Heterogeneous real-time embedded software optimization considering hardware platform. In: ACM Symposium on Applied Computing, pp. 1637–1641 (2009)
Qiu, M., Jia, Z., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. J. Signal Proc. Syst. (2007)
Qiu, M., Yang, L., et al.: Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE Trans. VLSI 18(3), 501–504 (2009)
Niu, J., Gao, Y., et al.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC 72(12), 1565–1575 (2012)
Qiu, M., Xue, C., Shao, Z., et al.: Efficient algorithm of energy minimization for heterogeneous wireless sensor network. IEEE EUC, pp. 25–34 (2006)
Qiu, M., Chen, Z., Ming, Z., Qin, X., Niu, J.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813–822 (2014)
Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. IEEE BigDataSecurity (2016)
Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. MCCA (2016)
Gao, X., Qiu, M.: Energy-based learning for preventing backdoor attack. KSEM, vol. 3, pp. 706–721 (2022)
Gai, K., Qiu, M., Chen, L., Liu, M.: Electronic health record error prevention approach using ontology in big data. IEEE 17th HPCC (2015)
Qiu, M., Qiu, H.: Review on image processing based adversarial example defenses in computer vision. In: IEEE 6th International Conference BigDataSecurity, pp. 94–99. USA (2020)
Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 8(13), 10327–10335 (2020)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system [EB], bitcoin.org (2009)
Liu, J., Xie, M., Chen, S., Ma, C., Gong, Q.: An improved DPoS consensus mechanism in blockchain based on PLTS for the smart autonomous multi-robot system. Inform Sci. 575, 528–554 (2021)
Gai, K., Zhang, Y., et al.: Blockchain-enabled service optimizations in supply chain digital twin. IEEE Trans. Service Comput. (2022)
Qiu, M., Qiu, H., et al.: Secure Data Sharing Through Untrusted Clouds with Blockchain-enabled Key Management. The 3rd SmartBlock, pp. 11–16, China (2020)
Chen, S., Xie, M., Liu, J.: Improvement of the DPoS Consensus Mechanism in Blockchain Based on PLTS. IEEE BigDataSecurity (2021)
Liu, J., Zhao, J., Huang, H., Xu, G.: A novel logistics data privacy protection method based on blockchain. Multimedia Tools Appl. 1–21 (2022). https://doi.org/10.1007/s11042-022-12836-w
Xu, G., Dong, J., Ma, C.: A certificateless encryption scheme based on blockchain. Peer-to-Peer Network. Appl. 14(5), 2952–2960 (2021). https://doi.org/10.1007/s12083-021-01147-w
Qiu, M., Xue, C., Shao, Z., Sha, E.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE Conference, pp. 1–6 (2007)
Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Architect. 57(9), 840–849 (2011)
Zhang, L., Qiu, M., et al.: Variable partitioning and scheduling for MPSoC with virtually shared scratch pad memory. J. Signal Process. Syst. 58(2), 247–265 (2010)
Qiu, H., Qiu, M., Lu, R.: Secure V2X communication network based on intelligent PKI and edge computing. IEEE Network 34(2), 172–178 (2019)
Qiu, H., Zeng, Y., Guo, S., Zhang, T., Qiu, M., Thuraisingham, B.: Deepsweep: an evaluation framework for mitigating DNN backdoor attacks using data augmentation. In: ACM Asia Conference on Computer and Communications (2021)
Xu, G., Zhang, J., Wang, L.: An Edge Computing Data Privacy-Preserving Scheme Based on Blockchain and Homomorphic Encryption. ICBCTIS’21 (2021)
Qiu, M., Guo, M., et al.: Loop scheduling and bank type assignment for heterogeneous multi-bank memory. JPDC 69(6), 546–558 (2009)
Qiu, M., Sha, E., et al.: Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP. JPDC 68(4), 443–455 (2008)
Qiu, M., Ming, Z., Li, J., et al.: Three-phase time-aware energy minimization with DVFS and unrolling for chip multiprocessors. JSA 58(10), 439–445 (2012)
