Page 105 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 105

Chapter 4 A critical review on using blockchain technology in education domain  93




                   appended with document hash. This ensures anonymity, pri-
                   vacy, integrity, and decentralization. Dragon chain follows
                   this consensus approach.
               (d) Proof of believability (PoBi): Smaller blocks deliver better
                   throughput but can be compromised easily. To overcome this
                   trade-off between performance and security, PoBi uses an
                   intrashard believable first approach. Here, validates are cate-
                   gorized into believable and normal groups. Based on the
                   reputation of a node (token balance, community work, repu-
                   tation), a believability score is calculated. There may be one
                   believable validator per group, who validates the committed
                   transactions. This is done quickly (with low latency) but
                   compromises on security. To overcome this security lapse, a
                   set of normal validators can sample these transactions and
                   verify them. If inconsistency is detected, then believable
                   validators are penalized by forfeiting the coins they hold.
                   This will prevent the believable validators from misbehaving.
                   Hence, this approach achieves low latency and is also secure.
                   IOSTChain uses this consensus mechanism.
               (e) Proof of stake (PoS): In PoS, miners can validate block in
                   proportion to the number of coins they possess. A node can
                   join the network only if the wallet contains a basic minimum
                   number of coins. Miners need to deposit (stake) a percentage
                   of their coins. Nodes in the network then vote for the valida-
                   tors among the miners. In case of false validation of transac-
                   tions, the amount staked by the miners will be forfeited. The
                   miner receives a transaction fees for mining. PoS follows an
                   internally game theoretic approach. Hence, all the validators
                   should be identifiable; hence, an authentication procedure
                   is essential for validators since malicious acts should be
                   prevented. Ethereum, Startis, and Navcoin are based on PoS.
                  This approach is less prone to 51% attack [8] and is more
               decentralized. It is also energy efficient as no complex computa-
               tions are involved. The major issue is that there is a possibility
               of power concentration among some miners.
               (f)  Delegated proof of stake (dPoS): Like PoS, nodes (delegates)
                    stake their coins in this consensus protocol. These delegates
                    then appoint witnesses by voting. These witnesses perform
                    validation. In dPoS [8], witnesses gain reputation when they
                    gain more votes from the delegates. Lisk uses DPoS. This
                    method is fast. It is semicentralized but is scalable and less
                    resource intensive. It is secure against 51% attack.
               (g) Leased proof of stake (lPoS): In PoS, delegates/nodes should
                    possess a minimum number of coins to participate in the
                    network. This reduces the chances of smallholders from
   100   101   102   103   104   105   106   107   108   109   110