Abstract
When developing peer-to-peer applications on distributed ledger technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum), because it is hard to change the underlying DLT design post hoc. To facilitate the selection of suitable DLT designs, we review DLT characteristics and identify trade-offs between them. Furthermore, we assess how DLT designs account for these trade-offs and we develop archetypes for DLT designs that cater to specific requirements of applications on DLT. The main purpose of our article is to introduce scientific and practical audiences to the intricacies of DLT designs and to support development of viable applications on DLT.
- Steven R. Kursh and Natalia A. Gold. 2016. Adding fintech and blockchain to your curriculum. Bus. Educ. Innov. J. 8, 2 (2016), 6--12.Google Scholar
- Feng Tian. 2016. An agri-food supply chain traceability system for China based on RFID 8 blockchain technology. In Proceedings of the 13th International Conference on Service Systems and Service Management. 1--6.Google Scholar
- Filip Caron. 2018. The evolving payments landscape: Technological innovation in payment systems. IT Profess. 20, 2 (2018), 53--61.Google ScholarCross Ref
- Gaby G. Dagher, Jordan Mohler, Matea Milojkovic, and Praneeth Babu Marella. 2018. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 39 (2018), 283--297.Google ScholarCross Ref
- Tomi Lehikoinen. 2018. Food supply chain this summer, fishing in Finland means food traceability on the menu. IBM Blockchain Blog. 4 (2019). Retrieved from https://www.ibm.com/blogs/blockchain/2018/07/this-summer-fishing-in-finland-means-food-traceability-on-the-menu.Google Scholar
- Xueping Liang, Sachin Shetty, Deepak Tosh, Charles Kamhoua, Kevin Kwiat, and Laurent Njilla. 2017. ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid’17). 468--477.Google ScholarDigital Library
- Ingo Weber, Vincent Gramoli, Alex Ponomarev, Mark Staples, Ralph Holz, An Binh Tran, and Paul Rimba. 2017. On availability for blockchain-based systems. In Proceedings of the IEEE 36th Symposium on Reliable Distributed Systems. 64--73. Retrieved from http://ieeexplore.ieee.org/document/8069069/.Google ScholarCross Ref
- Igor Zikratov, Alexander Kuzmin, Vladislav Akimenko, Viktor Niculichev, and Lucas Yalansky. 2017. Ensuring data integrity using blockchain technology. In Proceedings of the 20th Conference of Open Innovations Association. 534--539.Google ScholarDigital Library
- Niclas Kannengießer, Sebastian Lins, Tobias Dehling, and Ali Sunyaev. 2019. What does not fit can be made to fit! Trade-offs in distributed ledger technology designs. In Proceedings of the 52nd Hawaii International Conference on System Sciences.Google ScholarCross Ref
- Eric Alan Brewer. 2000. Towards robust distributed systems (abstract). In Proceedings of the 19th ACM Symposium on Principles of Distributed Computing (PODC’00). 7.Google ScholarDigital Library
- Johannes Göbel and Anthony E. Krzesinski. 2017. Increased block size and bitcoin blockchain dynamics. In Proceedings of the 27th International Telecommunication Networks and Applications Conference. 1--6.Google Scholar
- Nejc Zupan, Kaiwen Zhang, and Hans-Arno Jacobsen. 2017. Hyperpubsub: A decentralized, permissioned, publish/subscribe service using blockchains: demo. In Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos. 15--16.Google ScholarDigital Library
- Jude Nelson, Muneeb Ali, Ryan Shea, and Michael J. Freedman. 2016. Extending existing blockchains with virtualchain. Retrieved from https://www.zurich.ibm.com/dccl/papers/nelson_dccl.pdf.Google Scholar
- Florian Glaser and Luis Bezzenberger. 2015. Beyond cryptocurrencies—A taxonomy of decentralized consensus systems. In Proceedings of the 23rd European Conference on Information Systems. 1--18.Google Scholar
- Karl Wüst and Arthur Gervais. 2017. Do you need a blockchain? Retrieved from https://eprint.iacr.org/2017/375.pdf.Google Scholar
- Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (eds.). Retrieved from http://arxiv.org/abs/1311.0243.Google Scholar
- Qassim Nasir, Ilham A. Qasse, Manar Abu Talib, and Ali Bou Nassif. 2018. Performance analysis of hyperledger fabric platforms. Secur. Commun. Netw. (Sept. 2018). 1--14.Google Scholar
- J. P. Morgan Chase 8 Co. 2018. J. P. Morgan interbank information networksm expands to more than 75 banks. Retrieved from https://web.archive.org/save/https://www.jpmorgan.com/country/US/en/detail/1320570135560.Google Scholar
- Kaiwen Zhang and Hans-Arno Jacobsen. 2018. Towards dependable, scalable, and pervasive distributed ledgers with blockchains. In Proceedings of the IEEE 38th International Conference on Distributed Computing Systems. 1337--1346.Google ScholarCross Ref
- Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3 (1982), 382--401.Google ScholarDigital Library
- Ali Sunyaev. 2019. Distributed ledger technology. In Internet Computing: Principles of Distributed Systems and Emerging Internet-based Technologies (1st ed.). Springer, 265--292.Google Scholar
- Vitalik Buterin. 2018. Ethereum whitepaper. Retrieved from https://github.com/ethereum/wiki/wiki/White-Paper/f18902f4e7fb21dc92b37e8a0963eec4b3f4793a.Google Scholar
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcointalk.org/bitcoin.pdf.Google Scholar
- Garrick Hileman and Michel Rauchs. 2017. Global Blockchain Benchmarking Study (September 22, 2017). Available at SSRN: https://ssrn.com/abstract=3040224 or http://dx.doi.org/10.2139/ssrn.3040224.Google Scholar
- Ede Eykholt, Lucius Gregory Meredith, and Joseph Denman. 2017. RChain architecture documentation - release 0.8.1. Retrieved from https://buildmedia.readthedocs.org/media/pdf/rchain-architecture/stable/rchain-architecture.pdf.Google Scholar
- Soteria Lab. 2019. soteriaDAG - Soteria DAG Project. Github. Retrieved from https://github.com/soteria-dag/soterd/blob/master/docs/README.md.Google Scholar
- Christopher Natoli and Vincent Gramoli. 2016. The blockchain anomaly. In Proceedings of the IEEE 15th International Symposium on Network Computing and Applications. 310--317.Google ScholarCross Ref
- GoChain Foundation. 2019. Official GoChain documentation. Retrieved from https://web.archive.org/web/20190516083054/https://github.com/gochain-io/docs.Google Scholar
- Hyperledger. 2017. Hyperledger-fabricdocs documentation release v0.6. Retrieved from https://buildmedia.readthedocs.org/media/pdf/hyperledger-fabric/v0.6/hyperledger-fabric.pdf.Google Scholar
- All In Bits, Inc. 2019. Tendermint documentation. Retrieved from https://tendermint.com/docs/introduction/.Google Scholar
- EOS.IO. 2018. EOS.IO Technical White Paper v2. Retrieved from https://github.com/EOSIO/Documentation/blob/master/TechnicalWhitePaper.md.Google Scholar
- Colin LeMahieu. 2018. Nano: A feeless distributed cryptocurrency network. Retrieved from https://nano.org/en/whitepaper.Google Scholar
- Cody Born. 2018. Ethereum proof-of-authority on Azure. Microsoft Azure. Retrieved from https://web.archive.org/web/20190501134839/https://azure.microsoft.com/en-us/blog/ethereum-proof-of-authority-on-azure/.Google Scholar
- Intel Corporation. 2015. PoET 1.0 Specification. Retrieved from https://sawtooth.hyperledger.org/docs/core/releases/1.0/architecture/poet.html.Google Scholar
- GoChain. 2018. Proof of reputation. Retrieved from https://medium.com/gochain/proof-of-reputation-e37432420712.Google Scholar
- Evan Duffield and Daniel Dia. 2019. Dash: A privacy-centric cryptocurrency. Retrieved from https://whitepaperdatabase.com/wp-content/uploads/2017/09/Dash-Whitepaper.pdf.Google Scholar
- Serguei Popov. 2018. The tangle. Retrieved from https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf.Google Scholar
- Rafael Pass and Elaine Shi. 2017. The sleepy model of consensus. In Proceedings of the Advances in Cryptology Conference (ASIACRYPT’17). 380--409.Google ScholarCross Ref
