Proof-of-Stake Consensus Protocol for Cyber Supply Chain Data - - PowerPoint PPT Presentation

proof of stake consensus protocol for cyber supply chain
SMART_READER_LITE
LIVE PREVIEW

Proof-of-Stake Consensus Protocol for Cyber Supply Chain Data - - PowerPoint PPT Presentation

Proof-of-Stake Consensus Protocol for Cyber Supply Chain Data Provenance Xueping Liang, Deepak Tosh, Sachin She)y Old Dominion University Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org


slide-1
SLIDE 1

Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org

Proof-of-Stake Consensus Protocol for Cyber Supply Chain Data Provenance

Xueping Liang, Deepak Tosh, Sachin She)y Old Dominion University

slide-2
SLIDE 2

Mo;va;on

  • Address cyber supply chain risks due to lack of trust in soFware

and firmware developed by third party vendors

  • Current soluJons, such as, side channel fingerprinJng, reverse

engineering, deployed at chip level are not scalable to protect enJre cyber supply chain and cannot provide near real-Jme tracking

  • Goal – Permissioned blockchain-based data provenance

framework to ensure processes in the supply chain are funcJoning according the intended purpose.

slide-3
SLIDE 3

Blockchain Overview

Cryptographically Secure Public/Private signature technology applied to create transacJons that establishes a shared truth. Distributed Network Replicas of distributed ledger and no single parJcipant owns or can

  • tamper. Consensus

among majority parJcipants is needed to update the database Consensus Consensus among majority parJcipants is needed to update the

  • database. Leverages

validaJon rules provided by smart contract (“Business Logic”) IMMUTABLE LEDGER Append only database that holds immutable record of every transacJon

slide-4
SLIDE 4

Blockchain Overview

l Permissionless Blockchain

Infrastructures

l

Open access on the Internet

l

Anonymous validators

l

Proof of Work consensus

l

Public network

l

Permissioned Blockchain Infrastructures

l

Private network

l

Participation by members

  • nly

l

Trusted validators

l

Customized consensus protocol

Internet Intranet

slide-5
SLIDE 5

Consensus Protocols

  • Proof of Work
  • Carry out large computaJon and prove that computaJon was

successfully

  • No addiJonal work to check the proof
  • Limits the rate of new blocks and expensive to add invalid blocks
  • Aids in deciding between compeJng chains
  • Proof of Stake
  • Achieve consensus by eliminaJng expense proof of work
  • Block creaJon Jed to amount of stake
  • ByzanJne Fault Tolerance
  • Trusted enJJes work together to add records
  • VoJng process for accepJng a block on the chain
slide-6
SLIDE 6

Consensus Protocols

  • GHOST
  • Weigh subtrees to resolve conflicts
  • Bitcoin-NG
  • Leader elecJon to append microblocks for increasing throughput and decreasing

latency

  • ParallelizaJon
  • BlockDAG
  • Eliminate communicaJon and resource overhead
  • Stellar, XFT, CheapBF(trusted hardware)
  • Randomized BFT
  • Probability vs determinisJcally
  • BFT design framework (h\p://www.vukolic.com/700-Eurosys.pdf)
  • Mix of PoW and BFT (SCP)
  • PoW for idenJty management
  • BFT for agreement
slide-7
SLIDE 7

Approach

  • Blockchain empowered cyber supply chain framework
  • Cyber Supply Chain System EnJJes
  • System Operator, end-user and vendor
  • Cyber Supply Chain System Processes
  • Procurement and OperaJonal Phases
  • Cyber Supply Chain A\acks
  • Manufacturer Source Code, vendor remote access
  • Proof-of-stake consensus protocol to balance tradeoff

between scalability and resilience

slide-8
SLIDE 8

Blockchain empowered cyber supply chain framework

slide-9
SLIDE 9

Blockchain empowered cyber supply chain framework

in a distributed system

slide-10
SLIDE 10

Blockchain empowered cyber supply chain framework

  • Procurement Phase
  • IdenJfy and document cyber security risks during designing and

developing processes.

  • Prevent a\acks resulJng from procuring and uJlizing vendor devices or

soFware, as well as vendor transiJons.

  • OperaJonal Phase
  • Record regular pracJces to maintain the system funcJonality and

performance, including security check, periodic assessment, logging and monitoring.

