skip to main content
survey
Open Access

Trade-offs between Distributed Ledger Technology Characteristics

Authors Info & Claims
Published:29 May 2020Publication History
Skip Abstract Section

Abstract

When developing peer-to-peer applications on distributed ledger technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum), because it is hard to change the underlying DLT design post hoc. To facilitate the selection of suitable DLT designs, we review DLT characteristics and identify trade-offs between them. Furthermore, we assess how DLT designs account for these trade-offs and we develop archetypes for DLT designs that cater to specific requirements of applications on DLT. The main purpose of our article is to introduce scientific and practical audiences to the intricacies of DLT designs and to support development of viable applications on DLT.

References

  1. Steven R. Kursh and Natalia A. Gold. 2016. Adding fintech and blockchain to your curriculum. Bus. Educ. Innov. J. 8, 2 (2016), 6--12.Google ScholarGoogle Scholar
  2. Feng Tian. 2016. An agri-food supply chain traceability system for China based on RFID 8 blockchain technology. In Proceedings of the 13th International Conference on Service Systems and Service Management. 1--6.Google ScholarGoogle Scholar
  3. Filip Caron. 2018. The evolving payments landscape: Technological innovation in payment systems. IT Profess. 20, 2 (2018), 53--61.Google ScholarGoogle ScholarCross RefCross Ref
  4. Gaby G. Dagher, Jordan Mohler, Matea Milojkovic, and Praneeth Babu Marella. 2018. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 39 (2018), 283--297.Google ScholarGoogle ScholarCross RefCross Ref
  5. Tomi Lehikoinen. 2018. Food supply chain this summer, fishing in Finland means food traceability on the menu. IBM Blockchain Blog. 4 (2019). Retrieved from https://www.ibm.com/blogs/blockchain/2018/07/this-summer-fishing-in-finland-means-food-traceability-on-the-menu.Google ScholarGoogle Scholar
  6. Xueping Liang, Sachin Shetty, Deepak Tosh, Charles Kamhoua, Kevin Kwiat, and Laurent Njilla. 2017. ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid’17). 468--477.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ingo Weber, Vincent Gramoli, Alex Ponomarev, Mark Staples, Ralph Holz, An Binh Tran, and Paul Rimba. 2017. On availability for blockchain-based systems. In Proceedings of the IEEE 36th Symposium on Reliable Distributed Systems. 64--73. Retrieved from http://ieeexplore.ieee.org/document/8069069/.Google ScholarGoogle ScholarCross RefCross Ref
  8. Igor Zikratov, Alexander Kuzmin, Vladislav Akimenko, Viktor Niculichev, and Lucas Yalansky. 2017. Ensuring data integrity using blockchain technology. In Proceedings of the 20th Conference of Open Innovations Association. 534--539.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Niclas Kannengießer, Sebastian Lins, Tobias Dehling, and Ali Sunyaev. 2019. What does not fit can be made to fit! Trade-offs in distributed ledger technology designs. In Proceedings of the 52nd Hawaii International Conference on System Sciences.Google ScholarGoogle ScholarCross RefCross Ref
  10. Eric Alan Brewer. 2000. Towards robust distributed systems (abstract). In Proceedings of the 19th ACM Symposium on Principles of Distributed Computing (PODC’00). 7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Johannes Göbel and Anthony E. Krzesinski. 2017. Increased block size and bitcoin blockchain dynamics. In Proceedings of the 27th International Telecommunication Networks and Applications Conference. 1--6.Google ScholarGoogle Scholar
  12. Nejc Zupan, Kaiwen Zhang, and Hans-Arno Jacobsen. 2017. Hyperpubsub: A decentralized, permissioned, publish/subscribe service using blockchains: demo. In Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos. 15--16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jude Nelson, Muneeb Ali, Ryan Shea, and Michael J. Freedman. 2016. Extending existing blockchains with virtualchain. Retrieved from https://www.zurich.ibm.com/dccl/papers/nelson_dccl.pdf.Google ScholarGoogle Scholar
  14. Florian Glaser and Luis Bezzenberger. 2015. Beyond cryptocurrencies—A taxonomy of decentralized consensus systems. In Proceedings of the 23rd European Conference on Information Systems. 1--18.Google ScholarGoogle Scholar
  15. Karl Wüst and Arthur Gervais. 2017. Do you need a blockchain? Retrieved from https://eprint.iacr.org/2017/375.pdf.Google ScholarGoogle Scholar
  16. Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (eds.). Retrieved from http://arxiv.org/abs/1311.0243.Google ScholarGoogle Scholar
  17. Qassim Nasir, Ilham A. Qasse, Manar Abu Talib, and Ali Bou Nassif. 2018. Performance analysis of hyperledger fabric platforms. Secur. Commun. Netw. (Sept. 2018). 1--14.Google ScholarGoogle Scholar
  18. J. P. Morgan Chase 8 Co. 2018. J. P. Morgan interbank information networksm expands to more than 75 banks. Retrieved from https://web.archive.org/save/https://www.jpmorgan.com/country/US/en/detail/1320570135560.Google ScholarGoogle Scholar
  19. Kaiwen Zhang and Hans-Arno Jacobsen. 2018. Towards dependable, scalable, and pervasive distributed ledgers with blockchains. In Proceedings of the IEEE 38th International Conference on Distributed Computing Systems. 1337--1346.Google ScholarGoogle ScholarCross RefCross Ref
  20. Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3 (1982), 382--401.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Ali Sunyaev. 2019. Distributed ledger technology. In Internet Computing: Principles of Distributed Systems and Emerging Internet-based Technologies (1st ed.). Springer, 265--292.Google ScholarGoogle Scholar
  22. Vitalik Buterin. 2018. Ethereum whitepaper. Retrieved from https://github.com/ethereum/wiki/wiki/White-Paper/f18902f4e7fb21dc92b37e8a0963eec4b3f4793a.Google ScholarGoogle Scholar
  23. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcointalk.org/bitcoin.pdf.Google ScholarGoogle Scholar
  24. Garrick Hileman and Michel Rauchs. 2017. Global Blockchain Benchmarking Study (September 22, 2017). Available at SSRN: https://ssrn.com/abstract=3040224 or http://dx.doi.org/10.2139/ssrn.3040224.Google ScholarGoogle Scholar
  25. Ede Eykholt, Lucius Gregory Meredith, and Joseph Denman. 2017. RChain architecture documentation - release 0.8.1. Retrieved from https://buildmedia.readthedocs.org/media/pdf/rchain-architecture/stable/rchain-architecture.pdf.Google ScholarGoogle Scholar
  26. Soteria Lab. 2019. soteriaDAG - Soteria DAG Project. Github. Retrieved from https://github.com/soteria-dag/soterd/blob/master/docs/README.md.Google ScholarGoogle Scholar
  27. Christopher Natoli and Vincent Gramoli. 2016. The blockchain anomaly. In Proceedings of the IEEE 15th International Symposium on Network Computing and Applications. 310--317.Google ScholarGoogle ScholarCross RefCross Ref
  28. GoChain Foundation. 2019. Official GoChain documentation. Retrieved from https://web.archive.org/web/20190516083054/https://github.com/gochain-io/docs.Google ScholarGoogle Scholar
  29. Hyperledger. 2017. Hyperledger-fabricdocs documentation release v0.6. Retrieved from https://buildmedia.readthedocs.org/media/pdf/hyperledger-fabric/v0.6/hyperledger-fabric.pdf.Google ScholarGoogle Scholar
  30. All In Bits, Inc. 2019. Tendermint documentation. Retrieved from https://tendermint.com/docs/introduction/.Google ScholarGoogle Scholar
  31. EOS.IO. 2018. EOS.IO Technical White Paper v2. Retrieved from https://github.com/EOSIO/Documentation/blob/master/TechnicalWhitePaper.md.Google ScholarGoogle Scholar
  32. Colin LeMahieu. 2018. Nano: A feeless distributed cryptocurrency network. Retrieved from https://nano.org/en/whitepaper.Google ScholarGoogle Scholar
  33. Cody Born. 2018. Ethereum proof-of-authority on Azure. Microsoft Azure. Retrieved from https://web.archive.org/web/20190501134839/https://azure.microsoft.com/en-us/blog/ethereum-proof-of-authority-on-azure/.Google ScholarGoogle Scholar
  34. Intel Corporation. 2015. PoET 1.0 Specification. Retrieved from https://sawtooth.hyperledger.org/docs/core/releases/1.0/architecture/poet.html.Google ScholarGoogle Scholar
  35. GoChain. 2018. Proof of reputation. Retrieved from https://medium.com/gochain/proof-of-reputation-e37432420712.Google ScholarGoogle Scholar
  36. Evan Duffield and Daniel Dia. 2019. Dash: A privacy-centric cryptocurrency. Retrieved from https://whitepaperdatabase.com/wp-content/uploads/2017/09/Dash-Whitepaper.pdf.Google ScholarGoogle Scholar
  37. Serguei Popov. 2018. The tangle. Retrieved from https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf.Google ScholarGoogle Scholar
  38. Rafael Pass and Elaine Shi. 2017. The sleepy model of consensus. In Proceedings of the Advances in Cryptology Conference (ASIACRYPT’17). 380--409.Google ScholarGoogle ScholarCross RefCross Ref
  39. Kenji Saito and Yamada Hairoyuki. 2016. What's so different about blockchain? — Blockchain is a probabilistic state machine. In Proceedings of the IEEE 36th International Conference on Distributed Computing Systems Workshops. 168--175.Google ScholarGoogle ScholarCross RefCross Ref
  40. Miguel Castro and Barbara Liskov. 1999. Practical byzantine fault tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI’99). 173--186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Demiro Massessi. 2018. Public vs private blockchain in a Nutshell. Retrieved from https://medium.com/coinmonks/public-vs-private-blockchain-in-a-nutshell-c9fe284fa39f.Google ScholarGoogle Scholar
  42. Paige Cabianca. 2018. What's the difference between public, private, and permissioned blockchains? Retrieved from https://medium.com/nakamo-to/whats-the-difference-between-a-public-and-a-private-blockchain-c08d6d1886a0.Google ScholarGoogle Scholar
  43. Zibin Zheng, Shaoan Xie, Hong Ning Dai, Xiangping Chen, and Huaimin Wang. 2018. Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14, 4 (2018), 352.Google ScholarGoogle ScholarCross RefCross Ref
  44. J. P. Morgan Chase 8 Co. 2016. Quorum Whitepaper. Retrieved from https://github.com/jpmorganchase/quorum-docs/blob/master/Quorum%20Whitepaper%20v0.1.pdf.Google ScholarGoogle Scholar
  45. ARK.io. 2019. ARK Ecosystem Whitepaper. Retrieved from https://ark.io/Whitepaper.pdf.Google ScholarGoogle Scholar
  46. Tom Rodgers. 2019. Ethereum classic price roaring just weeks after 51% attack. Retrieved from https://www.forbes.com/sites/tomrodgers1/2019/04/08/ethereum-classic-price-roaring-just-weeks-after-51-attack/#2906e2a6f7ef.Google ScholarGoogle Scholar
  47. Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security (CMS’99). 258--272.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Christopher Natoli and Vincent Gramoli. 2017. The balance attack or why forkable blockchains are ill-suited for consortium. In Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks. 579--590.Google ScholarGoogle ScholarCross RefCross Ref
  49. Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In Proceedings of the 24th USENIX Conference on Security (SEC’15). 129--144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking bitcoin: Routing attacks on cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy. 375--392.Google ScholarGoogle ScholarCross RefCross Ref
  51. Joseph Bonneau. 2016. Why buy when you can rent? Bribery attacks on bitcoin-style consensus. In Proceedings of the International Conference on Financial Cryptography and Data Security. 19--26.Google ScholarGoogle ScholarCross RefCross Ref
  52. Johannes Göbel, Paul Keeler, Anthony E. Krzesinski, and Peter G. Taylor. 2016. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform. Eval. 104 (2016), 23--41.Google ScholarGoogle ScholarCross RefCross Ref
  53. Evangelos Deirmentzoglou, Georgios Papakyriakopoulos, and Constantinos Patsakis. 2019. A survey on long-range attacks for proof of stake protocols. IEEE Access 7 (2019), 28712--28725.Google ScholarGoogle ScholarCross RefCross Ref
  54. John R. Douceur. 2002. The Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’01). 251--260.Google ScholarGoogle ScholarCross RefCross Ref
  55. Pim Otte, Martijn de Vos, and Johan Pouwelse. 2017. TrustChain: A Sybil-resistant scalable blockchain. Fut. Gen. Comput. Syst. (2017). https://www.sciencedirect.com/science/article/abs/pii/S0167739X17318988?via%3Dihub.Google ScholarGoogle Scholar
  56. Brian Neil Levine, Clay Shields, and N. Boris Margolin. 2005. A survey of solutions to the Sybil attack. Retreived on April 05, 2019 from https://allquantor.at/blockchainbib/pdf/levine2006survey.pdf.Google ScholarGoogle Scholar
  57. Patrick Dai, Neil Mahi, Jordan Earls, and Alex Norta. 2017. Smart-contract value-transfer protocol on a distributed mobile application platform. Retrieved from https://web.archive.org/web/20190506095324/https://qtum.org/user/pages/01.home/Qtum%20whitepaper_en%20v0.7.pdf.Google ScholarGoogle Scholar
