Efficient and DoS-resistant Consensus for Permissioned Blockchains.

作者: Ji Qi , T.-H. Hubert Chan , Haoze Song , Fengwei Zhang , Xiapu Luo

DOI:

关键词: BlockchainComputer scienceComputer networkThe Internet

摘要: Existing permissioned blockchain systems designate a fixed and explicit group of committee nodes to run consensus protocol that confirms the same sequence blocks among all nodes. Unfortunately, when such runs in large scale on Internet, these can be easily turned down by denial-of-service (DoS) or network partition attacks. Although work proposes scalable BFT protocols larger number nodes, their efficiency drops dramatically only small are attacked. In this paper, our EGES leverages Intel SGX develop new abstraction called "stealth committee", which effectively hides into pool fake selects distinct stealth for each block with overwhelming probability. Evaluation typical geo-distributed settings shows that: (1)EGES is first blockchain's tolerate tough DoS attacks; (2) achieves comparable throughput latency as existing blockchains'

参考文章(65)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Meni Rosenfeld, Analysis of Hashrate-Based Double Spending arXiv: Cryptography and Security. ,(2014)
Christian Decker, Jochen Seidel, Roger Wattenhofer, Bitcoin meets strong consistency international conference of distributed computing and networking. pp. 13- ,(2016) , 10.1145/2833312.2833321
Anne-Marie Kermarrec, Maarten van Steen, Gossiping in distributed systems Operating Systems Review. ,vol. 41, pp. 2- 7 ,(2007) , 10.1145/1317379.1317381
Michael J. Fischer, Nancy A. Lynch, Michael S. Paterson, Impossibility of distributed consensus with one faulty process Journal of the ACM. ,vol. 32, pp. 374- 382 ,(1985) , 10.1145/3149.214121
Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, Uday R. Savagaonkar, Innovative instructions and software model for isolated execution hardware and architectural support for security and privacy. pp. 10- ,(2013) , 10.1145/2487726.2488368
Paul De Hert, Vagelis Papakonstantinou, The proposed data protection Regulation replacing Directive 95/46/EC : A sound system for the protection of individuals Computer Law & Security Review. ,vol. 28, pp. 130- 142 ,(2012) , 10.1016/J.CLSR.2012.01.011
George Danezis, Sarah Meiklejohn, Centrally Banked Cryptocurrencies network and distributed system security symposium. ,(2016) , 10.14722/NDSS.2016.23187
Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz, Attested append-only memory Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles - SOSP '07. ,vol. 41, pp. 189- 204 ,(2007) , 10.1145/1294261.1294280