Skip to main content

Research on Security Consensus Algorithm Based on Blockchain

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12608))

Included in the following conference series:

Abstract

As a distributed shared ledger and database technology, blockchain has the characteristics of decentralization, tamper-proof, openness and transparency. With the continuous development of blockchain technology, the technology has received high attention from government departments, finance, technology and other industries. The key technology of blockchain is the design of consensus algorithm, which affects the overall efficiency and performance of the blockchain system. How to achieve consistency and efficiency among nodes in a simple and efficient blockchain distributed system. This paper divides consensus algorithms into CFT and BFT according to fault tolerance types, and analyzes the basic principles and consensus process of each algorithm in detail. In five aspects of block generation speed, degree of decentralization, security, consistency and resource consumption, the mainstream consensus algorithms in the blockchain are compared and analyzed, the advantages and disadvantages of each consensus algorithm are summarized. Finally, the future blockchain consensus algorithms are summarized and prospected.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin (2008). https://bitcoin.org/bitcoin.pdf

  2. Amsden, Z., Arora, R., et al.: The Libra Blockchain https://www.chainnode.com/doc/3631

  3. Zeng, S., Ni, X.: A bibliometric analysis of blockchain research, pp. 102–107 (2018)

    Google Scholar 

  4. Liang, W., Zhang, D., Lei, X., et al.: Circuit copyright blockchain: blockchain-based homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Top. Comput. (99), 1 (2020)

    Google Scholar 

  5. Liang, W., Fan, Y., Li, K.-C., Zhang, D., Gaudiot, J.-L.: Secure data storage and recovery in industrial blockchain network environments. IEEE Trans. Industr. Inform. 16, 6543–6552 (2020)

    Article  Google Scholar 

  6. Ren, M., Tang, H.B., Si, X.M., et al.: Survey of applications based on blockchain in government department. Comput. Sci. 045(002), 1–7 (2018)

    Google Scholar 

  7. Proof of Stake [EB/OL], 10 November 2017. https://en.bitcoin.it/wiki/ProofofStake. Accessed 17 Oct 2018

  8. Bisola A. Delegated Proof-of-Stake (DPoS) Explained [EB/OL], 01 November 2018. https://www.mycryptopedia.com/delegated-proof-stake-dpos-explained/. Accessed 10 Mar 2020

  9. Castro, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS) 20(4), 398–461 (2002)

    Article  Google Scholar 

  10. Lamport, L.: Paxos made simple. ACM SIGACT News 32(4) (2016)

    Google Scholar 

  11. Ongaro, D., Ousterhout, J.: In search of an understandable consensus algorithm. In: 2014 {USENIX} Annual Technical Conference ({USENIX}{ATC} 2014), pp. 305–319 (2014)

    Google Scholar 

  12. Yong, Y., Xiao-Chun, N.I., Shuai, Z., et al.: Blockchain consensus algorithms: the state of the art and future trends. Acta Automatica Sinica (2018)

    Google Scholar 

  13. Back, A.: Hashcash-a denial of service counter-measure (2002)

    Google Scholar 

  14. Liang, W., Li, K.-C., Long, J., Kui, X., Zomaya, A.Y.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Industr. Inform. 16(3), 2063–2071 (2020)

    Article  Google Scholar 

  15. Das, D., Dutta, A.: Bitcoin’s energy consumption: is it the Achilles heel to miner’s revenue? Econ. Lett. 186, 1085301–1085306 (2020)

    Article  Google Scholar 

  16. Wikipedia. Proof-of-stake [EB/OL]. https://en.bitcoin.it/wiki/Proof_of_Stake

  17. King, S., Nadal, S.: PPcoin: peer-to-peer crypto-currency with proof-of-stake, 19 August 2012. 1. self-published paper

    Google Scholar 

  18. Lampson, B.: How to build a highly available system using consensus. In: Babaoğlu, Ö., Marzullo, K. (eds.) Distributed Algorithms. LNCS, vol. 1151, pp. 1–17 . Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61769-8_1

    Chapter  Google Scholar 

  19. Schuh, F., Larimer, D.: BitShares 2.0: Financial Smart Contract Platform (2017). Accessed 15 Jan 2015

    Google Scholar 

Download references

Acknowledgment

This work was supported by the Research on identification baesd on EEG high-dimensional data model (E52083) of PhD program of Hunan University of Science and Technology.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tan, M., Zheng, J., Zhang, J., Cheng, Y., Huang, W. (2021). Research on Security Consensus Algorithm Based on Blockchain. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2020. Lecture Notes in Computer Science(), vol 12608. Springer, Cham. https://doi.org/10.1007/978-3-030-74717-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-74717-6_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-74716-9

  • Online ISBN: 978-3-030-74717-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics