期刊文献+

基于改进的PBFT算法的性能模型研究 被引量:6

Performance Model Research Based on Improved PBFT Algorithm
下载PDF
导出
摘要 尽管区块链网络给现实社会带来了巨大的优势和便捷,但人们担心各式各样的区块链系统模型的性能是否能满足现行主流IT系统。论文旨在研究改进后的拜占庭容错(PBFT)共识算法的性能,能否满足大量节点的区块链网络。对改进后的PBFT一致性共识流程进行了性能建模,计算多达50个网络节点的网络完成一致共识流程所需要的平均时间;论文使用IBM Hyperledger-composer平台创建区块链网络,运行测试用例程序,并使用数据参数化验证该文的模型;并对大型多节点网络的性能进行了测试。 Although blockchain network brings great advantages and convenience to the real society,people worry about whether the performance of various blockchain system models can meet the current mainstream IT systems.This paper aims to study the performance of the improved Byzantine fault-tolerant(PBFT)consensus algorithm,and whether it can meet the needs of block chain networks with a large number of nodes.The improved PBFT conformance consensus process is modeled.The average time required for a network of up to 50 network nodes is calculated to complete a consensus process.This article uses the IBM Hyperledger-composer platform to create a blockchain network,a test case program is ran,and the model using data parameterization is validated.Sensitivity analysis of various system parameters is also carried out and the performance of a large multi-node network is tested.
作者 储劲松 鲍可进 夏纯中 CHU Jinsong;BAO Kejin;XIA Chunzhong(School of Computer Science and Communication Engineering,Jiangsu University,Zhenjiang 212001)
出处 《计算机与数字工程》 2020年第9期2225-2228,2243,共5页 Computer & Digital Engineering
关键词 区块链 PBFT 性能模型 FABRIC 共识算法 bolckchain PBFT performance model fabric consensus algorithm
  • 相关文献

参考文献7

二级参考文献43

  • 1田慧蓉,邹仕洪,王文东,程时端.激励一致的自适应P2P拓扑构造[J].软件学报,2006,17(4):845-853. 被引量:13
  • 2夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 3李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 4Kudtarkar A M, Umamaheswar/ S. Avoiding white washing in P2P networks [ C ]/)2009 First International Communication Systems and Networks and Workshops. NJ:IEEE,2009.
  • 5Douceur J R. The Sybil attack [ J ]. Peer-to- peer systems, 2002,2429:251-260.
  • 6Rowaihy H, Enck W, McDaniel P, et al. Limiting Sybil attacks in structured P2P networks [ C ]//Proceedings - IEEE INFO- COM. NJ, USA : IEEE ,2007.
  • 7Oliver J, Jochen D, Hannes H. Quantitative analysis of the syb- il attack and effective sybil resistance in peer-to'peer systems [C ]//IEEE International Conference on Communications. New Jersey:Institute of Electrical and Electronics Engineers Inc ,2010.
  • 8Viswanath B, Post A, Gummadi K P, et al. An analysis of so- cial network-based Sybil defenses [ C ]//SIGCOMM 10 - Pro- ceedings of the SIGCOMM 2010 Conference. New York:Asso- ciation for Computing Machinery,2010.
  • 9Bofisov N. Computational puzzles as Sybil defenses [ C ]// 2006 6th IEEE International Conference on Peer-to- Peer Computing. California: IEEE ,2006.
  • 10黄金萍.比特币,史上最危险的货币?[N].南方周末,2011(7).

共引文献531

同被引文献57

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部