Distributed Ledger Technology Review and Decentralized Applications Development Guidelines
Abstract
:1. Introduction
- The Protocol and Network Tier (PN-Tier) aggregates the core DLT elements and organizes them in two layers. The Protocol Layer contains technology solutions for digital assets registration, transactions, data structures, privacy, and business rules implementation. The Network Layer contains technology solutions for creating a peer-to-peer network, ledger replication, and consensus-based validation.
- The Scalability Tier (S-Tier) runs most of the time a parallel DLT network and aggregates technological solutions for addressing the scalability issues raised by the PN-Tier. We have focused on solutions for blockchain ledger scalability problems such as storage scalability, transaction throughput, and computational scalability.
- The Interoperability Tier built on top of the previous two tiers addresses integration and interoperability of multiple DLT applications and systems deployments.
2. Protocol and Network Tier
2.1. Protocol Layer
2.1.1. Type of Asset and Data Structures
2.1.2. Privacy of Transacting Parties and Data
2.1.3. Business Rules Enforcement over Transactions
2.2. Network Layer
2.2.1. Data Propagation and Replication
2.2.2. Permission Mechanisms
2.2.3. Consensus Protocols
3. Scalability Tier
3.1. Storage Size
3.2. Transaction Throughput
3.3. Processing Capability
4. Interoperability Tier
5. Discussion and Development Guidelines
5.1. Decentralization of Design
- Step 1.
- Understanding the existing system design and business model. An exhaustive understanding of the business is required to design a decentralized application. Good knowledge of the business model and rules that govern the domain, as well as of the architecture used in the centralized implementation, are prerequisites for starting the sequence of steps required to achieve a consistent and well-documented decentralized solution. One needs to identify the functional and non-functional requirements that need to be addressed for ensuring the completeness of the design. Most of the time, a complete and sound list of requirements can be obtained by holding several interview sessions with the future stakeholders of the system.
- Step 2.
- Identify potential challenges for each tier. Once the functional and non-functional requirements are clearly defined, the challenges that can arise once mapping the model on a decentralized solution can already be identified. We classify the challenges based on the tiers identified at the level of architecture. Protocol and Network Tier challenges: What is the targeted network level, public or private? Does the system need to hide the transacted information? Is selective disclosure a requirement of the business? Etc. Scalability Tier challenges: Are the scalability requirements higher than what the Protocol and Network Tier solutions can offer? Are the scalability requirements targeting storage, throughput, or computation?
- Step 3.
- Determine potential tradeoffs. Depending on the set of challenges identified, there might be situations where not all the requirements can be successfully ensured by the DLT solutions. In such situations, a tradeoff needs to be made. Most of the time, the application scalability may be affected while incorporating the reliability, immutability, and consensus properties ensured by a DLT. Furthermore, by outsourcing components of the system to the Scalability Tier, another tradeoff regarding the actual decentralization must be done since most of the Scalability Tier solution requires a trusted party to oversee the outsourced component.
- Step 4.
- Define a DLT compliant translation of the application design and business model. It is important to conduct thorough research of the state of the art whenever a DLT solution is considered, for a system decentralization. Obtaining a clear picture of all potential theologies alternatives to the problems identified can be quite difficult. A decentralized design of the system should be proposed, and the most suitable solution for each architectural component needs to be selected.
5.2. Decentralized Application Development
- Step A.
- Choose the DLT platform. From this point forward one needs to proceed with the evaluation of the existing DLT implementation platforms, since some decentralized applications may be compatible with existing systems, thus beneficiating from the already built network of miners. Two cases may emerge (Table 9): an existing platform matches the decentralized application requirements, or a new custom chain needs to be implemented. In the latter case, a custom chain is built and used as the base PN-Tier for the decentralized application implementation. Most of the time, this situation arises when the current frameworks’ specifications are not compliant with the application requirements, thus a new DLT core platform must be developed, and a new network of nodes must be built. Furthermore, a tradeoff regarding the cost and the complexity of the implementation must be considered when choosing one of the two solutions.
- Step B.
- Publish and advertise the idea through a whitepaper. One principle of decentralized application whitepaper is to provide complete transparency to build trust with the investors. Companies are encouraged to provide an honest technical and economic roadmap. They should explain in detail the technical feasibility of the solution as well as the investment and revenue plans, the shares among the company partners, the economic sustainability of the solution, etc.
- Step C.
- Token launch or Initial Coin Offering. A fixed number of tokens should be released to attract investors and raise money for the development phase. The token distribution plan specifies the maximum number of tokens that will be ever generated by the decentralized application, the tokens unlocked for distribution, the tokens transferred to the founders or other participants, and the tokens locked for future use. The initial coin offering plans are advertised by the company, mentioning the initial price, start date, end date, the number of tokens unlocked, pricing schemes (constant pricing, incremental pricing, etc.). The token registry and the distribution rules are programmed as smart contracts and deployed on-chain. Each buyer willing to invest in the decentralized application will need to acquire the necessary cryptocurrency and sign a transaction paying the requested sum in return for several tokens. The distribution contract will validate the deposited sum, and if all the rules hold, the token registry will update the buyer’s account accordingly.
- Step D.
- Development and application deployment. The decentralized application development will continue according to the roadmap presented in the whitepaper. Based on the alternatives presented in the previous chapters, a guideline for choosing the specific implementation solutions is presented in Table 10. Upon finalization, the application will be deployed and all the users that acquired tokens during the initial coin offering will be able to start using the decentralized application or will be able to sell the tokens to other interested parties.
- Step E.
