Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org
Proof-of-Stake Consensus Protocol for Cyber Supply Chain Data Provenance
Xueping Liang, Deepak Tosh, Sachin She)y Old Dominion University
Proof-of-Stake Consensus Protocol for Cyber Supply Chain Data - - PowerPoint PPT Presentation
Proof-of-Stake Consensus Protocol for Cyber Supply Chain Data Provenance Xueping Liang, Deepak Tosh, Sachin She)y Old Dominion University Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org
Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org
Xueping Liang, Deepak Tosh, Sachin She)y Old Dominion University
Cryptographically Secure Public/Private signature technology applied to create transacJons that establishes a shared truth. Distributed Network Replicas of distributed ledger and no single parJcipant owns or can
among majority parJcipants is needed to update the database Consensus Consensus among majority parJcipants is needed to update the
validaJon rules provided by smart contract (“Business Logic”) IMMUTABLE LEDGER Append only database that holds immutable record of every transacJon
l Permissionless Blockchain
l
Open access on the Internet
l
Anonymous validators
l
Proof of Work consensus
l
Public network
l
l
Private network
l
Participation by members
l
Trusted validators
l
Customized consensus protocol
Internet Intranet
successfully
latency
developing processes.
soFware, as well as vendor transiJons.
performance, including security check, periodic assessment, logging and monitoring.
improvement or security-related enhancement
energy-efficient way
buffer (𝑇↓𝑗 )
parameter (𝛿) drives X↓i
parameter
∀𝑗∈𝑂
elecJon occurs
Stake DeterminaJon Stake AllocaJon Stake VerificaJon Leader SelecJon Block PropagaJon
D4 D3 D2 D1
Resource Manager [Kubernetes]
(Xen Hyp.) Container-4 Container-2 Container-3 Container-1
B0 B1 B2 ... B0 B1 B2 ... B0 B1 B2 ... B0 B1 B2 ...
(In Presence of Network Delay)
Higher the stake, chances of becoming leader is high
private), consensus protocols (Proof-of-Work, Proof-of-Stake, Proof of Elapsed Time, PracJcal ByzanJne Fault Tolerance), factors impacJng scalability (validaJng nodes, bootstrap Jme) and resilience (network/ node failures)