SlideShare a Scribd company logo
Blockene: A High-throughput Blockchain
Over Mobile Devices
Sambhav Satija and Apurv Mehra, Microsoft Research India; S
udheesh Singanamalla, University of Washington; Karan Grov
er, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, and
Satya Lokam, Microsoft Research India
14th USENIX Symposium on Operating Systems Design and Implementation
November 4–6, 2020
Blockchain is fundamentally heavyweight
Storage cost
terabytes of replicated
storage in high throughput
blockchain (e.g., 1000TPS)
Ledger Ledger
Ledger Ledger
Network cost
45 GB/day of network
communication cost
Compute cost
intensive crypto
Blockchain can be lightweight?
Practically impossible !
Blockchain can be lightweight?
Existing solution: Offloads to resource-heavy node
Practically possible, but
not a true blockchain
Blockene: A (ultra) Lightweight Blockchain
Consensus made by resource-constrained node
Execution & storage by resource-heavy node
Blockene: A (ultra) Lightweight Blockchain
Consensus made by resource-constrained node
Execution & storage by resource-heavy node
Detect malicious behavior
(Audit)
⚫ High performance: 1045 transactions / sec
• Good enough of real-world applications
⚫ Large-scale
• Millions of participants
⚫ Ultra-Lightweight: Need only a smartphone
• ~60MB/day data usage (cellular-data friendly)
• MBs of storage
• ~3% battery cost per day
Blockene
Contributions
No Incentive? A target use-case
No Incentive? A target use-case
Citizens want to audit
without any incentive
⚫ Citizens
• Resource constrained (i.e., run on smartphones)
• Large-scale participation (millions)
• Run (committee-based) consensus without incentives
• 66% majority honest (2/3)
• Detect maliciousness of Politicians (80%) & Citizens (33%)
⚫ Politicians
• Resource powerful (i.e., run server)
• Small-scale participation (low hundreds)
• Only execute decisions taken by Citizens
• 80% of the politicians can be malicious
• Including collusions among themselves and 1/3 citizens
Blockene: Split-Trust Architecture
⚫ Citizen’s attack vector
• Bribing attack on Citizens
• Sybil attack by Citizens
⚫ Policitian’s attack vector
• Staleness attack
• Split-View attack (i.e., fork)
• Drop attack
• Denial-of-Service attack
• Sybil attack
Threat Model
⚫ Bribing attack on Citizens
• Politicians can offer bribes to sufficient number of
committee members
• Exclude this attack by two reasons:
• Carrier-grade NAT:
• IP address of Citizen not exposed
• Push notifications in smartphones:
• Blockene app on the Citizen will ignore any spurious traffic
⚫ Sybil attack by Citizens
• Blockene exploits TEE available in smartphones of
Citizens and ensures a smartphone can have at most
one identity on the blockchain
Threat Model: Citizen’s attack vector
⚫ Staleness attack
• Return non-latest state
⚫ Split-View attack (i.e., fork)
• Respond with two different values to different subsets of
Citizens
⚫ Drop attack
• Ignore Citizen’s request
⚫ Sybil attack
• Assumes out-of-band registration mechanism (identity
known in real-world)
⚫ DoS attack
• Assumes all nodes employ standard DoS protection
Threat Model: Policitian’s attack vector
Blockene Architecture
⚫ Citizen
• Run on a smartphone
• Network bandwidth: 1 MB/s
• Block size of 9MB, containing about 90k transactions
• 1 transaction: 100 bytes
⚫ Politician
• Network bandwidth of 40 MB/s
• 200 nodes
Design: System Configuration
⚫ Using VRF to select a committee (inspired from Algorand)
⚫ Lightweighting Algorand
• In Algorand, each participant wake up every round whether
it is chosen in the committee
• However, Citizen on a mobile phone cannot afford to do
such frequent checks due to significant battery drain
--> Citizens wake up every 10 blocks
⚫ Probabilistic security guarantee
• Recommends 2000 of committee size, assuming 2/3
Citizens are honest
Design: Selecting Committee of Citizens
= 11010110111…000000
Last k bits are all zero,
→ Be a committee
⚫ Citizen periodically verifies the structural integrity of the
blockchain to enforce that the chain of hashes
⚫ Track local state
• Each citizen locally remembers latest 10 blocks
⚫ Chained ID sub-blocks
• Records valid identity of Citizens
⚫ Incremental Validation
• Every 10 blocks, each Citizen queries a safe sample of
Politicians for the latest block number
• Checks signatures of committee of the latest block
Design: Fork-proof Structural Validation
⚫ Citizens validates
• Signatures of the transaction
• Nonce to detect replay attacks
• Semantic correctness (e.g., double spending)
• Referenced values using Merkle path from leaf to root
• Citizens ask challenge path of Merkle tree
Design: Transaction Validation
Design: Block Proposal
Proposer
(by VRF)
Committee
Citizens
1. Pick a safe sample and send Tx to them
Politicians
Gossip
Tx
Tx
Tx
Tx
Tx
Update merkle tree
Design: Block Proposal
Proposer
(by VRF)
Committee
Citizens
2. Pick a safe sample and proposes a new block
Politicians
Gossip
2.1 Freezes the exact set of
transactions: tx_pool ( 2000 txes)
2.2 Generates a commitment with
signed hash of the tx_pool and block#
2.3 Return the commitment to Citizen
tx_pool
Design: Block Proposal
Proposer
(by VRF)
Committee
Citizens
3. Proposer uploads a new block only with commitment
so that other citizens can reconstruct that block by downl
oading the tx_pools
Politicians
Gossip
Design: Block Commit Protocol
Citizens
1. Committee members downloads tx_pools & commitment
Politicians
Gossip
Design: Block Commit Protocol
Citizens
2. Uploads a signed witness list with the commitments
Politicians
Gossip
Design: Block Commit Protocol
Citizens
3. Each proposer downloads all witness lists from a safe sample
and picks commitments with at least a threshold
Politicians
Gossip
Design: Block Commit Protocol
Citizens
4. Committee members run consensus on the commitments
with gossip through Politicians
Politicians
Gossip
(Byzantine Agreement)
Design: Block Commit Protocol
Citizens
5. Each committee member downloads challenge paths for all keys
on the agreed transactions & validates them
Politicians
Gossip
Design: Block Commit Protocol
Citizens
6. If validation is successful, each committee member creates
a block, computes the new Merkle root of the updated values
& uploads them with signature
Politicians
Gossip
Design: Block Commit Protocol
Citizens
7. The proposed block is committed when more than a threshold number
of signatures have accumulated for the block
Politicians
Gossip
⚫ Citizen nodes
• Android app on SDK v23, 10k LoC
• Battery-optimized build and runs as a background app
• Multi-threaded event-driven model on top of EventBus to
parallelize and pipeline network and compute intensive
task
⚫ Politician nodes
• C++, 11K LoC
• State-machine based architecture
• C-Actor-Framework
Implementation
⚫ 2000 Citizen nodes and 200 Politician nodes
⚫ Citizen nodes
• 1-core VMs on Azure with a Xeon E5-2673,
• 2GB of RAM,
• Spread across three geographic regions across WAN
• Runs an Android 7.1 image
• 1MB/s network upload and download
• 2000 committee size
⚫ Politician nodes
• 8-core Azure VMs with a Xeon E5-2673, 32 GB of RAM
• 40MB/s network bandwidth
Experimental Setup
Evaluation: TPS under varying malicious nodes
(Politician/Citizens)
Evaluation: Commit Latency
⚫ Blockene enables a high-throughput lightweight
blockchain where members (with smartphone) perform
block validation and consensus
⚫ Blockene provide three conflicting properties
• Large scale of participation
• High transaction throughput
• Low resource usage at member nodes
Conclusion
Blockene is a lightweight version of Algorand
SOSP’17
Blockene
OSDI’20
Lightweight
Stake-based consensus
(proof-of-stake)
Voting-based consensus
(majority voting)
Gossip through all members Gossip through politicians

More Related Content

Similar to Blockene

Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
Ingo Weber
 
Connecting The Block Cointelligence Academy by Dr Vince Ming
Connecting The Block   Cointelligence Academy by Dr Vince MingConnecting The Block   Cointelligence Academy by Dr Vince Ming
Connecting The Block Cointelligence Academy by Dr Vince Ming
Cointelligence
 
Blockchain - Primer for City CIOs v03 28 22
Blockchain - Primer for City CIOs v03 28 22Blockchain - Primer for City CIOs v03 28 22
Blockchain - Primer for City CIOs v03 28 22
ssusera441c2
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
Amey Ratnakar Prabhu
 
BLOCKCHAIN
 BLOCKCHAIN BLOCKCHAIN
BLOCKCHAIN
Bikash Jaiswal
 
Blockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdfBlockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdf
ssusera441c2
 
Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017
Jeff Garzik
 
blockchain-161025100639.pptx
blockchain-161025100639.pptxblockchain-161025100639.pptx
blockchain-161025100639.pptx
Praveenkumar155694
 
Blockchain
BlockchainBlockchain
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
19MEB302SahilAli
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...
I MT
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
Mike Cartwright
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
M Shamim Iqbal
 
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhgBlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
DevkumarKardamVIT
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
Md. Syful Azam
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
Krzysztof Bury
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v eng
David Vangulick
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
Adri Jovin
 
LINE+LINK-DEV 2018 - ICON’s Interchain Technology and Developer Tools
LINE+LINK-DEV 2018 - ICON’s Interchain Technology and Developer ToolsLINE+LINK-DEV 2018 - ICON’s Interchain Technology and Developer Tools
LINE+LINK-DEV 2018 - ICON’s Interchain Technology and Developer Tools
ICON Foundation
 
Blockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessBlockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your business
David Joao Vieira Carvalho
 

Similar to Blockene (20)

Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
Connecting The Block Cointelligence Academy by Dr Vince Ming
Connecting The Block   Cointelligence Academy by Dr Vince MingConnecting The Block   Cointelligence Academy by Dr Vince Ming
Connecting The Block Cointelligence Academy by Dr Vince Ming
 
Blockchain - Primer for City CIOs v03 28 22
Blockchain - Primer for City CIOs v03 28 22Blockchain - Primer for City CIOs v03 28 22
Blockchain - Primer for City CIOs v03 28 22
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
BLOCKCHAIN
 BLOCKCHAIN BLOCKCHAIN
BLOCKCHAIN
 
Blockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdfBlockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdf
 
Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017
 
blockchain-161025100639.pptx
blockchain-161025100639.pptxblockchain-161025100639.pptx
blockchain-161025100639.pptx
 
Blockchain
BlockchainBlockchain
Blockchain
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhgBlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v eng
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
 
LINE+LINK-DEV 2018 - ICON’s Interchain Technology and Developer Tools
LINE+LINK-DEV 2018 - ICON’s Interchain Technology and Developer ToolsLINE+LINK-DEV 2018 - ICON’s Interchain Technology and Developer Tools
LINE+LINK-DEV 2018 - ICON’s Interchain Technology and Developer Tools
 
Blockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessBlockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your business
 

More from YongraeJo

Enhancing Ethereum PoA Clique Network with DAG-based BFT Consensus
Enhancing Ethereum PoA Clique Network with DAG-based BFT ConsensusEnhancing Ethereum PoA Clique Network with DAG-based BFT Consensus
Enhancing Ethereum PoA Clique Network with DAG-based BFT Consensus
YongraeJo
 
Zeus Locality aware distributed transaction upload.pptx
Zeus Locality aware distributed transaction upload.pptxZeus Locality aware distributed transaction upload.pptx
Zeus Locality aware distributed transaction upload.pptx
YongraeJo
 
basil.pptx
basil.pptxbasil.pptx
basil.pptx
YongraeJo
 
HotStuff
HotStuff HotStuff
HotStuff
YongraeJo
 
Fbft
FbftFbft
Fbft
YongraeJo
 
blockchain-and-trusted-computing
blockchain-and-trusted-computingblockchain-and-trusted-computing
blockchain-and-trusted-computing
YongraeJo
 