- Token listing on public exchanges. To facilitate the exchange of tokens between interested users, the company can list the token on one of the public exchanges. Sellers can make their offers and buyers can make their bids therefore, depending on the public interest in the launched business, the token can have the potential to raise its value. Being an off-chain exchange, only upon settlement the updated balance will be registered on-chain mirroring the transaction that happened between the seller and the buyer. However, some of these exchanges chose to act as a custodian for the exchanged tokens and the actual registry is not updated on-chain.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Top Trends in the Gartner Hype Cycle for Emerging Technologies. 2016. Available online: https://www.gartner.com/en/newsroom/press-releases/2016-08-16-gartners-2016-hype-cycle-for-emerging-technologies-identifies-three-key-trends-that-organizations-must-track-to-gain-competitive-advantage (accessed on 24 February 2021).
- Top Trends in the Gartner Hype Cycle for Emerging Technologies. 2018. Available online: https://www.gartner.com/smarterwithgartner/5-trends-emerge-in-gartner-hype-cycle-for-emerging-technologies-2018/ (accessed on 24 February 2021).
- Top Trends in the Gartner Hype Cycle for Emerging Technologies. 2019. Available online: https://www.gartner.com/smarterwithgartner/5-trends-appear-on-the-gartner-hype-cycle-for-emerging-technologies-2019/ (accessed on 24 February 2021).
- Nakamoto, S. Bitcoin: A Peer-To-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 24 February 2021).
- Pop, C.; Antal, M.; Cioara, T.; Anghel, I.; Sera, D.; Salomie, I.; Raveduto, G.; Ziu, D.; Croce, V.; Bertoncini, M. Blockchain-Based Scalable and Tamper-Evident Solution for Registering Energy Data. Sensors 2019, 19, 3033. [Google Scholar] [CrossRef] [Green Version]
- Pop, C.; Cioara, T.; Antal, M.; Anghel, I.; Salomie, I.; Bertoncini, M. Blockchain Based Decentralized Management of Demand Response Programs in Smart Energy Grids. Sensors 2018, 18, 162. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Farahani, B.; Firouzi, F.; Luecking, M. The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions. J. Netw. Comput. Appl. 2021, 177, 102936. [Google Scholar] [CrossRef]
- Maesa, D.; Mori, P. Blockchain 3.0 applications survey. J. Parallel Distrib. Comput. 2020, 138, 99–114. [Google Scholar] [CrossRef]
- FBenčić, M.; Žarko, I.P. Distributed Ledger Technology: Blockchain Compared to Directed Acyclic Graph. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2–6 July 2018; pp. 1569–1570. [Google Scholar] [CrossRef] [Green Version]
- Zia, M.F.; Benbouzid, M.; Elbouchikhi, E.; Muyeen, S.M.; Techato, K.; Guerrero, J.M. Microgrid Transactive Energy: Review, Architectures, Distributed Ledger Technologies, and Market Analysis. IEEE Access 2020, 8, 19410–19432. [Google Scholar] [CrossRef]
- Pop, C.; Antal, M.; Cioara, T.; Anghel, I. Trading Energy as a Digital Asset: A Blockchain based Energy Market. In Cryptocurrencies and Blockchain Technologies and Applications: Decentralization and Smart Contracts; Gulshan, S., Nhuong, L., Kavita, S., Eds.; Wiley-Scrivener: Hoboken, NJ, USA, 2020; ISBN 978-1-119-62116-4. [Google Scholar]
- Pop, C.D.; Antal, M.; Cioara, T.; Anghel, I.; Salomie, I. Blockchain and Demand Response: Zero-Knowledge Proofs for Energy Transactions Privacy. Sensors 2020, 20, 5678. [Google Scholar] [CrossRef]
- Pop, C.; Pop, C.; Marcel, A.; Vesa, A.; Petrican, T.; Cioara, T.; Anghel, I.; Salomie, I. Decentralizing the Stock Exchange using Blockchain An Ethereum-based implementation of the Bucharest Stock Exchange. In Proceedings of the 2018 IEEE 14th International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj-Napoca, Romania, 6–8 September 2018; pp. 45–466. [Google Scholar] [CrossRef]
- Pop, C.D.A.; Cioara, T.; Antal, M.; Anghel, I. Blockchain Platform for COVID-19 Vaccine Supply Management. 2020. Available online: https://arxiv.org/abs/2101.00983 (accessed on 24 February 2021).
- Wood, G. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper 151.2014 (2014): 1–32. Available online: http://gavwood.com/paper.pdf (accessed on 24 February 2021).
- Pervez, H.; Muneeb, M.; Irfan, M.U.; Haq, I.U. A Comparative Analysis of DAG-Based Blockchain Architectures. In Proceedings of the 12th International Conference on Open Source Systems and Technologies (ICOSST), Lahore, Pakistan, 19–21 December 2018; pp. 27–34. [Google Scholar] [CrossRef]
- Branson, E. Litecoin: The Ultimate Beginner’s Guide for Understanding Litecoins and What You Need to Know; CreateSpace Independent Publishing Platform: Scotts Valley, CA, USA, 2014; ISBN 1507878192. [Google Scholar]
- Alonso, K.M. Zero to Monero. Available online: https://www.getmonero.org/library/Zero-to-Monero-1-0-0.pdf (accessed on 24 February 2021).
- Sasson, E.B.; Chiesa, A.; Garman, C.; Green, M.; Miers, I.; Tromer, E.; Virza, M. Zerocash: Decentralized anonymous payments from bitcoin. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 18–21 May 2014. [Google Scholar] [CrossRef] [Green Version]
- EtherTulips. Available online: https://ethertulips.com/ (accessed on 24 February 2021).
- Grid. Available online: https://web.gridplus.io/grid-token (accessed on 24 February 2021).
- Rarible. Available online: https://rarible.com/ (accessed on 24 February 2021).
