Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Node synchronization is essential for the stability of the Bitcoin network. Critics have raised doubts about the ability of a new node to quickly and efficiently synchronize with the Bitcoin network and alleviate the storage pressure from existing full nodes to stockpile new data. Basic pruning and other techniques have been explored to address these concerns but have been insufficient to reduce node synchronization delay and effectively suppress the growth of synchronized data. In this study, we propose SnapshotPrune, a novel pruning and synchronization protocol that achieves fast node bootstrapping in the Bitcoin blockchain. Real Bitcoin historical data are leveraged to measure the synchronization time and monitor the network traffic during node bootstrapping. The protocol requires data downloads that are 99.70% less than Bitcoin Core, 81% less than CoinPrune, and 60% less than SnapshotSave, thereby saving 97.23% of download time. Findings show that the proposed design enhances the storage efficiency and reduces the node synchronization delay compared with existing techniques. We hypothesize that the efficiency of this protocol increases with the block height.
X. Wang, X. Zha, W. Ni, R. P. Liu, Y. J. Guo, X. Niu, and K. Zheng, Survey on blockchain for internet of things, Comput. Commun., vol. 136, pp. 10–29, 2019.
Y. Pu, T. Xiang, C. Hu, A. Alrawais, and H. Yan, An efficient blockchain-based privacy preserving scheme for vehicular social networks, Inf. Sci., vol. 540, pp. 308–324, 2020.
A. S. Patil, R. Hamza, A. Hassan, N. Jiang, H. Yan, and J. Li, Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts, Comput. Secur., vol. 97, p. 101958, 2020.
H. Yuan, X. Chen, J. Wang, J. Yuan, H. Yan, and W. Susilo, Blockchain-based public auditing and secure deduplication with fair arbitration, Inf. Sci., vol. 541, pp. 409–425, 2020.
G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Proj. Yellow Paper, vol. 151, pp. 1–32, 2014.
R. Matzutt, B. Kalde, J. Pennekamp, A. Drichel, M. Henze, and K. Wehrl, CoinPrune: Shrinking bitcoin’s blockchain retrospectively, IEEE Trans. Netw. Serv. Manage., vol. 18, no. 3, pp. 3064–3078, 2021.
J. Hellings and M. Sadoghi, ByShard: Sharding in a byzantine environment, Proc. VLDB Endow., vol. 14, no. 11, pp. 2230–2243, 2021.
S. Li, M. Yu, C. S. Yang, A. S. Avestimehr, S. Kannan, and P. Viswanath, PolyShard: Coded sharding achieves linearly scaling efficiency and security simultaneously, IEEE Trans. Inform. Forensics Secur., vol. 16, pp. 249–261, 2021.
X. Feng, J. Ma, Y. Miao, Q. Meng, X. Liu, Q. Jiang, and H. Li, Pruneable sharding-based blockchain protocol, Peer-to-Peer Netw. Appl., vol. 12, no. 4, pp. 934–950, 2019.
J. Cai, H. Fu, and Y. Liu, Deep reinforcement learning-based multitask hybrid computing offloading for multiaccess edge computing, Int. J. Intell. Syst., vol. 37, no. 9, pp. 6221–6243, 2022.
W. Li, Y. Wang, Z. Jin, K. Yu, J. Li, and Y. Xiang, Challenge-based collaborative intrusion detection in software-defined networking: An evaluation, Digital Commun. Netw., vol. 7, no. 2, pp. 257–263, 2021.
T. Li, W. Chen, Y. Tang, and H. Yan, A homomorphic network coding signature scheme for multiple sources and its application in IoT, Secur. Commun. Netw., vol. 2018, p. 9641273, 2018.
Q. Chen, C. Tang, and Z. Lin, Efficient explicit constructions of multipartite secret sharing schemes, IEEE Trans. Inform. Theory, vol. 68, no. 1, pp. 601–631, 2022.
Q. Chen, C. Tang, and Z. Lin, Compartmented secret sharing schemes and locally repairable codes, IEEE Trans. Commun., vol. 68, no. 10, pp. 5976–5987, 2020.
Q. Chen, C. Tang, and Z. Lin, Efficient explicit constructions of compartmented secret sharing schemes, Des. Codes Cryptogr., vol. 87, no. 12, pp. 2913–2940, 2019.
K. Mo, W. Tang, J. Li, and X. Yuan, Attacking deep reinforcement learning with decoupled adversarial policy, IEEE Trans. Dependable Secure Comput., vol. 20, no. 1, pp. 758–768, 2023.
F. Wang, Y. Li, F. Liao, and H. Yan, An ensemble learning based prediction strategy for dynamic multi-objective optimization, Appl. Soft Comput., vol. 96, p. 106592, 2020.
W. Tang, B. Li, M. Barni, J. Li, and J. Huang, An automatic cost learning framework for image steganography using deep reinforcement learning, IEEE Trans. Inform. Forensics Secur., vol. 16, pp. 952–967, 2021.
788
Views
126
Downloads
1
Crossref
0
Web of Science
1
Scopus
0
CSCD
Altmetrics
The articles published in this open access journal are distributed under the terms of theCreative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).