ChapterPDF Available

Data Storage in the Decentralized World: Blockchain and Derivatives

Authors:
  • Hezârfen Havacılık ve Uzay Teknolojileri Enstitüsü

Abstract and Figures

We have entered an era where the importance of decentralized solutions has become more obvious. Blockchain technology and its derivatives are distributed ledger technologies that keep the registry of data between peers of a network. This ledger is secured within a successive over looping cryptographic chain. The accomplishment of the Bitcoin cryptocurrency proved that blockchain technology and its derivatives could be used to eliminate intermediaries and provide security for cyberspace. However, there are some challenges in the implementation of blockchain technology. This chapter first explains the concept of blockchain technology and the data that we can store therein. The main advantage of blockchain is the security services that it provides. This section continues by describing these services.. The challenges of blockchain; blockchain anomalies, energy consumption, speed, scalability, interoperability, privacy and cryptology in the age of quantum computing are described. Selected solutions for these challenges are given. Remarkable derivatives of blockchain, which use different solutions (directed acyclic graph, distributed hash table, gossip consensus protocol) to solve some of these challenges are described. Then the data storage in blockchain and evolving data solutions are explained. The comparison of decentralized solutions with the lcentralized database systems is given. A multi-platform interoperable scalable architecture (MPISA) is proposed. In the conclusion we include the evolution assumptions of data storage in a decentralized world.
Content may be subject to copyright.
CHAPTER 3
DATA STORAGE IN THE
DECENTRALIZED WORLD:
BLOCKCHAIN AND DERIVATIVES
Enis KARAARSLAN*, Enis KONACAKLI**
*Assistant Professor, Mugla Sitki Kocman University, Department of Computer Engineering, Mugla, Turkey.
E-mail: enis.karaarslan@mu.edu.tr
**Eskisehir Technical University, Department of Computer Engineering, Eskisehir, Turkey.
E-mail: enisk@eskisehir.edu.tr
DOI: 10.26650/B/ET06.2020.011.03
Abstract
We have entered an era where the importance of decentralized solutions has become more obvious. Blockchain
technology and its derivatives are distributed ledger technologies that keep the registry of data between peers of a
network. This ledger is secured within a successive over looping cryptographic chain. The accomplishment of the
Bitcoin cryptocurrency proved that blockchain technology and its derivatives could be used to eliminate
intermediaries and provide security for cyberspace. However, there are some challenges in the implementation of
blockchain technology. This chapter first explains the concept of blockchain technology and the data that we can
store therein. The main advantage of blockchain is the security services that it provides. This section continues by
describing these services.. The challenges of blockchain; blockchain anomalies, energy consumption, speed,
scalability, interoperability, privacy and cryptology in the age of quantum computing are described. Selected
solutions for these challenges are given. Remarkable derivatives of blockchain, which use different solutions
(directed acyclic graph, distributed hash table, gossip consensus protocol) to solve some of these challenges are
described. Then the data storage in blockchain and evolving data solutions are explained. The comparison of
decentralized solutions with the lcentralized database systems is given. A multi-platform interoperable scalable
architecture (MPISA) is proposed. In the conclusion we include the evolution assumptions of data storage in a
decentralized world.
Keywords: Data, Data storage, Distributed ledger technology, Security, Cryptology, Blockchain, Scalability,
Blockchain derivatives, Directed acyclic graph, Gossip consensus protocol, Sidechain
WHO RUNS THE WORLD: DATA
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES38
1. Introduction
We are now entering an era where people seek solutions for eliminating intermediaries.
The processes can be made faster, while they became less bureaucratic. These solutions can
be possible with decentralized solutions; blockchain technology and its derivatives. We mean
the “blockchain frameworks” which implement this technology, when we use the term
“blockchain technology”.
Decentralized solutions are important, as they establish trust without using any intermediary.
They do not depend on a central node and are more fault-tolerant and resistant to attacks than
traditional solutions. These solutions work as peer-to-peer (P2P), which allows direct
communication between peers via the Internet (Karaarslan & Adiguzel, 2018). BitTorrent is one
of the most successful implementations of the P2P file-sharing protocol (Alves et al., 2018).
Decentralized solutions can be used to eliminate intermediaries like banks, notary, etc.
Bitcoin (BTC) cryptocurrency is a working example of how it can be done. As described in
(Brennan et.al, 2018), “cryptocurrencies are only the beginning”. Autonomous codes are
devised to make the processes autonomous and work without intermediaries. Decentralized
applications (Dapp) allow us to have answers within a distributed and secured network
(Karaarslan & Adiguzel, 2018).
This chapter aims to describe blockchain technology and to show the differences in its
purpose and design. In section 2 we start with a brief explanation of blockchain technology.
Blockchain technology fundamentals and security services are described. Data storage in
blockchain is addressed here. The challenges of blockchain technology and some remarkable
solutions are described in Section 3. Blockchain anomalies, energy consumption, scalability,
speed; interoperability, privacy, and cryptology challenges in the age of quantum computing
are addressed here. The decentralized derivatives (Tangle, Hashgraph, Holochain) and their
technological differences are described in Section 4. Data storage in decentralized systems is
covered in Section 5. Evolving data solutions for the decentralized systems and hybrid
solutions are given here. Decentralized solutions are compared with centralized databases. A
multi-platform interoperable scalable architecture (MPISA) is proposed in Section 6. Finally,
results and conclusions are given.
2. Blockchain Technology
Blockchain is atechnology, which is used for the keeping of a list of records in a (semi-)
decentralized manner. These records contain information about any transaction or any
39Enis KARAARSLAN, Enis KONACAKLI
program code (smart contract) which allows a system to work autonomously (Alves et al.,
2018; Ali et al., 2017). The records are aggregated in data structures and called blocks. These
blocks are linked to each other using cryptographic techniques and thus form a chain structure.
The registry, which keeps this blockchain, is called the ledger. Blockchain keeps the ledger
distributed and is also called distributed ledger technology (DLT). The ledger is kept in
several devices, which are called nodes. These nodes are connected using P2P protocols.
These nodes can act as servers or clients at the same time and form a decentralized system.
Nodes with different hardware can have different functions, which are summarized in Table
1 (Barnas, 2016). These nodes use consensus protocols to make a common decision on
operations, such as the choice regarding who will write the new block. The new block is
written by the selected node and then distributed to all nodes.
Table 1. Blockchain Node types
No de Ty pe Function Examples
Full Node
Keep full copy of the blockchain,
Generate blocks,
Validate blocks,
Validate transactions,
Generate new transaction and broadcast.
Servers or personal computers with
sufficient hardware resources
Partial/Half Node
Keep only partial copy of the blockchain,
Validate blocks,
Validate transactions,
Validate old records as peer support,
Generate new transaction and broadcast.
Laptops or alike
Simple Node Validate new transactions,
Generate new transaction and broadcast.
IoT or limited capacity mobile
devices
Blockchain is not a suitable solution for all computational issues and neither for all data
storage problems. The need of a blockchain solution is discussed in detail in Wüst and
Gervais’ paper (Wüst & Gervais, 2018) and also summarized in Fig. 1. A blockchain solution
is suitable under the following conditions:
If the domain has a dataset which is to be shared with more than one party,
Where there is low trust between parties and there is no trusted third-party to ensure
trust,
In cases of a need for auditing.
In a scenario of a supply chain, a company may want to track all the processes in the
supply chain and even make it transparent to its users. As it is shown in Fig. 2, it becomes
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES40
complex even in a scenario of two companies (a producer and a consumer). All the transport
means, authorities, banks, and others need to share the data or generate transactions during
this process. Blockchain is a good solution in a scenario like that, where there are many
parties that have to trust each other (Mohan, 2019).
Figure 1: Do you need a blockchain?
Figure 2: Multi-party data access scenario
41Enis KARAARSLAN, Enis KONACAKLI
The blockchain solution will help in keeping the records of the transactions. The records
should be reachable at all times, unmodifiable and inerasable (White et al., 2017). The system
will work in an autonomous way, which will ensure trust in the system. Full trust, complete
privacy, and decentralization should be aimed at when creating such decentralized systems
(Karaarslan & Akbaş, 2016).
Different blockchain implementations, which depend on the anonymity and trustworthiness
of the validator (node), are possible, as shown in Fig. 3 (Gür et al., 2019). These are:
Allowing nodes to join the network with or without permission (permissionless),
Allowing public or private access to the ledger,
Different consensus protocols such as proof of work (PoW), proof of stake (PoS), proof
of authority (PoA), practical byzantine fault tolerance (PBFT) and such like are preferred in
accordance with the anonymity and trustworthiness of the node.
There are also hybrid blockchain implementations, which allow different types to work
together to achieve a function. Some implementations can have public and private ledgers
together. Implementations like federated (consortium) blockchain allow multiple
organizations to share information privately between parties (Bauer, 2015).
Figure 3: Blockchain implementation types per anonymity/trust of validators
Cryptocurrency implementations mostly use permissionless validators and public
blockchain. The users are anonymous or pseudonymous. The term ‘permissionless’ states
that any node can enter or leave the system without permission. The trust in the validator is
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES42
low as the nodes are anonymous (Karaarslan & Akbaş, 2016). Cryptocurrency implementations
depend on using their own currencies to run transactions on their systems. Bitcoin can be
called the first blockchain implementation of this type, which has been active since 2008.
Bitcoin is the proof-of-concept that this type of system can work and have value. Satoshi has
proposed a model in his paper (Nakamoto, 2008), where the system generates a new crypto
coin per block and gives an award to the owner of the node that will write the block. Ethereum
(ETC) introduced a framework where new blockchain applications can be developed. Smart
contracts are used which are in the form of an autonomous software code on the blockchain.
The steps in the process of making a value (cryptocurrency) transfer in such a blockchain
network are given in Fig. 4. In this scenario, Fatih wants to make a value (cryptocurrency)
transfer to Eylul. Most cryptocurrency systems use “mining pools”, which orchestrate such a
process. The nodes in the P2P network validate the transactions (account balance check, double
spending check) and collect the validated transaction data. According to the protocol used,
nodes collect information of variable number of different transactions in a specified time. PoW
consensus protocol is used to select the node which will write the new block. PoW depends on
a calculation to solve a puzzle like a mathematical problem. The node, which solves the
problem, will first be selected. The selected node will form and write the block and advertise it
in the network (Karaarslan & Akbaş, 2016). The fairness of the node selection and the security
of such a process results in high energy and time-consuming operations (Gür et al., 2019). PoW
and alike consensus protocols, have a bad reputation on high energy usage, which is said to
affect climate change. The blocks are transparent and that means the transaction information is
visible through web interfaces, which are called explorers such as the block explorer. These
web interfaces also show detailed information about that cryptocurrency system.
Figure 4: Transaction steps of a value transfer in cryptocurrency implementations
43Enis KARAARSLAN, Enis KONACAKLI
Different consensus protocols can be developed and deployed, which consume less
energy and are faster than PoW. POS and alike consensus protocols are being tested with
cryptocurrency implementations (Zheng et al., 2018). This will be covered in section 3.2.
The needs of enterprise implementations are different from cryptocurrency implementations.
The identity of the users is known. Permissioned validators and private/public blockchains are
mostly used. Different parties of the blockchain system supply the validator nodes. The
validators are trusted and not anonymous, which means they are under the control of the
management. PoW consensus protocol is not necessary. PBFT, PoA and similar consensus
protocols are preferred in this type of implementation (Zheng et al., 2018). Hyperledger Fabric,
R3 Corda (Valenta & Sandner, 2017) and Quorum can be given as examples.
Hyperledger Fabric is widely used in production (Hyperledger, 2018) and in academia
(Androulaki et.al, 2018; Nasir et al, 2018). Such an implementation scenario in Hyperledger
Fabric is given in Fig. 5, which consists of a customer and his/her IoT device, two companies,
and one authority. The customer can be subscribed to different companies and there is also
one authority that these companies have to share their data with. The IoT device of the
customer sends a summary of collected data to the blockchain network. Each company
creates a group (channel) among themselves. Different consensus protocols and different
types of nodes can be used in each group. These nodes, rest server, and CA server can all be
installed as Docker containers. Each node has limited authority. The owner of each transaction
is identified in its own certificate authority. These groups also share data with the authority,
which is labeled as Auth. C Peer in this case (Gür et al., 2019).
Figure 5: Hyperledger Fabric enterprise blockchain solution
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES44
Many cloud services have started to provide environments of blockchain as a service
(BaaS), which serve cloud services to build Dapps. By way of example, IBM, Alibaba,
Huawei, and many others provide Hyperledger Fabric based BaaS (Mohan, 2019).
A comparison of the security services provided by blockchains, central databases and
distributed databases are given in Table 2 (Bozic et al., 2016). Data integrity, availability and
fault tolerance services can best be provided with blockchain.
The integrity of the data is established by the design of the DLT. Each block is connected
to the previous one using its hash value. Hash functions (SHA-256, Keccak-256 … etc) are
one-way functions that form the fingerprint of the input data. This data structure makes the
binding so strong that, when an attacker wants to change block n, the blocks starting from the
nth block, until the last block, have to be modified and rewritten according to the change. It
should also be noted that the selected node of each block is also recorded in the ledger and
such an attempted attack will easily be detected (Karaarslan & Akbaş, 2016).
The availability and security of the system depends on the number of nodes and their
distribution in the network. More nodes will make the system stronger against the attacks.
Then taking control of the majority of the nodes by the attacker will be harder and the
compromised nodes will not be able to misguide the block creation process. If the nodes are
more widely distributed in different networks, the network will also be stronger against
DDoS attacks. Fault tolerance is the ability of the blockchain to correct any misuse and
errors. This is implemented by using consensus protocols.
Privacy is not a design concern in most implementations such as cryptocurrencies. Privacy
and security in Bitcoin are investigated in (Conti et al., 2018). Different implementations can
have different levels of privacy. Transparent records do not mean the privacy level is low.
Personal data is not revealed, transactions are only traceable with the public addresses.
Transparency property is used to prevent any possible fraud and misuse. It can be used to
enable safer environments (Ölmez & Karaarslan, 2019).
Table 2. Comparison of the security services
Blockchain Central Database Distributed Database
Integrity High Average Average
Availability High Low Average
Fault tolerance High Low High
Privacy Va r iable* High Aver age
* Privac y is not by design. Mainly depends on the implementation
45Enis KARAARSLAN, Enis KONACAKLI
There are nascent standardization efforts, which focus on narrow aspects of blockchain
(Mohan, 2019). IEEE Blockchain Initiative has just started several blockchain standardization
efforts focusing on areas like agriculture, medicine and IoT (IEEE, 2019). ISO/TC 307
technical committee is working on blockchain and distributed ledger technologies (ISO,
2019). W3C community group is working on the Web Ledger Protocol, which will describe
the format and protocol of decentralized ledgers on the web (W3C, 2019).
3. Meeting the Challenges
Despite the opportunities of blockchain technology, the challenges of blockchain are still
notable for discussion. The challenges can be summarized as follows:
Blockchain anomalies,
Energy consumption,
Scalability and speed,
Interoperability,
Privacy,
Cryptology challenges in the age of quantum computing.
Some note-worthy solutions proposed and studied are given in the subsections.
3.1. Blockchain Anomalies
Some anomalies may result in the addition of conflicting blocks and the formation of new
branches of the chain in PoW based blockchains. The conditions, which may lead to these
anomalies, are covered in Natoli and Gramoli’s study (Natoli & Gramoli, 2016). This can cause
usability, integrity and performance problems (Mohan, 2019). Blockchain implementations
should give deterministic guarantees on these conditions. Implementations can be adapted and
smart contracts can be written to overcome these types of anomaly (Natoli & Gramoli, 2016).
3.2. Energy Consumption
Mining operations of the conventional PoW based blockchain systems require expensive
hardware and a very high degree of energy consumption (Flipo & Berne, 2017; Trautman &
Molesky, 2019). Energy efficient solutions, which will replace or minimize the usage of the
conventional PoW based blockchain systems, are being experimented. Different node
selection algorithms are proposed which are based on random choice or on the cryptocurrency
amount of the miners (Rosic, 2017).
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES46
POS consensus protocol has started to be preferred in cryptocurrency implementations
instead of the PoW approach. The nodes have to deposit a predefined amount of cryptocurrency
and show their commitment to the system and become a trusted validator. The system does
not require a calculation-based competition, rather it randomly chooses from the validators.
The possibility of being selected is directly proportional to the amount of cryptocurrency.
The system will consume much less electricity and be much faster with POS (Sayeed &
Marco-Gisbert, 2018; Opray, 2017).
Current business blockchain frameworks such as Hyperledger and R3 Corda are token-
free platforms and are far more energy efficient as they eliminate this extravagant process.
Other blockchain derivatives, such as Hashgraph, Holochain, and Tangle, are also energy
efficient and resource friendly DLT systems.
3.3. Scalability and speed
Scalability is the ability to handle large volumes of transactions at high speeds. This
basically depends on the following factors:
Consensus: The nodes have to agree on the validity of the transaction. Adding
information to a block with POW consensus protocol is a very slow process in the
conventional cryptocurrency architectures. Creating a block can take around 10 to 60
minutes in Bitcoin (Bitinfocharts, 2019); it takes about 15 seconds in Ethereum
(Etherscan, 2019). All new blocks are broadcasted and verified by all nodes in a
typical blockchain network.
Storage: Storage capacity is the biggest concern when implementing blockchain. The
exponential growth of the block size creates a performance problem. Keeping the
whole data in every node can be unfeasible and impractical in many solutions.
This brings out the scalability problem since the broadcast traffic and the size of the
ledger data stored in the nodes increases exponentially because of the nature of the blockchain
architecture. Moreover, lightweight devices like Internet of Things (loT) do not have
sufficient resources for this. Many solutions have started to use all nodes for validation of the
transactions, and only use some (full nodes) for storing all the data. Maintaining only the
summary or link of the data in the nodes, keeping the data in the DSN architecture is also
being implemented. Vitalik Buterin, co-founder of Ethereum, once claimed that a blockchain
solution can have a maximum of two characteristics out of the three core characteristics
(decentralization, security and scalability). This is also called the scalability/blockchain
47Enis KARAARSLAN, Enis KONACAKLI
trilemma, which is shown in Fig. 6. An attempt to solve the scalability problem will result in
sacrificing on decentralization or security (Gomez, M., 2017).
Figure 6: Scalability/Blockchain Trilemma
Scalability solutions can be covered in four layers; hardware, network, blockchain and
application (EUBlockchain, 2019a). These solutions are summarized in Table 3. However,
the throughput values are estimations to show the effect of each solution.
Using better machines or having faster communication has a limited effect on scalability.
Hardware upgrades can be in limited amounts, and this type can perform best only in consortium
chains and dPoS consensus protocol (EUBlockchain, 2019a). Higher bandwidths may be available
from the telecom providers, but that does not mean that faster communication is possible.
There are various scalability solutions in blockchain layer such as adjusting block size,
adjusting block interval, sharding, using different consensus mechanisms and decentralized
derivatives. Solutions like directed acyclic graph (DAG), distributed hash table (DHT) can also be
used. These solutions have different requirements and are difficult to compare with each other on
performance (EUBlockchain, 2019a). These will be covered in detail in the next sections.
Table 3. Scalability measures in blockchain layers
Layer Solution Throughput Limitations
Hardware Using better machines Up to 5-10x Not for large networks
Best only in consortium chains, dPoS
Network Faster communication links Up to 5x Not affordable in all areas
Blockchain
Adjust block size
Adjust block interval
Sharding
Different consensus mechanisms
Decentralized derivatives
Up to 10-20x Difficult to compare on performance
Application Off-chain
Sidechain
Up to 10,000 to
100,000x Depends on interoperable tools
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES48
Significant parts of the data and computation can be transferred to conventional systems
to make the processes faster. Structures like off-chain and side chain can be used to increase
the throughput. Direct channels can be established between parties (EUBlockchain, 2019a).
Solutions will be described in detail in the next sections.
3.4. Interoperability
Interoperability of blockchain infrastructures has emerged as a newborn challenge for the
blockchain community in recent years. Although blockchain technology has been designed
and established for removing the intermediaries and trusted third parties, users of different
blockchain systems cannot easily transfer digital assets between each other without using an
intermediary. For example, if a user wants to transact some data or a digital asset, secured and
processed in Hyperledger Fabric network, to a R3 Corda network client, this user first has to
register to the Hyperledger Fabric network, then decrypt the secured data, and then register
on R3 Corda to use this network’s functionality and put the aforementioned data into R3
Corda network. This creates a great amount of wasted time and processes. It becomes a
necessity to ensure the interoperability of different blockchain architectures even between
different companies or industries.
We will testify that different blockchain architectures will be able to communicate and
share digital assets in the near future. Mechanisms like QuickX should be used to enable cross
transactions. Sidechains have been proposed as a promising mechanism that allows transactions
from one blockchain to another. It is not only a DLT technology but also a potential architecture
for enabling the interoperability of the blockchain technologies (Ray, 2018).
3.5. Privacy
Privacy is another challenging issue that emerges from the nature of the blockchain
methodology. In a permissionless blockchain architecture, all parties have the right to download
the ledger, which implies that they have the right to explore the entire history of the recorded
transactions. Implementing “the right of privacy” is a challenge in these architectures. Special
care must be taken, when working with PII (Personally Identifiable Information). It is a good
practice not to store PII on the blockchain and let the user handle his/her own data.
Zero Knowledge Proof (ZKP) can be integrated into blockchain systems to ensure privacy.
The user can be given the total control of his/her data. ZKP can be used to validate any
process (like identity check) without revealing any information about it (Goldreich, 2019;
Korkmaz et al., 2019).
49Enis KARAARSLAN, Enis KONACAKLI
3.6. Cryptology challenges in the age of Quantum Computing
Quantum computing and the parallel processing power it promises threaten the security
of the current public-key-based algorithms and blockchain systems. Quantum computing is
an earthshaking technology that can be used to break ciphers and expose secrets that are
secured by the current cryptographic algorithms (Piscini et al., 2018). Symmetric algorithms
appear to be secure against quantum computers (and Grover’s algorithms) by simply
increasing the associated key sizes. Commonly used public-key cryptographic algorithms
(based on integer factorization and discrete log problem) such as RSA, DSA, Diffie-Hellman
Key Exchange, ECC, ECDSA will be vulnerable to Shors algorithm and will no longer be
secure (Cromwell, 2015).
Researchers are studying post-quantum blockchain (PQB) and secure cryptocurrency
schemes based on PQB systems, which can resist quantum computing attacks. This area is
still under progress (Gao et al., 2019).
4. Decentralized Derivatives
There are Blockchain derivatives that intend to solve the problematic issues of this
technology and offer individual solutions for specific aforementioned challenges (Schueffel,
2017). These derivatives are basically distributed ledger technologies that have different
consensus protocols and architectures other than conventional blockchains. Directed acyclic
graph (DAG) and distributed hash table (DHT) aim to perform the benefits of blockchain
with better performance. Sidechain implementations offer to solve scalability solutions.
Gossip protocol aims to reach a faster consensus than the counterparts do. These solutions are
described, then the platforms that use these solutions are compared.
4.1. Directed Acyclic Graph
Changing the manner of the transaction validation process using distributed acyclic
graphs is a new and effective approach, which creates new solutions for the scalability and
speed problems of traditional blockchains. IOTA Tangle and Byteball are well-known
examples, which put this methodology into practice (Wang et al., 2018).
The graphs are a representation of the connected peers through which information can be
passed from one peer to another along different edges in a multidimensional space. They are
great tools for traversing between various connections of individual units of data. A peer
initially communicates with the closest peer according to pre-defined rules. They may be
directed or undirected. Fig. 7 shows various graph types.
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES50
DAG is a non-looping graph that joins edges to turn in a pre-defined direction. Each
square stands for a separate transaction in Fig. 7. The transactions are validated by the
recently validated transactions in the way through the DAG branches.
DAGs stand out as promising DLT structure, enabling promising applications that can
compete with classical blockchains (Jiab, Bouric, Guntad, & Roubaude). The use of DAG
structures in distributed networks aims to solve the speed, cost, and scalability challenges of
classical blockchain architecture.
Figure 7: DAG and other graph types
4.2. Distributed Hash Table
DHT is a set of distributed storage systems that provides lookup and storage schemes for
the peers, which store and retrieve data, identified by key values in the network. Distributed
hash table establishes a distributed routing table in a very large and distributed network.
There is no central authority, and peers can join and leave the network at any time in a
distributed network. They are connected together through an overlay network. The nodes
store and share the data by coordinating with each other (Dufel, 2017).
Fig. 8 shows the dictionary-like structure of the DHT usage. DHT allows the nodes to find
any given key in the key-space. It maps the whole network by key values. Key value is the
ID of the node that is calculated by hashing the node’s IP and port combinations. This key
identifies every separate node, and the node’s position in the DHT indicates separate
independent node which keeps related data. If a node leaves the network, the algorithm
automatically shifts the abandoned key value to another peer, which is not addressed with any
key. Nodes can make a search for the related node and find its data using this easy-to-
implement structure. (Dufel, 2017).
51Enis KARAARSLAN, Enis KONACAKLI
Figure 8: Mapping network using key values
4.3. Side Chain
Sidechain (child-chain) is a solution which allows making a partial copy and a separate
branch of the (main/parent) blockchain, which is bound to counterpart(s). The original
blockchain is called the mainchain and all additional blockchains are called the sidechains.
Sidechains are used to allow cryptocurrencies and other digital assets to be processed in a
separate private blockchain and then be securely transferred back to the original blockchain
(Halpin & Piekarska, 2017).
Sidechain uses two-way pegging mechanisms to allow two separate chains bound to each
other and transfer assets in between. In a crypto currency transfer scenario which is shown in
Figure 9, a user on the parent chain initially sends its cryptocoins to an output address
(Musungate et.al, 2019). The first step is a lock box, which locks the sent cryptocoins so the
user cannot spend them. After acceptance of the transaction, an equivalent amount of crypto
coins is delivered to the side chain. The user can spend the coins after that step. The reverse
process is performed when moving back from a sidechain to the mainchain.
Every sidechain is responsible for its own security. Since each sidechain is independent,
if it is hacked, the damage will be enclosed within that chain and will not affect the main
chain.
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES52
Figure 9: Transaction process of sidechain and two-way pegging
4.4. Gossip Consensus Protocol
Gossip is a communication protocol that is an agent for nodes to interact each other at
high speed (Baird et al., 2018). When a node gossips, it randomly selects a peer and shares
the received new information with it. The selected peer does the same thing, and this process
continues until the information is passed on to all the connected nodes. It works just like
social gossiping and information passes through the whole network in this way. The
transactions are validated by the previous successful transactions rather than the mining
process of currency based blockchain architectures. This protocol can run successfully on
DAG and DHT networks to achieve high speed transactions (Zhenyu, Gaogang, Zhongcheng,
Yunfei, & Xiaodong, 2018).
4.5. Comparison of the DLT Technologies
The DLT systems covered in this section are typically designed to deal with a registry of
data that is distributed across a network. They are more transparent and robust compared with
the conventional centralized database systems. The basic idea of blockchain derivatives is to
form alternative decentralized systems that can solve the structural challenges and overcome
the architectural limitations of traditional blockchains. Table 4 shows the comparison of the
DLT derivatives.
Even though there are many similarities among the derivatives of DLT systems, there are
also some architectural differences (El Ioini & Pahl, 2018). The foremost blockchain designs
were created to be permissionless, but the DLT derivatives are predominantly permissioned.
Everyone can join a permissionless network, however only accepted parties may access the
network in the permissioned DLT alternatives. This difference also influences the size of the
53Enis KARAARSLAN, Enis KONACAKLI
network. Blockchain networks, which are used for well-known cryptocurrencies such as
Bitcoin, aim to expand to provide a more secure environment. In a permissioned DLT
network, the number of parties involved tend to be smaller, as this number does not have such
an effect on the security of the systemin this case.
Projects such as Hashgraph, Holochain and Tangle are promising platforms, which are
creating new types of distributed ledger technologies. These projects share the common
aspects of distributed, consensus, flexible, and peer-to-peer platforms. Although being fast
DLT architectures, they use their own consensus protocols and the data structures. Hashgraph
and Tangle solve the scalability problem with DAG.
Hashgraph and Holochain use the gossip consensus protocol. Hashgraph is a patented
permissioned DLT network, which can handle over 250,000 TPS. The validation of the
network requires at least ⅔ of the nodes to receive gossip and confirm transactions. Holochain
uses distributed hash table (Anwar, 2018). It aims to create a new distributed Internet
structure, trying to establish a new secure generation of cloud computing framework. Trust is
established using the computing power of the peers. It is estimated to have an immense
scalability rate depending on the holochain networks expansion. Each user peer keeps its own
data and transactions information (Harris-Braun, Luck.,& Brock, 2018).
Bitcoin processes 3–7 transactions per second (TPS) and Ethereum can handle 10–20
TPS, however Hashgraph promises to process hundreds of thousands of TPS (Kerner, 2018).
Tangle’s consensus mechanism hashcash has a high theoretical limit on the TPS throughputs
(IOTA, 2019). Tangle can reach up to 800 TPS rates (Kerner, 2018). Despite their potential
advantages, their capabilities have not been tested as traditional blockchain systems.
Sidechain has a very high potential to enhance scalability and TPS values depend on the
platform used. It can also be used to provide interoperability between different blockchains.
There are several platforms which are testing sidechains. A promising project is Plasma
(Saini, 2018). Plasma is the child-chain solution of Ethereum. High TPS values are aimed at
by allowing each Dapp to use its own chain (Poon, & Buterin, 2017).
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES54
Table 4. Comparison of the DLT Technologies
Blockchain Plasma Ta ng le Hashgraph Holochain
Structure P2P P2P Directed acyclic
graph
Directed acyclic
graph
Distributed hash
table
Platform Bitcoin Sidechain IOTA Hedra
Swirlds
Holo
Transaction
per second
(Tp s)
4 to 7 More than
billions 500 to 800 More than
200.000
More than
millions
Consensus PoW POS PoW: hashcash Virtual voting DNS Validation
Rules
Decentralized
Yes but using
mining pools
make it semi
decentralized
Depends on the
implementation
Semi-
Centralized Semi-Centralized Decentralized
Licence Open Source Open Source Open Source Patented Open Source
Maturity Proven and been
used since 2008 Experimental Experimental Experimental
(Public use since
2018)
Experimental
(Alpha1 rel. in
2018)
5. Data Storage in Decentralized Systems
Blockchain is not a place to store all kinds of different data. As mentioned above, it is a
registry where the records (logs) of the transactions are kept. A transaction can be a record of
any process and may also contain codes, which allows the autonomous working of a system.
A transaction can also give a link to the cloud storage where the actual data exits. Data may
be stored in different forms. There are evolving data solutions to solve scalability and
interoperability problems. Selected solution proposals are covered first. Then the hybrid
solutions, which are formed by using different solutions together, are covered. This section
will continue with the comparison of decentralized solutions with centralized databases.
55Enis KARAARSLAN, Enis KONACAKLI
Table 5. Comparison of Blockchain with Evolving Data Solutions
Category Solution Throughput
Cost
Power&
Resource
Capacity
Block
width/
size
Advantage Disadvantage
Basic
Blockchain
(Bitcoin)
PoW Low High Basic
Proved to work
in trustless
environment,
Protection against
DDoS attacks
Scalability,
Computationally
Expensive,
Needs high
computational
power,
High energy and
processing costs,
%51 Attack
Alternate
Consensus
Protocols
POS
PoA High High Low
APX 0 runtime
cost,
High transaction
speeds
The node who has
the steak controls the
network
Raft-
based
consensus
High Low Low
Handle multiple
problems,
Easy to implement
Lacking enough live
tests
Gossip High Low Low APX 0 transaction
fee and waiting time
Lacking enough live
tests
On-chain
Big block High Low High High capacity
transmissions
Centralization of
mining pools,
High Orphan block
rate
Segwit High Low -Various Possible
Bitcoin solutions
Fungibility
occurrence
Sharding High -Low
Low capacity
burden
Parallel processing
%1 Attack
Off-chain
Lightning
network High Low Low APX 0 transaction
fee and waiting time
P2P Payment
channels
Raiden
network High Low Low General purpose
channel
P2P Payment
channels
Child-chain Plasma High -Low Parent-child
blockchain tree
High costs of
verification
Inter-chain Side
Chain High Low Low
Blockchain
interoperability and
cross transactions
Application
boundaries
DSN
IPFS
Gaia
Storj
High Low High
More secure
Flexible
Reduced rate of data
failures and outages
-
Decentralized
Derivatives
New
Solutions
DAG
(Nano,
IOTA &
Byteball)
High Low Low
Better scalability
No miners
Quantum resistant
cryptography
Lacking enough live
tests
DHT High Low Low
APX 0 runtime
cost,
Very high
transaction speeds
Lacking enough live
tests
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES56
5.1. Evolving Data Solutions
Data storage solutions are evolved to solve the scalability, interoperability, and privacy of
blockchain in several forms and are given in Table 5. The solutions are shown as follows
(Kim et.al, 2018):
Using alternative consensus protocols
On-chain: Storing all the data on the main-chain. Solutions such as sharding, making
blocks bigger are possible.
Off-chain: Off-chain is storing the data outside the blockchain, processing it and
writing the summary on the blockchain. There are challenges to reach the manipulation
resistance, verifiability and privacy (Eberhardt & Tai, 2017), (Lightning network,
Raiden network).
Child & parent chains: The records of the child-chain are processed and written to the
parent-chain in this type of implementation (Plasma).
Inter-chain: This is used to provide communication and join the functionality of
different blockchains. Structures such as Atomic swaps and side-chain are used.
DSN: Using blockchain and cloud storage together.
Other structures (DAG, DHT … etc)
Enterprise solutions have different needs and expectations than the cryptocurrency
systems. Different consensus protocols (PoA, POS, raft-based consensus, Istanbul BFT, etc.)
are being implemented to make the consensus phase faster and reach higher transactions per
second (TPS) rates by eliminating the mining processes, while ensuring confidentiality. By
way of example, Quorum, which is based on Ethereum, does not use POW/POS consensus
protocols, but instead supports multiple consensus protocols to support enterprise needs. It
supports alternative consensus protocols like raft-based consensus, Istanbul BFT (IBFT)
(Baliga et.al. 2018).
Sharding and making blocks bigger are both possible on-chain solutions. The Big block
is the basic process to enhance the block size. Making blocks bigger enlarges the transmission
limit, but big blocks need extremely high processing powers, which will also increase the
transmission cost (Clifford, 2017). Since the propagation speed becomes limited, this process
increases the probability of orphan blocks appearing. Big blocks are not efficient at the
current stage because of these disadvantages. Sharding is the process of dividing a database
57Enis KARAARSLAN, Enis KONACAKLI
into smaller segments. It is also called horizontal partitioning. Sharding is a controversial
issue in blockchain and there are different views. Vitalik Buterin and Beniamin Mincu believe
that sharding can be one of the solutions. Vitalik Buterin once expressed the concept of the
‘sharding’ model as the creation of hundreds of different universes, each of which being
different account spaces. According to him, the transaction will affect the things only in the
universe it belongs to. He claims that thousands of transactions per second can be achieved
without any special server, nor with consortium chains (Gomez, M., 2017). Beniamin Mincu,
the CEO of the Elrond Network, claims that sharding is needed to reach the throughput
capacity that is needed to rival networks like VISA and states that some challenges are single-
shard takeovers, cross-shard communication and data validity (Cointelegraph, 2019).
Lightning network and raiden network can be given as examples of off-chain solutions. A
consensus process will not be used in lightning network when two parts trust each other.
Transactions will be quicker and will not be recorded on the chain (Karaarslan & Adigüzel,
2018; Poon & Dryja, 2016).
Plasma can be given as an example of the child-chain solution in Ethereum. Each Dapp
will use its own chain in the Plasma solution (Poon, & Buterin, 2017).
Atomic swaps and sidechain are inter-chain solutions that are established to enable cross
transactions and blockchain interoperability. Atomic Swap is the peer-to-peer currency
exchange between different blockchain networks, without the need for a mediator. Sidechain
was covered in Section 4. It has a very high potential of enhancing scalability and can also be
used to provide interoperability between two separate blockchains (Musungate et.al, 2019).
Using blockchain and cloud storage together forms decentralized storage, which is also
called a decentralized cloud storage network (DSN). Data can be stored and shared without
having to trust third parties (Wilkinson et.al, 2014). This solution is used to overcome storage
limits and also provide personal data storage and privacy. A DSN network can have advanced
privacy, security and data control as it has the following characteristics (Karaarslan &
Adiguzel, 2018):
More secure as it uses client-side encryption,
Flexible as there are speed and low-cost advantages with proper implementation,
Integrity and availability of the data is ensured with proof of retrievability,
Reduced rate of data failures and outages.
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES58
Examples of DSN can be given as follows (Karaarslan & Adiguzel, 2018):
Gaia: It is used by Blockstack. When the user uses the decentralized application and
any data is needed to be written, it serves to save this data on the existing cloud
infrastructure. Data is written in encrypted or signed form (Ali et.al, 2017).
Storj: Storj works as a P2P cloud storage network. An open source software project
called Metadisk provides a set of tools to make Storj easily integrated with legacy
systems (Wilkinson et.al, 2014).
Other token-free DLT derivatives, such as Hashgraph, Holochain, and Tangle achieve
better scalability and TPS rates by using different structures (DAG, DHT) while eliminating
mining operations.
Different multi platform solutions are possible. Outstanding ones are shown as follows:
Using hybrid blockchain solutions which involve public and private blockchain
solutions working together,
Using inter-chain structures like sidechain to make different decentralized solutions
working together.
Using blockchain with decentralized cloud storage network (DSN)
Alternative cloud storage platforms which use blockchain as an awarding system.
5.2. Comparison of Decentralized Solutions with Centralized Databases
The differences between decentralized solutions and databases is in their design and
purpose. This topic is widely investigated in (Tabora V., 2018). Blockchains are distributed
systems, which hold replicated databases on several different nodes. Special consensus
protocols are used to ensure these replicas are trusted (Murthy C., 2016).
Database systems are becoming more complex with the ever-increasing usage of different
data types, big data, and cloud infrastructure. There are many characteristics to classify them.
Firstly, it is important to talk about the data management models like relational and non-
relational. Relational databases are the most commonly used database types in the world.
However, non-relational databases are also becoming popular with the rising storage needs
of unstructured data and the increasing usage of the machine learning processes which use
them. By way of example, No-SQL databases are also becoming widespread and are mostly
used for rapid development or used to store large amounts of data that have little or no
structure. Blockchain is a non-relational database but there are also exceptions. A recent
59Enis KARAARSLAN, Enis KONACAKLI
blockchain system called postchain (Botsford A., 2019) seems to be the first blockchain
system which uses the relational model.
The general characteristics of decentralized solutions with relational databases are given
in Table 6. There are also variations but it is outside the scope of this section. The comparison
of these solutions is shown in Table 6 and is summarized in the following paragraphs.
Database is deployed in client/server model, however blockchain system is decentralized.
There is mostly one party involved in relational database. Consistency is hard and expensive
to achieve in relational database when there is more than one party. Blockchain solutions are
best suited for multi-party solutions and satisfy consistency as all nodes have the full copy of
the dataset. A blockchain system will directly identify and correct possible inaccurate records.
Companies, authorities, banks, transportation companies and such like can be a part of this
multi-party network (Schlapkohl, 2019).
Security services such as availability, integrity, and fault tolerance are highly supported
with blockchain systems. Database systems may be deployed to serve these services, but we
can say that it will not be as effective as blockchain systems. Users trust databases that they
will work right, but no one can be sure since administrators have full control of the system.
Even competitor companies need to share data between each other. They do not need to trust
each other, but need to trust the shared data. Trusted third parties can also be used to ensure
trust but their trustworthiness is also questionable (Karaarslan & Adiguzel, 2018). Blockchain
systems work by ensuring trust without using any intermediaries. Trust is established using
autonomous code and consensus protocols.
The attackers try to delete all possible evidence on the compromised system after any
attack. Digital forensics become difficult when logs are deleted. Any change attempt on the
blockchain ledger is also kept on the immutable ledger, so the details of the incident (who,
when and what) will be detected. This will also have a deterrent effect on attackers.
Cryptocurrencies use public chains that have transaction records transparent to everyone.
They allow everyone to see and query all transaction records on the system. Enterprise
solutions use private or hybrid chains and queries that give reading access only in that
domain. Databases do not give such a service.
Data management is relational in databases, blockchain is non-relational. The user
accounts are created on the database system and administered. Security is mostly implemented
by giving roles on the database system such as the database tables they can reach and their
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES60
permissions. However, blockchain works autonomously; consensus protocols and smart
codes (autonomous codes) define how the system works. There are no users on the system.
Decentralized identity management systems (IDMS) (EUBlockchain, 2019b) or such like
may be used, however these do not define any user roles on the system. Permissioned
blockchains are also possible where there is an access control layer. This layer is used to
permit specified actions to the defined users. This property is different from the relational
database permission process.
Blockchain is distributed by default. Database systems are installed as standalone by
default, but may also be deployed asdistributed. However, the amount of nodes that the
blockchain solutions can reach is mostly not possible in distributed database solutions. Only
allowed nodes can be added to the distributed architecture of relational databases. Nodes can
be permissioned or permissionless depending on which decentralized technology is used.
Redundancy is only possible to the level where relational database is distributed. All full
nodes have the latest copy and data redundancy is satisfied in the blockchain implementations.
Sharding is available in relational databases when the data is distributed in several servers.
Sharding is a controversial issue in blockchain.
Parallelization is limited in relational databases. Cloud adaptability is high with
decentralized databases. Big data handling capability is limited in relational databases;
however, decentralized solutions are more suitable for big data operations, especially when
used along with the cloud infrastructure. Relational databases generally handle small data
better. However, decentralized solutions handle big data better. Scalability for variable data
sizes is rigid in relational databases, but elastic in decentralized solutions (Demir et.al, 2018).
Databases support high volume transactions at a fast processing rate. Blockchain
implementations have to validate transactions and this comes at the cost of speed. The
solutions which use PoW consensus protocols support low volume transactions at a slow
processing rate. Higher volume transactions and faster processing rates are possible when
different consensus protocols like PoS, PoA are used. These faster consensus protocols
mostly need trusted nodes. We can say that blockchain should not be used when transaction
speed is a concern. However, there are studies on low-latency solutions. Data analytics is
supported with databases, however blockchain can be described as poorly supported in this
concept.
Blockchain systems are said to have problems in the areas of data size, synchronization,
energy consumption, interoperability and scalability. There are many studies and many new
61Enis KARAARSLAN, Enis KONACAKLI
solution proposals on these areas. Some of these proposals are given in the previous sections
of this chapter. Databases are widely used in various projects. However blockchain solutions
have a value when there is a need for establishing trust between parties without any
intermediaries involved and a need for data verification.
Table 6. Comparison of Blockchain (and derivatives) with Relational Database
Relational Database Blockchain (and Derivatives)
Centralization Centralized Decentralized
Party Involved Mostly one More than one party
Consistency (multiple party) Hard and expensive to achieve Consistent (full copy)
Security Services
(Availability, Integrity, Fault
Tol eran c e)
Poorly supported (by default) Highly supported
Tru st Trusted 3rd party Trust without intermediary
Trust on smart code, consensus
Forensics Difficult (if logs are deleted) Easier (unalterable records)
Transparency of transaction
data No Yes (public chains)
Partial (private or federated chains)
Data management system Relational model Non-relational
Management Method Administrated Autonomous
User Control Method Permissioned Permissionless, permissioned
Distributed Deployment Possible Distributed by default
Node Add Method Permissioned Permissionless, permissioned
Redundancy Possible (when distributed) All full nodes have the latest copy
Sharding Suitable (when distributed) Controversial
Parallelization Limited Suitable
Cloud Adaptability Limited High
Big data handling Limited Suitable (with cloud)
Scalability for variable data
sizes Rigid Elastic
Read/write Speeds Faster for small data Faster for big data
Transaction Volume High volume Low to Average*
Transaction Speed Fast Slow to Average*
Data Analytics Supported Limited
Problems
Single Point of Failure
Administration Issues
Security Issues
Energy Consumption
Interoperability
Scalability
Best When
High volume of data
Fast processing need
Quick query need
Data verification needed
Establishing Trust without
intermediaries
* Changes according to the level of decentralization
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES62
6. Proposed Model: MPISA
Many decentralized computation and storage solutions use different technologies and are
used in different domains. Just like connecting different communication networks to form the
Internet, different solutions can be inter-connected and their services can be associated.
Different decentralized solutions generally use different platforms that are suitable for that
domain. By way of example, a scenario may require co-working of a PoW-based
cryptocurrency and a PoA-based supply chain solution. Hence, there is a need for a unifying
platform that will solve the interoperability problem.
We propose a model called MPISA, whose name is a portmanteau of “Multi-Platform
Interoperable Scalable Architecture”. We aim to show how multiple platforms can be used
together and help developers in solving scalability and interoperability issues. The MPISA
model is shown in a two blockchain platform scenario in Figure 10. In this scenario, the two
blockchain platforms have their own P2P network and a mainchain as the main blockchain.
Each platform uses its own sidechain structure for the scalability issues.
Common data such as digital identities or general preferences can be kept in the
shared data storage. Such a system will help in preventing unnecessary re-entrance of
such data in different parties and also in preventing inconsistencies. Any change of this
data will require only one update and will be available to all parties instantaneously.
These will decrease the maintenance costs of this data across systems (Houlding, 2019).
The data can be kept in a cloud or distributed storage. It can be reached through a
decentralized identity management system. Such a platform can be designed to keep user
credentials safely. The Dapps will be able to check the user identity through this system.
Zero-knowledge proof can also be integrated into this system to ensure the privacy of the
parties. Users can keep their credentials on this shared platform without revealing their
private data.
The Dapps have relevant APIs to grant access to their associated blockchain platform.
Smart contracts are used in the data storage operations. The blockchain only keeps the records
of the transactions made, but the associated data is not kept in the ledger. A cloud or distributed
storage is used for storing and retrieving data. Data can be reached using the data locations in
the ledger records.
The most challenging component of the model is the interoperability platform. The Dapps
will be able to reach different blockchains and their associated data using this platform.
Sidechains or atomic swaps can be used to enable interoperability between the chains.
63Enis KARAARSLAN, Enis KONACAKLI
However, sidechain solution proposals are mostly proof of concept and experimental
(Johnson et.al, 2019). This area and the scalability issues are still open for development.
Figure 10: Multi-platform interoperable scalable system (MPISA) scenario
7. Conclusion
This study aims to describe the decentralized ledger technology and its usage as a data
storage to the data scientists and to give a contribution to academia by making the concept
easier to understand. Scalability measures in blockchain layers are given in Table 4.
Blockchain technology is compared with evolving data solutions in Table 5 and is compared
with the relational database in Table 6. We believe that if the data scientists could understand
this technology better, they would be able to be a part of the work to solve the challenging
issues that come with it.
Blockchain is not a place to store all kinds of different data; it is a registry where the records
of transactions are stored. Blockchain is currently the most effective secure way of keeping
these records as a ledger, which are distributed in a network. It will help in sharing the data
between different parties and enable collaboration. These DLT based solutions ensure the trust
without intermediaries. Smart contracts allow autonomous working of the system.
Decentralized systems can be designed to provide common data such as digital identities or
general preferences. Such a system will reduce the time needed for the data synchronization
across parties and decrease the maintenance costs of this data. We recommend keeping the data in
a cloud or distributed storage. Data will be reachable using the data locations in the ledger records.
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES64
Nowadays more decentralized application prototypes have become the new focus, and we
are now talking about projects which have started to move towards production alongside
legacy systems(Brennan et al, 2018). Finance and supply chain are some of the widely used
fields of blockchain technology. There are many fields such as health data exchange, know
your customer (KYC), smart governance and fraud detection that fit perfectly with the
benefits of blockchain technology. We will see blockchain based open global trade digitization
platforms in the future, which will ensure secure and instant access to end-to-end supply
chain information (Mohan, 2019).
Despite the obvious opportunities of blockchain technology, the challenges of blockchain
are still in need of discussion. The most notable architectural challenges are scalability and
privacy problems. Other challenges include energy consumption, interoperability, cryptology
challenges in the age of quantum computing. These problems should be solved to achieve better
implementations in the field. In particular, we should work on scalability problems. Possible
solutions should not have an effect on security and decentralization. However, we also believe
that some enterprise solutions may also have some centralized parts.
There are evolving data solutions for the decentralized storage challenges. Several
solutions such as making blocks bigger, sharding, using more than one chain, and using a
decentralized cloud storage network have been proposed. Using solutions like directed
acyclic graph (DAG), distributed hash table (DHT) also seem promising.
DAG, DHT, sidechain, gossip protocol and such like can be used to solve the scalability
problems of blockchain. Platforms such as Tangle, Hashgraph and Holochain which use
these solutions are compared. We think that these derivatives are important for the evolution
of decentralized systems. The decentralized solutions promise better TPS rates than the
traditional blockchain systems and are likely be preferred in the near future if no security
flaws are noticed in their implementations. However, their capabilities have not been tested
much and their sustainability has not been tested as long as the known blockchain technologies.
Measures for the privacy of data should be taken. It is a good practice not to store PII on
the blockchain and let the user handle his/her own data. Zero Knowledge Proof (ZKP) can be
integrated to blockchain systems to ensure privacy.
We proposed a multi-platform interoperable scalable architecture (MPISA) model. We
plan to study scalability and interoperability technologies, which can be used to make such a
system possible.
65Enis KARAARSLAN, Enis KONACAKLI
In the near future, interoperability will be one of the most important necessities of the
business blockchain platforms for benefiting inter-sectoral business solutions with the wide
usage of DLT. Sidechain is the potential structure for enhancing the scalability of existing
blockchain implementations and a chance for ensuring the interoperability of blockchain
technologies. However, it adds more complexity and should be well designed and
implemented.
Blockchain immutability may also be argued. Controlled rewriting of blockchain records
with chameleon-hashing may be applicable in some cases (Derler et.al, 2019). Different
approaches may be appropriate for different implementation areas. Some domains such as the
Internet of Things have domain specific characteristics such as frequent data transfers with
small content. Domain specific solutions should be developed. IOTA, based on Tangle, is a
candidate for a solution; however, it still has many issues which need to be solved.
Blockchain and artificial intelligence (AI) can be used together to complement each other.
Revolutionary improvements are possible (Dinh & Thai, 2018; Salah et.al., 2019).
