Research on the Optimization Model of Blockchain Hierarchical Proxy
In the decentralized blockchain, each node stores the same data copy that costs a lot of repeated storage space to store valuable information. It makes storage efficiency insufficient. Meanwhile, each node needs to exchange the huge messages to create and verify the block. With rapid increasing in t...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9584874/ |
_version_ | 1819121725571334144 |
---|---|
author | Wang Junlu Liu Qiang Song Baoyan |
author_facet | Wang Junlu Liu Qiang Song Baoyan |
author_sort | Wang Junlu |
collection | DOAJ |
description | In the decentralized blockchain, each node stores the same data copy that costs a lot of repeated storage space to store valuable information. It makes storage efficiency insufficient. Meanwhile, each node needs to exchange the huge messages to create and verify the block. With rapid increasing in the number of communication nodes and communication frequency, it has caused a large network load. In order to further improve the storage efficiency and decrease the network load, a hierarchical proxy model is proposed. Firstly, designing a hierarchical proxy model which accurately divides normal nodes and proxy node groups, and it performs directional division of tasks for different nodes. Secondly, in a small-scale management cluster composed of proxy nodes, cluster failure priority classification can effectively deal with the failure of proxy nodes. Through the hierarchical storage mode, the block header and body data are separated, and it uses global or local method to store. The hierarchical operation mode makes use of idle resources to make transaction verification and block creation run in parallel. On this basis, the proxy model adopts delay correction strategy and concentrated multiple correction strategy to further reduce the communication loss. Through malicious node blacklist, the node with malicious behavior is added to the blacklist, and it prevents the node from further making evil. Finally, the simulation experiments show that the hierarchical proxy model effectively resists malicious behaviors, reduces network load and has great advantages in terms of data storage efficiency. |
first_indexed | 2024-12-22T06:41:08Z |
format | Article |
id | doaj.art-353ac63241094096981fa16def5677f0 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-22T06:41:08Z |
publishDate | 2021-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-353ac63241094096981fa16def5677f02022-12-21T18:35:26ZengIEEEIEEE Access2169-35362021-01-01914432714434010.1109/ACCESS.2021.31221329584874Research on the Optimization Model of Blockchain Hierarchical ProxyWang Junlu0https://orcid.org/0000-0001-5966-335XLiu Qiang1https://orcid.org/0000-0002-0046-7001Song Baoyan2https://orcid.org/0000-0003-4285-578XSchool of Information, Liaoning University, Shenyang, ChinaSchool of Information, Liaoning University, Shenyang, ChinaSchool of Information, Liaoning University, Shenyang, ChinaIn the decentralized blockchain, each node stores the same data copy that costs a lot of repeated storage space to store valuable information. It makes storage efficiency insufficient. Meanwhile, each node needs to exchange the huge messages to create and verify the block. With rapid increasing in the number of communication nodes and communication frequency, it has caused a large network load. In order to further improve the storage efficiency and decrease the network load, a hierarchical proxy model is proposed. Firstly, designing a hierarchical proxy model which accurately divides normal nodes and proxy node groups, and it performs directional division of tasks for different nodes. Secondly, in a small-scale management cluster composed of proxy nodes, cluster failure priority classification can effectively deal with the failure of proxy nodes. Through the hierarchical storage mode, the block header and body data are separated, and it uses global or local method to store. The hierarchical operation mode makes use of idle resources to make transaction verification and block creation run in parallel. On this basis, the proxy model adopts delay correction strategy and concentrated multiple correction strategy to further reduce the communication loss. Through malicious node blacklist, the node with malicious behavior is added to the blacklist, and it prevents the node from further making evil. Finally, the simulation experiments show that the hierarchical proxy model effectively resists malicious behaviors, reduces network load and has great advantages in terms of data storage efficiency.https://ieeexplore.ieee.org/document/9584874/Hierarchical proxysmall-scale management clusterfault priority classificationproxy model optimization strategymalicious node blacklist |
spellingShingle | Wang Junlu Liu Qiang Song Baoyan Research on the Optimization Model of Blockchain Hierarchical Proxy IEEE Access Hierarchical proxy small-scale management cluster fault priority classification proxy model optimization strategy malicious node blacklist |
title | Research on the Optimization Model of Blockchain Hierarchical Proxy |
title_full | Research on the Optimization Model of Blockchain Hierarchical Proxy |
title_fullStr | Research on the Optimization Model of Blockchain Hierarchical Proxy |
title_full_unstemmed | Research on the Optimization Model of Blockchain Hierarchical Proxy |
title_short | Research on the Optimization Model of Blockchain Hierarchical Proxy |
title_sort | research on the optimization model of blockchain hierarchical proxy |
topic | Hierarchical proxy small-scale management cluster fault priority classification proxy model optimization strategy malicious node blacklist |
url | https://ieeexplore.ieee.org/document/9584874/ |
work_keys_str_mv | AT wangjunlu researchontheoptimizationmodelofblockchainhierarchicalproxy AT liuqiang researchontheoptimizationmodelofblockchainhierarchicalproxy AT songbaoyan researchontheoptimizationmodelofblockchainhierarchicalproxy |