- CryptoKitties: Collectible and Breedable Cats Empowered by Blockchain Technology. Available online: http://upyun-assets.ethfans.org/uploads/doc/file/25583a966d374e30a24262dc5b4c45cd.pdf?_upd=CryptoKitties_WhitePapurr_V2.pdf (accessed on 24 February 2021).
- NRGcoin. Available online: https://nrgcoin.org/ (accessed on 24 February 2021).
- TelCoin. Available online: https://www.telco.in/ (accessed on 24 February 2021).
- Ethereum Improvement Proposals. Available online: http://eips.ethereum.org/erc (accessed on 24 February 2021).
- Blocksquare. Available online: https://blocksquare.io/ (accessed on 24 February 2021).
- Blockchain in Commercial Real Estate: The Future Is Here. Available online: https://www2.deloitte.com/us/en/pages/financial-services/articles/blockchain-in-commercial-real-estate.html (accessed on 24 February 2021).
- Zeilinger, M. Digital art as ‘onetised graphics’: Enforcing intellectual property on the blockchain. Philos. Technol. 2018, 31, 15–41. [Google Scholar] [CrossRef] [Green Version]
- Nielson, B. Blockchain Ownership of Intellectual Property. Available online: http://www.yourtrainingedge.com/blockchain-ownership-of-intellectual-property/ (accessed on 24 February 2021).
- Turkanovi, M.; Hölbl, M.; Koši, K.; Heriko, M.; Kamišali, A. EduCTX: A blockchain-based higher education credit platform. IEEE Access 2018, 6, 5112–5127. [Google Scholar] [CrossRef]
- Durant, E.; Trachy, A. Digital Diploma Debuts at MIT. Available online: http://news.mit.edu/2017/mit-debuts-secure-digital-diploma-using-bitcoin-blockchain-technology-1017 (accessed on 24 February 2021).
- del Castillo, M. Britain’s Royal Mint Reveals Details on “Live” Blockchain for Tracking Gold. Available online: https://www.coindesk.com/britains-royal-mint-reveals-details-on-live-blockchain-for-tracking-gold/ (accessed on 24 February 2021).
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018. [Google Scholar] [CrossRef] [Green Version]
- Nicolas van Saberhagen, CryptoNode v 2.0, Monero White Paper. 2013. Available online: https://bytecoin.org/old/whitepaper.pdf (accessed on 24 February 2021).
- David, S.; Youngs, N.; Britto, A. The Ripple Protocol Consensus Algorithm. Ripple Labs Inc. White Paper 5 2014. Available online: https://ripple.com/files/ripple_consensus_whitepaper.pdf (accessed on 24 February 2021).
- Churyumov, A. Byteball: A Decentralized System for Storage and Transfer of Value. Available online: https://byteball.org/Byteball.pdf (accessed on 24 February 2021).
- Dagcoin Whitepaper. Available online: https://dagcoin.org/whitepaper/ (accessed on 24 February 2021).
- Baird, L. The Swirlds Hashgraph Consensus Algorithm: Fair, Fast, Byzantine Fault Tolerance. Available online: https://www.swirlds.com/downloads/SWIRLDS-TR-2016-01.pdf (accessed on 24 February 2021).
- Braun, E.H.; Luck, N.; Brock, A. Holochain-Scalable Agent-Centric Distributed Computing. 2018. Available online: https://github.com/holochain/holochain-proto/blob/whitepaper/holochain.pdf (accessed on 24 February 2021).
- Chen, J. Flowchain: A Distributed Ledger Designed for Peer-to-Peer IoT Networks and Real-Time Data Transactions. In Proceedings of the 2nd International Workshop on Linked Data and Distributed Ledgers, Portoroz, Slovenia, 29 May 2017. [Google Scholar]
- The Coordicide. 2019. Available online: https://cdn0.tnwcdn.com/wp-content/blogs.dir/1/files/2019/05/Coordicide_WP.pdf (accessed on 24 February 2021).
- Kosba, A.; Miller, A.; Shi, E.; Wen, Z.; Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the 2016 IEEE symposium on security and privacy (SP), San Jose, CA, USA, 22–26 May 2016. [Google Scholar] [CrossRef]
- Azaria, A.; Ekblaw, A.; Vieira, T.; Lippman, A. Medrec: Using blockchain for medical data access and permission management. In Proceedings of the 2016 2nd International Conference on Open and Big Data (OBD), Vienna, Austria, 22–24 August 2016; pp. 25–30. [Google Scholar] [CrossRef]
- Griggs, K.N.; Ossipova, O.; Kohlios, C.P.; Baccarini, A.N.; Howson, E.A.; Hayajneh, T. Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J. Med Syst. 2018, 42, 130. [Google Scholar] [CrossRef]
- Elagin, V.; Spirkina, A.; Levakov, A.; Belozertsev, I. Blockchain Behavioral Traffic Model as a Tool to Influence Service IT Security. Future Internet 2020, 12, 68. [Google Scholar] [CrossRef]
- Maurer, F.K.; Neudecker, T.; Florian, M. Anonymous CoinJoin transactions with arbitrary values. In Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, 1–4 August 2017; pp. 522–529. [Google Scholar] [CrossRef]
- Duffield, E.; Diaz, D. Dash: A Payments-Focused Cryptocurrency. 2018. Available online: https://github.com/dashpay/dash/wiki/Whitepaper (accessed on 24 February 2021).
- Quorum Whitepaper. Available online: https://github.com/jpmorganchase/quorum-docs/blob/master/Quorum%20Whitepaper%20v0.1.pdf (accessed on 24 February 2021).