Supercomputers and quantum technology will be further key elements that will shape
future implementations of blockchain. Post-quantum blockchain and secure cryptocurrency
schemes, which can resist quantum computing attacks, should be studied.
IEEE, ISO and W3C are working on new standards. We need more standardization efforts on
blockchain and decentralized systems. We would like to emphasize that blockchain and its
derivatives are still evolving. New advanced approaches and better benchmark systems (Gutierrez
C., 2019) are being developed. The promises of decentralized implementations are so evident that
the challenges should be studied, and more attention should be given to this field.
Acknowledgements
We would like to thank MSKU Blockchain Research Group (http://wiki.netseclab.mu.
edu.tr/index.php?title=MSKU_BcRG) members (especially Cemal Dak, Şafak Öksüzer,
Ahmet Önder Gür) for their contribution to the graphics used in this chapter.
References
Ali, M., Shea, R., Nelson, J., & Freedman, M. J. (2017). Blockstack: A new decentralized internet. Whitepaper, May.
Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., & Muralidharan, S. (2018).
Hyperledger fabric: a distributed operating system for permissioned blockchains. In Proceedings of the
Thirteenth EuroSys Conference (p. 30). ACM.
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES66
Alves, G., Cavalcante, E., & Batista, T. (2018). On the Use of New Blockchain-based Technologies for Securely
Distributing Data. 81 - 88.
Botsford A. (2019). What is relational blockchain and why should you use it?. Retrieved from https://blog.
chromia.com/what-is-relational-blockchain-and-why-should-you-use-it/
Anwar H. (2018). Blockchain vs Hashgraph vs DAG vs Holochain. Retrieved from http://www.101blockchains.com.
Baird, L., Harmon, M., & Madsen, P. (2018). Hedera: A governing council & public hashgraph network. The
trust layer of the internet, whitepaper, 1.
Barnas, N. B. (2016). Blockchains in national defense: Trustworthy systems in a trustless world. Blue Horizons
Fellowship, Air University, Maxwell Air Force Base, Alabama.
Bitinfocharts (2019). Bitcoin Block Time historical chart. Retrieved from https://bitinfocharts.com/comparison/
bitcoin-confirmationtime.html
Bozic, N., Pujolle, G.,& Secci, S. (2016). A Tutorial on Blockchain and Applications to Secure Network
Control-Planes. IEEE 3rd Smart Cloud Networks & Systems (SCNS), pp. 1-8.
Harris-Braun, E., Luck, N., & Brock, A. (2018). Holochain-scalable agentcentric distributed computing. Alpha,
1, 1-14.
Baliga, A., Subhod, I., Kamat, P., & Chatterjee, S. (2018). Performance evaluation of the quorum blockchain
platform. arXiv preprint arXiv:1809.03421.
Brennan, C. , Zelnick, B. , Yates, M. & Lunn, W. (2018). Cryptocurrencies are only the beginning, Credit Suisse
Blockchain Revolution Series
Clifford, J. (2017). Understanding the block size debate. Retrieved from https://medium.com/scalar-capital/
understanding-the-block-size-debate-351bdbaaa38
Cointelegraph (2019). Sharding explained. Retrieved from https://cointelegraph.com/explained/sharding-
explained
Conti, M., Kumar, E.S., Lal,C., & Ruj, S. (2018). A Survey On Security and Privacy Issues of Bitcoin. IEEE
Communications Surveys & Tutorials, 20(4), pp.3416-3452.
Cromwell, B. (2015). What Is Post-Quantum Cryptography And What Does It Mean For Us?. Retrieved from
https://blog.learningtree.com.
Demir E., Senocak T., Gezer N., Çabuk U. C. (2018). A Preliminary Study on Suitable Database Types for
E-Voting Systems, (ICENS) 2018, vol.4, pp.288
Derler, D., Samelin, K., Slamanig, D., & Striecks, C. (2019). Fine-Grained and Controlled Rewriting in
Blockchains: Chameleon-Hashing Gone Attribute-Based. IACR Cryptology ePrint Archive, 2019, 406.
Dinh, T. N., & Thai, M. T. (2018). Ai and blockchain: A disruptive integration. Computer, 51(9), 48-53.
Dufel M. (2017, 27 Dec). Distributed Hash Tables And Why They Are Better Than Blockchain For Exchanging
Health Records. Retrieved from https://medium.com/@michael.dufel_10220/distributed-hash-tables-and-
why-they-are-better-than-blockchain-for-exchanging-health-records-d469534cc2a5
Eberhardt, J., Tai, S. (2017) On or off the blockchain? Insights on off-chaining computation and data. European
Conference on Service-Oriented and Cloud Computing. Springer, Cham.
El Ioini, N., & Pahl, C. (2018). A review of distributed ledger technologies. Springer, Cham, In OTM
Confederated International Conferences, On the Move to Meaningful Internet Systems, (pp. 277-288).
Etherscan (2019). Ethereum Block Time History , Retrieved from http://etherscan.io/chart/blocktime
67Enis KARAARSLAN, Enis KONACAKLI
EUBlockchain (2019). Scalability, Interoperability and Sustainability of Blockchains. [Report]. Retrieved from
https://www.eublockchainforum.eu/sites/default/files/reports/report_scalaibility_06_03_2019.pdf
EUBlockchain (2019) Blockchain and digital identity. [Report]. Retrieved from https://www.eublockchainforum.
eu/sites/default/files/report_identity_v0.9.4.pdf
Flipo, F.,& Berne, M. (2019) The Bitcoin and Blockchain: Energy Hogs. Retrieved from https://theconversation.com
Gao, Y. L., Chen, X. B., Chen, Y. L., Sun, Y., Niu, X. X., & Yang, Y. X. (2018). A secure cryptocurrency scheme
based on post-quantum blockchain. IEEE Access, 6, 27205-27213.
Goldreich, O. (Ed.). (2019). Providing Sound Foundations for Cryptography: On the work of Shafi Goldwasser
and Silvio Micali. Morgan & Claypool.
Gomez, M. (2017). Ethereum Co-Founder Vitalik Buterin Weighs in on Blockchain Improvement & Scaling
Issues. Cryptovest. Retrieved from https://cryptovest.com/news/ethereum-co-founder-vitalik-buterin-
weighs-in-on-blockchain-improvement--scaling-issues/
Gutierrez C. (2019). Hyperledger Caliper to Provide Benchmarking for Blockchain Systems. Retrieved from
https://www.altoros.com/blog/hyperledger-caliper-to-provide-benchmarking-for-blockchain-systems/
Gür Ö., Öksüzer Ş.,& Karaarslan E. (2019). Blockchain Based Metering and Billing System, ICSG 2019.
[Accepted to be indexed] IEEE Explore.
Halpin H., & Piekarska M.( 2017, July 3). Introduction to Security and Privacy on the Blockchain, 2017 IEEE
European Symposium on Security and Privacy Workshops (EuroS&PW). http://dx.doi.org/ 10.1109/
EuroSPW.2017.43
Harris-Braun, E., Luck, N., & Brock (2018). A. Holochain: Scalable Agent-Centric Distributed Computing.
Houlding D. (2019). A Data Centric View of Blockchain. Retrieved from https://www.linkedin.com/pulse/data-
centric-view-blockchain-david-houlding-cissp-cipp/
Hyperledger (2018). Five Hyperledger Blockchain Projects Now in Production. Retrieved from https://www.
hyperledger.org/blog/2018/11/30/six-hyperledger-blockchain-projects-now-in-production
IEEE (2019). IEEE Blockchain Standards. Retrieved from https://blockchain.ieee.org/standards
IOTA (2019). The Tangle. Retrieved from https://docs.iota.org/docs/getting-started/0.1/network/the-tangle
ISO (2019). ISO/TC 307 technical committee on blockchain and distributed ledger technologies. Retrieved
from https://www.iso.org/committee/6266604.html
Jiab, Q., Bouric, E., Guntad, R., & Roubaude, D. (2018, Nov). Network causality structures among Bitcoin and
other financial assets: A directed acyclic graph approach. The Quarterly Review of Economics and Finance
(70), 203-213.
Johnson, S., Robinson, P., & Brainard, J. (2019). Sidechains and interoperability. arXiv preprint
arXiv:1903.04077.
Karaarslan, E., & Adiguzel, E. (2018). Blockchain Based DNS and PKI Solutions. IEEE Communications
Standards Magazine 2.3 (2018): 52-57.
Karaarslan E., & Akbaş, M.F. (2016). Blok Zinciri Tabanlı Siber Güvenlik Sistemleri [Blockchain Based Cyber
Security Systems]. Uluslararası Bilgi Güvenliği Mühendisliği Dergisi, 3(2), 16 - 21, http://dx.doi.
org/10.18640/ubgmd.373297.
Kerner, L. (2018, Mar 25). Is The Future Of Blockchains DAGs ? - 5 Takeaways From The Hashgraph Event In
NYC on March 13th [Web log post]. Retrieved from https://medium.com/crypto-oracle/is-the-future-of-
blockchains-dags-5-lessons-from-the-hashgraph-event-in-nyc-on-march-13th-ff0f7e0fa510
DATA STORAGE IN THE DECENTRALIZED WORLD: BLOCKCHAIN AND DERIVATIVES68
Kim, S., Kwon, Y., & Cho, S. (2018). A survey of scalability solutions on blockchain. In 2018 International
Conference on Information and Communication Technology Convergence (ICTC) (pp. 1204-1207). IEEE.
Korkmaz, U., Altunlu, H. İ., Özkan, A., & Karaarslan, E. Sustainable Member Motivation System Proposal for
NGOs: NGO-TR. UBMYK 2019, 2019
Mohan C. (2019). State of Permissionless and Permissioned Blockchains: Myths and Reality, BlueTalks @ Rio
BNDES
Murthy, C. (2016). Blockchain DB-unked, Presentation Slides, Retrieved from https://ripple.com/files/db-
unked.pdf
Musungate, B. N., Candan, B., Çabuk, U. C., & Dalkılıç, G. (2019). Sidechains: Highlights and Challenges.
ASYU 2019
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
Nasir, Q., Qasse, I.A., Talib M.A., & Nassif A.B. (2018). Performance analysis of hyperledger fabric platforms.
Security and Communication Networks, Volume 2018, Article ID 3976093.
Natoli, C., & Gramoli, V. (2016). The blockchain anomaly. In 2016 IEEE 15th International Symposium on
Network Computing and Applications (NCA). 310-317. IEEE.
