skip to main content
research-article

GBT-CHAIN: A System Framework for Solving the General Trilemma in Permissioned Blockchains

Published: 18 June 2024 Publication History

Abstract

As a subset of distributed systems, blockchain technology is equally bound by the CAP trilemma. Specifically, no distributed system can satisfy consistency, availability, and partition tolerance simultaneously. Informally, the innovative blockchain trilemma has been theorized to include security, scalability, and decentralization. While many software approaches on blockchains claim to solve the trilemma problem, almost all known approaches have been proven to involve tradeoffs and fail to reach the upper bounds, meaning they do not achieve the theoretical limit value in each term of a trilemma. In this article, we propose a general trilemma based on the above two trilemmas. For permissioned blockchains, we then describe a system framework called GBT-CHAIN to solve the General Blockchain Trilemma. In the proposed framework, the consensus and data layer, the network layer, and the physical layer work in cooperation. According to our theoretical proof and experimental analysis, the three properties of the trilemma consisting of consistency, scalability, and partition tolerance are perfectly satisfied without tradeoffs. Our results demonstrate that the general blockchain trilemma is resolved by combining consensus algorithms and physical topologies, in particular for permissioned blockchains.

References

[1]
Y. Yuan and F.-Y. Wang. 2016. Towards blockchain-based intelligent transportation systems. In Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC’16).
[2]
S. Wang, Y. Yuan, X. Wang, J. Li, R. Qin, and F.-Y. Wang. 2018. An overview of smart contract: Architecture, applications, and future trends. In Proceedings of the 2018 IEEE Intelligent Vehicles Symposium (IV’18).
[3]
J. Joshua. 2017. Information bodies: Computational anxiety in Neal Stephenson's snow crash. Interdisciplinary Literary Studies 19, 1 (2017), 17–47.
[4]
J. Hendler. 2009. Web 3.0 Emerging. Computer 42, 1 (2009), 111–113.
[5]
S. Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260.
[6]
M. Touloupou, M. Themistocleous, E. Iosif, and K. Christodoulou. 2022.A systematic literature review toward a blockchain benchmarking framework. IEEE Access 10 (2022), 70630–70644.
[7]
L. Lamport, R. Shostak, and M. Pease. 1982. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems 4, 3 (1982), 382–401.
[8]
M. Castro and B. Liskov. 1999. Practical Byzantine fault tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI’99).
[9]
R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. 2007. Zyzzyva: speculative byzantine fault tolerance. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SIGOPS'07).
[10]
A. Clement, E. L. Wong, L. Alvisi, M. Dahlin, and M. Marchetti. 2009. Making Byzantine fault tolerant systems tolerate Byzantine faults. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI'09).
[11]
G. S. Veronese, M. Correia, A. N. Bessani, and L. C. Lung. 2009. Spin one's wheels? Byzantine fault tolerance with a spinning primary. In Proceedings of the 2009 28th IEEE International Symposium on Reliable Distributed Systems. IEEE.
[12]
K. Li, H. Li, H. Wang, H. An, P. Lu, P. Yi, and F. Zhu. 2020. PoV: An efficient voting-based consensus algorithm for consortium blockchains. Frontiers in Blockchain 3, 11 (2020), 1--16.
[13]
K. Li, H. Li, H. Hou, K. Li, and Y. Chen. 2017. Proof of vote: A high-performance consensus protocol based on vote mechanism & consortium blockchain. In Proceedings of the 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS’17). IEEE.
[14]
M. Yin, D. Malkhi, M. K. Reiter, G. G. Gueta, and I. Abraham. 2019.HotStuff: BFT consensus with linearity and responsiveness. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, IEEE.
[15]
Y. Gilad, R. Hemo, S. Micali, G. Vlachos, and N. Zeldovich. 2017.Algorand: Scaling Byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles. Association for Computing Machinery.
[16]
B. Guo, Z. Lu, Q. Tang, J. Xu, and Z. Zhang. 2020. Dumbo: Faster asynchronous BFT protocols. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.
[17]
S. Gilbert and N. Lynch. 2002. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News 33, 2 (2002), 51–59.
[18]
A. Lewis-Pye and T. Roughgarden. 2020. Resource pools and the CAP theorem. arXiv preprint (2020).
[19]
T. E. Vision. A Digital Future on a Global Scale. https://ethereum.org/en/upgrades/vision/#main-content. Accessed November 16, 2023.
[20]
E. A. Brewer. 2000. Towards robust distributed systems. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC'00).
[21]
D. Pritchett. 2008. BASE: An acid alternative: In partitioned databases, trading some consistency for availability can lead to dramatic improvements in scalability. Queue 6, 3 (2008), 48–55.
[22]
E. Brewer. 2012. CAP twelve years later: How the “rules” have changed. Computer 45, 2 (2012), 23–29.
[23]