- Kenji Saito and Yamada Hairoyuki. 2016. What's so different about blockchain? — Blockchain is a probabilistic state machine. In Proceedings of the IEEE 36th International Conference on Distributed Computing Systems Workshops. 168--175.Google ScholarCross Ref
- Miguel Castro and Barbara Liskov. 1999. Practical byzantine fault tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI’99). 173--186.Google ScholarDigital Library
- Demiro Massessi. 2018. Public vs private blockchain in a Nutshell. Retrieved from https://medium.com/coinmonks/public-vs-private-blockchain-in-a-nutshell-c9fe284fa39f.Google Scholar
- Paige Cabianca. 2018. What's the difference between public, private, and permissioned blockchains? Retrieved from https://medium.com/nakamo-to/whats-the-difference-between-a-public-and-a-private-blockchain-c08d6d1886a0.Google Scholar
- Zibin Zheng, Shaoan Xie, Hong Ning Dai, Xiangping Chen, and Huaimin Wang. 2018. Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14, 4 (2018), 352.Google ScholarCross Ref
- J. P. Morgan Chase 8 Co. 2016. Quorum Whitepaper. Retrieved from https://github.com/jpmorganchase/quorum-docs/blob/master/Quorum%20Whitepaper%20v0.1.pdf.Google Scholar
- ARK.io. 2019. ARK Ecosystem Whitepaper. Retrieved from https://ark.io/Whitepaper.pdf.Google Scholar
- Tom Rodgers. 2019. Ethereum classic price roaring just weeks after 51% attack. Retrieved from https://www.forbes.com/sites/tomrodgers1/2019/04/08/ethereum-classic-price-roaring-just-weeks-after-51-attack/#2906e2a6f7ef.Google Scholar
- Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security (CMS’99). 258--272.Google ScholarDigital Library
- Christopher Natoli and Vincent Gramoli. 2017. The balance attack or why forkable blockchains are ill-suited for consortium. In Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks. 579--590.Google ScholarCross Ref
- Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In Proceedings of the 24th USENIX Conference on Security (SEC’15). 129--144.Google ScholarDigital Library
- Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking bitcoin: Routing attacks on cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy. 375--392.Google ScholarCross Ref
- Joseph Bonneau. 2016. Why buy when you can rent? Bribery attacks on bitcoin-style consensus. In Proceedings of the International Conference on Financial Cryptography and Data Security. 19--26.Google ScholarCross Ref
- Johannes Göbel, Paul Keeler, Anthony E. Krzesinski, and Peter G. Taylor. 2016. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform. Eval. 104 (2016), 23--41.Google ScholarCross Ref
- Evangelos Deirmentzoglou, Georgios Papakyriakopoulos, and Constantinos Patsakis. 2019. A survey on long-range attacks for proof of stake protocols. IEEE Access 7 (2019), 28712--28725.Google ScholarCross Ref
- John R. Douceur. 2002. The Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’01). 251--260.Google ScholarCross Ref
- Pim Otte, Martijn de Vos, and Johan Pouwelse. 2017. TrustChain: A Sybil-resistant scalable blockchain. Fut. Gen. Comput. Syst. (2017). https://www.sciencedirect.com/science/article/abs/pii/S0167739X17318988?via%3Dihub.Google Scholar
- Brian Neil Levine, Clay Shields, and N. Boris Margolin. 2005. A survey of solutions to the Sybil attack. Retreived on April 05, 2019 from https://allquantor.at/blockchainbib/pdf/levine2006survey.pdf.Google Scholar
- Patrick Dai, Neil Mahi, Jordan Earls, and Alex Norta. 2017. Smart-contract value-transfer protocol on a distributed mobile application platform. Retrieved from https://web.archive.org/web/20190506095324/https://qtum.org/user/pages/01.home/Qtum%20whitepaper_en%20v0.7.pdf.Google Scholar
- Daira Hopwood, Sean Bowe, Taylor Hornby, and Nathan Wilcox. 2018. Zcash protocol specification. Retrieved from https://whitepaperdatabase.com/wp-content/uploads/2018/03/z-cash-zec-whitepaper.pdf.Google Scholar
- Howard Shrobe, David L. Shrier, and Alex Pentland. 2018. Enigma: Decentralized computation platform with guaranteed privacy. In New Solutions for Cybersecurity. Chapter 15, 504.Google Scholar