Opray, M. (2017). Could a blockchain-based electricity network change the energy market. The Guardian. July, 13.
Ölmez A.C., Karaarslan, E. (2019). Blockchain Based Adoption and Fostering System Proposal for Animal
Shelters: BAdopt. UBMYK 2019
Piscini, E., Dalton, D., & Kehoe, L. (2017). Deliotte, Blockchain & Cyber Security.
Poon J., & Buterin V., (2017, August 11). Plasma: Scalable Autonomous Smart Contracts, [Working draft].
Retrieved from https://plasma.io/
Poon, J., & Dryja, T. (2016). The bitcoin lightning network: Scalable off-chain instant payments.
Ray, S. (2018, Jan 22). What are Sidechains? [Web log post]. Retrieved from https://hackernoon.com/what-are-
sidechains-1c45ea2daf3
Rosic, A. (2017). Proof of work vs proof of stake: Basic mining guide. Blockgeeks blog.
Saini V. (2018, April 26). Retrieved from https://hackernoon.com/13-sidechain-projects-every-blockchain-
developer-should-know-about-804b65364107
Salah, K., Rehman, M. H. U., Nizamuddin, N., & Al-Fuqaha, A. (2019). Blockchain for AI: review and open
research challenges. IEEE Access, 7, 10127-10149.
Sayeed, S., & Marco-Gisbert, H. (2018). On the Effectiveness of Blockchain against Cryptocurrency Attacks.
Proceedings of the UBICOMM.
Schlapkohl K., (2019). What’s the difference between a blockchain and a database?. Retrieved from https://
www.ibm.com/blogs/blockchain/2019/01/whats-the-difference-between-a-blockchain-and-a-database/
Schueffel, P. (2017). Alternative Distributed Ledger Technologies Blockchain vs. Tangle vs. Hashgraph - A
High-Level Overview and Comparison (December 15, 2017). http://dx.doi.org/10.2139/ssrn.3144241.
Tabora V. (2018). Databases and Blockchains, The Difference Is In Their Purpose and Design. Retrieved from
https://hackernoon.com/databases-and-blockchains-the-difference-is-in-their-purpose-and-design-
56ba6335778b
Trautman, L. J., & Molesky, M. J. (2019). A Primer for Blockchain. University of Missouri-Kansas City Law
Review, Forthcoming.
69Enis KARAARSLAN, Enis KONACAKLI
Wang, W., Hoang, D.T., Xiong, Z., Niyoto, N., Wang, P., Hu, P., &Wen, Y. (May 7, 2018) A Survey on Consensus
Mechanisms and Mining Management in Blockchain Networks. arXiv preprint arXiv:1805.02707v1.
W3C (2019). The Web Ledger Protocol 1.0, Draft Community Group Report 18 June 2019. Retrieved from
https://w3c.github.io/web-ledger/
White,M.,Killmeyer,J.,&Chew,B. (2017). Understanding basics of blockchain in government. Retrieved from
https://dupress.deloitte.com.
Wilkinson, S., Boshevski, T., Brandoff, J., & Buterin, V. (2014). Storj a peer-to-peer cloud storage network.
Wüst, K.,& Gervais, A. Do you need a Blockchain. Retrieved from https://eprint.iacr.org
Valenta, M., & Sandner, P. (2017). Comparison of Ethereum Hyperledger Fabric and Corda, Frankfurt:Frankfurt
School Blockchain Center, Jun. 2017.
Zheng, Z., Xie, S., Dai, H. N., Chen, X., & Wang, H. (2018). Blockchain challenges and opportunities: A survey.
International Journal of Web and Grid Services, 14(4), 352-375.
Zhenyu, L., Gaogang, X., Zhongcheng, L., Yunfei, Z.,& Xiaodong, D. (2008). DHT-Aid, Gossip-Based
Heterogeneous Peer-to-Peer Membership Management. 2008 5th IEEE Consumer Communications and
Networking Conference. http://dx.doi.org/ 10.1109/ccnc08.2007.70.
... Both conventional and modern alternatives to blockchain exist, e.g. relational databases, NoSQL databases, and other distributed ledgers (Karaarslan and Konacakl 2020;Schueffel 2017). Relational databases are the most common databases and store structured data in twodimensional tables (Austerberry 2006). ...
... Well-known distributed ledger designs are not as mature as blockchain and have more niche applications. For example, while blockchain was released in 2008, Tangle was only released in 2016, Hashgraph in 2017 and Holochain in 2018 (Karaarslan and Konacakl 2020). ...
Article
Full-text available
Global trade is plagued by slow and inefficient manual processes associated with physical documents. Firms are constantly looking for new ways to improve transparency and increase the resilience of their supply chains. This can be solved by the digitalisation of supply chains and the automation of document-and information-sharing processes. Blockchain is touted as a solution to these issues due to its unique combination of features, such as immutability, decentralisation and transparency. A lack of business cases that quantify the costs and benefits causes uncertainty regarding the truth of these claims. This paper explores how the costs and benefits of a blockchain-based solution for digitalising and automating documentation flows in cross-border supply chains compare to a conventional cen-tralised relational database solution. The research described in this paper uses primary data collected through semi-structured interviews with industry experts, as well as secondary data from literature. Two models based on existing services were developed and the costs and benefits compared and then analysed using the Architecture Trade-off Analysis Method (ATAM) and the Analytic Network Process (ANP). Findings from the analysis show that a consortium blockchain solution like TradeLens is the favourable solution for digitalising and automating information flows in cross-border supply chains. ARTICLE HISTORY
... Blockchain technology is characterized by trustlessness, eliminating dependence on centralized storage providers through the implementation of a transparent and decentralized system. The decentralized system does not involve third parties or intermediaries; instead, it utilizes a peer-to-peer (P2P) method allowing direct communication between nodes, and with the consensus protocol that eliminates the potential for data fraud in the network [7], [8]. ...
Article
Full-text available
In the face of escalating global data exchange, the pronounced vulnerability oftraditional centralized storage networks to manipulation and attacks poses a pressing challenge. Digital service providers, entrusted with vast datasets, grapple with the formidable task of ensuring the security, integrity, and continuous availability of their stored information. This paper tackles these multifaceted issues by proposing a decentralized data storage network empowered by blockchain technology. This approach systematically mitigates the inherent susceptibilities of centralized systems, thereby providing heightened resilience against unauthorized alterations and malicious attacks that compromise digital information integrity. Moreover, the decentralized model holds significant promise for securing public data. By leveraging the transparency and immutability of blockchain ledgers, this approach not only safeguards against unauthorized access but also actively fosters transparency and accountability in data management. This makes it particularly well-suited for ensuring the security and integrity of public data, addressing concerns related to trust and reliability in the ever-evolving landscape of information exchange.
... Since there are no servers in such systems, each individual computer will independently calculate recommendations based on the information available to it [4,6,7]. As a result, there may be problems with the reliability and data security of the information system of the network [5,8], in particular, the recommender system. After all, new nodes connecting to the network can be controlled by attackers or be affected by malicious software. ...
Article
Full-text available
Recommender systems make it easier to search with a large amount of content, supplementing or replacing the classic search output with recommendations. In P2P networks, their use can have additional benefits. Because of indexing and search problems, previously added files may not be available to P2P network users. If the user cannot find the file he is looking for, one can provide him with a list of recommendations based on his preferences and search query. The object of research is the process of creating recommendations for users of decentralized P2P networks to facilitate data search. The urgent task of increasing the accuracy of mathematical modeling of recommender systems by taking into account the requirements for reliability and data security during changes in the structure of a decentralized P2P network is solved. An analytical model of the recommender system of a decentralized P2P network has been developed, the main feature of which is taking into account the requirements of reliability and security of recommendation messages. This was done by introducing the following indicators into the general model of the decentralized recommender system – the probability of reliable packet transmission and the probability of safe packet transmission. The developed analytical model makes it possible to conduct a comparative analysis of different methods of operation of recommender systems and to set acceptable parameters under which the degree of relevance does not fall below a certain threshold. The developed mathematical model of the system based on the GERT scheme differs from the known ones by taking into account the reliability and security requirements during changes in the structure of the decentralized P2P network. This has made it possible to improve the accuracy of simulation results up to 5 %. The proposed mathematical model could be used for prototyping recommender systems in various fields of activity
... The most popular application of the blockchain technology is for keeping a decentralized and secured record of the transactions in cryptocurrency systems like 'Bitcoin' [4]. The innovative concept of the blockchain is that it instills confidence without requiring a reliable third party by guaranteeing the truthfulness and security of a data record. ...
Article
Full-text available
Blockchain technology ensures record-keeping by redundantly storing and verifying transactions on a distributed network of nodes. Permissionless blockchains have pushed the development of decentralized applications (DApps) characterized by distributed business logic, resilience to centralized failures, and data immutability. However, storage scalability without sacrificing throughput is one of the remaining open challenges in permissionless blockchains. Enhancing throughput often compromises storage, as seen in projects such as Elastico, OmniLedger, and RapidChain. On the other hand, solutions seeking to save storage, such as CUB, Jidar, SASLedger, and SE-Chain, reduce the transactional throughput. To our knowledge, no analysis has been performed that relates storage growth to transactional throughput. In this article, we delve into the execution of the Bitcoin and Ethereum transactional models, unlocking patterns that represent any transaction on the blockchain. We reveal the trade-off between transactional throughput and storage. To achieve this, we introduce the spent-by relation, a new abstraction of the UTXO model that utilizes a directed acyclic graph (DAG) to reveal the patterns and allows for a graph with granular information. We then analyze the transactional patterns to identify the most storage-intensive ones and those that offer greater flexibility in the throughput/storage trade-off. Finally, we present an analytical study showing that the UTXO model is more storage-intensive than the account model but scales better in transactional throughput.