S. King and S. Nadal. 2012. Ppcoin: Peer-to-peer Crypto-currency with Proof-of-stake. https://www.peercoin.net/read/papers/peercoin-paper.pdf
[24]
F. Wu, H. Y. Yuen, H. Chan, V. C. Leung, and W. Cai. 2023.Facilitating serverless match-based online games with novel blockchain technologies. ACM Transactions on Internet Technology 23, 1 (2023), 1–26.
[25]
F. Wen, L. Yang, W. Cai, and P. Zhou. 2020. DP-Hybrid: A two-layer consensus protocol for high scalability in permissioned blockchain. In Proceedings of the Blockchain and Trustworthy Systems: Second International Conference (BlockSys’20), Revised Selected Papers 2. Springer.
[26]
H. Azimy, A. A. Ghorbani, and E. Bagheri. 2022. Preventing proof-of-work mining attacks. Information Sciences 608 (2022), 1503–1523.
[27]
D. S. Gadiraju, V. Lalitha, and V. Aggarwal. 2023. An optimization framework based on deep reinforcement learning approaches for prism blockchain. IEEE Transactions on Services Computing 16, 4 (2023), 2451--2461.
[30]
D. Ongaro and J. Ousterhout. 2014. In search of an understandable consensus algorithm. In Proceedings of the 2014 USENIX Annual Technical Conference (Usenix ATC’14).
[31]
S. Gao, T. Yu, J. Zhu, and W. Cai. 2019. T-PBFT: An EigenTrust-based practical Byzantine fault tolerance consensus algorithm. China Communications 16, 12 (2019), 111–123.
[32]
L.-e. Wang, Y. Bai, Q. Jiang, V. C. Leung, W. Cai, and X. Li. 2020.Beh-Raft-Chain: A behavior-based fast blockchain protocol for complex networks. IEEE Transactions on Network Science and Engineering 8, 2 (2020), 1154–1166.
[33]
L. Luu, V. Narayanan, C. Zheng, K. Baweja, S. Gilbert, and P. Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.
[34]
G. D. Monte, D. Pennino, and M. Pizzonia. 2020. Scaling blockchains without giving up decentralization and security: A solution to the blockchain scalability trilemma. In Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems.
[35]
G. A. Pierro and R. Tonelli. 2022. Can Solana be the solution to the blockchain scalability problem? In Proceedings of the 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER’22). IEEE.
[37]
Q. Zhou, H. Huang, Z. Zheng, and J. Bian. 2020. Solutions to scalability of blockchain: A survey. IEEE Access 8 (2020), 16440–16455.
[38]
Jordan Lyanchev. 2022. The Biggest Ever Crypto Hack: What Happened in the Ronin Bridge Attack. https://cryptopotato.com/the-biggest-ever-crypto-hack-what-happened-in-the-ronin-bridge-attack/
[40]
A. Kertesz and H. Baniata. 2022. Consistency analysis of distributed ledgers in fog-enhanced blockchains. In Proceedings of the Euro-Par 2021: Parallel Processing Workshops: Euro-Par 2021 International Workshops, Revised Selected Papers. Springer.
[41]
M. Liu, F. R. Yu, Y. Teng, V. C. Leung, and M. Song. 2019.Performance optimization for blockchain-enabled industrial Internet of Things (IIoT) systems: A deep reinforcement learning approach. IEEE Transactions on Industrial Informatics 15, 6 (2019), 3559–3570.
[42]
X. Fu, H. Wang, and P. Shi. 2022. Votes-as-a-Proof (VaaP): Permissioned blockchain consensus protocol made simple. IEEE Transactions on Parallel and Distributed Systems 33, 12 (2022), 4964–4973.
[43]
A. Singh, T. Das, P. Maniatis, P. Druschel, and T. Roscoe. 2008. BFT protocols under fire. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI'08).
[44]
J. Moy. 1997. OSPF version 2. 2070-1721.
[45]
R. Serfozo. 2009. Basics of Applied Stochastic Processes. Springer Science & Business Media.
[46]
T. J. Sheskin. 1985. A Markov chain partitioning algorithm for computing steady state probabilities. Operations Research 33, 1 (1985), 228–235.
[47]
H. Wang, H. Li, Q. Ye, P. Lu, Y. Yang, P. H. J. Chong, X. Chu, Q. Lv, and A. Smahi. 2023. A physical topology for optimizing partition tolerance in consortium blockchains to reach CAP guarantee bound. Transactions on Emerging Telecommunications Technologies 34, 9 (2023), e4820.
[48]
H. Wang, H. Li, A. Smahi, F. Zhao, Y. Yao, C. C. Chan, S. Wang, W. Yang, and S.-Y. R. Li. 2023. MIS: A multi-identifier management and resolution system in the metaverse. ACM Transactions on Multimedia Computing, Communications, and Applications (2023).
[49]
Y. Wang, T. Huang, G. Wei, H. Li, and H. Zhang. 2022. Scalable name identifier lookup for Industrial Internet. Computer Communications 186 (2022), 102–109.
[50]
Y. Wang, H. Li, T. Huang, X. Zhang, and Y. Bai. 2021. Scalable identifier system for industrial internet based on multi-identifier network architecture. IEEE Internet of Things Journal 10, 3 (2021), 1919--1932.
[51]
B. Tao, H.-N. Dai, J. Wu, I. W.-H. Ho, Z. Zheng, and C. F. Cheang. 2021. Complex network analysis of the bitcoin transaction network. IEEE Transactions on Circuits and Systems II: Express Briefs 69, 3 (2021), 1009–1013.
[52]
J. B. Abdo, S. Dass, B. Qolomany, and L. Hossain. 2022. Evolutionary random graph for bitcoin overlay and blockchain mining networks. arXiv preprint arXiv:2206.09011 (2022).
[53]
J. Xu, C. Wang, and X. Jia. 2023. A survey of blockchain consensus protocols. ACM Computing Surveys 55, 13 (2023), 1--35.

Cited By

View all
  • (2025)A novel Layer 2 framework for breaking the blockchain trilemma problem using MPC-in-the-HeadComputer Networks10.1016/j.comnet.2025.111148(111148)Online publication date: Feb-2025
  • (2025)Fundamentals of BlockchainPrinciples and Applications of Blockchain Systems10.1002/9781394237258.ch1(1-29)Online publication date: 3-Jan-2025
  • (2024)A Review on Blockchain Technology, Current Challenges, and AI-Driven SolutionsACM Computing Surveys10.1145/370064157:3(1-39)Online publication date: 22-Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Distributed Ledger Technologies: Research and Practice
Distributed Ledger Technologies: Research and Practice  Volume 3, Issue 2
June 2024
163 pages
EISSN:2769-6480
DOI:10.1145/3613670
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2024
Online AM: 23 August 2023
Accepted: 01 August 2023
Revised: 13 July 2023
Received: 17 January 2023
Published in DLT Volume 3, Issue 2

Check for updates

Author Tags

  1. Permissioned blockchain
  2. trilemma
  3. scalability
  4. partition tolerance
  5. consistency

Qualifiers

  • Research-article

Funding Sources

  • National Keystone Research and Development Program of China
  • Foshan Innovation Team
  • Basic Research Enhancement Program of China
  • China Environment for Network Innovation
  • Guangdong Province Research and Development Key Program
  • Guangdong Province Basic Research
  • Shenzhen Research Programs
  • Shenzhen Fundamental Research Program
  • ZTE
  • Huawei

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)290
  • Downloads (Last 6 weeks)13
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)A novel Layer 2 framework for breaking the blockchain trilemma problem using MPC-in-the-HeadComputer Networks10.1016/j.comnet.2025.111148(111148)Online publication date: Feb-2025
  • (2025)Fundamentals of BlockchainPrinciples and Applications of Blockchain Systems10.1002/9781394237258.ch1(1-29)Online publication date: 3-Jan-2025
  • (2024)A Review on Blockchain Technology, Current Challenges, and AI-Driven SolutionsACM Computing Surveys10.1145/370064157:3(1-39)Online publication date: 22-Nov-2024
  • (2024)Blockchain-Based Self-Sovereign Identity: Taking Control of Identity in Federated LearningIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.34496925(5764-5781)Online publication date: 2024
  • (2024)Matching-Gossip: Optimizing Blockchain Broadcast Performance to Address the CAP Trilemma2024 6th International Conference on Blockchain Computing and Applications (BCCA)10.1109/BCCA62388.2024.10844464(263-270)Online publication date: 26-Nov-2024
  • (2024)A Formulation of the Trilemma in Proof of Work BlockchainIEEE Access10.1109/ACCESS.2024.341002512(80559-80578)Online publication date: 2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media