Abstract
The emergence of the blockchain-as-a-service (BaaS) platform reduces the application barrier of blockchain technology. However, in BaaS, the transaction processing demand generated by BaaS users is continuous isolating from the transaction processing capability that comes from blockchain miner community. This results in the phenomenon that miner community spontaneously reduces the transaction processing capacity to obtain higher revenue, which is called the miners’ collusion. The BaaS platform requires a new consensus protocol that prevent the miners’ collusion while remain the security and immutability of blockchain. Based on this challenge, in this article, we propose a hybrid consensus protocol for BaaS called the Proof-of-Transaction Amount (PoTA). First, we theoretically analyze and formally define the miners’ collusion. The existence of Nash-equilibrium collusion strategy has been proven. Second, the calculation method of the miner’s effective collusion strategy space is provided to help determine whether the BaaS is facing the threat of collusion. Third, by organizing a transaction packaging committee (TPC) based on transaction amount, PoTA successfully avoids single-identity miners who have greater effective collusion strategy space obtaining the authority of transaction packaging. In the meanwhile, we redefine the reference relationship of blocks to enable cross-verification of PoW and PoS consensus. Finally, we prove our protocol can effectively avoid the occurrence of the miners’ collusion. Control experiments prove the outperforms security and performance of PoTA in the comparison with PoW, PoS and other hybrid protocols.
















Similar content being viewed by others
References
Zhu YJ, Yao JG, Guan HB (2020) Blockchain as a service: Next generation of cloud services. Ruan Jian Xue Bao/Journal of Software, 31(1):1–19 (in Chinese). http://www.jos.org.cn/1000-9825/5891.htm
Pindyck RS, Rubinfeld DL, Mehta PL (1995) Microeconomics, Englewood Cliffs. Prentice Hall, NJ
Ethereum statistics website (2021) https://www.oklink.com/eth
Ethereum statistics website. (2021) https://www.gasnow.org/
Ethereum statistics website (2021) https://etherchain.org/
Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review 21260. http://www.bitcoin.org
King S, Nadal S (2012) PPcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper 19(1)
Onik MMH, Miraz MH (2019) Performance analytical comparison of blockchain-as-a-service (baas) platforms, in: International Conference for Emerging Technologies in Computing. Springer, Cham, 3–18. https://doi.org/10.1007/978-3-030-23943-5_1
Blockchain Technology and Application (2021) https://azure.microsoft.com/en-us/solutions/blockchain/. 2021
Blockchain on AWS (2021) https://aws.amazon.com/partners/blockchain/
IBM Blockchain Platform (2021) https://www.ibm.com/blockchain/platform
Dao TC, Nguyen BM, Do BL (2019) Challenges and strategies for developing decentralized applications based on blockchain technology, in: International Conference on Advanced Information Networking and Applications. Springer, Cham 952–962. https://doi.org/10.1007/978-3-030-15032-7_80
Zou W, Lo D, Kochhar PS et al (2019) Smart contract development: Challenges and opportunities [J]. IEEE Trans Software Eng 47(10):2084–2106. https://doi.org/10.1109/TSE.2019.2942301
Douceur JR (2002) The sybil attack, in: International workshop on peer-to-peer systems. Berlin, Heidelberg, Springer 251–260. https://doi.org/10.1007/3-540-45748-8_24
Bentov I, Lee C, Mizrahi A et al (2014) Proof of activity: Extending bitcoin’s proof of work via proof of stake [extended abstract]. ACM SIGMETRICS Performance Evaluation Review 42(3):34–37. https://doi.org/10.1145/2695533.2695545
Liu Z, Tang S, Chow SSM et al (2019) Fork-free hybrid consensus with flexible proof-of-activity. Futur Gener Comput Syst 96:515–524. https://doi.org/10.1016/j.future.2019.02.059
Huang Y, Zeng Y, Ye F et al (2020) Incentive Assignment in PoW and PoS Hybrid Blockchain in Pervasive Edge Environments, in: 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), Hang Zhou, China, 15–17 Jun, 2020, IEEE 1–10. https://doi.org/10.1109/IWQoS49365.2020.9212842
Gupta KD, Rahman A, Poudyal S et al (2019) A hybrid POW-POS implementation against 51 percent attack in cryptocurrency system, in: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Sydney, NSW, Australia, 11-13 Dec. 2019, IEEE 396–403. https://doi.org/10.1109/CloudCom.2019.00068