Blockchain meets database
Blockchain meets databaseBlockchain meets database
Blockchain meets database
YongraeJo
 
Beat
BeatBeat
Beat
YongraeJo
 
Byzantine ordered consensus
Byzantine ordered consensusByzantine ordered consensus
Byzantine ordered consensus
YongraeJo
 
BlockLot: Blockchain-based verifiable lottery
BlockLot: Blockchain-based verifiable lotteryBlockLot: Blockchain-based verifiable lottery
BlockLot: Blockchain-based verifiable lottery
YongraeJo
 
Simple robot pets with three emotions (uC/OS III)
Simple robot pets with three emotions (uC/OS III)Simple robot pets with three emotions (uC/OS III)
Simple robot pets with three emotions (uC/OS III)
YongraeJo
 
FlexSC
FlexSCFlexSC
FlexSC
YongraeJo
 
Honeybadger of BFT Protocols
Honeybadger of BFT ProtocolsHoneybadger of BFT Protocols
Honeybadger of BFT Protocols
YongraeJo
 
Cheapbft
Cheapbft Cheapbft
Cheapbft
YongraeJo
 
Practical Byzantine Fault Tolernace
Practical Byzantine Fault TolernacePractical Byzantine Fault Tolernace
Practical Byzantine Fault Tolernace
YongraeJo
 
Making BFT Protocols Really Adaptive
Making BFT Protocols Really AdaptiveMaking BFT Protocols Really Adaptive
Making BFT Protocols Really Adaptive
YongraeJo
 
Pileus
PileusPileus
Pileus
YongraeJo
 
Vft
VftVft

More from YongraeJo (20)

Enhancing Ethereum PoA Clique Network with DAG-based BFT Consensus
Enhancing Ethereum PoA Clique Network with DAG-based BFT ConsensusEnhancing Ethereum PoA Clique Network with DAG-based BFT Consensus
Enhancing Ethereum PoA Clique Network with DAG-based BFT Consensus
 
Zeus Locality aware distributed transaction upload.pptx
Zeus Locality aware distributed transaction upload.pptxZeus Locality aware distributed transaction upload.pptx
Zeus Locality aware distributed transaction upload.pptx
 
basil.pptx
basil.pptxbasil.pptx
basil.pptx
 
HotStuff
HotStuff HotStuff
HotStuff
 
Fbft
FbftFbft
Fbft
 
blockchain-and-trusted-computing
blockchain-and-trusted-computingblockchain-and-trusted-computing
blockchain-and-trusted-computing
 
Blockchain meets database
Blockchain meets databaseBlockchain meets database
Blockchain meets database
 
Beat
BeatBeat
Beat
 
Byzantine ordered consensus
Byzantine ordered consensusByzantine ordered consensus
Byzantine ordered consensus
 
Stellar
StellarStellar
Stellar
 
Ledgerdb
LedgerdbLedgerdb
Ledgerdb
 
BlockLot: Blockchain-based verifiable lottery
BlockLot: Blockchain-based verifiable lotteryBlockLot: Blockchain-based verifiable lottery
BlockLot: Blockchain-based verifiable lottery
 
Simple robot pets with three emotions (uC/OS III)
Simple robot pets with three emotions (uC/OS III)Simple robot pets with three emotions (uC/OS III)
Simple robot pets with three emotions (uC/OS III)
 
FlexSC
FlexSCFlexSC
FlexSC
 
Honeybadger of BFT Protocols
Honeybadger of BFT ProtocolsHoneybadger of BFT Protocols
Honeybadger of BFT Protocols
 
Cheapbft
Cheapbft Cheapbft
Cheapbft
 
Practical Byzantine Fault Tolernace
Practical Byzantine Fault TolernacePractical Byzantine Fault Tolernace
Practical Byzantine Fault Tolernace
 
Making BFT Protocols Really Adaptive
Making BFT Protocols Really AdaptiveMaking BFT Protocols Really Adaptive
Making BFT Protocols Really Adaptive
 
Pileus
PileusPileus
Pileus
 
Vft
VftVft
Vft
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Blockene

  • 1. Blockene: A High-throughput Blockchain Over Mobile Devices Sambhav Satija and Apurv Mehra, Microsoft Research India; S udheesh Singanamalla, University of Washington; Karan Grov er, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, and Satya Lokam, Microsoft Research India 14th USENIX Symposium on Operating Systems Design and Implementation November 4–6, 2020
  • 2. Blockchain is fundamentally heavyweight Storage cost terabytes of replicated storage in high throughput blockchain (e.g., 1000TPS) Ledger Ledger Ledger Ledger Network cost 45 GB/day of network communication cost Compute cost intensive crypto
  • 3. Blockchain can be lightweight? Practically impossible !
  • 4. Blockchain can be lightweight? Existing solution: Offloads to resource-heavy node Practically possible, but not a true blockchain
  • 5. Blockene: A (ultra) Lightweight Blockchain Consensus made by resource-constrained node Execution & storage by resource-heavy node
  • 6. Blockene: A (ultra) Lightweight Blockchain Consensus made by resource-constrained node Execution & storage by resource-heavy node Detect malicious behavior (Audit)
  • 7. ⚫ High performance: 1045 transactions / sec • Good enough of real-world applications ⚫ Large-scale • Millions of participants ⚫ Ultra-Lightweight: Need only a smartphone • ~60MB/day data usage (cellular-data friendly) • MBs of storage • ~3% battery cost per day Blockene
  • 9. No Incentive? A target use-case
  • 10. No Incentive? A target use-case Citizens want to audit without any incentive
  • 11. ⚫ Citizens • Resource constrained (i.e., run on smartphones) • Large-scale participation (millions) • Run (committee-based) consensus without incentives • 66% majority honest (2/3) • Detect maliciousness of Politicians (80%) & Citizens (33%) ⚫ Politicians • Resource powerful (i.e., run server) • Small-scale participation (low hundreds) • Only execute decisions taken by Citizens • 80% of the politicians can be malicious • Including collusions among themselves and 1/3 citizens Blockene: Split-Trust Architecture
  • 12. ⚫ Citizen’s attack vector • Bribing attack on Citizens • Sybil attack by Citizens ⚫ Policitian’s attack vector • Staleness attack • Split-View attack (i.e., fork) • Drop attack • Denial-of-Service attack • Sybil attack Threat Model
  • 13. ⚫ Bribing attack on Citizens • Politicians can offer bribes to sufficient number of committee members • Exclude this attack by two reasons: • Carrier-grade NAT: • IP address of Citizen not exposed • Push notifications in smartphones: • Blockene app on the Citizen will ignore any spurious traffic ⚫ Sybil attack by Citizens • Blockene exploits TEE available in smartphones of Citizens and ensures a smartphone can have at most one identity on the blockchain Threat Model: Citizen’s attack vector
  • 14. ⚫ Staleness attack • Return non-latest state ⚫ Split-View attack (i.e., fork) • Respond with two different values to different subsets of Citizens ⚫ Drop attack • Ignore Citizen’s request ⚫ Sybil attack • Assumes out-of-band registration mechanism (identity known in real-world) ⚫ DoS attack • Assumes all nodes employ standard DoS protection Threat Model: Policitian’s attack vector
  • 16. ⚫ Citizen • Run on a smartphone • Network bandwidth: 1 MB/s • Block size of 9MB, containing about 90k transactions • 1 transaction: 100 bytes ⚫ Politician • Network bandwidth of 40 MB/s • 200 nodes Design: System Configuration
  • 17. ⚫ Using VRF to select a committee (inspired from Algorand) ⚫ Lightweighting Algorand • In Algorand, each participant wake up every round whether it is chosen in the committee • However, Citizen on a mobile phone cannot afford to do such frequent checks due to significant battery drain --> Citizens wake up every 10 blocks ⚫ Probabilistic security guarantee • Recommends 2000 of committee size, assuming 2/3 Citizens are honest Design: Selecting Committee of Citizens = 11010110111…000000 Last k bits are all zero, → Be a committee
  • 18. ⚫ Citizen periodically verifies the structural integrity of the blockchain to enforce that the chain of hashes ⚫ Track local state • Each citizen locally remembers latest 10 blocks ⚫ Chained ID sub-blocks • Records valid identity of Citizens ⚫ Incremental Validation • Every 10 blocks, each Citizen queries a safe sample of Politicians for the latest block number • Checks signatures of committee of the latest block Design: Fork-proof Structural Validation
  • 19. ⚫ Citizens validates • Signatures of the transaction • Nonce to detect replay attacks • Semantic correctness (e.g., double spending) • Referenced values using Merkle path from leaf to root • Citizens ask challenge path of Merkle tree Design: Transaction Validation
  • 20. Design: Block Proposal Proposer (by VRF) Committee Citizens 1. Pick a safe sample and send Tx to them Politicians Gossip Tx Tx Tx Tx Tx Update merkle tree
  • 21. Design: Block Proposal Proposer (by VRF) Committee Citizens 2. Pick a safe sample and proposes a new block Politicians Gossip 2.1 Freezes the exact set of transactions: tx_pool ( 2000 txes) 2.2 Generates a commitment with signed hash of the tx_pool and block# 2.3 Return the commitment to Citizen tx_pool
  • 22. Design: Block Proposal Proposer (by VRF) Committee Citizens 3. Proposer uploads a new block only with commitment so that other citizens can reconstruct that block by downl oading the tx_pools Politicians Gossip
  • 23. Design: Block Commit Protocol Citizens 1. Committee members downloads tx_pools & commitment Politicians Gossip
  • 24. Design: Block Commit Protocol Citizens 2. Uploads a signed witness list with the commitments Politicians Gossip
  • 25. Design: Block Commit Protocol Citizens 3. Each proposer downloads all witness lists from a safe sample and picks commitments with at least a threshold Politicians Gossip
  • 26. Design: Block Commit Protocol Citizens 4. Committee members run consensus on the commitments with gossip through Politicians Politicians Gossip (Byzantine Agreement)
  • 27. Design: Block Commit Protocol Citizens 5. Each committee member downloads challenge paths for all keys on the agreed transactions & validates them Politicians Gossip
  • 28. Design: Block Commit Protocol Citizens 6. If validation is successful, each committee member creates a block, computes the new Merkle root of the updated values & uploads them with signature Politicians Gossip
  • 29. Design: Block Commit Protocol Citizens 7. The proposed block is committed when more than a threshold number of signatures have accumulated for the block Politicians Gossip
  • 30. ⚫ Citizen nodes • Android app on SDK v23, 10k LoC • Battery-optimized build and runs as a background app • Multi-threaded event-driven model on top of EventBus to parallelize and pipeline network and compute intensive task ⚫ Politician nodes • C++, 11K LoC • State-machine based architecture • C-Actor-Framework Implementation
  • 31. ⚫ 2000 Citizen nodes and 200 Politician nodes ⚫ Citizen nodes • 1-core VMs on Azure with a Xeon E5-2673, • 2GB of RAM, • Spread across three geographic regions across WAN • Runs an Android 7.1 image • 1MB/s network upload and download • 2000 committee size ⚫ Politician nodes • 8-core Azure VMs with a Xeon E5-2673, 32 GB of RAM • 40MB/s network bandwidth Experimental Setup
  • 32. Evaluation: TPS under varying malicious nodes (Politician/Citizens)
  • 34. ⚫ Blockene enables a high-throughput lightweight blockchain where members (with smartphone) perform block validation and consensus ⚫ Blockene provide three conflicting properties • Large scale of participation • High transaction throughput • Low resource usage at member nodes Conclusion
  • 35. Blockene is a lightweight version of Algorand SOSP’17 Blockene OSDI’20 Lightweight Stake-based consensus (proof-of-stake) Voting-based consensus (majority voting) Gossip through all members Gossip through politicians