- Jonathan Heiss, Jan Eberhardt, and Stefan Tai. 2019. From oracles to trustworthy data on-chaining systems. Retrieved from https://www.redaktion.tu-berlin.de/fileadmin/fg308/publications/2019/Heiss-et-al-oracles_preprint.pdf.Google Scholar
- Neville Grech, Michael Kong, Anton Jurisevic, Lexi Brent, Bernhard Scholz, and Yannis Smaragdakis. 2018. MadMax: Surviving out-of-gas conditions in ethereum smart contracts. Proc. ACM Program. Lang. 2 (Oct. 2018), 1--27.Google ScholarDigital Library
- Maximilian Wöhrer and Uwe Zdun. 2018. Smart contracts: Security patterns in the ethereum ecosystem and solidity. In Proceedings of the International Workshop on Blockchain Oriented Software Engineering. 2--8.Google ScholarCross Ref
- Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2016. A survey of attacks on ethereum smart contracts. Retrieved from https://allquantor.at/blockchainbib/pdf/atzei2016survey.pdf.Google Scholar
- Xiangfu Zhao, Zhongyu Chen, Xin Chen, Yanxia Wang, and Changbing Tang. 2017. The DAO attack paradoxes in propositional logic. In Proceedings of the 4th International Conference on Systems and Informatics. 1743--1746. Retrieved from http://ieeexplore.ieee.org/document/8248566/.Google ScholarCross Ref
- Peter Vessenes. 2016. Ethereum griefing wallets: Send w/Throw Is Dangerous. Retrieved from https://vessenes.com/ethereum-griefing-wallets-send-w-throw-considered-harmful/.Google Scholar
- Niclas Kannengießer, Michelle Pfister, Malte Greulich, Sebastian Lins, and Ali Sunyaev. 2020. Bridges between islands: Cross-chain technology for distributed ledger technology. In Proceedings of the 53rd Hawaii International Conference on System Sciences.Google ScholarCross Ref
- Paolo Tasca and Claudio Tessone. 2019. A taxonomy of blockchain technologies: Principles of identification and classification. Ledger 4 (2019).Google Scholar
- Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, and Paul Rimba. 2017. A taxonomy of blockchain-based systems for architecture design. In Proceedings of the IEEE International Conference on Software Architecture. 243--252. Retrieved from http://ieeexplore.ieee.org/document/7930224/.Google ScholarCross Ref
- Seyoung Huh, Sangrae Cho, and Soohyung Kim. 2017. Managing IoT devices using blockchain platform. In Proceedings of the 19th International Conference on Advanced Communication Technology. 464--467.Google ScholarCross Ref
- Morgen E. Peck. 2017. Blockchain world—do you need a blockchain? This chart will tell you if the technology can solve your problem. IEEE Spectrum 54, 10 (2017), 38--60.Google ScholarDigital Library
- Andreas Unterweger, Fabian Knirsch, Christoph Leixnering, and Dominik Engel. 2018. Lessons learned from implementing a privacy-preserving smart contract in ethereum. In Proceedings of the 9th IFIP International Conference on New Technologies, Mobility and Security. 1--5.Google ScholarCross Ref
- Merve Can Kus Khalilov and Albert Levi. 2018. A survey on anonymity and privacy in bitcoin-like digital cash systems. IEEE Commun. Surv. Tutor. 20, 3 (2018), 1--44. https://ieeexplore.ieee.org/abstract/document/8325269Google ScholarCross Ref
- Bogdan Cristian Florea. 2018. Blockchain and internet of things data provider for smart applications. In Proceedings of the 7th Mediterranean Conference on Embedded Computing. 1--4.Google ScholarCross Ref
- Ripple. 2017. Solution overview. Retrieved from https://whitepaperdatabase.com/wp-content/uploads/2017/09/Ripple-XRP-Whitepaper.pdf.Google Scholar
- Runchao Han, Vincent Gramoli, and Xiwei Xu. 2018. Evaluating blockchains for IoT. In Proceedings of the 9th IFIP International Conference on New Technologies, Mobility and Security. 1--5.Google ScholarCross Ref
- Tien Tuan Anh Dinh, Ji Wang, Gang Chen, Rui Liu, Beng Chin Ooi, and Kian-Lee Tan. 2017. Blockbench: A framework for analyzing private blockchains. In Proceedings of the ACM International Conference on Management of Data (SIGMOD’17). 1085--1100.Google ScholarDigital Library