  • Conduct soFware updates from vendors either for performance

improvement or security-related enhancement

slide-11
SLIDE 11

Blockchain empowered cyber supply chain framework

  • Procedures
  • IdenJty Establishment
  • Product AuthenJcity and VerificaJon
  • Access Control Management
  • Contract NegoJaJon and ExecuJon
  • Logging, Monitoring and AudiJng
  • Challenges
  • IdenJty protecJon
  • Integrity protecJon
  • Fine-grained access control management
  • Automated contract execuJon
  • Tamper-resistant record keeping
slide-12
SLIDE 12

Requirements for consensus protocols

  • Efficiency
  • Time to achieve agreement
  • TransacJon processing Jme
  • Security
  • DeterminisJc agreement
  • Resilient to parJal node failure
  • Scalability
  • Number of validaJng nodes
  • TransacJon Processing
slide-13
SLIDE 13

Distributed Consensus Protocol

  • TradiJonal PoW suffers from large consensus delay and high

computaJonal requirement

  • State-of-the art Proof of Stake consensus works well for

cryptocurrencies

  • Mechanism for allocaJng resources should balance tradeoff

between resilience and scalability

  • No formal work on defining stake in distributed systems
slide-14
SLIDE 14

Distributed Consensus Protocol

  • Audit data-related operaJons in cyber supply chain in near real-

Jme

  • PoS based Energy-efficient consensus protocol
  • Validators who commit transacJons offer securiJes in the form of stakes
  • OpportunisJc use of under-uJlized resources for realizing the consensus in

energy-efficient way

  • Reward of dedicaJng resources to maintain consensus
  • Malicious acJons in consensus are prevented through penalizing stake
slide-15
SLIDE 15

Threat Model

  • Validators’ agility (may enter and exit the consensus process

anyJme)

  • Validators may behave erraJcally or even disappear in

between an ongoing epoch

  • Permieng any user to be validator can widen a\ack surface

through nothing-at-stake problem

  • ReputaJon of validators ma\ers otherwise greediness may

drive the consensus toward maliciousness

slide-16
SLIDE 16

Defining Stakes

  • In cryptocurrency, stakes are nothing but tokenized

form for the currencies

  • In cloud compuJng perspecJve, stakes can be
  • CPU power or the number of CPU slices/cores provided by the CSP (​𝐷↓𝑗 )
  • Amount of memory allocated for program execuJon and temporary

buffer (​𝑇↓𝑗 )

  • Network data rate (​𝐸↓𝑗 )
  • Secondary storage etc.
  • Stake of a validator 𝑗 can be a tuple ​X↓i = <​𝑌↓​𝐷↓𝑗 , ​𝑌↓​𝑇↓𝑗 ,​𝑌↓​𝐸↓𝑗 >

that is selected out of total allocated resources ​R↓i =<​𝐷↓𝑗↑max , ​

𝑇↓𝑗↑max ,​𝐸↓𝑗↑𝑛𝑏𝑦 >

  • Given current resource usage <​𝐷↓𝑗 ,​𝑇↓𝑗 ,​𝐸↓𝑗 >, the greediness

parameter (𝛿) drives ​X↓i

slide-17
SLIDE 17

Incen;ves for par;cipa;on

  • Consensus cannot survive with no parJcipaJon
  • MoJvaJon requires incenJvizaJon
  • Rewarding consensus validators should be through
  • TransacJon fees
  • Transferring resources to the leader’s account
  • DiscounJng leasing costs
  • Who offers the reward?
  • Choice to make: Service provider or clients?
  • If ​R↓𝑢𝑝𝑢𝑏𝑚 turns out to be the benefit of service for a total of 𝑨

epochs, then reward ​𝑆↓𝑢𝑝𝑢𝑏𝑚 /𝑨 /epoch should be dedicated

  • Leader-followers’ reward distribuJon needs to be agreed !!!
slide-18
SLIDE 18

PoS based Energy-efficient consensus protocol

a. Stake DeterminaJon

  • Stake for validator 𝑗=​𝑌↓𝑗 =f(R, ​R↑u , 𝛿)=𝛿(𝑆−​𝑆↑𝑣 ), 𝛿 is greediness

parameter

  • b. Resource staking and confirmaJon
  • VMCREATE( <​𝑌↓​𝐷↓𝑗 , ​𝑌↓​𝑇↓𝑗 ,​𝑌↓​𝐸↓𝑗 >, Shared_Sec) → (​∆↓𝑗 , ​txID↓i ),