  58. Daira Hopwood, Sean Bowe, Taylor Hornby, and Nathan Wilcox. 2018. Zcash protocol specification. Retrieved from https://whitepaperdatabase.com/wp-content/uploads/2018/03/z-cash-zec-whitepaper.pdf.Google ScholarGoogle Scholar
  59. Howard Shrobe, David L. Shrier, and Alex Pentland. 2018. Enigma: Decentralized computation platform with guaranteed privacy. In New Solutions for Cybersecurity. Chapter 15, 504.Google ScholarGoogle Scholar
  60. Jonathan Heiss, Jan Eberhardt, and Stefan Tai. 2019. From oracles to trustworthy data on-chaining systems. Retrieved from https://www.redaktion.tu-berlin.de/fileadmin/fg308/publications/2019/Heiss-et-al-oracles_preprint.pdf.Google ScholarGoogle Scholar
  61. Neville Grech, Michael Kong, Anton Jurisevic, Lexi Brent, Bernhard Scholz, and Yannis Smaragdakis. 2018. MadMax: Surviving out-of-gas conditions in ethereum smart contracts. Proc. ACM Program. Lang. 2 (Oct. 2018), 1--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Maximilian Wöhrer and Uwe Zdun. 2018. Smart contracts: Security patterns in the ethereum ecosystem and solidity. In Proceedings of the International Workshop on Blockchain Oriented Software Engineering. 2--8.Google ScholarGoogle ScholarCross RefCross Ref
  63. Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2016. A survey of attacks on ethereum smart contracts. Retrieved from https://allquantor.at/blockchainbib/pdf/atzei2016survey.pdf.Google ScholarGoogle Scholar
  64. Xiangfu Zhao, Zhongyu Chen, Xin Chen, Yanxia Wang, and Changbing Tang. 2017. The DAO attack paradoxes in propositional logic. In Proceedings of the 4th International Conference on Systems and Informatics. 1743--1746. Retrieved from http://ieeexplore.ieee.org/document/8248566/.Google ScholarGoogle ScholarCross RefCross Ref
  65. Peter Vessenes. 2016. Ethereum griefing wallets: Send w/Throw Is Dangerous. Retrieved from https://vessenes.com/ethereum-griefing-wallets-send-w-throw-considered-harmful/.Google ScholarGoogle Scholar
  66. Niclas Kannengießer, Michelle Pfister, Malte Greulich, Sebastian Lins, and Ali Sunyaev. 2020. Bridges between islands: Cross-chain technology for distributed ledger technology. In Proceedings of the 53rd Hawaii International Conference on System Sciences.Google ScholarGoogle ScholarCross RefCross Ref
  67. Paolo Tasca and Claudio Tessone. 2019. A taxonomy of blockchain technologies: Principles of identification and classification. Ledger 4 (2019).Google ScholarGoogle Scholar
  68. Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, and Paul Rimba. 2017. A taxonomy of blockchain-based systems for architecture design. In Proceedings of the IEEE International Conference on Software Architecture. 243--252. Retrieved from http://ieeexplore.ieee.org/document/7930224/.Google ScholarGoogle ScholarCross RefCross Ref
  69. Seyoung Huh, Sangrae Cho, and Soohyung Kim. 2017. Managing IoT devices using blockchain platform. In Proceedings of the 19th International Conference on Advanced Communication Technology. 464--467.Google ScholarGoogle ScholarCross RefCross Ref
  70. Morgen E. Peck. 2017. Blockchain world—do you need a blockchain? This chart will tell you if the technology can solve your problem. IEEE Spectrum 54, 10 (2017), 38--60.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Andreas Unterweger, Fabian Knirsch, Christoph Leixnering, and Dominik Engel. 2018. Lessons learned from implementing a privacy-preserving smart contract in ethereum. In Proceedings of the 9th IFIP International Conference on New Technologies, Mobility and Security. 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  72. Merve Can Kus Khalilov and Albert Levi. 2018. A survey on anonymity and privacy in bitcoin-like digital cash systems. IEEE Commun. Surv. Tutor. 20, 3 (2018), 1--44. https://ieeexplore.ieee.org/abstract/document/8325269Google ScholarGoogle ScholarCross RefCross Ref
  73. Bogdan Cristian Florea. 2018. Blockchain and internet of things data provider for smart applications. In Proceedings of the 7th Mediterranean Conference on Embedded Computing. 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  74. Ripple. 2017. Solution overview. Retrieved from https://whitepaperdatabase.com/wp-content/uploads/2017/09/Ripple-XRP-Whitepaper.pdf.Google ScholarGoogle Scholar
