Blockchain Systems, Technologies, and Applications: A Methodology Perspective

In the past decade, blockchain has shown a promising vision greatly to build the trust without any powerful third party in a secure, decentralized and salable manner. However, due to the wide application and future development from cryptocurrency to Internet of Things, blockchain is an extremely complex system enabling integration with mathematics, finance, computer science, communication and network engineering, etc. As a result, it is a challenge for engineer, expert and researcher to fully understand the blockchain process in a systematic view from top to down. First, this article introduces how blockchain works, the research activity and challenge, and illustrates the roadmap involving the classic methodology with typical blockchain use cases and topics. Second, in blockchain system, how to adopt stochastic process, game theory, optimization, machine learning and cryptography to study blockchain running process and design blockchain protocol/algorithm are discussed in details. Moreover, the advantage and limitation using these methods are also summarized as the guide of future work to further considered. Finally, some remaining problems from technical, commercial and political views are discussed as the open issues. The main findings of this article will provide an overview in a methodology perspective to study theoretical model for blockchain fundamentals understanding, design network service for blockchain-based mechanisms and algorithms, as well as apply blockchain for Internet of Things, etc.

[1]  Lei Zhang,et al.  How Much Communication Resource is Needed to Run a Wireless Blockchain Network? , 2021, IEEE Network.

[2]  Miguel Correia,et al.  A Survey on Blockchain Interoperability: Past, Present, and Future Trends , 2020, ACM Comput. Surv..

[3]  Shaveta Bhatia,et al.  Ethereum , 2021, Blockchain for Business.

[4]  W. Buchanan,et al.  BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond , 2020, IEEE Internet of Things Journal.

[5]  Mohamed Amine Ferrag,et al.  DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids , 2020, IEEE Transactions on Engineering Management.

[6]  Xinghuo Yu,et al.  Cooperative Mining in Blockchain Networks With Zero-Determinant Strategies , 2020, IEEE Transactions on Cybernetics.

[7]  Ke Xu,et al.  Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks , 2020, IEEE Transactions on Vehicular Technology.

[8]  Vallipuram Muthukkumarasamy,et al.  A survey on blockchain-based platforms for IoT use-cases , 2020, The Knowledge Engineering Review.

[9]  Abdulsalam Yassine,et al.  Blockchain for smart homes: Review of current trends and research challenges , 2020, Comput. Electr. Eng..

[10]  Keke Gai,et al.  Blockchain Meets Cloud Computing: A Survey , 2020, IEEE Communications Surveys & Tutorials.

[11]  F. Richard Yu,et al.  Joint Optimization of Radio and Computational Resources Allocation in Blockchain-Enabled Mobile Edge Computing Systems , 2020, IEEE Transactions on Wireless Communications.

[12]  Paulo Valente Klaine,et al.  Blockchain-enabled Resource Management and Sharing for 6G Communications , 2020, Digit. Commun. Networks.

[13]  Hai Jin,et al.  Towards a Trust-Enhanced Blockchain P2P Topology for Enabling Fast and Reliable Broadcast , 2020, IEEE Transactions on Network and Service Management.

[14]  David Mohaisen,et al.  Exploring the Attack Surface of Blockchain: A Comprehensive Survey , 2020, IEEE Communications Surveys & Tutorials.

[15]  N. G. J. Dias,et al.  A Survey on Blockchain Technology Concepts, Applications, and Issues , 2020, SN Computer Science.

[16]  Song Guo,et al.  Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System , 2020, IEEE Transactions on Industrial Informatics.

[17]  John G. Brainard,et al.  Atomic Crosschain Transactions White Paper , 2020, ArXiv.

[18]  Victor C. M. Leung,et al.  Blockchain and Machine Learning for Communications and Networking Systems , 2020, IEEE Communications Surveys & Tutorials.

[19]  Xiangjian He,et al.  Security & Privacy in IoT Using Machine Learning & Blockchain: Threats & Countermeasures , 2020, ArXiv.

[20]  A. Elwalid,et al.  Stability and Scalability of Blockchain Systems , 2020, Proc. ACM Meas. Anal. Comput. Syst..

[21]  Hao Xu,et al.  RAFT Based Wireless Blockchain Networks in the Presence of Malicious Jamming , 2020, IEEE Wireless Communications Letters.

[22]  Mugen Peng,et al.  A Distributed Game Theoretic Approach for Blockchain-based Offloading Strategy , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[23]  Mohammad A. Hoque,et al.  Blockchain Consensus Algorithms: A Survey , 2020, 2001.07091.

[24]  Ren Ping Liu,et al.  Survey: Sharding in Blockchains , 2020, IEEE Access.

[25]  Li Jiang,et al.  Joint Transaction Relaying and Block Verification Optimization for Blockchain Empowered D2D Communication , 2020, IEEE Transactions on Vehicular Technology.

[26]  Dinh C. Nguyen,et al.  Blockchain for 5G and Beyond Networks: A State of the Art Survey , 2019, J. Netw. Comput. Appl..

[27]  Ning Zhang,et al.  A Survey of Distributed Consensus Protocols for Blockchain Networks , 2019, IEEE Communications Surveys & Tutorials.

[28]  Seong-Lyun Kim,et al.  Blockchained On-Device Federated Learning , 2018, IEEE Communications Letters.

[29]  Attila Kertesz,et al.  A Survey on Blockchain-Fog Integration Approaches , 2020, IEEE Access.

[30]  Raghvinder S. Sangwan,et al.  Architectural Considerations for Blockchain Based Systems for Financial Transactions , 2020 .

[31]  Moses Dogonyaro Noel,et al.  Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency , 2019, 2019 15th International Conference on Electronics, Computer and Computation (ICECCO).

[32]  Abdelhakim Senhaji Hafid,et al.  Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning , 2019, ArXiv.

[33]  Seonggeun Kim,et al.  Mining Pool Manipulation in Blockchain Network Over Evolutionary Block Withholding Attack , 2019, IEEE Access.

[34]  Zhigang Jin,et al.  Charging Guiding Strategy for Electric Taxis Based on Consortium Blockchain , 2019, IEEE Access.

[35]  Jian Weng,et al.  Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks , 2019, IEEE Transactions on Vehicular Technology.

[36]  Myung-Sup Kim,et al.  Block Analysis in Bitcoin System Using Clustering with Dimension Reduction , 2019, 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS).

[37]  Ke Zhang,et al.  Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things , 2019, IEEE Network.

[38]  F. Richard Yu,et al.  A Survey on the Scalability of Blockchain Systems , 2019, IEEE Network.

[39]  Zahoor Ahmed Alizai,et al.  Blockchain Based Anonymous Voting System Using zkSNARKs , 2019, 2019 International Conference on Applied and Engineering Mathematics (ICAEM).

[40]  Lei Zhang,et al.  On the Viable Area of Wireless Practical Byzantine Fault Tolerance (PBFT) Blockchain Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[41]  Yingshu Li,et al.  Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[42]  Yan Zhou,et al.  zk-AuthFeed: How to Feed Authenticated Data into Smart Contract with Zero Knowledge , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[43]  Elisa Bertino,et al.  Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[44]  Xiaohui Gu,et al.  FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[45]  Zièd Choukair,et al.  Anomaly Detection Model Over Blockchain Electronic Transactions , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[46]  Hayri Sever,et al.  Securing Blockchain Shards By Using Learning Based Reputation and Verifiable Random Functions , 2019, 2019 International Symposium on Networks, Computers and Communications (ISNCC).

[47]  Shigeng Zhang,et al.  Privacy-Protected Blockchain System , 2019, 2019 20th IEEE International Conference on Mobile Data Management (MDM).

[48]  Zhongcheng Li,et al.  Privacy protection for blockchains with account and multi-asset model , 2019, China Communications.

[49]  Xiuzhen Cheng,et al.  NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce , 2019, IEEE Internet of Things Journal.

[50]  Xinhua Ling,et al.  Maximizing the System Energy Efficiency in the Blockchain Based Internet of Things , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[51]  Shahid Mumtaz,et al.  When Internet of Things Meets Blockchain: Challenges in Distributed Consensus , 2019, IEEE Network.

[52]  Laurent Njilla,et al.  Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[53]  Victor C. M. Leung,et al.  Deep Reinforcement Learning Based Performance Optimization in Blockchain-Enabled Internet of Vehicle , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[54]  Dejun Yang,et al.  CheaPay: An Optimal Algorithm for Fee Minimization in Blockchain-Based Payment Channel Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[55]  Martin B. H. Weiss,et al.  On the Application of Blockchains to Spectrum Management , 2019, IEEE Transactions on Cognitive Communications and Networking.

[56]  Ying-Chang Liang,et al.  A Survey on Blockchain: A Game Theoretical Perspective , 2019, IEEE Access.

[57]  Raylin Tso,et al.  An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications , 2019, 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON).

[58]  Saikat Mondal,et al.  Blockchain Inspired RFID-Based Information Architecture for Food Supply Chain , 2019, IEEE Internet of Things Journal.

[59]  Lei Zhang,et al.  Blockchain-Enabled Wireless Internet of Things: Performance Analysis and Optimal Communication Node Deployment , 2019, IEEE Internet of Things Journal.

[60]  M Harikrishnan,et al.  Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network , 2019, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).

[61]  Shen Wang,et al.  Protecting Data Privacy for Permissioned Blockchains using Identity-Based Encryption , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).

[62]  Kai-Kit Wong,et al.  Blockchain-Empowered Decentralized Storage in Air-to-Ground Industrial Networks , 2019, IEEE Transactions on Industrial Informatics.

[63]  Haipeng Yao,et al.  Resource Trading in Blockchain-Based Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.

[64]  F. Richard Yu,et al.  A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[65]  Xiaodong Lin,et al.  Anonymous Reputation System for IIoT-Enabled Retail Marketing Atop PoS Blockchain , 2019, IEEE Transactions on Industrial Informatics.

[66]  F. Richard Yu,et al.  Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[67]  Vishal Sharma,et al.  An Energy-Efficient Transaction Model for the Blockchain-Enabled Internet of Vehicles (IoV) , 2018, IEEE Communications Letters.

[68]  Ying-Chang Liang,et al.  Joint Transaction Transmission and Channel Selection in Cognitive Radio Based Blockchain Networks: A Deep Reinforcement Learning Approach , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[69]  Mohammed Samaka,et al.  Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.

[70]  Dong In Kim,et al.  Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory , 2018, IEEE Transactions on Vehicular Technology.

[71]  Mohamed Amine Ferrag,et al.  Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.

[72]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.

[73]  Jiaheng Wang,et al.  Blockchain Radio Access Network (B-RAN): Towards Decentralized Secure Radio Access Paradigm , 2019, IEEE Access.

[74]  Ladislav Hluchý,et al.  Machine Learning and Deep Learning frameworks and libraries for large-scale data mining: a survey , 2019, Artificial Intelligence Review.

[75]  Liang Xiao,et al.  Learning Based Security for VANET with Blockchain , 2018, 2018 IEEE International Conference on Communication Systems (ICCS).

[76]  Jiajun Shi,et al.  Optimal Multi-access Computation Offloading for Mobile Blockchain , 2018, 2018 IEEE International Conference on Communication Systems (ICCS).

[77]  Yang Zhang,et al.  Cyber Risk Management with Risk Aware Cyber-Insurance in Blockchain Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[78]  Sharath Yaji,et al.  Privacy Preserving in Blockchain Based on Partial Homomorphic Encryption System for Ai Applications , 2018, 2018 IEEE 25th International Conference on High Performance Computing Workshops (HiPCW).

[79]  A. Stephen Morse,et al.  Analysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[80]  Bei Wang,et al.  Learning to Classify Blockchain Peers According to Their Behavior Sequences , 2018, IEEE Access.

[81]  Tsuyoshi Idé,et al.  Collaborative Anomaly Detection on Blockchain from Noisy Sensor Data , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).

[82]  Kishor S. Trivedi,et al.  Performance Modeling of Hyperledger Fabric (Permissioned Blockchain Network) , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).

[83]  Yining Hu,et al.  Blockchain-based Smart Contracts - Applications and Challenges , 2018 .

[84]  Victor C. M. Leung,et al.  Computation Offloading and Content Caching in Wireless Blockchain Networks With Mobile Edge Computing , 2018, IEEE Transactions on Vehicular Technology.

[85]  Jinhong Yang,et al.  General Data Protection Regulation Complied Blockchain Architecture for Personally Identifiable Information Management , 2018, 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE).

[86]  James Brown,et al.  Blockchained Post-Quantum Signatures , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[87]  Somdip Dey,et al.  Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory: A Proof of Work , 2018, 2018 10th Computer Science and Electronic Engineering (CEEC).

[88]  R. Saravanan,et al.  A State of Art Techniques on Machine Learning Algorithms: A Perspective of Supervised Learning Approaches in Data Classification , 2018, 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).

[89]  Juanjuan Li,et al.  Transaction Queuing Game in Bitcoin BlockChain , 2018, 2018 IEEE Intelligent Vehicles Symposium (IV).

[90]  Leandros Tassiulas,et al.  Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[91]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[92]  Jiayu Zhou,et al.  EdgeChain: Blockchain-based Multi-vendor Mobile Edge Application Placement , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).

[93]  Dusit Niyato,et al.  Evolutionary Game for Mining Pool Selection in Blockchain Networks , 2017, IEEE Wireless Communications Letters.

[94]  Dusit Niyato,et al.  Optimal Auction for Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach , 2017, 2018 IEEE International Conference on Communications (ICC).

[95]  Dusit Niyato,et al.  Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).

[96]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[97]  Ahmet M. Kondoz,et al.  Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption , 2017, 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[98]  Tian Feng,et al.  The multimedia blockchain: A distributed and tamper-proof media transaction framework , 2017, 2017 22nd International Conference on Digital Signal Processing (DSP).

[99]  Liang Xiao,et al.  Game theoretic study on blockchain based secure edge networks , 2017, 2017 IEEE/CIC International Conference on Communications in China (ICCC).

[100]  Mohsen Guizani,et al.  MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain , 2017, IEEE Access.

[101]  Chen Xin,et al.  Zero-determinant strategy for the algorithm optimize of blockchain PoW consensus , 2017, 2017 36th Chinese Control Conference (CCC).

[102]  Shin'ichiro Matsuo,et al.  Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[103]  Bram van Ginneken,et al.  A survey on deep learning in medical image analysis , 2017, Medical Image Anal..

[104]  Antorweep Chakravorty,et al.  Ushare: user controlled social media based on blockchain , 2017, IMCOM.

[105]  Blaise Agüera y Arcas,et al.  Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.

[106]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[107]  M. Kubát An Introduction to Machine Learning , 2017, Springer International Publishing.

[108]  Ajoy Kumar Khan,et al.  Performance evaluation of RSA and Elliptic Curve Cryptography , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[109]  Steven Lee,et al.  Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods , 2016, ArXiv.

[110]  Fei-Yue Wang,et al.  Towards blockchain-based intelligent transportation systems , 2016, 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC).

[111]  Heng-Tze Cheng,et al.  Wide & Deep Learning for Recommender Systems , 2016, DLRS@RecSys.

[112]  Daniel Kraft,et al.  Difficulty control for blockchain-based consensus systems , 2016, Peer-to-Peer Netw. Appl..

[113]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[114]  Phillipp Kaestner,et al.  Linear And Nonlinear Programming , 2016 .

[115]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[116]  Ghassan O. Karame,et al.  Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.

[117]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[118]  S. Popov The Tangle , 2015 .

[119]  Goutam Sanyal,et al.  A comparative survey of Symmetric and Asymmetric Key Cryptography , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[120]  L. Deng A tutorial survey of architectures, algorithms, and applications for deep learning – ERRATUM , 2014, APSIPA Transactions on Signal and Information Processing.

[121]  Li Deng,et al.  A tutorial survey of architectures, algorithms, and applications for deep learning , 2014, APSIPA Transactions on Signal and Information Processing.

[122]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[123]  Csaba Szepesvári,et al.  Reinforcement Learning Algorithms for MDPs , 2011 .

[124]  Derek C. Rose,et al.  Deep Machine Learning - A New Frontier in Artificial Intelligence Research [Research Frontier] , 2010, IEEE Computational Intelligence Magazine.

[125]  François Baccelli,et al.  Stochastic geometry and wireless networks , 2009 .

[126]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[127]  Jon Atli Benediktsson,et al.  Fusion of Support Vector Machines for Classification of Multisensor Data , 2007, IEEE Transactions on Geoscience and Remote Sensing.

[128]  H. Hindi A tutorial on convex optimization II: duality and interior point methods , 2006, 2006 American Control Conference.

[129]  Alex Biryukov,et al.  Data Encryption Standard (DES) , 2005, Encyclopedia of Cryptography and Security.

[130]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[131]  Alan Mcginnis,et al.  THE KILLER APPLICATION , 2003 .

[132]  E. Damme,et al.  Non-Cooperative Games , 2000 .

[133]  Alfred Menezes,et al.  Elliptic Curves and Cryptography , 1999 .

[134]  T. Mattfeldt Stochastic Geometry and Its Applications , 1996 .

[135]  Andrew W. Moore,et al.  Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..

[136]  Herbert A. Simon,et al.  Applications of machine learning and rule induction , 1995, CACM.

[137]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[138]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[139]  Gustavus J. Simmons,et al.  Symmetric and Asymmetric Encryption , 1979, CSUR.

[140]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[141]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.