Skip to main content

Abstract

We are introducing a new computational model for heterogeneous architectures for performing enhanced security validations and processing of transactions on-chain, a model applicable to both permissioned and permissionless blockchains. By proposing an efficient storage model for the Merkle trees involved in the transaction and security validation processing, and combining it with an efficient heterogeneous approach for processing it, we are outlining the improved computational advantages to ensuring attack resilience on-chain, which surpasses the performance of traditional CPU-based approaches by a significant factor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin whitepaper (2009). https://bitcoin.org/bitcoin.pdf

  2. CoinMarketCap. All Cryptocurrencies. https://coinmarketcap.com/all/views/all/. Accessed 15 Feb 2019

  3. Zile, K., Renate, S.: Blockchain use cases and their feasibility. Appl. Comput. Syst. 23(1), 12–20 (2018)

    Google Scholar 

  4. Holbl, M., et al.: A systematic review of the use of blockchain in healthcare. Symmetry 10(10), 470 (2018)

    Google Scholar 

  5. Ko, T., et al.: Blockchain technology and manufacturing industry: real-time transparency and cost savings. Sustainability 10, 4274 (2018)

    Google Scholar 

  6. PwC Report: Blockchain: the next innovation to make our cities smarter (2018). https://www.pwc.in/assets/pdfs/publications/2018/blockchain-the-next-innovation-to-make-our-cities-smarter.pdf

  7. DH Network: Blockchain for the humanitarian sector: future opportunities (2016)

    Google Scholar 

  8. Wood, G.: Ethereum: a secure decentralized generalised transaction ledger (2015). https://gavwood.com/paper.pdf

  9. Merkle, R.: Method of providing digital signatures. Patent, Patent US4309569A (1979). https://patents.google.com/patent/US4309569

  10. EOS: EOSIO: blockchain software architecture. https://eos.io/. Accessed 12 Feb 2020

  11. TRON: TRON—Decentralize the Web. https://tron.network/. Accessed 12 Feb 2020

  12. Mirkin, M., et al.: https://arxiv.org/ftp/arxiv/papers/1912/1912.07497.pdf. Accessed 23 Apr 2020

  13. Double-spending: Double-spending digital currency. https://en.wikipedia.org/wiki/Double-spending. Accessed 12 Feb 2020

  14. Blockchain Denial of Service: BDoS: Blockchain Denial of Service. https://medium.com/coinmonks/bdos-blockchain-denial-of-service-385c8c56b401. Accessed 12 Feb 2020

  15. NVIDIA: NVIDIA CUDA Compute Unified Device Architecture Programming Guide, version 4.1. http://developer.download.nvidia.com/compute/DevZone/ docs/html/C/doc/CUDA_C_Programming_Guide.pdf

  16. Pungila, C., Negru, V.: A highly-efficient memory-compression approach for GPU-accelerated virus signature matching. In: Information Security Conference (ISC) (2012)

    Google Scholar 

  17. Pungila, C., Negru, V.: Real-time polymorphic Aho-Corasick automata for heterogeneous malicious code detection. In: Herrero, Á., et al. (eds.) International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. Advances in Intelligent Systems and Computing, vol. 239, pp. 439–448. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-01854-6_45

  18. BloxHIVE: The BloxHIVE Project. https://bloxhive.com

Download references

Acknowledgment

This work was supported by the West University of Timişoara, BloxHIVE [18] and MOISE project number 240/2020, ID POC/398/1/1, financed by EU and Romanian government. The views expressed in this paper do not necessarily reflect those of the corresponding project’s consortium members.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ciprian Pungila .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pungila, C., Negru, V. (2022). A Fast Heterogeneous Approach to Enhanced Blockchain Attack Resilience and Mitigation. In: Gude Prego, J.J., de la Puerta, J.G., García Bringas, P., Quintián, H., Corchado, E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400. Springer, Cham. https://doi.org/10.1007/978-3-030-87872-6_1

Download citation

Publish with us

Policies and ethics