  75. Runchao Han, Vincent Gramoli, and Xiwei Xu. 2018. Evaluating blockchains for IoT. In Proceedings of the 9th IFIP International Conference on New Technologies, Mobility and Security. 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  76. Tien Tuan Anh Dinh, Ji Wang, Gang Chen, Rui Liu, Beng Chin Ooi, and Kian-Lee Tan. 2017. Blockbench: A framework for analyzing private blockchains. In Proceedings of the ACM International Conference on Management of Data (SIGMOD’17). 1085--1100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Florian Gräbe, Niclas Kannengießer, Sebastian Lins, and Ali Sunyaev. 2020. Do not be fooled: Towards a holistic comparison of distributed ledger technology designs. In Proceedings of the 53th Hawaii Internantional Conference on System Sciences.Google ScholarGoogle ScholarCross RefCross Ref
  78. Odhran O'Donoghue, Anuraag A. Vazirani, David Brindley, and Edward Meinert. 2019. Design choices and trade-offs in health care blockchain implementations: Systematic review. J. Med. Internet Res. 21, 5 (2019), e12426.Google ScholarGoogle ScholarCross RefCross Ref
  79. Jan vom Brocke, Alexander Simons, Kai Riemer, Bjoern Niehaves, and Ralf Platfaut. 2015. Standing on the shoulders of giants: Challenges and recommendations of literature search in information systems research. Commun. AIS 37, 9 (2015), 205--224.Google ScholarGoogle Scholar
  80. Barbara Kitchenham, O. Pearl Brereton, David Budgen, Mark Turner, John Bailey, and Stephen Linkman. 2009. Systematic literature reviews in software engineering. Inf. Softw. Technol. 51, 1 (2009), 7--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Guy Paré, Marie Claude Trudel, Mirou Jaana, and Spyros Kitsiou. 2015. Synthesizing information systems knowledge: A typology of literature reviews. Inf. Manag. 52, 2 (2015), 183--199.Google ScholarGoogle ScholarCross RefCross Ref
  82. Jane Webster and Richard T. Watson. 2002. Analyzing the past to prepare for the future. MIS Quart. 26, 2 (2002), xiii--xxiii.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Gavin Wood. 2016. Polkadot. Retrieved from https://icowhitepapers.co/wp-content/uploads/PolkaDot-Whitepaper.pdf.Google ScholarGoogle Scholar
  84. Shilan Yang, Huaimin Wang, Wei Li, Wei Liu, and Xiang Fu. 2018. CVEM: A cross-chain value exchange mechanism. In Proceedings of the International Conference on Cloud Computing and Internet of Things. 80--85.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi. 2016. Town crier: An authenticated data feed for smart contracts. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 270--282.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Mary C. Lacity, Shaji Khan, Aihua Yan, and Leslie P. Willcocks. 2010. A review of the IT outsourcing empirical literature and future research directions. J. Inf. Technol. 25, 4 (2010), 395--433.Google ScholarGoogle ScholarCross RefCross Ref
  87. Mildred L. G. Shaw and Brian R. Gaines. 1989. Comparing conceptual structures: Consensus, conflict, correspondence, and contrast. Knowl. Acquis. 1, 4 (1989), 341--363.Google ScholarGoogle ScholarCross RefCross Ref
  88. Juliet M. Corbin and Anselm L. Strauss. 2015. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (4th ed.). SAGE Publications.Google ScholarGoogle Scholar
  89. Barney G. Glaser and Anselm L. Strauss. 2009. The Discovery of Grounded Theory: Strategies for Qualitative Research (4th ed.). Routledge.Google ScholarGoogle Scholar
  90. Martin Davis. 1982. Computability 8 Unsolvability. Dover.Google ScholarGoogle Scholar
  91. Mingjun Dai, Shengli Zhang, Hu Wang, and Shi Jin. 2018. A low storage room requirement framework for distributed ledger in blockchain. IEEE Access 6 (2018), 22970--22975.Google ScholarGoogle ScholarCross RefCross Ref
  92. NewsBTC. 2018. Increased SegWit Adoption for Bitcoin—Is Lightning Network Next? Retrieved from https://web.archive.org/web/20190410173449/https://www.newsbtc.com/2018/03/01/segwit-adoption-lightning-network-increases-bitcoin/.Google ScholarGoogle Scholar
  93. Deepak Puthal, Nisha Malik, Saraju P. Mohanty, Elias Kougianos, and Chi Yang. 2018. The blockchain as a decentralized security framework (future directions). IEEE Consum. Electron. Mag. 7, 2 (2018), 18--21.Google ScholarGoogle ScholarCross RefCross Ref
