Page 108 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 108

96   Chapter 4 A critical review on using blockchain technology in education domain




                                    3.2 Vote-based approaches
                                    These approaches are based on the Byzantine general problem. A
                                    consensus is to be reached between Byzantine generals over the
                                    attack strategy with the assumption that some generals may be
                                    traitors and try to adopt treacherous actions to prevent loyal
                                    generals reach a consensus and win the opponent. A comparison
                                    between vote-based byzantine approaches and proof-based
                                    approaches is provided in Table 4.2.
                                       Some of the common Byzantine agreement methods [10] are
                                    as follows:
                                    (a) Practical Byzantine fault tolerance (PBFT): In this asynchro-
                                       nous consensus method, all the authenticated nodes should
                                       participate in the voting process to add the next block, and
                                       the consensus is reached when more than two-thirds of the
                                       nodes agree upon that block. The block is validated by one
                                       node. This is then verified by all other nodes. Once two-
                                       thirds of the nodes verify, the block is added to the chain by
                                       the first node. It requires each node to query the other nodes.
                                       PBFT can tolerate malicious behavior upto one-third nodes.
                                       Consensus in PBFT is faster and more economical than
                                       PoW. Unlike PoS, validators do not require assets. Major
                                       advantages of PBFT include high scalability, high throughput,
                                       low latency, and low computational overhead. It is more
                                       suited for private and consortium BCs as validators should
                                       be authenticated. This also leads to centralization of control
                                       among the validators. Further PBFT consensus approach is
                                       prone to Sybil attack [12]. BC platforms such as Hyperledger
                                       Fabric and Hyperledger Iroha for mobile applications use
                                       PBFT consensus algorithm.



                  Table 4.2 Comparison of proof-based with vote-based consensus.

                Criterion            Proof-based consensus           Vote-based consensus
                Agreement            Proof mechanism (such as PoW, PoS)  Decision of majority nodes
                Nodes can join       Freely                          Restricted
                Participating nodes  All                             Limited
                Decentralization     High                            Low
                Trust                More                            Less
                Identity management  No                              Yes
                Security threat      More                            Less
                PoS, proof of stake; PoW, proof of work.
   103   104   105   106   107   108   109   110   111   112   113