- Florian Gräbe, Niclas Kannengießer, Sebastian Lins, and Ali Sunyaev. 2020. Do not be fooled: Towards a holistic comparison of distributed ledger technology designs. In Proceedings of the 53th Hawaii Internantional Conference on System Sciences.Google ScholarCross Ref
- Odhran O'Donoghue, Anuraag A. Vazirani, David Brindley, and Edward Meinert. 2019. Design choices and trade-offs in health care blockchain implementations: Systematic review. J. Med. Internet Res. 21, 5 (2019), e12426.Google ScholarCross Ref
- Jan vom Brocke, Alexander Simons, Kai Riemer, Bjoern Niehaves, and Ralf Platfaut. 2015. Standing on the shoulders of giants: Challenges and recommendations of literature search in information systems research. Commun. AIS 37, 9 (2015), 205--224.Google Scholar
- Barbara Kitchenham, O. Pearl Brereton, David Budgen, Mark Turner, John Bailey, and Stephen Linkman. 2009. Systematic literature reviews in software engineering. Inf. Softw. Technol. 51, 1 (2009), 7--15.Google ScholarDigital Library
- Guy Paré, Marie Claude Trudel, Mirou Jaana, and Spyros Kitsiou. 2015. Synthesizing information systems knowledge: A typology of literature reviews. Inf. Manag. 52, 2 (2015), 183--199.Google ScholarCross Ref
- Jane Webster and Richard T. Watson. 2002. Analyzing the past to prepare for the future. MIS Quart. 26, 2 (2002), xiii--xxiii.Google ScholarDigital Library
- Gavin Wood. 2016. Polkadot. Retrieved from https://icowhitepapers.co/wp-content/uploads/PolkaDot-Whitepaper.pdf.Google Scholar
- Shilan Yang, Huaimin Wang, Wei Li, Wei Liu, and Xiang Fu. 2018. CVEM: A cross-chain value exchange mechanism. In Proceedings of the International Conference on Cloud Computing and Internet of Things. 80--85.Google ScholarDigital Library
- Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi. 2016. Town crier: An authenticated data feed for smart contracts. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 270--282.Google ScholarDigital Library
- Mary C. Lacity, Shaji Khan, Aihua Yan, and Leslie P. Willcocks. 2010. A review of the IT outsourcing empirical literature and future research directions. J. Inf. Technol. 25, 4 (2010), 395--433.Google ScholarCross Ref
- Mildred L. G. Shaw and Brian R. Gaines. 1989. Comparing conceptual structures: Consensus, conflict, correspondence, and contrast. Knowl. Acquis. 1, 4 (1989), 341--363.Google ScholarCross Ref
- Juliet M. Corbin and Anselm L. Strauss. 2015. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (4th ed.). SAGE Publications.Google Scholar
- Barney G. Glaser and Anselm L. Strauss. 2009. The Discovery of Grounded Theory: Strategies for Qualitative Research (4th ed.). Routledge.Google Scholar
- Martin Davis. 1982. Computability 8 Unsolvability. Dover.Google Scholar
- Mingjun Dai, Shengli Zhang, Hu Wang, and Shi Jin. 2018. A low storage room requirement framework for distributed ledger in blockchain. IEEE Access 6 (2018), 22970--22975.Google ScholarCross Ref
- NewsBTC. 2018. Increased SegWit Adoption for Bitcoin—Is Lightning Network Next? Retrieved from https://web.archive.org/web/20190410173449/https://www.newsbtc.com/2018/03/01/segwit-adoption-lightning-network-increases-bitcoin/.Google Scholar
- Deepak Puthal, Nisha Malik, Saraju P. Mohanty, Elias Kougianos, and Chi Yang. 2018. The blockchain as a decentralized security framework (future directions). IEEE Consum. Electron. Mag. 7, 2 (2018), 18--21.Google ScholarCross Ref
- Michael Coblenz. 2017. Obsidian: A safer blockchain programming language. In Proceedings of the 39th International Conference on Software Engineering Companion (ICSE-C’17). 97--99.Google ScholarDigital Library
- Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. 2016. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the IEEE Symposium on Security and Privacy. 839--858.Google ScholarCross Ref
- Ittai Anati, Shay Gueron, Simon P. Johnson, and Vincent R. Scarlata. 2014. Innovative technology for CPU Based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy.Google Scholar