  94. Michael Coblenz. 2017. Obsidian: A safer blockchain programming language. In Proceedings of the 39th International Conference on Software Engineering Companion (ICSE-C’17). 97--99.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. 2016. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the IEEE Symposium on Security and Privacy. 839--858.Google ScholarGoogle ScholarCross RefCross Ref
  96. Ittai Anati, Shay Gueron, Simon P. Johnson, and Vincent R. Scarlata. 2014. Innovative technology for CPU Based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy.Google ScholarGoogle Scholar
  97. Oraclize. 2019. Oraclize documentary. Retrieved from https://provable.xyz/.Google ScholarGoogle Scholar
  98. Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, and Qiaoyan Wen. 2017. A survey on the security of blockchain systems. Fut. Gen. Comput. Syst. 107 (2017), 1--13. https://www.sciencedirect.com/science/article/abs/pii/S0167739X17318332.Google ScholarGoogle Scholar
  99. Matevž Pustišek and Andrej Kos. 2018. Approaches to front-end IoT application development for the ethereum blockchain. Proc. Comput. Sci. 129 (2018), 410--419.Google ScholarGoogle ScholarCross RefCross Ref
  100. Ioannis Chatzigiannakis, Apostolos Pyrgelis, Paul G. Spirakis, and Yannis C. Stamatiou. 2011. Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In Proceedings of the IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems. 715--720.Google ScholarGoogle Scholar
  101. Jan Henrik Ziegeldorf, Fred Grossmann, Martin Henze, Nicolas Inden, and Klaus Wehrle. 2015. CoinParty: Secure multi-party mixing of bitcoins. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY’15). 75--86.Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Micha R. Hoffman. 2018. Can blockchains and linked data advance taxation. In Proceedings of the Web Conference (WWW’18). 1179--1182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 3--16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Jega Anish Dev. 2014. Bitcoin mining acceleration and performance quantification. In Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering. 1--6.Google ScholarGoogle Scholar
  105. Florian Tschorsch and Bjorn Scheuermann. 2016. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18, 3 (2016), 2084--2123.Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Du Mingxiao, Ma Xiaofeng, Zhe Zhe, Wang Xiangwei, and Chen Qijun. 2017. A review on consensus algorithm of blockchain. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. 2567--2572.Google ScholarGoogle ScholarCross RefCross Ref
  107. Karim Jabbar and Pernille Bjørn. 2018. Infrastructural Grind: Introducing blockchain technology in the shipping domain. In Proceedings of the ACM Conference on Supporting Groupwork (GROUP’18). 297--308.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Tim Swanson. 2015. Consensus-as-a-service: A brief report on the emergence of permissioned, distributed ledger systems. Retrieved from https://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf.Google ScholarGoogle Scholar
  109. Stefano De Angelis, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, and Vladimiro Sassone. 2018. PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain. Retrieved from https://eprints.soton.ac.uk/415083/.Google ScholarGoogle Scholar
  110. Harish Sukhwani, José M. Martínez, Xiaolin Chang, Kishor S. Trivedi, and Andy Rindos. 2017. Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric). In Proceedings of the IEEE 36th Symposium on Reliable Distributed Systems. 253--255.Google ScholarGoogle ScholarCross RefCross Ref
  111. Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 31--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Dvora Dolev and H. R. Strong. 1982. Distributed commit with bounded waiting. Retrieved from https://www.cs.huji.ac.il/∼dolev//pubs/dist-commit.pdf.Google ScholarGoogle Scholar
  113. Rafael Pass and Elaine Shi. 2017. Rethinking large-scale consensus. In Proceedings of the IEEE 30th Computer Security Foundations Symposium. 115--129.Google ScholarGoogle ScholarCross RefCross Ref