- Goldreich, O.; Micali, S.; Wigderson, A. Proofs that yield nothing but the validity of their assertion. Preprint 1986. [Google Scholar]
- Miers, I.; Garman, C.; Green, M.; Rubin, A.D. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 19–22 May 2013. [Google Scholar] [CrossRef] [Green Version]
- Ben-Sasson, E.; Chiesa, A.; Tromer, E.; Virza, M. Succinct non-interactive zero knowledge for a von Neumann architecture. In Proceedings of the 23rd {USENIX} Security Symposium ({USENIX} Security 14, San Diego, CA, USA, 20–22 August 2014; pp. 781–796. [Google Scholar]
- Poelstra, A. Mimblewimble. Self-Published in October 2016. Available online: https://download.wpsoftware.net/bitcoin/wizardry/mimblewimble.pdf (accessed on 24 February 2021).
- van Saberhagen, N. CryptoNode v 2.0, Monero White Paper. 2016. Available online: https://github.com/monero-project/research-lab/blob/master/whitepaper/whitepaper.pdf (accessed on 24 February 2021).
- Garrick, H.; Rauchs, M. 2017 Global Blockchain Benchmarking Study. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3040224 (accessed on 24 February 2021).
- Morrison, D.R. PATRICIA-practical algorithm to retrieve information coded in alphanumeric. J. ACM 1968, 15, 514–534. [Google Scholar] [CrossRef]
- Nxt. Available online: https://nxtdocs.jelurida.com/Nxt_Whitepaper (accessed on 24 February 2021).
- Counterparty. Available online: https://counterparty.io/docs/ (accessed on 24 February 2021).
- Saia, R.; Carta, S.; Recupero, D.; Fenu, G. Internet of Entities (IoE): A Blockchain-based Distributed Paradigm for Data Exchange between Wireless-based Devices. In Proceedings of the 8th International Conference on Sensor Networks (SENSORNETS 2019, Prague, Czech Republic, 26–27 February 2019; pp. 77–84. [Google Scholar] [CrossRef]
- Honar Pajooh, H.; Rashid, M.; Alam, F.; Demidenko, S. Hyperledger Fabric Blockchain for Securing the Edge Internet of Things. Sensors 2021, 21, 359. [Google Scholar] [CrossRef] [PubMed]
- Palm, E.; Bodin, U.; Schelén, O. Approaching Non-Disruptive Distributed Ledger Technologies via the Exchange Network Architecture. IEEE Access 2020, 8, 12379–12393. [Google Scholar] [CrossRef]
- Joseph, P.; Buterin, V. Plasma: Scalable Autonomous Smart Contracts. White Paper. 2017, pp. 1–47. Available online: https://plasma.io/plasma.pdf (accessed on 24 February 2021).
- George, C.; Dollimore, J.; Kindberg, T. Distributed Systems: Concepts and Design, 3rd ed.; Addison-Wesley: Boston, MA, USA, 2001; p. 452. ISBN 978-0201-61918-8. [Google Scholar]
- Huang, D.; Ma, X.; Zhang, S. Performance Analysis of the Raft Consensus Algorithm for Private Blockchains. IEEE Trans. Syst. ManCybern. Syst. 2020, 50, 172–181. [Google Scholar] [CrossRef] [Green Version]
- Lamport, L. The Part-Time Parliament, ACM Transactions on Computer Systems 16. 1998. Available online: https://lamport.azurewebsites.net/pubs/lamport-paxos.pdf (accessed on 24 February 2021).
- Diego, O.; Ousterhout, J. In search of an understandable consensus algorithm. In Proceedings of the 2014 {USENIX} Annual Technical Conference, Philadelphia, PA, USA, 19–20 June 2014. [Google Scholar]
- Longo, R.; Podda, A.S.; Saia, R. Analysis of a Consensus Protocol for Extending Consistent Subchains on the Bitcoin Blockchain. Computation 2020, 8, 67. [Google Scholar] [CrossRef]
- Pires, M.; Ravi, S.; Rodrigues, R. Generalized Paxos Made Byzantine (and Less Complex). Algorithms 2018, 11, 141. [Google Scholar] [CrossRef] [Green Version]
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Trans. Comput. Syst. 2002, 20, 398–461. [Google Scholar] [CrossRef]
- Clement, A.; Wong, E.; Alvisi, L.; Dahlin, M.; Marchetti, M. Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults. In Networked Systems Design and Implementation; USENIX: Berkeley, CA, USA, 2009. [Google Scholar]
- Aublin, P.-L.; Mokhtar, S.B.; Quéma, V. RBFT: Redundant Byzantine Fault Tolerance. In Proceedings of the 33rd IEEE International Conference on Distributed Computing Systems, Philadelphia, PA, USA, 8–11 July 2013. [Google Scholar] [CrossRef]
- Abd-El-Malek, M.; Ganger, G.; Goodson, G.; Reiter, M.; Wylie, J. Fault-scalable Byzantine Fault-Tolerant Services. ACM Sigops Oper. Syst. Rev. 2005, 39, 59. [Google Scholar] [CrossRef]
- Cowling, J.; Myers, D.; Liskov, B.; Rodrigues, R.; Shrira, L. HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, Seattle, WA, USA, 6–8 November 2006; pp. 177–190, ISBN 1-931971-47-1. [Google Scholar]
- Kotla, R.; Alvisi, L.; Dahlin, M.; Clement, A.; Wong, E. Zyzzyva: Speculative Byzantine Fault Tolerance. ACM Trans. Comput. Syst. 2009, 27, 1–39. [Google Scholar] [CrossRef]
- Guerraoui, R.; Kneževic, N.; Vukolic, M.; Quéma, V. The Next 700 BFT Protocols. In Proceedings of the 5th European conference on Computer systems, Paris, France, 30 March–2 April 2010. [Google Scholar] [CrossRef]
- Zhao, W. A Byzantine Fault Tolerant Distributed Commit Protocol. In Proceedings of the Third IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2007), Columbia, MD, USA, 25–26 September 2007; pp. 37–46. [Google Scholar] [CrossRef] [Green Version]
- Markus, J.; Ari, J. Proofs of Work and Bread Pudding Protocols, Communications and Multimedia Security. 1999. Available online: http://www.hashcash.org/papers/bread-pudding.pdf (accessed on 24 February 2021).
