Skip to main content
Log in

PoTA: A hybrid consensus protocol to avoid miners’ collusion for BaaS platform

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The emergence of the blockchain-as-a-service (BaaS) platform reduces the application barrier of blockchain technology. However, in BaaS, the transaction processing demand generated by BaaS users is continuous isolating from the transaction processing capability that comes from blockchain miner community. This results in the phenomenon that miner community spontaneously reduces the transaction processing capacity to obtain higher revenue, which is called the miners’ collusion. The BaaS platform requires a new consensus protocol that prevent the miners’ collusion while remain the security and immutability of blockchain. Based on this challenge, in this article, we propose a hybrid consensus protocol for BaaS called the Proof-of-Transaction Amount (PoTA). First, we theoretically analyze and formally define the miners’ collusion. The existence of Nash-equilibrium collusion strategy has been proven. Second, the calculation method of the miner’s effective collusion strategy space is provided to help determine whether the BaaS is facing the threat of collusion. Third, by organizing a transaction packaging committee (TPC) based on transaction amount, PoTA successfully avoids single-identity miners who have greater effective collusion strategy space obtaining the authority of transaction packaging. In the meanwhile, we redefine the reference relationship of blocks to enable cross-verification of PoW and PoS consensus. Finally, we prove our protocol can effectively avoid the occurrence of the miners’ collusion. Control experiments prove the outperforms security and performance of PoTA in the comparison with PoW, PoS and other hybrid protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Zhu YJ, Yao JG, Guan HB (2020) Blockchain as a service: Next generation of cloud services. Ruan Jian Xue Bao/Journal of Software, 31(1):1–19 (in Chinese). http://www.jos.org.cn/1000-9825/5891.htm

  2. Pindyck RS, Rubinfeld DL, Mehta PL (1995) Microeconomics, Englewood Cliffs. Prentice Hall, NJ

    Google Scholar 

  3. Ethereum statistics website (2021) https://www.oklink.com/eth

  4. Ethereum statistics website. (2021) https://www.gasnow.org/

  5. Ethereum statistics website (2021) https://etherchain.org/

  6. Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review 21260. http://www.bitcoin.org

  7. King S, Nadal S (2012) PPcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper 19(1)

  8. Onik MMH, Miraz MH (2019) Performance analytical comparison of blockchain-as-a-service (baas) platforms, in: International Conference for Emerging Technologies in Computing. Springer, Cham, 3–18. https://doi.org/10.1007/978-3-030-23943-5_1

  9. Blockchain Technology and Application (2021) https://azure.microsoft.com/en-us/solutions/blockchain/. 2021

  10. Blockchain on AWS (2021) https://aws.amazon.com/partners/blockchain/

  11. IBM Blockchain Platform (2021) https://www.ibm.com/blockchain/platform

  12. Dao TC, Nguyen BM, Do BL (2019) Challenges and strategies for developing decentralized applications based on blockchain technology, in: International Conference on Advanced Information Networking and Applications. Springer, Cham 952–962. https://doi.org/10.1007/978-3-030-15032-7_80

  13. Zou W, Lo D, Kochhar PS et al (2019) Smart contract development: Challenges and opportunities [J]. IEEE Trans Software Eng 47(10):2084–2106. https://doi.org/10.1109/TSE.2019.2942301

  14. Douceur JR (2002) The sybil attack, in: International workshop on peer-to-peer systems. Berlin, Heidelberg, Springer 251–260. https://doi.org/10.1007/3-540-45748-8_24

  15. Bentov I, Lee C, Mizrahi A et al (2014) Proof of activity: Extending bitcoin’s proof of work via proof of stake [extended abstract]. ACM SIGMETRICS Performance Evaluation Review 42(3):34–37. https://doi.org/10.1145/2695533.2695545

    Article  Google Scholar 

  16. Liu Z, Tang S, Chow SSM et al (2019) Fork-free hybrid consensus with flexible proof-of-activity. Futur Gener Comput Syst 96:515–524. https://doi.org/10.1016/j.future.2019.02.059

    Article  Google Scholar 

  17. Huang Y, Zeng Y, Ye F et al (2020) Incentive Assignment in PoW and PoS Hybrid Blockchain in Pervasive Edge Environments, in: 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), Hang Zhou, China, 15–17 Jun, 2020, IEEE 1–10. https://doi.org/10.1109/IWQoS49365.2020.9212842

  18. Gupta KD, Rahman A, Poudyal S et al (2019) A hybrid POW-POS implementation against 51 percent attack in cryptocurrency system, in: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Sydney, NSW, Australia, 11-13 Dec. 2019, IEEE 396–403. https://doi.org/10.1109/CloudCom.2019.00068

  19. Sun Y, Rajasekaran A (2019) An Interleaving Hybrid Consensus Protocol[J]. arXiv preprint arXiv:1911.09262

  20. Santos RP, Swan M (2018) PoW, PoS and Hybrid protocols: A Matter of Complexity?[J]. arXiv e-prints. arXiv: 1805.08674

  21. Gibbons R (1992) A primer in game theory

  22. Sompolinsky Y, Zohar A (2013) Accelerating bitcoin’s transaction processing, Fast money grows on trees, not chains

  23. Eyal I, Gencer AE, Sirer EG et al (2016) Bitcoin-ng: A scalable blockchain protocol, in: 13th USENIX symposium on networked systems design and implementation (NSDI 16), Santa Clara, CA, pp. 45–59