  114. Seth Gilbert and Nancy Lynch. 2002. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News 33, 2 (2002), 51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P’13). 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  116. Artem Barger, Yacov Manevich, Benjamin Mandler, Vita Bortnikov, Gennady Laventman, and Gregory Chockler. 2017. Scalable communication middleware for permissioned distributed ledgers. In Proceedings of the 10th ACM International Systems and Storage Conference (SYSTOR’17). 23:1.Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Frank Hofmann, Simone Wurster, Eyal Ron, and Moritz Böhmecke-Schwafert. 2017. The immutability concept of blockchains and benefits of early standardization. In ITU Kaleidoscope: Challenges for a Data-Driven Society. IEEE, 1--8.Google ScholarGoogle Scholar
  118. Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The bitcoin backbone protocol: Analysis and applications. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT’15). 281--310.Google ScholarGoogle ScholarCross RefCross Ref
  119. ISO. 1989. Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture. Retreived on June 10, 2018.Google ScholarGoogle Scholar
  120. Heiko Koziolek. 2011. Sustainability evaluation of software architectures: A systematic review. In Proceedings of the Joint ACM SIGSOFT Conference - QoSA and ACM SIGSOFT Symposium - ISARCS on Quality of Software Architectures - QoSA and Architecting Critical Systems-- (QoSA-ISARCS’11). 3.Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, Sooyong Park, and Kari Smolander. 2016. Where is current research on blockchain technology? PLOS One 11, 10 (2016), 1--27.Google ScholarGoogle ScholarCross RefCross Ref
  122. Alin Tomescu and Srinivas Devadas. 2017. Catena: Efficient non-equivocation via bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy. 393--409.Google ScholarGoogle ScholarCross RefCross Ref
  123. Nitesh Emmadi and Harika Narumanchi. 2017. Reinforcing immutability of permissioned blockchains with keyless signatures’ infrastructure. In Proceedings of the 18th International Conference on Distributed Computing and Networking (ICDCN’17). 1--6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Adam Back. 1997. A partial hash collision based postage scheme. Retrieved from http://www.hashcash.org/papers/announce.txt.Google ScholarGoogle Scholar
  125. Lukas Malina, Jan Hajny, Radek Fujdiak, and Jiri Hosek. 2016. On perspective of security and privacy-preserving solutions in the internet of things. Comput. Netw. 102 (2016), 83--95.Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, and Hicham Lakhlef. 2018. Internet of things security: A top-down survey. Comput. Netw. 141 (2018), 199--221.Google ScholarGoogle ScholarCross RefCross Ref
  127. Daniel Abadi. 2012. Consistency tradeoffs in modern distributed database system design: CAP is only part of the story. Computer 45, 2 (2012), 37--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. The Cryptocurrency Consultant. 2019. Ethereum 2.0 - Consensys Publishes Roadmap to Serenity. Medium. Retrieved December 10, 2019 from https://medium.com/altcoin-magazine/ethereum-2-0-consensys-publishes-roadmap-to-serenity-e1ce76fa34f2.Google ScholarGoogle Scholar
  129. Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, and Neeraj Kumar. 2019. A survey on privacy protection in blockchain system. J. Netw. Comput. Applic. 126 (2019), 45--58.Google ScholarGoogle ScholarCross RefCross Ref
  130. Nicolas van Saberhagen. 2013. CryptoNote v 2.0. Retrieved from https://cryptonote.org/whitepaper.pdf.Google ScholarGoogle Scholar
  131. Nicolas van Saberhagen. 2013. CryptoNote v 2.0. Retrieved from https://whitepaperdatabase.com/wp-content/uploads/2017/09/Monero-whitepaper.pdf.Google ScholarGoogle Scholar
  132. Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, and Nicolas Christin. 2018. An empirical analysis of traceability in the monero blockchain. Proc. Privacy Enhanc. Technol. 2018, 3 (2018).Google ScholarGoogle ScholarCross RefCross Ref
  133. The Zilliqa Team. 2017. The Zilliqa technical whitepaper. Retrieved from https://docs.zilliqa.com/whitepaper.pdf.Google ScholarGoogle Scholar
  134. Jack Lu, Boris Yang, Zane Liang, Ying Zhang, Demmon Shi, Eric Swartz, and Lizzie Lu. 2017. Wanchain. Retrieved from https://wanchain.org/files/Wanchain-Whitepaper-EN-version.pdf.Google ScholarGoogle Scholar
  135. Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, and Beng Chin Ooi. 2018. Untangling blockchain: A data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30, 7 (2018), 1--20.Google ScholarGoogle Scholar