- Goldwasser, S.; Micali, S.; Rackoff, C. The Knowledge Complexity of Interactive Proof-Systems. Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.419.8132&rep=rep1&type=pdf (accessed on 24 February 2021).
- Sompolinsky, Y.; Zohar, A. Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security; Böhme, R., Okamoto, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
- Cocco, L.; Pinna, A.; Marchesi, M. Banking on Blockchain: Costs Savings Thanks to the Blockchain Technology. Future Internet 2017, 9, 25. [Google Scholar] [CrossRef] [Green Version]
- Kim, H.; Kim, K.; Kwon, H.; Seo, H. ASIC-Resistant Proof of Work Based on Power Analysis of Low-End Microcontrollers. Mathematics 2020, 8, 1343. [Google Scholar] [CrossRef]
- Franco, P. Understanding Bitcoin: Cryptography, Engineering and Economics; Wiley: Hoboken, NJ, USA, 2014; ISBN 978-1-119-01916-9. [Google Scholar]
- Vujičić, D.; Jagodić, D.; Ranđić, S. Blockchain technology, bitcoin, and Ethereum: A brief overview. In Proceedings of the 2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH), East Sarajevo, Bosnia and Herzegovina, 21–23 March 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Biryukov, A.; Khovratovich, D. Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem, Network and Distributed System Security Symposium. 2016. Available online: https://www.ndss-symposium.org/wp-content/uploads/2017/09/equihash-asymmetric-proof-of-work-based-generalized-birthday-problem.pdf (accessed on 24 February 2021).
- Tromp, J. Cuckoo Cycle: A memory bound graph-theoretic proof-of-work. In International Conference on Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2015; pp. 49–62. [Google Scholar]
- GRIN. Available online: https://github.com/ignopeverell/grin (accessed on 24 February 2021).
- AEternity. Available online: http://www.aeternity.com/ (accessed on 24 February 2021).
- Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C.M. Blockchain-Based Decentralized Trust Management in Vehicular Networks. IEEE Internet Things J. 2018, 6, 1495–1505. [Google Scholar] [CrossRef]
- CureCoin. Available online: https://www.curecoin.net/ (accessed on 24 February 2021).
- Bentov, I.; Lee, C.; Mizrahi, A.; Rosenfeld, M. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake. Acm Sigmetrics Perform. Eval. Rev. 2014, 42, 34–37. [Google Scholar] [CrossRef]
- Christina, J. DTB001: Decred Technical Brief. Available online: https://cryptorating.eu/whitepapers/Decred/decred.pdf (accessed on 24 February 2021).
- Boni, K.R.C.; Xu, L.; Chen, Z.; Baddoo, T.D. A Security Concept Based on Scaler Distribution of a Novel Intrusion Detection Device for Wireless Sensor Networks in a Smart Environment. Sensors 2020, 20, 4717. [Google Scholar] [CrossRef] [PubMed]
- Buterin, V.; Griffith, V. Casper the friendly finality gadget. arXiv 2017, arXiv:1710.09437. Available online: https://arxiv.org/abs/1710.09437 (accessed on 24 February 2021).
- Chen, J.; Micali, S. Algorand: A secure and efficient distributed ledger. Theor. Comput. Sci. 2019. [Google Scholar] [CrossRef]
- Buterin, V. Slasher: A Punitive Proof-of-Stake Algorithm. 2014. Available online: https://blog.ethereum.org/2014/01/15/slasher-a-punitive-proof-of-stake-algorithm/ (accessed on 24 February 2021).
- Bentov, I. Cryptocurrencies without Proof of Work. 2017. Available online: https://fc16.ifca.ai/bitcoin/papers/BGM16.pdf (accessed on 24 February 2021).
- Zhu, S.; Cai, Z.; Hu, H.; Li, Y.; Li, W. zkCrowd: A Hybrid Blockchain-Based Crowdsourcing Platform. IEEE Trans. Ind. Inform. 2020, 16, 4196–4205. [Google Scholar] [CrossRef]
- Elrond. Available online: https://elrond.com/ (accessed on 24 February 2021).
- Maofan, Y.; Dahlia, M.; Michael, R.; Guy, G.; Ittai, A. HotStuff: BFT Consensus with Linearity and Responsiveness. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, Toronto, ON, Canada, 29 July–2 August 2019; pp. 347–356. [Google Scholar] [CrossRef] [Green Version]
- Kuhn, R.; Yaga, D.; Voas, J. Rethinking Distributed Ledger Technology. Computer 2019, 52, 68–72. [Google Scholar] [CrossRef]
- Bitcoin: Maximum Transactions Rate. Available online: https://en.bitcoin.it/wiki/Maximum_transaction_rate (accessed on 21 January 2021).
- Ehrsam, F. Scalability Ethereum to Billions of Users. Available online: https://medium.com/@FEhrsam/scalability-ethereum-to-billions-of-users-f37d9f487db1 (accessed on 24 February 2021).
- Costa, C.H.; Vianney, B.M.; Filho, J.; Henrique, M.; Maia, P.; Carlos, M.B.; Oliveira, F. Sharding by Hash Partitioning—A Database Scalability Pattern to Achieve Evenly Sharded Database Clusters. In Proceedings of the 17th International Conference on Enterprise Information Systems, Barcelona, Spain, 27–30 April 2015; pp. 313–320, ISBN 978-989-758-096-3. [Google Scholar] [CrossRef]
- Yu, G.; Wang, X.; Yu, K.; Ni, W.; Zhang, J.A.; Liu, R.P. Survey: Sharding in Blockchains. IEEE Access 2020, 8, 14155–14181. [Google Scholar] [CrossRef]
- Chow, S.S.M.; Lai, Z.; Liu, C.; Lo, E.; Zhao, Y. Sharding Blockchain. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; p. 1665. [Google Scholar] [CrossRef]
- Elrond-A Highly Scalable Public Blockchain via Adaptive State Sharding and Secure Proof of Stake. 2019. Available online: https://elrond.com/assets/files/elrond-whitepaper.pdf (accessed on 24 February 2021).