Sun Y, Rajasekaran A (2019) An Interleaving Hybrid Consensus Protocol[J]. arXiv preprint arXiv:1911.09262
Santos RP, Swan M (2018) PoW, PoS and Hybrid protocols: A Matter of Complexity?[J]. arXiv e-prints. arXiv: 1805.08674
Gibbons R (1992) A primer in game theory
Sompolinsky Y, Zohar A (2013) Accelerating bitcoin’s transaction processing, Fast money grows on trees, not chains
Eyal I, Gencer AE, Sirer EG et al (2016) Bitcoin-ng: A scalable blockchain protocol, in: 13th USENIX symposium on networked systems design and implementation (NSDI 16), Santa Clara, CA, pp. 45–59
Karame GO, Androulaki E, Capkun S (2012) Double-spending fast payments in bitcoin, in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS 2012), Raleigh, North Carolina, USA, pp. 906–917. https://doi.org/10.1145/2382196.2382292
Eyal I, Sirer EG (2014) Majority is not enough: Bitcoin mining is vulnerable, in: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg pp. 436–454. https://doi.org/10.1007/978-3-662-45472-5_28
Nothing at stake attack Ethereum (2021) https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQs/what-is-the-nothing-at-stake-problem-and-how-can-it-be-fixed
Long range attack Ethereum (2021) https://blog.ethereum.org/2014/05/15/long-range-attacks-the-serious-problem-with-adaptive-proof-of-work/
Mininet (2021) http://mininet.org/
Freixas J (2005) The Shapley-Shubik power index for games with several levels of approval in the input and output. Decis Support Syst 39(2):185–195. https://doi.org/10.1016/j.dss.2003.10.006
Acknowledgements
This article is funded by the National Key Research and Development Program of China 2020YFB2009503.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this article.
Appendix
Appendix
We abstract the strategy transfers process as a \(\mu\)-round first-price sealed-bid auction which contains Bayesian Nash equilibrium solutions. Under the miners’ collusion, we assume that miner community will not accept the behavior fight against the auction, which means if the strategy transfers, users who maintain their original bids will not have their transactions processed. Therefore, the price gap of two strategies \(\mathbb {Q}\) is the BaaS users’ valuation of this auction. We define there are two users \(n_i\) and \(n_j\) biding for transaction process with their positive bids \(q_i\) and \(q_i\) which obeys a uniformly distribution within \([0,\mathbb {Q}]\). If one user succeed in the auction with bid q, the revenue of this auction is \(\mathbb {Q}-q\). According to the rules of auction, the higher bidder gets the commodity, i.e., gets his transactions processed. If both sides have the same bids, miner community will toss a coin to decide the winner. Therefore, the revenue function of \(n_i\) is:
Then, to achieve the optimal strategy in auction, \(q_i\) needs to satisfy
According to [21], since users’ bids are uniformly distributed, there exists an unique linear Bayesian Nash equilibrium solution to Eq. (17). We define users final bids as \(b(q_i)=Q(s)+\theta _i \times \mathbb {Q}\) and \(b(q_i)=Q(s)+\theta _j \times \mathbb {Q}\), respectively. The users’ bids satisfy a continuous uniform distribution. Therefore, the probability of \(q_i = q_j\) is 0. The optimal bidding strategy is the solution of the following formula:
\(n_i\) needs a final bid that higher than the Q(s) and lower than the highest possible bid of \(n_j\), \(Q(s)+\mathbb {Q}\). Therefore, we have
The optimal strategy of bidding for \(n_i\) is:
Obviously, the case \(Q(s^*) < Q(s)\) does not meet our assumption. Therefore, we have \(\theta =0.5\) as the optimal bidding value for users in the strategy transfer process caused by a collusion. The derivation of optimal strategy for \(n_j\) is the same as above. In a \(\mu\)-round strategy transfer process, the final valuation of strategy \(s^*\) can be obtained by overlaying the user estimates from \(\mu\)-round auction, which is \(Q(s^*)=Q(s)+\sum ^{t=1}_{\mu }\theta ^{\mu -t}\times \mathbb {Q}\). The equation for the user’s optimal bid contains only one unknown variable. Therefore, for a multi-player auction model, \(\theta =0.5\) is still the only solution. Then, we successfully generalize the optimal bid case to the multi-player auction game.
Rights and permissions
About this article
Cite this article
Wang, K., Tu, Z. & Ji, Z. PoTA: A hybrid consensus protocol to avoid miners’ collusion for BaaS platform. Peer-to-Peer Netw. Appl. 15, 2037–2056 (2022). https://doi.org/10.1007/s12083-022-01337-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01337-0