∀𝑗∈𝑂

  • VMVERIFY(​∆↓𝑗 )→{0, 1}

c. StochasJc leader elecJon based on proporJon of staked resources

  • Probability of i being a leader is defined as: ​𝑞↓𝑗 =​‖​𝑌↓𝑗 ‖/∑𝑙=1↑𝑂▒‖​𝑌↓𝑙 ‖
  • d. Block replicaJon and verificaJon
  • Leader’s block gets broadcasted and verified before commit otherwise re-

elecJon occurs

e. Reward distribuJon for parJcipaJon in consensus

  • Extra resource as incenJve, or reduced resource leasing cost as incenJve
slide-19
SLIDE 19

Algorithm

Stake DeterminaJon Stake AllocaJon Stake VerificaJon Leader SelecJon Block PropagaJon

slide-20
SLIDE 20

PoS Consensus Timeline

slide-21
SLIDE 21

Experimental Testbed

q Testbed environment is based on a local cluster of physical machines managed by a Xen Hypervisor q ElasJcity resource management is done through Kubernetes and Docker is used for containerized services in the VMs

D4 D3 D2 D1

Resource Manager [Kubernetes]

(Xen Hyp.) Container-4 Container-2 Container-3 Container-1

B0 B1 B2 ... B0 B1 B2 ... B0 B1 B2 ... B0 B1 B2 ...

slide-22
SLIDE 22

Performance Evalua;on

§ Each validator’s stake value is designed as a value between 0 and 100 § Validators stake remains unchanged for a fixed duraJon § Network latency is considered to be normally distributed between 1 and 5ms § Time for block mining consists of Jme taken to verify transacJons and stakes of the leader

slide-23
SLIDE 23

Evalua;on Metrics

§ Average and total Jmes each validator was the leader

§ Total number of Jmes a leader was selected as validator but did not have the highest stake amount § Average, max/min Jme in milliseconds to make progress and extend the Blockchain with a new block

slide-24
SLIDE 24

Average ;me to extend Blockchain with a new block

(In Presence of Network Delay)

slide-25
SLIDE 25

Average # of ;mes a leader elected based on stake amount

Higher the stake, chances of becoming leader is high

slide-26
SLIDE 26

Ongoing and Future Work

  • Formal Analysis of the Proof-of-Stake protocol to evaluate

scalability and resilience to a\acks

  • Development of Blockchain-based Cyber Supply Chain

Prototype in Hyperledger Fabric

  • Development of simulator to aid in engineering Blockchain

soluJons for cyber supply chain

  • QuanJtaJve insights into choice of plasorms (public/private/public-

private), consensus protocols (Proof-of-Work, Proof-of-Stake, Proof of Elapsed Time, PracJcal ByzanJne Fault Tolerance), factors impacJng scalability (validaJng nodes, bootstrap Jme) and resilience (network/ node failures)

slide-27
SLIDE 27

Related Publica;ons

  • Xueping Liang, Sachin She\y, Deepak Tosh, Yafei Ji, Danyi Li,

“Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System using Blockchain”, 14th EAI InternaJonal Conference on Security and Privacy in CommunicaJon Networks (SecureComm), August 2018

  • Xueping Liang, Sachin She\y, Deepak Tosh, Charles Kamhoua,

Kevin Kwiat, Laurent Njilla, “ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability”, The 17th IEEE/ACM InternaJonal Symposium on Cluster, Cloud and Grid CompuJng (CCGRID), May 2017.

  • Deepak Tosh Sachin She\y, Xueping Liang, Charles Kamhoua,

Kevin Kwiat, Laurent Njilla, “Security ImplicaJons of Blockchain Cloud with Analysis of Block Withholding A\ack”, 17th IEEE/ ACM InternaJonal Symposium on Cluster, Cloud and Grid CompuJng (CCGRID), May 2017.

slide-28
SLIDE 28

Thank You ! QuesJons?