Abstract
We are introducing a new computational model for heterogeneous architectures for performing enhanced security validations and processing of transactions on-chain, a model applicable to both permissioned and permissionless blockchains. By proposing an efficient storage model for the Merkle trees involved in the transaction and security validation processing, and combining it with an efficient heterogeneous approach for processing it, we are outlining the improved computational advantages to ensuring attack resilience on-chain, which surpasses the performance of traditional CPU-based approaches by a significant factor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakamoto, S.: Bitcoin whitepaper (2009). https://bitcoin.org/bitcoin.pdf
CoinMarketCap. All Cryptocurrencies. https://coinmarketcap.com/all/views/all/. Accessed 15 Feb 2019
Zile, K., Renate, S.: Blockchain use cases and their feasibility. Appl. Comput. Syst. 23(1), 12–20 (2018)
Holbl, M., et al.: A systematic review of the use of blockchain in healthcare. Symmetry 10(10), 470 (2018)
Ko, T., et al.: Blockchain technology and manufacturing industry: real-time transparency and cost savings. Sustainability 10, 4274 (2018)
PwC Report: Blockchain: the next innovation to make our cities smarter (2018). https://www.pwc.in/assets/pdfs/publications/2018/blockchain-the-next-innovation-to-make-our-cities-smarter.pdf
DH Network: Blockchain for the humanitarian sector: future opportunities (2016)
Wood, G.: Ethereum: a secure decentralized generalised transaction ledger (2015). https://gavwood.com/paper.pdf
Merkle, R.: Method of providing digital signatures. Patent, Patent US4309569A (1979). https://patents.google.com/patent/US4309569
EOS: EOSIO: blockchain software architecture. https://eos.io/. Accessed 12 Feb 2020
TRON: TRON—Decentralize the Web. https://tron.network/. Accessed 12 Feb 2020
Mirkin, M., et al.: https://arxiv.org/ftp/arxiv/papers/1912/1912.07497.pdf. Accessed 23 Apr 2020
Double-spending: Double-spending digital currency. https://en.wikipedia.org/wiki/Double-spending. Accessed 12 Feb 2020
Blockchain Denial of Service: BDoS: Blockchain Denial of Service. https://medium.com/coinmonks/bdos-blockchain-denial-of-service-385c8c56b401. Accessed 12 Feb 2020
NVIDIA: NVIDIA CUDA Compute Unified Device Architecture Programming Guide, version 4.1. http://developer.download.nvidia.com/compute/DevZone/ docs/html/C/doc/CUDA_C_Programming_Guide.pdf
Pungila, C., Negru, V.: A highly-efficient memory-compression approach for GPU-accelerated virus signature matching. In: Information Security Conference (ISC) (2012)
Pungila, C., Negru, V.: Real-time polymorphic Aho-Corasick automata for heterogeneous malicious code detection. In: Herrero, Á., et al. (eds.) International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. Advances in Intelligent Systems and Computing, vol. 239, pp. 439–448. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-01854-6_45
BloxHIVE: The BloxHIVE Project. https://bloxhive.com
Acknowledgment
This work was supported by the West University of Timişoara, BloxHIVE [18] and MOISE project number 240/2020, ID POC/398/1/1, financed by EU and Romanian government. The views expressed in this paper do not necessarily reflect those of the corresponding project’s consortium members.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Pungila, C., Negru, V. (2022). A Fast Heterogeneous Approach to Enhanced Blockchain Attack Resilience and Mitigation. In: Gude Prego, J.J., de la Puerta, J.G., García Bringas, P., Quintián, H., Corchado, E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400. Springer, Cham. https://doi.org/10.1007/978-3-030-87872-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-87872-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-87871-9
Online ISBN: 978-3-030-87872-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)