- Oraclize. 2019. Oraclize documentary. Retrieved from https://provable.xyz/.Google Scholar
- Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, and Qiaoyan Wen. 2017. A survey on the security of blockchain systems. Fut. Gen. Comput. Syst. 107 (2017), 1--13. https://www.sciencedirect.com/science/article/abs/pii/S0167739X17318332.Google Scholar
- Matevž Pustišek and Andrej Kos. 2018. Approaches to front-end IoT application development for the ethereum blockchain. Proc. Comput. Sci. 129 (2018), 410--419.Google ScholarCross Ref
- Ioannis Chatzigiannakis, Apostolos Pyrgelis, Paul G. Spirakis, and Yannis C. Stamatiou. 2011. Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In Proceedings of the IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems. 715--720.Google Scholar
- Jan Henrik Ziegeldorf, Fred Grossmann, Martin Henze, Nicolas Inden, and Klaus Wehrle. 2015. CoinParty: Secure multi-party mixing of bitcoins. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY’15). 75--86.Google ScholarDigital Library
- Micha R. Hoffman. 2018. Can blockchains and linked data advance taxation. In Proceedings of the Web Conference (WWW’18). 1179--1182.Google ScholarDigital Library
- Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 3--16.Google ScholarDigital Library
- Jega Anish Dev. 2014. Bitcoin mining acceleration and performance quantification. In Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering. 1--6.Google Scholar
- Florian Tschorsch and Bjorn Scheuermann. 2016. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18, 3 (2016), 2084--2123.Google ScholarDigital Library
- Du Mingxiao, Ma Xiaofeng, Zhe Zhe, Wang Xiangwei, and Chen Qijun. 2017. A review on consensus algorithm of blockchain. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. 2567--2572.Google ScholarCross Ref
- Karim Jabbar and Pernille Bjørn. 2018. Infrastructural Grind: Introducing blockchain technology in the shipping domain. In Proceedings of the ACM Conference on Supporting Groupwork (GROUP’18). 297--308.Google ScholarDigital Library
- Tim Swanson. 2015. Consensus-as-a-service: A brief report on the emergence of permissioned, distributed ledger systems. Retrieved from https://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf.Google Scholar
- Stefano De Angelis, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, and Vladimiro Sassone. 2018. PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain. Retrieved from https://eprints.soton.ac.uk/415083/.Google Scholar
- Harish Sukhwani, José M. Martínez, Xiaolin Chang, Kishor S. Trivedi, and Andy Rindos. 2017. Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric). In Proceedings of the IEEE 36th Symposium on Reliable Distributed Systems. 253--255.Google ScholarCross Ref
- Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 31--42.Google ScholarDigital Library
- Dvora Dolev and H. R. Strong. 1982. Distributed commit with bounded waiting. Retrieved from https://www.cs.huji.ac.il/∼dolev//pubs/dist-commit.pdf.Google Scholar
- Rafael Pass and Elaine Shi. 2017. Rethinking large-scale consensus. In Proceedings of the IEEE 30th Computer Security Foundations Symposium. 115--129.Google ScholarCross Ref
- Seth Gilbert and Nancy Lynch. 2002. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News 33, 2 (2002), 51.Google ScholarDigital Library
- Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P’13). 1--10.Google ScholarCross Ref
- Artem Barger, Yacov Manevich, Benjamin Mandler, Vita Bortnikov, Gennady Laventman, and Gregory Chockler. 2017. Scalable communication middleware for permissioned distributed ledgers. In Proceedings of the 10th ACM International Systems and Storage Conference (SYSTOR’17). 23:1.Google ScholarDigital Library
- Frank Hofmann, Simone Wurster, Eyal Ron, and Moritz Böhmecke-Schwafert. 2017. The immutability concept of blockchains and benefits of early standardization. In ITU Kaleidoscope: Challenges for a Data-Driven Society. IEEE, 1--8.Google Scholar
- Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The bitcoin backbone protocol: Analysis and applications. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT’15). 281--310.Google ScholarCross Ref
- ISO. 1989. Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture. Retreived on June 10, 2018.Google Scholar
- Heiko Koziolek. 2011. Sustainability evaluation of software architectures: A systematic review. In Proceedings of the Joint ACM SIGSOFT Conference - QoSA and ACM SIGSOFT Symposium - ISARCS on Quality of Software Architectures - QoSA and Architecting Critical Systems-- (QoSA-ISARCS’11). 3.Google ScholarDigital Library
- Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, Sooyong Park, and Kari Smolander. 2016. Where is current research on blockchain technology? PLOS One 11, 10 (2016), 1--27.Google ScholarCross Ref
- Alin Tomescu and Srinivas Devadas. 2017. Catena: Efficient non-equivocation via bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy. 393--409.Google ScholarCross Ref
- Nitesh Emmadi and Harika Narumanchi. 2017. Reinforcing immutability of permissioned blockchains with keyless signatures’ infrastructure. In Proceedings of the 18th International Conference on Distributed Computing and Networking (ICDCN’17). 1--6.Google ScholarDigital Library
- Adam Back. 1997. A partial hash collision based postage scheme. Retrieved from http://www.hashcash.org/papers/announce.txt.Google Scholar
- Lukas Malina, Jan Hajny, Radek Fujdiak, and Jiri Hosek. 2016. On perspective of security and privacy-preserving solutions in the internet of things. Comput. Netw. 102 (2016), 83--95.Google ScholarDigital Library
- Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, and Hicham Lakhlef. 2018. Internet of things security: A top-down survey. Comput. Netw. 141 (2018), 199--221.Google ScholarCross Ref
- Daniel Abadi. 2012. Consistency tradeoffs in modern distributed database system design: CAP is only part of the story. Computer 45, 2 (2012), 37--42.Google ScholarDigital Library
- The Cryptocurrency Consultant. 2019. Ethereum 2.0 - Consensys Publishes Roadmap to Serenity. Medium. Retrieved December 10, 2019 from https://medium.com/altcoin-magazine/ethereum-2-0-consensys-publishes-roadmap-to-serenity-e1ce76fa34f2.Google Scholar
- Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, and Neeraj Kumar. 2019. A survey on privacy protection in blockchain system. J. Netw. Comput. Applic. 126 (2019), 45--58.Google ScholarCross Ref
- Nicolas van Saberhagen. 2013. CryptoNote v 2.0. Retrieved from https://cryptonote.org/whitepaper.pdf.Google Scholar
- Nicolas van Saberhagen. 2013. CryptoNote v 2.0. Retrieved from https://whitepaperdatabase.com/wp-content/uploads/2017/09/Monero-whitepaper.pdf.Google Scholar
- Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, and Nicolas Christin. 2018. An empirical analysis of traceability in the monero blockchain. Proc. Privacy Enhanc. Technol. 2018, 3 (2018).Google ScholarCross Ref
- The Zilliqa Team. 2017. The Zilliqa technical whitepaper. Retrieved from https://docs.zilliqa.com/whitepaper.pdf.Google Scholar
- Jack Lu, Boris Yang, Zane Liang, Ying Zhang, Demmon Shi, Eric Swartz, and Lizzie Lu. 2017. Wanchain. Retrieved from https://wanchain.org/files/Wanchain-Whitepaper-EN-version.pdf.Google Scholar
- Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, and Beng Chin Ooi. 2018. Untangling blockchain: A data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30, 7 (2018), 1--20.Google Scholar
- Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 17--30.Google ScholarDigital Library
- Seele. 2018. Seele whitepaper. Retrieved from http://seele.hk.ufileos.com/Seele_White_Paper_English_v3.1.pdf.Google Scholar
- Cindy Compert, Maurizio Luinetti, and Bertrand Portier. 2018. Blockchain and GDPR—How blockchain could address five areas associated with GDPR compliance. Retrieved on December 11, 2018 from https://www.ibm.com/downloads/cas/2EXR2XYP.Google Scholar
