skip to main content
10.1145/3474124.3474184acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesic3Conference Proceedingsconference-collections
research-article

Study on Blockchain Scalability Solutions

Authors Info & Claims
Published:04 November 2021Publication History

ABSTRACT

The adoption of blockchain and Distributed Ledger Technology is continuously increasing and offering solutions to various application areas. In the last few decades, much more developments in various features are seen to improve the performance, but still scalability is becoming the bottleneck for the performance enhancement. The scalability problem further leads to severe delays and high costs in a bitcoin network. Nowadays, the real-time transactions in cryptocurrencies need to be scaled up from seven transactions per second to thousands of transactions per second to handle real-life problems in the field of visa, healthcare, flights, etc. In this paper, a detailed study on the scalability issues, Proof of Work, and Practical Byzantine Fault Tolerant in blockchain was given. It also explored and analyzed the recent promising research areas in blockchain scalability such as net neutrality, sharding, side-chain, and off-chain scaling through blockchain distributed networks along with their effects.

References

  1. Bonneau, J. 2015. SoK: Research perspectives and challenges for bitcoin and cryptocurrencies. Proceedings - IEEE Symposium on Security and Privacy. 2015-July, (2015), 104–121. DOI:https://doi.org/10.1109/SP.2015.14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Chepurnoy, A. 2019. A systematic approach to cryptocurrency fees. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10958 LNCS, (2019), 19–30. DOI:https://doi.org/10.1007/978-3-662-58820-8_2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Croman, K. 2016. On Scaling Decentralized Blockchains Initiative for CryptoCurrencies and Contracts (IC3). International Conference on Financial Cryptography and Data Security. (2016), 106–125.Google ScholarGoogle Scholar
  4. Dang, H. 2019. Towards scaling blockchain systems via sharding. Proceedings of the ACM SIGMOD International Conference on Management of Data. (2019), 123–140. DOI:https://doi.org/10.1145/3299869.3319889.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Eyal, I. 2016. Bitcoin-NG: A scalable blockchain protocol. Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016. (2016), 45–59.Google ScholarGoogle Scholar
  6. Garay, J. 2015. The Bitcoin backbone protocol: Analysis and applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9057, (2015), 281–310. DOI:https://doi.org/10.1007/978-3-662-46803-6_10.Google ScholarGoogle Scholar
  7. Gudgeon, L. 2020. SoK: Off The Chain Transactions. Financial Cryptography and Data Security. (2020), Layer 2.Google ScholarGoogle Scholar
  8. Gupta, H. and Janakiram, D. 2019. Colosseum: A scalable permissioned blockchain over structured network. BCC 2019 - Proceedings of the 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts, co-located with AsiaCCS 2019. (2019), 23–25. DOI:https://doi.org/10.1145/3327959.3329539.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kim, S. 2018. A Survey of Scalability Solutions on Blockchain. 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018. (2018), 1204–1207. DOI:https://doi.org/10.1109/ICTC.2018.8539529.Google ScholarGoogle ScholarCross RefCross Ref
  10. Klarman, U. 2018. bloXroute: A Scalable Trustless Blockchain Distribution Network W. Bloxroute.Com. March (2018), 1–12.Google ScholarGoogle Scholar
  11. Kugler, L. 2018. Why cryptocurrencies use so much energy. Communications of the ACM. 61, 7 (2018), 15–17. DOI:https://doi.org/10.1145/3213762.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lewenberg, Y. 2015. Inclusive block chain protocols. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8975, (2015), 528–547. DOI:https://doi.org/10.1007/978-3-662-47854-7_33.Google ScholarGoogle Scholar
  13. Lind, J. 2016. Teechan: Payment Channels Using Trusted Execution Environments. (2016), 1–14.Google ScholarGoogle Scholar
  14. Liu, J. 2019. Scalable byzantine consensus via hardware-assisted secret sharing. IEEE Transactions on Computers. 68, 1 (2019), 139–151. DOI:https://doi.org/10.1109/TC.2018.2860009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Peck, M. E. 2015. Adam Back Says the Bitcoin Fork Is a Coup. https://spectrum.ieee.org/tech-talk/computing/networks/the-bitcoin-for-is-a-coup, (2015).Google ScholarGoogle Scholar
  16. Maiyya, S. 2018. Database and distributed computing fundamentals for scalable, faulttolerant, and consistent maintenance of blockchains. Proceedings of the VLDB Endowment. 11, 12 (2018), 2098–2101. DOI:https://doi.org/10.14778/3229863.3229877.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Poon, J. and Buterin, V. 2017. Plasma: Scalable Autonomous Smart Contracts. Whitepaper. (2017), 1–47.Google ScholarGoogle Scholar