Chapter
The rapid development of global navigation, information and communication technology, and sensor technology, alongside the launch of a vast number of geo-satellites, have led to an unprecedented amount of geospatial data being generated. The need to share and use this data reliably has persisted, and data privacy, integrity, and security have become crucial issues. Guaranteeing these aspects of geospatial data is challenging, given the extensive use of the data in a range of technologies and the fact that it is stored in various formats and calibrated by different standards. Before any comparison, combination, or mapping can occur, data scrubbing and reformatting are necessary. Maintaining data integrity, while sharing or storage, is challenging under these conditions. To preserve the privacy and integrity of geospatial data, the data must be validated and protected from unauthorized modifications. Blockchain has recently emerged as a potential solution to the challenges of geospatial data, as it possesses tamper-proof, traceable, trust-free, transparent, and decentralized characteristics. Blockchain integrates consensus mechanisms, asymmetric cryptographic algorithms, and distributed data storage to achieve these features, making it a promising technology to address the issue. We have proposed a method for storing and accessing geospatial data in the distributed blockchain using InterPlanetary File System (IPFS). We have tested our proposed method using VEDAS SIH dataset, Bhuvan dataset and Kaggle SpaceNet dataset. The test result of the proposed method is efficient, secure, and immutable. The proposed method is compared with the state-of-the-art centralized storage solutions.
Chapter
Metaverse is evolving as a structure that provides three-dimensional access with the creation of various virtual worlds using different technologies. The internet has undergone a comprehensive advancement before the formation of the Metaverse. The transition from centralized systems to decentralized systems played the most significant role in the basis of this change. Information security, power, politics, and the economy are the driving forces of interdisciplinary decentralization. Decentralization gained more importance after it became possible with blockchain technology. Blockchain enables decentralized transactions in many areas. The economic dimension of these systems is at a high level, and cryptocurrencies have started to be used within this framework. Decentralized internet is the most essential requirement for these developments. In this process; new structures are being developed that provide more advanced interaction with internet sites with virtual rooms and three-dimensional avatars. New experiments and applications are constantly being carried out on Metaverse. In the information technology age, every trial and application is brought to the attention of users and developers as soon as possible. Decentralization is behind the rapid development of this process. With the elimination of intermediaries, peer-to-peer transactions become possible, and users can realize what cannot be done before using distributed and decentralized network technology. This enables a very high number of system users to be reached in a much shorter time. In this way, many economists believe that the Metaverse market has a potential exceeding a trillion dollars. Metaverse users will want to protect their personal data that is transfered to this environment and the digital assets. In this sense, decentralized systems provide the user and service providers confidence. Web 3.0 will take information-sharing processes to higher levels with smart contracts, crypto assets, and the token economy. In this chapter, the concept of distributed systems and decentralization is examined from an interdisciplinary perspective. The decentralized Metaverse concept is explained by evaluating the opportunities and possible problems of the decentralized systems.
Article
The extension of emerging renewable energy sources such as wind and water turbines, solar panels, and the increasing usage of electric vehicles requires the supply and distribution of energy in a small device on local scale and it has created new methods of supplying and selling electricity. Middle buyers and end users can obtain the local energy with the peer‐to‐peer trading method in this large and hierarchical market. This method enables market to manage and exchange the electricity between major suppliers and medium and local levels. Blockchain technology is developing in peer‐to‐peer exchange of electricity and acts as a reliable, efficient, and safe technology in the electricity trading market. In this method, while preserving the privacy of electricity users, by using smart contracts and by removing intermediaries in the energy supply and demand market, direct commercial interactions between energy suppliers and consumers are done. The blockchain technology, while creating trust between the parties in the energy market, reduces the cost of electricity trading and increases its scalability with using the intermediate energy aggregators. In this research, the blockchain‐based model, is presented for distribution and peer‐to‐peer transactions in the energy market. The suggested model provides the possibility of registration low‐cost instant transactions at the power grid in any specific period of time. The above method, unlike periodic payments, provides immediate access to bills and small payments. Since the transactions outside the blockchain chain are not recorded, this system guarantees its honest and independent operation without fraud and failure. The smart contract method based on blockchain, reduces the transaction fees and speeds up electricity trading. Also, the experimental investigation in 20 nodes shows the time required to determine the exchange contract in the blockchain method. The average is improved by 49.7% in this method. Also, the negotiation convergence time has become 47% faster.
Article
Full-text available
A peer-to-peer cloud storage network implementing end-to-end encryption would allow users to transfer and share data without reliance on a third party data provider. The removal of central controls would eliminate most traditional data failures and outages, as well as significantly increasing security, privacy, and data control. A peer-to-peer network and basic encryption serve as a solution for most problems, but we must offer proper incentivisation for users to properly participate in this network. We propose a solution to these additional problems by using a challenge algorithm. In this way we can periodically cryptographically check the integrity and availability of a file, and offer direct rewards to those maintaining the file. In absence of a peer-to-peer network the described methods may be used to allow users to control, migrate, validate their data on 3rd party data providers without the provider having direct access to the data.
Conference Paper
Full-text available
The revolutionary concept of blockchain and its applications are spectacularly drawing more and more attention in today’s world. The crypto-currency platforms have been on the forefront of implementing blockchain technology. However, the capabilities of blockchains are not limited to monetary transactions. Introduction of smart contracts allowed development of various distributed applications. As the need for blockchains continues to grow, there is also a strong demand for larger, more scalable and more flexible “multipurpose” chains. Conventional blockchains (even the ones supporting smart contracts) cannot comprehensively cover these requirements. To address these issues, the concept of sidechains has been introduced. This paper provides a brief overview of sidechains, explains how they work, discusses their benefits and drawbacks; moreover, describes how they can be built using relevant software and tools.
Article
Full-text available
Recently, Artificial Intelligence (AI) and blockchain have become two of the most trending and disruptive technologies. Blockchain technology has the ability to automate payment in cryptocurrency and to provide access to a shared ledger of data, transactions, and logs in a decentralized, secure, and trusted manner. Also with smart contracts, blockchain has the ability to govern interactions among participants with no intermediary or a trusted third party. AI, on the other hand, offers intelligence and decision-making capabilities for machines similar to humans. In this paper, we present a detailed survey on blockchain applications for AI. We review the literature, tabulate, and summarize the emerging blockchain applications, platforms, and protocols specifically targeting AI area. We also identify and discuss open research challenges of utilizing blockchain technologies for AI.
Conference Paper
Full-text available
Recently the race toward trusted distributed systems has attracted a huge interest, mostly due to the advances in crypto-currencies platforms such as Bitcoin. Currently, different Distributed Ledger Technologies (DLTs) are competing to demonstrate their capabilities and show how they can overcome the limitations faced by others. The common denominator among all distributed ledger technologies is their reliance on a distributed, decentralized peer-to-peer network and a set of modular mechanisms such as cryptographic hashes and consensuses mechanisms. However, their implementations vary substantially in terms of the used data structure, fault tolerance and consensus approaches. This divergence affects the nature of each instance of the DLT in terms of cost, security, latency and performance. In this paper, we present a snapshot of four existing implementations of DLTs. The particularities of each technology and an initial comparison between them is discussed.
Article
Full-text available
Blockchain has numerous benefits such as decentralisation, persistency, anonymity and auditability. There is a wide spectrum of blockchain applications ranging from cryptocurrency, financial services, risk management, internet of things (IoT) to public and social services. Although a number of studies focus on using the blockchain technology in various application aspects, there is no comprehensive survey on the blockchain technology in both technological and application perspectives. To fill this gap, we conduct a comprehensive survey on the blockchain technology. In particular, this paper gives the blockchain taxonomy, introduces typical blockchain consensus algorithms, reviews blockchain applications and discusses technical challenges as well as recent advances in tackling the challenges. Moreover, this paper also points out the future directions in the blockchain technology.
Article
Full-text available
AI and blockchain are among the most disruptive technologies and will fundamentally reshape how we live, work, and interact. The authors summarize existing efforts and discuss the promising future of their integration, seeking to answer the question: What can smart, decentralized, and secure systems do for our society?
Conference Paper
Animal shelters are known as safe places which are managed by governmental or nongovernmental organizations, however the way these establishments harboring animals is a controversial issue. Almost every country in the world have different approaches to that subject. As an example; United States of America and the Europe Union have acclaimed regulations about animal rights. However, the situation in many countries is not that bright for the stray animals. Stray animals face considerable ratios of violence, assault and death. The shelters have conspicuous problems, such as overpopulation, hunger, lack of space, forced mating, illegal euthanasia and death ratio. Those circumstances have put adopting and fostering mechanisms on a much more troublesome way. Our proposal includes a promising, trackable and transparent system solution based on blockchain technology for the animal shelters. Design of the system, requirements and possible usage scenarios have been proposed. The prototype is implemented on Ethereum. Smart contracts are implemented for autonomous work of the system. ---------------------------------------------------------------------------------------------------------------- Özet: Hayvan barınakları, hükümet veya sivil toplum örgütleri tarafından yönetilen güvenli yerler olarak bilinir, ancak bu tesislerin hayvanları barındırma şekli tartışmalı bir konudur. Dünyadaki hemen hemen her ülkenin bu konuda farklı yaklaşımları bulunmaktadır. Örnek olarak; Amerika Birleşik Devletleri ve Avrupa Birliği hayvan hakları ile ilgili kabul gören düzenlemelere sahiptir. Ancak, birçok ülkedeki durum (başıboş) sokak hayvanları için o kadar da parlak değildir. Başıboş hayvanlar büyük oranda şiddet, saldırı ve ölüm oranları ile karşı karşıyadır. Barınma yerlerinin aşırı nüfus, açlık, alan eksikliği, zorunlu çiftleşme, yasadışı ötenazi ve ölüm oranı gibi göze çarpan sorunları bulunmaktadır. Bu şartlar, hayvan barındırma ve koruyucu ailelik mekanizmalarının çok daha sıkıntılı bir şekilde işlemesine yol açmaktadır. Önerimiz, hayvan barınakları için blokzinciri teknolojisine dayanan izlenebilir, şeffaf gelecek vaat eden bir sistem çözümü içermektedir. Sistemin tasarımı, gereksinimleri ve olası kullanım senaryoları önerilmiştir. Prototip Ethereum üzerinde uygulanmıştır. Sistemin özerk çalışması için akıllı sözleşmeler uygulanmaktadır.
Article
Domain name systems and certificate authority systems may have security and trust problems in their implementation. This article summarizes how these systems work and what the implementation problems may be. There are blockchain-based decentralized solutions that claim to overcome those problems. We provide a brief explanation on how blockchain systems work, and their strengths are explained. DNS security challenges are given. Blockchain-based DNS solutions are classified and described in detail according to their services. The advantages and feasibility of these implementations are discussed. Last but not least, the possibility of the decentralized Internet is questioned.