  24. Karame GO, Androulaki E, Capkun S (2012) Double-spending fast payments in bitcoin, in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS 2012), Raleigh, North Carolina, USA, pp. 906–917. https://doi.org/10.1145/2382196.2382292

  25. Eyal I, Sirer EG (2014) Majority is not enough: Bitcoin mining is vulnerable, in: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg pp. 436–454. https://doi.org/10.1007/978-3-662-45472-5_28

  26. Nothing at stake attack Ethereum (2021) https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQs/what-is-the-nothing-at-stake-problem-and-how-can-it-be-fixed

  27. Long range attack Ethereum (2021) https://blog.ethereum.org/2014/05/15/long-range-attacks-the-serious-problem-with-adaptive-proof-of-work/

  28. Mininet (2021) http://mininet.org/

  29. Freixas J (2005) The Shapley-Shubik power index for games with several levels of approval in the input and output. Decis Support Syst 39(2):185–195. https://doi.org/10.1016/j.dss.2003.10.006

    Article  Google Scholar 

Download references

Acknowledgements

This article is funded by the National Key Research and Development Program of China 2020YFB2009503.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenzhou Ji.

Ethics declarations

Conflicts of interest

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this article.

Appendix

Appendix

We abstract the strategy transfers process as a \(\mu\)-round first-price sealed-bid auction which contains Bayesian Nash equilibrium solutions. Under the miners’ collusion, we assume that miner community will not accept the behavior fight against the auction, which means if the strategy transfers, users who maintain their original bids will not have their transactions processed. Therefore, the price gap of two strategies \(\mathbb {Q}\) is the BaaS users’ valuation of this auction. We define there are two users \(n_i\) and \(n_j\) biding for transaction process with their positive bids \(q_i\) and \(q_i\) which obeys a uniformly distribution within \([0,\mathbb {Q}]\). If one user succeed in the auction with bid q, the revenue of this auction is \(\mathbb {Q}-q\). According to the rules of auction, the higher bidder gets the commodity, i.e., gets his transactions processed. If both sides have the same bids, miner community will toss a coin to decide the winner. Therefore, the revenue function of \(n_i\) is:

$$\begin{aligned} u_i={\left\{ \begin{array}{ll} \mathbb {Q}-q_i &{}, if\quad q_i > q_j;\\ \frac{1}{2}\times ( \mathbb {Q}-q_i) &{}, if\quad q_i = q_j;\\ 0 &{}, if\quad q_i < q_j. \end{array}\right. } \end{aligned}$$
(16)

Then, to achieve the optimal strategy in auction, \(q_i\) needs to satisfy

$$\begin{aligned} max \quad (\mathbb {Q}-q_i)Pro\{q_i > q_j\}+\frac{1}{2}\times (\mathbb {Q}-q_i)Pro\{q_i = q_j\} \end{aligned}$$
(17)

According to [21], since users’ bids are uniformly distributed, there exists an unique linear Bayesian Nash equilibrium solution to Eq. (17). We define users final bids as \(b(q_i)=Q(s)+\theta _i \times \mathbb {Q}\) and \(b(q_i)=Q(s)+\theta _j \times \mathbb {Q}\), respectively. The users’ bids satisfy a continuous uniform distribution. Therefore, the probability of \(q_i = q_j\) is 0. The optimal bidding strategy is the solution of the following formula:

$$\begin{aligned} max\quad (\mathbb {Q}-q_i)Pro\{b(q_i) > Q(s)+\theta _j \times \mathbb {Q}\} \end{aligned}$$
(18)

\(n_i\) needs a final bid that higher than the Q(s) and lower than the highest possible bid of \(n_j\), \(Q(s)+\mathbb {Q}\). Therefore, we have

$$\begin{aligned} Pro\{b(q_i) > Q(s)+\theta _j \times \mathbb {Q}\}&=Pro\{\mathbb {Q}<\frac{b(q_i)-Q(s)}{\theta _i}\}\\&=\frac{b(q_i)-Q(s)}{\theta _i} \end{aligned}$$
(19)

The optimal strategy of bidding for \(n_i\) is:

$$\begin{aligned} b(q_i) {\left\{ \begin{array}{ll} Q(s)+\frac{\mathbb {Q}}{2} &{}, if\quad Q(s^*) \ge Q(s);\\ q(s) &{}, if\quad Q(s^*) < Q(s). \end{array}\right. } \end{aligned}$$
(20)

Obviously, the case \(Q(s^*) < Q(s)\) does not meet our assumption. Therefore, we have \(\theta =0.5\) as the optimal bidding value for users in the strategy transfer process caused by a collusion. The derivation of optimal strategy for \(n_j\) is the same as above. In a \(\mu\)-round strategy transfer process, the final valuation of strategy \(s^*\) can be obtained by overlaying the user estimates from \(\mu\)-round auction, which is \(Q(s^*)=Q(s)+\sum ^{t=1}_{\mu }\theta ^{\mu -t}\times \mathbb {Q}\). The equation for the user’s optimal bid contains only one unknown variable. Therefore, for a multi-player auction model, \(\theta =0.5\) is still the only solution. Then, we successfully generalize the optimal bid case to the multi-player auction game.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, K., Tu, Z. & Ji, Z. PoTA: A hybrid consensus protocol to avoid miners’ collusion for BaaS platform. Peer-to-Peer Netw. Appl. 15, 2037–2056 (2022). https://doi.org/10.1007/s12083-022-01337-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01337-0

Keywords

Navigation