Hu, F., Lakdawala, S., et al.: Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE Trans. Infor. Tech. Biomed. 13(4), 656–663 (2009)
Qiu, H., Zheng, Q., et al.: Topological graph convolutional network-based urban traffic flow and density prediction. IEEE Trans. ITS (2020)
Qiu, M., Khisamutdinov, E., et al.: RNA nanotechnology for computer design and in vivo computation. Philosoph. Trans. Royal Soc. A (2013)
Zhang, K., Kong, J., et al.: Multimedia layout adaptation through grammatical specifications. Multimedia Syst. 10(3), 245–260 (2005)
Qiu, M., Zhang, K., Huang, M.: Usability in mobile interface browsing. Web Intell. Agent Syst. J. 4(1), 43–59 (2006)
Qi, D., Liu, M., et al.: Exponential synchronization of general discrete-time chaotic neural networks with or without time delays. IEEE TNN 21(8), 1358–1365 (2010)
Luu, L., Narayanan, V., et al.: A secure sharding protocol for open blockchains. 2016 ACM SIGSAC, pp. 17–30 (2016)
Xie, M., Liu, J., et al.: Primary node election based on probabilistic linguistic term set with confidence interval in the PBFT consensus mechanism for blockchain. Complex Intell Syst. https://doi.org/10.1007/s40747-022-00857-9
Gan, C., Saini, A., et al.: Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor. Multimed Tools Appl. 1–17 (2020)
Zhu, Q., Loke, S., et al.: Applications of distributed ledger technologies to the internet of things: a survey. ACM Comput. Surv. 52(6), 1–34 (2020)
Kokoris-Kogias, E., Jovanovic, P., et al.: Omniledger: a secure, scale-out, decentralized ledger via sharding. IEEE SP, pp. 583–598 (2018)
Zhou, Y., Liu, T., Tang, F.: A privacy-preserving authentication and key agreement scheme with deniability for IoT. Electronics 8(4) (2019)
Zhang, X., Yijun, Y.: Research on digital copyright management system based on blockchain technology. In: IEEE 3rd ITNEC (2019)
Bin, C., Shouming, H., Daquan, F.: Impact of Network Load on Direct Acyclic Graph Based Blockchain for Internet of Things. 2019 CyberC (2019)
Ning, Z., et al.: Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach. Sci. China Inf. Sci. 64(6), 1–16 (2021). https://doi.org/10.1007/s11432-020-3125-y
Tang, F., Pang, J., Cheng, K., Gong, Q.: Multiauthority traceable ring signature scheme for smart grid based on blockchain. Wireless Commun. Mobile Comput. 2021, 1–9 (2021). https://doi.org/10.1155/2021/5566430
Fu, W., Wei, X., Tong, S.: An improved blockchain consensus algorithm based on raft. Arab. J. Sci. Eng. 46(9), 8137–8149 (2021). https://doi.org/10.1007/s13369-021-05427-8
Zhu, Z., Qi, G., Zheng, M.: Blockchain based consensus checking in decentralized cloud storage. Simul. Model Pract. Tt. 102 (2020)
Chauhan, A., Malviya, O.P., et al.: Blockchain and scalability. In: IEEE QRS-C, pp. 122–128 (2018)
Kim, S., Kwon, Y., Cho, S.: A survey of scalability solutions on blockchain. In: IEEE ICTC, pp. 1204–1207 (2018)
Al-Bassam, M., Sonnino, A., et al.: Chainspace: a sharded smart contracts platform. arXiv:1708.03778 (2017)
Gao, Y., Nobuhara, H.: A proof of stake sharding protocol for scalable blockchains. 2017 APAN, vol. 44, pp. 13–16 (2017)
Wang, W., Hoang, D.T., et al.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328–22370 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, J., Shen, X., Xie, M., Zhang, Q. (2023). Research on Sharding Strategy of Blockchain Based on TOPSIS. In: Qiu, M., Lu, Z., Zhang, C. (eds) Smart Computing and Communication. SmartCom 2022. Lecture Notes in Computer Science, vol 13828. Springer, Cham. https://doi.org/10.1007/978-3-031-28124-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-031-28124-2_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28123-5
Online ISBN: 978-3-031-28124-2
eBook Packages: Computer ScienceComputer Science (R0)