- Luu, L.; Narayanan, V.; Zheng, C.; Baweja, K.; Gilbert, S.; Saxena, P. A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 17–30. [Google Scholar] [CrossRef]
- Kokoris-Kogias, E.; Jovanovic, P.; Gasser, L.; Gailly, N.; Syta, E.; Ford, B. Omniledger: A secure, scale-out, decentralized ledger via sharding. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–24 May 2018; pp. 583–598. [Google Scholar] [CrossRef] [Green Version]
- Zamani, M.; Movahedi, M.; Raykova, M. Rapidchain: Scalability blockchain via full sharding. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 931–948. [Google Scholar] [CrossRef] [Green Version]
- Wilkinso, S.; Boshevski, T.; Brandoff, J.; Prestwich, J.; Hall, G.; Gerbes, P.; Hutchins, P.; Pollard, C. Storj: A Peer-to-Peer Cloud Storage Network. Available online: https://storj.io/storj.pdf (accessed on 24 February 2021).
- Benet, J. IPFS —Content Addressed, Versioned, P2P File Systems. Available online: https://ipfs.io/ipfs/QmR7GSQM93Cx5eAg6a6yRzNde1FQv7uL6X1o4k7zrJa3LX/ipfs.draft3.pdf (accessed on 24 February 2021).
- Labs, P. Filecoin: A Decentralized Storage Network. Available online: https://filecoin.io/filecoin.pdf (accessed on 24 February 2021).
- MediaChain. Available online: http://www.mediachain.io/ (accessed on 24 February 2021).
- Sevcik, J. DECENT Whitepaper. 2015. Available online: https://www.allcryptowhitepapers.com/decent-whitepaper/ (accessed on 24 February 2021).
- Vorick, D. Luke Champine, Sia: Simple Decentralizes Storage. Available online: https://sia.tech/sia.pdf (accessed on 24 February 2021).
- Nick, L.; Ma, Q.; Irvine, D. Safecoin: The Decentralised Network Token. Maidsafe. Tech. Rep. 2015. Available online: https://docs.maidsafe.net/Whitepapers/pdf/Safecoin.pdf (accessed on 24 February 2021).
- Trón, V.; Fischer, A.; Nagy, D.A.; Felföldi, Z.; Johnson, N. Swap, Swear and Swindle Incentive System for Swarm. Available online: https://ethersphere.github.io/swarm-home/ethersphere/orange-papers/1/sw%5E3.pdf (accessed on 24 February 2021).
- Arweave. Available online: https://github.com/ArweaveTeam/arweave (accessed on 24 February 2021).
- Ozyilmaz, K.R.; Yurdakul, A. Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks. IEEE Consum. Electron. Mag. 2019, 8, 28–34. [Google Scholar] [CrossRef] [Green Version]
- Wang, S.; Li, G.; Yao, X.; Zeng, Y.; Pang, L.; Zhang, L. A Distributed Storage and Access Approach for Massive Remote Sensing Data in MongoDB. ISPRS Int. J. Geo-Inf. 2019, 8, 533. [Google Scholar] [CrossRef] [Green Version]
- Back, A.; Corallo, M.; Dashjr, L.; Friedenbach, M.; Maxwell, G.; Miller, A.; Poelstra, A.; Timón, J.; Wuille, P. Enabling Blockchain Innovations with Pegged Sidechains. 2014. Available online: https://blockstream.com/sidechains.pdf (accessed on 24 February 2021).
- Back, A.; Maxwell, G. Transferring Ledger Assets between Blockchains via Pegged Sidechains. U.S. Patent Application No. 15/150,032, 10 November 2016. Available online: https://patents.google.com/patent/US20160330034A1/en (accessed on 24 February 2021).
- Fallis, A. Rootstock Platform: Bitcoin Powered Smart Contracts—White Paper. J. Chem. Inf. Model 2013, 53, 1689–1699. [Google Scholar]
- Joseph, P.; Dryja, T. The Bitcoin Lightning Network: Scalable off-Chain Instant Payments. 2016. Available online: https://lightning.network/lightning-network-paper.pdf (accessed on 24 February 2021).
- Raiden. Available online: https://raiden.network/ (accessed on 24 February 2021).
- Bolt. Available online: https://boltlabs.tech/ (accessed on 24 February 2021).
- Siris, V.A.; Dimopoulos, D.; Fotiou, N.; Voulgaris, S.; Polyzos, G.C. Decentralized authorization in constrained IoT environments exploiting interledger mechanisms. Comput. Commun. 2020, 152, 243–251. [Google Scholar] [CrossRef]
- Provable. Available online: http://provable.xyz/ (accessed on 24 February 2021).
- Jason, T.; Reitwießner, C. A Scalable Verification Solution for Blockchains. 2017. Available online: https://people.cs.uchicago.edu/~teutsch/papers/truebit.pdf (accessed on 24 February 2021).
- WolframAlpha. Available online: https://www.wolframalpha.com/ (accessed on 24 February 2021).
- Peterson, J. Augur: A Decentralized Oracle and Prediction Market Platform. arXiv 2015, arXiv:1501.01042. Available online: https://arxiv.org/abs/1501.01042 (accessed on 24 February 2021).