  18. Saad, M. 2019. Exploring the Attack Surface of Blockchain: A Systematic Overview. (2019), 1–30.Google ScholarGoogle Scholar
  19. Scalable, H. 2018. Elrond A Highly Scalable Public Blockchain via Adaptive State Sharding and Secure Proof of Stake-The Elrond Team https://www.elrond.com. (2018), 1–16.Google ScholarGoogle Scholar
  20. Singh, A. 2020. Sidechain technologies in blockchain networks: An examination and state-of-the-art review. Journal of Network and Computer Applications. 149, October 2019 (2020), 102471. DOI:https://doi.org/10.1016/j.jnca.2019.102471.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sompolinsky, Y. and Zohar, A. 2015. Secure high-rate transaction processing in bitcoin. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8975, (2015), 507–527. DOI:https://doi.org/10.1007/978-3-662-47854-7_32.Google ScholarGoogle Scholar
  22. Vukolić, M. 2016. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9591, (2016), 112–125. DOI:https://doi.org/10.1007/978-3-319-39028-4_9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Yu, Y. 2019. A scalable and extensible blockchain architecture. IEEE International Conference on Data Mining Workshops, ICDMW. 2018-Novem, (2019),Google ScholarGoogle Scholar
  24. Zamani, M. RapidChain: Scaling Blockchain via Full Sharding Dfinity Palo Alto, CA. 1–38.Google ScholarGoogle Scholar
  25. FROOMKIN, M.A. 1996. The essential role of trusted third parties in electronic commerce. Electronic publication, URL: http://www.law.miami.edu/∼froomkin/articles/trusted1.htm, last access: 31. Oct. 2002.Google ScholarGoogle Scholar
  26. Kokoris-Kogias, E. 2017. OmniLedger: A Secure, Scale-Out, Decentralized Ledger. IACR Cryptology ePrint Archive. (2017), 406.Google ScholarGoogle Scholar
  27. Mike Koller 2016. The Stellar Consensus Protocol: Decentralization Explained. (2016).Google ScholarGoogle Scholar
  28. Castro, M. and Liskov, B. 2002. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Transactions on Computer Systems. 20, 4 (2002), 398–461. DOI:https://doi.org/10.1145/571637.571640.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Gudgeon, L. 2020. SoK: Off The Chain Transactions. Financial Cryptography and Data Security. (2020), Layer 2.Google ScholarGoogle Scholar
  30. S. Nakamoto. 2009 "Bitcoin: A peer-to-peer electronic cash system." May 2009.Google ScholarGoogle Scholar
  31. Berger, C. and Reiser, H.P. 2018. Scaling Byzantine Consensus. (2018), 13–18. DOI:https://doi.org/10.1145/3284764.3284767.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Hazari, S.S. and Mahmoud, Q.H. 2019. A parallel proof of work to improve transaction speed and scalability in blockchain systems. 2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019. (2019), 916–921. DOI:https://doi.org/10.1109/CCWC.2019.8666535.Google ScholarGoogle Scholar
  33. Luu, L. 2016. A secure sharding protocol for open blockchains. Proceedings of the ACM Conference on Computer and Communications Security. 24-28-Octo, (2016), 17–30. DOI:https://doi.org/10.1145/2976749.2978389.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Eklund, P.W. and Beck, R. 2019. Factors that impact blockchain scalability. 11th International Conference on Management of Digital EcoSystems, MEDES 2019. November (2019), 126–133. DOI:https://doi.org/10.1145/3297662.3365818.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Karame, G.O. 2015. Misbehavior in Bitcoin. ACM Transactions on Information and System Security. 18, 1 (2015), 1–32. DOI:https://doi.org/10.1145/2732196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Malavolta, G. 2017. Concurrency and privacy with payment-channel networks. Proceedings of the ACM Conference on Computer and Communications Security. (2017), 455–471. DOI:https://doi.org/10.1145/3133956.3134096.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Ehmke, C. 2018. Proof-of-property: A lightweight and scalable blockchain protocol. Proceedings - International Conference on Software Engineering. January (2018), 48–51. DOI:https://doi.org/10.1145/3194113.3194122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Chen, W. 2018. A survey of blockchain applications in different domains. ACM International Conference Proceeding Series. (2018), 17–21. DOI:https://doi.org/10.1145/3301403.3301407.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Gervais, A. 2017. On the Security and Performance of Proof of Work Blockchains Vasileios Glykantzis Srdjaň Capkun. Bitcoin.org. (2017).Google ScholarGoogle Scholar
  40. Eyal, I. and Sirer, E.G. 2018. Majority Is Not Enough: Bitcoin mining is vulnerable. Communications of the ACM. 61, 7 (2018), 95–102. DOI:https://doi.org/10.1145/3212998.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    IC3-2021: Proceedings of the 2021 Thirteenth International Conference on Contemporary Computing
    August 2021
    483 pages
    ISBN:9781450389204
    DOI:10.1145/3474124

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 4 November 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format