  136. Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 17--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. Seele. 2018. Seele whitepaper. Retrieved from http://seele.hk.ufileos.com/Seele_White_Paper_English_v3.1.pdf.Google ScholarGoogle Scholar
  138. Cindy Compert, Maurizio Luinetti, and Bertrand Portier. 2018. Blockchain and GDPR—How blockchain could address five areas associated with GDPR compliance. Retrieved on December 11, 2018 from https://www.ibm.com/downloads/cas/2EXR2XYP.Google ScholarGoogle Scholar
  139. Ashiq Anjum, Manu Sporny, and Alan Sill. 2017. Blockchain standards for compliance and trust. IEEE Cloud Comput. 4, 4 (2017), 84--90.Google ScholarGoogle ScholarCross RefCross Ref
  140. Josh Swihart, Benjamin Winston, and Sean Bowe. 2019. Zcash counterfeiting vulnerability successfully remediated. Retrieved from https://electriccoin.co/blog/zcash-counterfeiting-vulnerability-successfully-remediated/.Google ScholarGoogle Scholar
  141. Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson. 1985. Impossibility of distributed consensus with one faulty process. J. ACM 32, 2 (1985), 374--382.Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. L. Lamport and M. Massa. 2004. Cheap paxos. In Proceedings of the International Conference on Dependable Systems and Networks. 307--314.Google ScholarGoogle Scholar
  143. Diego Ongaro and John Ousterhout. 2016. In search of an understandable consensus algorithm (extended version). Retrieved from https://raft.github.io/raft.pdf.Google ScholarGoogle Scholar
  144. Vitalik Buterin. 2016. Chain interoperability [white paper]. Retrieved from http://www.r3cev.com/s/Chain-Interoperability-8g6f.pdf.Google ScholarGoogle Scholar
  145. Hai Jin, Jiang Xiao, and Xiaohai Dai (Eds.). 2018. Towards a novel architecture for enabling interoperability amongst multiple blockchains. In Proceedings of the IEEE 38th International Conference on Distributed Computing Systems.Google ScholarGoogle ScholarCross RefCross Ref
  146. Claudio Lima. 2018. Developing open and interoperable DLT/blockchain standards. Computer 51, 11 (2018), 106--111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. Shijun Liu, Bedir Tekinerdogan, Mikio Aoyama, Liang-Jie Zhang, Liping Deng, Huan Chen, and Jing Zeng (Eds.). 2018. Research on cross-chain technology based on sidechain and hash-locking. Retrieved from https://link.springer.com/content/pdf/10.1007%2F978-3-319-94340-4.pdf.Google ScholarGoogle Scholar
  148. Tobias Dehling, Sebastian Lins, and Ali Sunyaev. 2019. Security of critical information infrastructures. In Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace, Christian Reuter (Ed.). Springer, 319--339.Google ScholarGoogle Scholar
  149. Diego Marmsoler and Leo Eichhorn. 2018. Simulation-based analysis of blockchain architectures. Retrieved from http://rgdoi.net/10.13140/RG.2.2.19898.44481.Google ScholarGoogle Scholar
  150. Manuel Zander, Tom Waite, and Dominik Harz. 2018. DAGsim: Simulation of DAG-based distributed ledger protocols. ACM SIGMETRICS Perform. Eval. Rev. 46, 3 (2018), 118--121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. Xiwei Xu, Cesare Pautasso, Liming Zhu, Vincent Gramoli, Alexander Ponomarev, An Binh Tran, and Shiping Chen Chen. 2016. The blockchain as a software connector. In Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture. 182--191.Google ScholarGoogle ScholarCross RefCross Ref
  152. Youngjin Yoo. 2010. Computing in everyday life: A call for research on experiential computing. MIS Quarterly 34, 2 (2010), 213--231.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Trade-offs between Distributed Ledger Technology Characteristics

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 53, Issue 2
        March 2021
        848 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3388460
        Issue’s Table of Contents

        Copyright © 2020 Owner/Author

        This work is licensed under a Creative Commons Attribution-NoDerivatives International 4.0 License.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 May 2020
        • Online AM: 7 May 2020
        • Accepted: 1 January 2020
        • Revised: 1 December 2019
        • Received: 1 June 2019
        Published in csur Volume 53, Issue 2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • survey
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format