- Haas, A.; Rossberg, A.; Schuff, D.L.; Titzer, B.L.; Holman, M.; Gohman, D.; Bastien, J.F. Bringing the web up to speed with WebAssembly. In Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, Barcelona, Spain, 18–23 June 2017. [Google Scholar]
- Zyskind, G.; Nathan, O. Decentralizing privacy: Using blockchain to protect personal data. In Proceedings of the 2015 IEEE Security and Privacy Workshops, San Jose, CA, USA, 21–22 May 2015; pp. 180–184. [Google Scholar] [CrossRef]
- Enigma- Testnet. Available online: https://github.com/enigmampc?language=javascript (accessed on 24 February 2021).
- AHrga; Capuder, T.; Žarko, I.P. Demystifying Distributed Ledger Technologies: Limits, Challenges, and Potentials in the Energy Sector. IEEE Access 2020, 8, 126149–126163. [Google Scholar] [CrossRef]
- Li, D.; Wong, W.E.; Guo, J. A Survey on Blockchain for Enterprise Using Hyperledger Fabric and Composer. In Proceedings of the 2019 6th International Conference on Dependable Systems and Their Applications (DSA), Harbin, China, 3–6 January 2020; pp. 71–80. [Google Scholar] [CrossRef]
- The Interledger Protocol. Available online: https://interledger.org/rfcs/0027-interledger-protocol-4/ (accessed on 24 February 2021).
- Le, D.; Yang, G.; Ghorbani, A. A New Multisignature Scheme with Public Key Aggregation for Blockchain. In Proceedings of the 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada, 26–28 August 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Rajan, D.; Visser, M. Quantum Blockchain Using Entanglement in Time. Quantum Rep. 2019, 1, 2. [Google Scholar] [CrossRef] [Green Version]
- Otsuki, K.; Banno, R.; Shudo, K. Quantitatively Analyzing Relay Networks in Bitcoin. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes Island, Greece, 2–6 November 2020; pp. 214–220. [Google Scholar] [CrossRef]
- Dai, W.; Deng, J.; Wang, Q.; Cui, C.; Zou, D.; Jin, H. SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone. IEEE Access 2018, 6, 40638–40648. [Google Scholar] [CrossRef]
- DriveChain: Enabling Bitcoin Sidechains. Available online: http://www.drivechain.info/ (accessed on 24 February 2021).
Type | Token Example | Fungibility | Issuers |
---|---|---|---|
Native tokens | Bitcoin, Ether, CryptoKitties [4,15,23] | Yes | Mining Reward Schemes |
ERC20, ERC223, ERC-621 [26] | Yes | Initial Coin Offerings | |
ERC721 [26] | No | Initial Coin Offerings | |
Asset-Based Tokens | Real Estate [27] | No | Government Land Registries [28] |
Patents [29] | No | U.S. Patent & Trademark Office [30] | |
Academic Records [31] | No | The Registrar’s Office [32] | |
Gold | Yes | Royal Mint Gold [33] |
Features | Private-Public Key Encryption | Zero-Knowledge Proofs | Ring Signatures | Homomorphic Encryption | Coin Mixers |
---|---|---|---|---|---|
Hidden Data | yes | yes | yes | yes | no |
Non-traceable | yes | n/a | yes | yes | yes |
Non-linkable | no | yes | yes | no | yes |
Decentralized | no | yes | yes | yes | no |
Private Business Enforcement | no | yes | no | no | no |
Transaction validation by network | no | yes | yes | yes | yes |
Type | Implementation | Platform | Enforcement Flexibility | Costs | Exploitation Risks |
---|---|---|---|---|---|
Stateless Transaction Oriented | Transactional Rules | ||||
Built-In Enforcement | Bitcoin [4], Litecoin [17] | Limited | None | Low | |
Nxt [57] | Templates | None | Low | ||
Piggy Backed Enforcement | Counterparty [58] | Turing Complete | Fee per instruction | High | |
Stateful Business Oriented | State Storage | ||||
Smart Contracts & Merkle Patricia Tree | Ethereum [15] | Turing Complete | Fee per instruction | High | |
Smart Contracts & NoSQL DB | HyperLedger [34] | Turing Complete | None | High |
Type | Platform | Trusted Parties | Global Disclosed | Selective Disclosed | ||
---|---|---|---|---|---|---|
Data | Structure | Data | Structure | |||
Public DLTs | Ethereum [15], Bitcoin [4], etc. | - | All transactions | Blockchain | - | - |
Business Specific Chains | HyperLedger Multi-channel [60] | Orderer | - | - | Exclusive transactions | Queues, Blockchain |
Plasma [62] | Central Authority, N delegates | Public Transactions + settlements | Blockchain | Exclusive transactions | Blockchain | |
Point-to-Point transactions | Corda [61] | Notary Service | - | - | Exclusive transactions | Local database |
Quorum [49] | Private parties | Public transactions, Hashes of Exclusive Transactions | Blockchain | Exclusive transactions | Merkle Patricia Tree |
Action | Public Chain | Private Chain | ||
---|---|---|---|---|
Permission-Less | Permissioned | Consortium | Enterprise | |
Chain Access | Everyone | Everyone | Group Owner | Group Owner |
Transactions | Everyone | Owners & Validated Users | Owners & Validated Users | Administrator |
Commit to chain | Everyone | Owners & subset of Validated Users | Owners & subset of Validated Users | Administrator |
Features | Protocol & Network Tier | Scalability Tier | |
---|---|---|---|
Fully Replicated | Sharding | File Systems | |
Immutability | Yes | Yes | No |
Trusted Parties | None | None | Peer nodes |
Byzantine Tolerant | Yes | A tradeoff with the no. of shards | No |
Storage Scalability | Low | Medium | High |
Cost | High | Medium | medium |
Protocol and Network Tier | Scalability Tier | |||
---|---|---|---|---|
Fully Replicated | Sharding | Sidechains | Payment Channels | |
