English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109951/140892 (78%)
Visitors : 46221004      Online Users : 764
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/131116
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/131116


    Title: 企業區塊鏈平台Quorum的共識機制與交易復原程序之研究
    A Study on Consensus Mechanism and Transaction Recovery Procedure of Enterprise Blockchain Platform Quorum
    Authors: 邱天
    Chiu, Tien
    Contributors: 陳恭
    Chen, Kung
    邱天
    Chiu, Tien
    Keywords: 企業區塊鏈
    共識機制
    私有交易
    容錯
    Enterprise blockchain
    Consensus mechanism
    Private transaction
    Fault tolerance
    Date: 2020
    Issue Date: 2020-08-03 17:59:22 (UTC+8)
    Abstract: Quorum 是美國摩根大通銀行(JP Morgan Chase)所投資研發,基於以太坊所開發的聯盟鏈。Quorum跟以太坊最大的差異在於私有交易的功能,只有參與私有交易的節點能夠知道交易內容。Quorum提供較佳的交易執行效率以及隱私性,但其在容錯方面的表現並不是很完善,當有惡意節點或是故障節點出現時,Quorum在特定情況下將會出錯。
    本論文將從惡意節點和故障節點兩方面來討論如何加強Quorum的容錯功能。惡意節點方面,將在Quorum上實作2-Step-BFT,此共識能夠容忍小於總節點數五分之一的惡意節點,且保證安全性(safety)和活性(liveness)。而故障節點方面,將提出兩種方法來修改私有交易的架構。第一種是以資料庫備份來提高可用性。第二種是新增一個全知節點,全知節點將能夠知道所有私有交易參與方。最後將結合以上兩種方法,讓故障節點遺失的私有交易能夠順利被復原。
    實驗結果顯示,2-Step-BFT共識機制能夠在有惡意節點的情況下正常運作,且新的私有交易架構也能將故障節點遺失的私有交易復原。
    Quorum is invested and developed by JP Morgan Chase and is the consortium blockchain based on Ethereum. The biggest difference between Quorum and Ethereum lies in the function of private transactions. Only nodes participating in private transactions can know the transaction content. Quorum provides better transaction execution efficiency and privacy, but its performance in fault tolerance is not perfect. When faulty nodes or crash nodes appear, Quorum will make mistakes under certain circumstances.
    This thesis discusses how to enhance Quorum`s fault tolerance capability from two aspects: faulty nodes and crash nodes. In terms of faulty nodes, 2-Step-BFT algorithm is implemented in Quorum. It can tolerate faulty nodes that are less than 1/5 of the total number of nodes, and guarantees safety and liveness. In terms of crash nodes, two methods will be proposed to modify the structure of the private transaction. The first way is to improve the availability by backing up the database. The second way is to add the all-knowing node. Finally, the above two methods will be combined to allow the private transactions lost by the crash node to be successfully restored.
    The experimental results show that the 2-Step-BFT consensus mechanism can operate normally in the presence of faulty nodes, and the new private transaction architecture can also recover the lost private transactions of the crash node.
    Reference: [1] D. H.-W. Roberto Saltini, “Correctness Analysis of IBFT,” 2019.
    [2] “Istanbul BFT`s design cannot successfully tolerate fail-stop failures,” [線上]. Available: https://github.com/jpmorganchase/quorum/issues/305.
    [3] J.-W. Su, “私有區塊鏈上的兩步驟拜占庭共識演算法,” 2019.
    [4] S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008.
    [5] L. Lamport, R. Shostak and M. Pease, "The Byzantine Generals Problem," ACM Transactions on Programming Languages and Systems, vol. 4, no. 3, pp. 382-401, July 1982.
    [6] V. Buterin, “A Next-Generation Smart Contract and Decentralized Application Platform,” 2014.
    [7] Y. Sompolinsky and A. Zohar, "Secure High-Rate Transaction Processing in Bitcoin," 2013.
    [8] J.P. Morgan. [線上]. Available: https://github.com/jpmorganchase/quorum/blob/master/docs/Quorum%20Whitepaper%20v0.2.pdf.
    [9] M. Vukolic, "The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication," in International Workshop on Open Problems in Network Security, Zurich, Switzerland, 2015.
    [10] L. Lamport, "The part-time parliament," ACM Transactions on Computer Systems (TOCS), vol. 16, no. 2, pp. 133-169, 1998.
    [11] L. Lamport, "Paxos made simple," ACM Sigact News, vol. 32, no. 4, pp. 18-25, 2001.
    [12] D. Ongaro and J. Ousterhout, "In search of an understandable consensus algorithm," in 2014 USENIX Annual Technical Conference, 2014.
    Description: 碩士
    國立政治大學
    資訊科學系
    107753009
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0107753009
    Data Type: thesis
    DOI: 10.6814/NCCU202000861
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    There are no files associated with this item.



    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback