Decentrally-Consented-Server-Based Blockchain System for Universal Types of Data

The rapid increase of data makes the third party cloud storage more and more popular. However, decentralization, immutability, and integrity characteristics of Blockchain systems are making Blockchain systems another potential platform for data storage. Using the Blockchain system for data storage will eliminate the dependency on any central authority thus increasing the data security, privacy, data retention probability, and eliminate the single point of failure. Most of the Blockchain consensus mechanism have been developed over the decade are about storing the transactional data only. In this paper, we present a novel idea of the Blockchain consensus system for universal types of data. Our proposed consensus mechanism is designed in such a way that, most of the devices or entities can participate in the mechanism by doing low computational validation work. To add an extra layer of security we introduce a two-step validation process in this consensus mechanism. The probabilistic fair rotation of the block creator in our consensus mechanism will significantly reduce the probability of centralization which is a common issue in most of operating Blockchain consensus mechanism based on one user/group winning strategy. Moreover, we analyze our consensus mechanism using game theory and queuing theory.

[1]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[2]  Andrew McLennan,et al.  Gambit: Software Tools for Game Theory , 2006 .

[3]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[4]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[5]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[6]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[7]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[8]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[9]  Seny Kamara,et al.  Proofs of Storage: Theory, Constructions and Applications , 2013, CAI.

[10]  Christos G. Cassandras,et al.  Introduction to Discrete Event Systems , 1999, The Kluwer International Series on Discrete Event Dynamic Systems.

[11]  Juan Benet,et al.  IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.

[12]  Shawn Wilkinson,et al.  Storj A Peer-to-Peer Cloud Storage Network , 2014 .

[13]  Robert Wilson,et al.  A global Newton method to compute Nash equilibria , 2003, J. Econ. Theory.

[14]  Tyler Moore,et al.  Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.

[15]  A. Leon-Garcia,et al.  Probability, statistics, and random processes for electrical engineering , 2008 .