System integration and optimization of security in a multilayer virtual network

Keywords: distributed ledger, blockchain, P-BFT, RAFT

Abstract

In modern distributed systems, especially in the field of blockchain and cloud computing, ensuring reliable and efficient consensus is a critical task. This paper discusses a combined consensus approach based on a combination of P-BFT and RAFT protocols. The purpose of this study is to explore the possibilities of a combined P-BFT and RAFT consensus approach to improve reliability, performance and security in distributed registries and cloud systems. The principles of operation and characteristics of each protocol are explored, as well as their joint use to achieve agreement in a distributed environment. In the course of the work, the advantages and prospects of the combined P-BFT and RAFT approach are analyzed, support for various trust models is considered, as well as the integration of data protection mechanisms to ensure security and privacy. The results of the study suggest that the combined P-BFT and RAFT consensus approach demonstrates high performance and reliability in distributed registries and cloud systems. The proposed approach has prospects for application in various areas where a reliable and secure consensus is required to ensure the efficient operation of distributed systems.

Author Biographies

Shchegoleva Nadezhda, Saint Petersburg State University, 35 Universitetskiy pr., Stary Peterhof, 198504, Saint Petersburg, Russia

Doctor of Sciences (Tech.), Associate Professor, Professor of the Department of Fundamental Informatics and Distributed Systems, Saint Petersburg State University, n.shchegoleva@spbu.ru

Jasur Kiyamov, Saint Petersburg State University, 35 Universitetskiy pr., Stary Peterhof, 198504, Saint Petersburg, Russia

Assistant of the Department of Computer Modeling and Processor Systems, Saint Petersburg State University,  z.kiyamov@spbu.ru

References

A. Bogdanov et al., “A Multilayer Approach to the Security of Blockchain Networks of the Future,” in Proc. Int. Conf. on Computational Science and Its Applications, Cham: Springer International Publishing, pp. 205–216, 2022; doi:10.1007/978-3-031-10536-4_14.

E. Buchman, Tendermint: Byzantine fault tolerance in the age of blockchains, Guelph, Ontario, Canada: University of Guelph, 2016.

S. H. Lin and M. H. Liao, “Towards publishing social network data with graph anonymization,” Journal of Intelligent & Fuzzy Systems, vol. 30, no. 1, pp. 333–345, 2016.

C. Zhu et. al., “A Survey on the Integration of Blockchains and Databases,” Data Science and Engineering, vol. 8, no. 2, pp. 196–219, 2023; doi:10.1007/s41019-023-00212-z

K. Liu and E. Terzi, “Towards identity anonymization on graphs,” in Proc. of the 2008 ACM SIGMOD int. conf. on Management of data (SIGMOD ’08), New York, NY, USA: Association for Computing Machinery, pp. 93–106, 2008; doi:10.1145/1376616.1376629

P. Zhang and M. Zhou, “Security and Trust in Blockchains: Architecture, Key Technologies, and Open Issues,” IEEE Transactions on Computational Social Systems, vol. 7, no. 3, pp. 790–801, 2020; doi:10.1109/tcss.2020.2990103

M. Vukolic, “The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication” in Lecture Notes in Computer Science, Cham: Springer International Publishing, pp. 112–125, 2016; doi:10.1007/978-3-319-39028-4_9

N. Ferguson, B. Schneier, and T. Kohno, Cryptography engineering: design principles and practical applications, Hoboken, NJ, U.S: John Wiley & Sons, 2011.

L. Lamport, R. Shostak, M. Pease, “Cryptography Engineering: Design Principles and Practical Applications,” in The Byzantine Generals Problem ACM Transactions on Programming Lanuages and Systems, Hoboken, NJ, U.S: John Wiley & Sons, vol. 4, no. 3, pp. 382–401, 1982.

M. Castro et al., “Practical byzantine fault tolerance,” OsDI, vol. 99, no. 1999, pp. 173–186, 1999.

R. Pass and E. Shi, “Hybrid consensus: Efficient consensus in the permissionless model,” in Cryptology ePrint Archive, 2016. [Online]. Available: https://eprint.iacr.org/2016/917

A. Bogdanov et al., “Testing and Comparative Analysis of the F-BFT-based DLT Solution,” in Proc. of Computational Science and Its Applications–ICCSA 2021: 21st International Conference, Cagliari, Italy, September 13–16, 2021, part IV 21, Springer International Publishing, pp. 31–41, 2021.

J. Zhou et al., “A Hybrid Consensus Algorithm for Blockchain,” in 2019 IEEE 5th Int. Conf. on Computer and Communications (ICCC), IEEE publ., 2019.

Y. Zhang et al., “A survey on software defined networking with multiple controllers,” Journal of Network and Computer Applications, vol. 103, pp. 101–118, 2018; doi:10.1016/j.jnca.2017.11.015

M. A. Khan, “A survey of security issues for cloud computing,” Journal of Network and Computer Applications, vol. 71, pp. 11–29, 2016; doi:10.1016/j.jnca.2016.05.010

Published
2023-10-15
How to Cite
Nadezhda, S., & Kiyamov, J. (2023). System integration and optimization of security in a multilayer virtual network. Computer Tools in Education, (3), 28-34. https://doi.org/10.32603/2071-2340-2023-3-28-34
Section
Informational systems