Trusted Parties | None | None | Depending on implementation | None |
Transaction Scalability | Low | Medium | Medium | High |
Cost | High | Medium | Medium | Low |
Implementation Level | Deposit Mechanism | Withdraw Mechanism | Trusted Entities | Chain Independence | |
---|---|---|---|---|---|
Central Exchange | Escrow | TX to a central authority | TX to a central authority | Central Authority | Yes |
MultiSig Federation [138] | Escrow | TX to a multi-signature federation | TX to a multi-signature federation | N Delegates | Yes |
Entangled Chain [140] | Protocol Layer | SPV Proof from the main chain | - | Dependent on the withdraw | Mining rate restriction |
Sidechains [121,122] | Network & Protocol Layer | SPV Proof from the main chain+ proof of block validity | SPV Proof from the sidechain + proof of block validity | Sidechain miners | Yes |
Drivechain [142] | Network & Protocol Layer | SPV Proof from the main chain+ proof of block validity | SPV Proof from the sidechain + proof of block validity + miners votes | Sidechain miners | Yes |
Hybrid Models [123] | Network & Protocol Layer | SPV Proof from the main chain + proof of block validity | SPV Proof from the sidechain + proof of block validity + miners votes + multi-signature notaries | Sidechain miners + Notaries | Yes |
Plasma [62] | Network & Protocol Layer | Proof for TX on the main chain | Direct withdraw + Fault Proofs | Central Authority, N Delegates | Yes |
Lightning Network, Interledger [137] | Scalability Tier Solution | Atomic Swap | Atomic Swap | None | Yes |
Option | Advantages | Disadvantages |
---|---|---|
Standalone Customized DLT | Target the business requirements, limitations, and challenges | Needs to build a network and gain trust in the mining nodes. Increased implementation complexity |
Existing DLT Platform | Existing P2P Network and community Attacks are unlikely considering the high number of existing nodes | High costs imposed by the mining nodes Some tradeoffs may be made due to the core-properties of an existing DLT |
Issue | Tier | Description | Alternative Solutions |
---|---|---|---|
Asset Representation | PN-Tier | Custom tokens in an existing DLT | ERC-721: CryptoKitties [23], Rarible [22], EtherTulips [20] ERC20: Grid [21], Telcoin [25], Storj [110] |
Native token in a custom build DLT | Filecoin [112], MediaChain [113] | ||
Data Structure | PN-Tier | Selection of Security and Decentralisation over Scalability | Blockchain platforms: Ethereum [15], Hyperledger [34], Quorum [49] |
Selection of Scalability and Security over Decentralization | Directed Acyclic Graphs: IOTA [16], HashGraph [39] | ||
Data privacy | PN-Tier | Anonymity of identities involved | Ring Signatures: Monero [18], CryptoNote [54] Mixers: CoinJoin [47], Dash [48] |
Anonymity of content retaining verifiability | Homomorphic Encryptions (MimbleWimble [53]); Secure Multi Party Computation: Enigma [133]; Zero-Knowledge Proofs: Zcash [19], Zerocoin [51], | ||
PN-Tier/ S-Tier | Anonymity of data using references to locations in Scalability Tier | External Storage System: IPFS [111] | |
Business Enforcement | PN-Tier | Built-in custom business rules | Filecoin [112], NRGCoin [24] |
Generic rules and pluggable Turing Complete implementation | Ethereum [15], Hyperledger [34] | ||
Data Propagation | PN-Tier | Selective disclosure | Hyperledger Multichannel (Corda [61], Plasma [62]), Quorum [49] |
Global disclosure | Any public permissionless DLT | ||
Permissions & Consensus | PN-Tier | Public Permissionless & Byzantine Fault Tolerance | Ethereum with PoS or PoW |
Public Permissioned | Ethereum PoS or PoA; Hyperledger [34] | ||
Consortium or Private | Hyperledger [34], Corda [61] | ||
Large Size data | PN-Tier | Selection of Scalability and Decentralisation over Security | BigChainDB [20] |
PN-Tier/ S-Tier | File System Storage | IPFS [111], Storj [110], Filecoin [112] | |
High-Frequency Data | PN-Tier/S-Tier | Selection of Scalability and Security over Decentralization | IOTA [16], Sharding [104], Sidechains [121] |
Overlay Networks; Payment/State Channels | Payment Channels [124], Raiden [125] | ||
Computational Intensive Algorithms | PN-Tier/S-Tier | Selection of Scalability and Security over Decentralization | Secure Multi-Party Computation: Enigma [133]; TrueBit [129] |
Oracles | Provable [128] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Antal, C.; Cioara, T.; Anghel, I.; Antal, M.; Salomie, I. Distributed Ledger Technology Review and Decentralized Applications Development Guidelines. Future Internet 2021, 13, 62. https://doi.org/10.3390/fi13030062
Antal C, Cioara T, Anghel I, Antal M, Salomie I. Distributed Ledger Technology Review and Decentralized Applications Development Guidelines. Future Internet. 2021; 13(3):62. https://doi.org/10.3390/fi13030062
Chicago/Turabian StyleAntal, Claudia, Tudor Cioara, Ionut Anghel, Marcel Antal, and Ioan Salomie. 2021. "Distributed Ledger Technology Review and Decentralized Applications Development Guidelines" Future Internet 13, no. 3: 62. https://doi.org/10.3390/fi13030062
APA StyleAntal, C., Cioara, T., Anghel, I., Antal, M., & Salomie, I. (2021). Distributed Ledger Technology Review and Decentralized Applications Development Guidelines. Future Internet, 13(3), 62. https://doi.org/10.3390/fi13030062