- Ashiq Anjum, Manu Sporny, and Alan Sill. 2017. Blockchain standards for compliance and trust. IEEE Cloud Comput. 4, 4 (2017), 84--90.Google ScholarCross Ref
- Josh Swihart, Benjamin Winston, and Sean Bowe. 2019. Zcash counterfeiting vulnerability successfully remediated. Retrieved from https://electriccoin.co/blog/zcash-counterfeiting-vulnerability-successfully-remediated/.Google Scholar
- Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson. 1985. Impossibility of distributed consensus with one faulty process. J. ACM 32, 2 (1985), 374--382.Google ScholarDigital Library
- L. Lamport and M. Massa. 2004. Cheap paxos. In Proceedings of the International Conference on Dependable Systems and Networks. 307--314.Google Scholar
- Diego Ongaro and John Ousterhout. 2016. In search of an understandable consensus algorithm (extended version). Retrieved from https://raft.github.io/raft.pdf.Google Scholar
- Vitalik Buterin. 2016. Chain interoperability [white paper]. Retrieved from http://www.r3cev.com/s/Chain-Interoperability-8g6f.pdf.Google Scholar
- Hai Jin, Jiang Xiao, and Xiaohai Dai (Eds.). 2018. Towards a novel architecture for enabling interoperability amongst multiple blockchains. In Proceedings of the IEEE 38th International Conference on Distributed Computing Systems.Google ScholarCross Ref
- Claudio Lima. 2018. Developing open and interoperable DLT/blockchain standards. Computer 51, 11 (2018), 106--111.Google ScholarDigital Library
- Shijun Liu, Bedir Tekinerdogan, Mikio Aoyama, Liang-Jie Zhang, Liping Deng, Huan Chen, and Jing Zeng (Eds.). 2018. Research on cross-chain technology based on sidechain and hash-locking. Retrieved from https://link.springer.com/content/pdf/10.1007%2F978-3-319-94340-4.pdf.Google Scholar
- Tobias Dehling, Sebastian Lins, and Ali Sunyaev. 2019. Security of critical information infrastructures. In Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace, Christian Reuter (Ed.). Springer, 319--339.Google Scholar
- Diego Marmsoler and Leo Eichhorn. 2018. Simulation-based analysis of blockchain architectures. Retrieved from http://rgdoi.net/10.13140/RG.2.2.19898.44481.Google Scholar
- Manuel Zander, Tom Waite, and Dominik Harz. 2018. DAGsim: Simulation of DAG-based distributed ledger protocols. ACM SIGMETRICS Perform. Eval. Rev. 46, 3 (2018), 118--121.Google ScholarDigital Library
- Xiwei Xu, Cesare Pautasso, Liming Zhu, Vincent Gramoli, Alexander Ponomarev, An Binh Tran, and Shiping Chen Chen. 2016. The blockchain as a software connector. In Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture. 182--191.Google ScholarCross Ref
- Youngjin Yoo. 2010. Computing in everyday life: A call for research on experiential computing. MIS Quarterly 34, 2 (2010), 213--231.Google ScholarCross Ref
Index Terms
- Trade-offs between Distributed Ledger Technology Characteristics
Recommendations
Applications of Distributed Ledger Technologies to the Internet of Things: A Survey
Distributed Ledger Technologies (DLTs) and blockchain systems have received enormous academic, government, and commercial interest in recent years. This article surveys the integration of DLTs within another life-changing technology, the Internet of ...
Online rating system development using blockchain-based distributed ledger technology
AbstractIn most websites, the online rating system provides the ratings of products and services to users. Lack of trust in data integrity and its manipulation has hindered fulfilling user satisfaction. Since existing online rating systems deal with a ...
Do We Really Need Another Blockchain Framework? A Case for a Legacy-friendly Distributed Ledger Implementation based on Java EE Web Technologies
WEBIST 2019: Proceedings of the 15th International Conference on Web Information Systems and TechnologiesCryptocurrencies, blockchain technology and smart contracts could fundamentally change the way how financial products and financial services are implemented and operated. While many frameworks for implementing such blockchain applications already exist, ...
Comments