Skip to main content

Research on Sharding Strategy of Blockchain Based on TOPSIS

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13828))

Included in the following conference series:

  • 1100 Accesses

Abstract

Cryptocurrency applications with blockchain technology as the underlying architecture have gradually developed into a new means of payment, and are expanding to all walks of life with the support of cryptography and consensus algorithms. Due to the disadvantages of low throughput and high latency, the blockchain has seriously hindered the widespread use of upper-layer applications and cannot meet the growing demand for users and transaction volumes. Drawing on the sharding idea of traditional databases, blockchain sharding, as a representative of on-chain scaling solutions, greatly improves the throughput of the blockchain system. At present, most of the network sharding schemes in the sharded blockchain adopt a strategy based on random sharding. This strategy does not take into account the performance of the node itself, resulting in large performance differences between different shards, further reducing the throughput of the entire system. In addition, the aggregation behavior of malicious nodes may also occur, reducing the security of the system. Aiming at the performance of each node, this paper proposes a sharding strategy based on the approximate ideal solution model (TOPSIS). Through the TOPSIS model, the nodes are scored according to the hardware performance of the node, the response time to the transaction and the results, etc., and the nodes are allocated to the corresponding shards according to the scoring results. The sharding strategy based on this model balances the performance differences among shards and improves the throughput of the entire system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Qiu, M., Li, H., Sha, E.: Heterogeneous real-time embedded software optimization considering hardware platform. In: ACM Symposium on Applied Computing, pp. 1637–1641 (2009)

    Google Scholar 

  2. Qiu, M., Jia, Z., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. J. Signal Proc. Syst. (2007)

    Google Scholar 

  3. Qiu, M., Yang, L., et al.: Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE Trans. VLSI 18(3), 501–504 (2009)

    Article  Google Scholar 

  4. Niu, J., Gao, Y., et al.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC 72(12), 1565–1575 (2012)

    Google Scholar 

  5. Qiu, M., Xue, C., Shao, Z., et al.: Efficient algorithm of energy minimization for heterogeneous wireless sensor network. IEEE EUC, pp. 25–34 (2006)

    Google Scholar 

  6. Qiu, M., Chen, Z., Ming, Z., Qin, X., Niu, J.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813–822 (2014)

    Article  Google Scholar 

  7. Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. IEEE BigDataSecurity (2016)

    Google Scholar 

  8. Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. MCCA (2016)

    Google Scholar 

  9. Gao, X., Qiu, M.: Energy-based learning for preventing backdoor attack. KSEM, vol. 3, pp. 706–721 (2022)

    Google Scholar 

  10. Gai, K., Qiu, M., Chen, L., Liu, M.: Electronic health record error prevention approach using ontology in big data. IEEE 17th HPCC (2015)

    Google Scholar 

  11. Qiu, M., Qiu, H.: Review on image processing based adversarial example defenses in computer vision. In: IEEE 6th International Conference BigDataSecurity, pp. 94–99. USA (2020)

    Google Scholar 

  12. Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 8(13), 10327–10335 (2020)

    Article  Google Scholar 

  13. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system [EB], bitcoin.org (2009)

    Google Scholar 

  14. Liu, J., Xie, M., Chen, S., Ma, C., Gong, Q.: An improved DPoS consensus mechanism in blockchain based on PLTS for the smart autonomous multi-robot system. Inform Sci. 575, 528–554 (2021)

    Article  MathSciNet  Google Scholar 

  15. Gai, K., Zhang, Y., et al.: Blockchain-enabled service optimizations in supply chain digital twin. IEEE Trans. Service Comput. (2022)

    Google Scholar 

  16. Qiu, M., Qiu, H., et al.: Secure Data Sharing Through Untrusted Clouds with Blockchain-enabled Key Management. The 3rd SmartBlock, pp. 11–16, China (2020)

    Google Scholar 

  17. Chen, S., Xie, M., Liu, J.: Improvement of the DPoS Consensus Mechanism in Blockchain Based on PLTS. IEEE BigDataSecurity (2021)

    Google Scholar 

  18. Liu, J., Zhao, J., Huang, H., Xu, G.: A novel logistics data privacy protection method based on blockchain. Multimedia Tools Appl. 1–21 (2022). https://doi.org/10.1007/s11042-022-12836-w

  19. Xu, G., Dong, J., Ma, C.: A certificateless encryption scheme based on blockchain. Peer-to-Peer Network. Appl. 14(5), 2952–2960 (2021). https://doi.org/10.1007/s12083-021-01147-w

    Article  Google Scholar 

  20. Qiu, M., Xue, C., Shao, Z., Sha, E.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE Conference, pp. 1–6 (2007)

    Google Scholar 

  21. Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Architect. 57(9), 840–849 (2011)

    Article  Google Scholar 

  22. Zhang, L., Qiu, M., et al.: Variable partitioning and scheduling for MPSoC with virtually shared scratch pad memory. J. Signal Process. Syst. 58(2), 247–265 (2010)

    Article  Google Scholar 

  23. Qiu, H., Qiu, M., Lu, R.: Secure V2X communication network based on intelligent PKI and edge computing. IEEE Network 34(2), 172–178 (2019)

    Article  Google Scholar 

  24. Qiu, H., Zeng, Y., Guo, S., Zhang, T., Qiu, M., Thuraisingham, B.: Deepsweep: an evaluation framework for mitigating DNN backdoor attacks using data augmentation. In: ACM Asia Conference on Computer and Communications (2021)

    Google Scholar 

  25. Xu, G., Zhang, J., Wang, L.: An Edge Computing Data Privacy-Preserving Scheme Based on Blockchain and Homomorphic Encryption. ICBCTIS’21 (2021)

    Google Scholar 

  26. Qiu, M., Guo, M., et al.: Loop scheduling and bank type assignment for heterogeneous multi-bank memory. JPDC 69(6), 546–558 (2009)

    Google Scholar 

  27. Qiu, M., Sha, E., et al.: Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP. JPDC 68(4), 443–455 (2008)

    MATH  Google Scholar 

  28. Qiu, M., Ming, Z., Li, J., et al.: Three-phase time-aware energy minimization with DVFS and unrolling for chip multiprocessors. JSA 58(10), 439–445 (2012)

    Google Scholar 

  29. Hu, F., Lakdawala, S., et al.: Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE Trans. Infor. Tech. Biomed. 13(4), 656–663 (2009)

    Google Scholar 

  30. Qiu, H., Zheng, Q., et al.: Topological graph convolutional network-based urban traffic flow and density prediction. IEEE Trans. ITS (2020)

    Google Scholar 

  31. Qiu, M., Khisamutdinov, E., et al.: RNA nanotechnology for computer design and in vivo computation. Philosoph. Trans. Royal Soc. A (2013)

    Google Scholar 

  32. Zhang, K., Kong, J., et al.: Multimedia layout adaptation through grammatical specifications. Multimedia Syst. 10(3), 245–260 (2005)

    Article  Google Scholar 

  33. Qiu, M., Zhang, K., Huang, M.: Usability in mobile interface browsing. Web Intell. Agent Syst. J. 4(1), 43–59 (2006)

    Google Scholar 

  34. Qi, D., Liu, M., et al.: Exponential synchronization of general discrete-time chaotic neural networks with or without time delays. IEEE TNN 21(8), 1358–1365 (2010)

    Google Scholar 

  35. Luu, L., Narayanan, V., et al.: A secure sharding protocol for open blockchains. 2016 ACM SIGSAC, pp. 17–30 (2016)

    Google Scholar 

  36. Xie, M., Liu, J., et al.: Primary node election based on probabilistic linguistic term set with confidence interval in the PBFT consensus mechanism for blockchain. Complex Intell Syst. https://doi.org/10.1007/s40747-022-00857-9

  37. Gan, C., Saini, A., et al.: Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor. Multimed Tools Appl. 1–17 (2020)

    Google Scholar 

  38. Zhu, Q., Loke, S., et al.: Applications of distributed ledger technologies to the internet of things: a survey. ACM Comput. Surv. 52(6), 1–34 (2020)

    Google Scholar 

  39. Kokoris-Kogias, E., Jovanovic, P., et al.: Omniledger: a secure, scale-out, decentralized ledger via sharding. IEEE SP, pp. 583–598 (2018)

    Google Scholar 

  40. Zhou, Y., Liu, T., Tang, F.: A privacy-preserving authentication and key agreement scheme with deniability for IoT. Electronics 8(4) (2019)

    Google Scholar 

  41. Zhang, X., Yijun, Y.: Research on digital copyright management system based on blockchain technology. In: IEEE 3rd ITNEC (2019)

    Google Scholar 

  42. Bin, C., Shouming, H., Daquan, F.: Impact of Network Load on Direct Acyclic Graph Based Blockchain for Internet of Things. 2019 CyberC (2019)

    Google Scholar 

  43. Ning, Z., et al.: Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach. Sci. China Inf. Sci. 64(6), 1–16 (2021). https://doi.org/10.1007/s11432-020-3125-y

    Article  MathSciNet  Google Scholar 

  44. Tang, F., Pang, J., Cheng, K., Gong, Q.: Multiauthority traceable ring signature scheme for smart grid based on blockchain. Wireless Commun. Mobile Comput. 2021, 1–9 (2021). https://doi.org/10.1155/2021/5566430

    Article  Google Scholar 

  45. Fu, W., Wei, X., Tong, S.: An improved blockchain consensus algorithm based on raft. Arab. J. Sci. Eng. 46(9), 8137–8149 (2021). https://doi.org/10.1007/s13369-021-05427-8

    Article  Google Scholar 

  46. Zhu, Z., Qi, G., Zheng, M.: Blockchain based consensus checking in decentralized cloud storage. Simul. Model Pract. Tt. 102 (2020)

    Google Scholar 

  47. Chauhan, A., Malviya, O.P., et al.: Blockchain and scalability. In: IEEE QRS-C, pp. 122–128 (2018)

    Google Scholar 

  48. Kim, S., Kwon, Y., Cho, S.: A survey of scalability solutions on blockchain. In: IEEE ICTC, pp. 1204–1207 (2018)

    Google Scholar 

  49. Al-Bassam, M., Sonnino, A., et al.: Chainspace: a sharded smart contracts platform. arXiv:1708.03778 (2017)

  50. Gao, Y., Nobuhara, H.: A proof of stake sharding protocol for scalable blockchains. 2017 APAN, vol. 44, pp. 13–16 (2017)

    Google Scholar 

  51. Wang, W., Hoang, D.T., et al.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328–22370 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, J., Shen, X., Xie, M., Zhang, Q. (2023). Research on Sharding Strategy of Blockchain Based on TOPSIS. In: Qiu, M., Lu, Z., Zhang, C. (eds) Smart Computing and Communication. SmartCom 2022. Lecture Notes in Computer Science, vol 13828. Springer, Cham. https://doi.org/10.1007/978-3-031-28124-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28124-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28123-5

  • Online ISBN: 978-3-031-28124-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics