ElasticChain: Support Very Large Blockchain by Reducing Data Redundancy

  • Dayu Jia
  • Junchang XinEmail author
  • Zhiqiong Wang
  • Wei Guo
  • Guoren Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10988)


Blockchains are secure by design and they have been widely used in digital asses, trade finance, information security and many other fields. However, the current blockchain protocol requires that each full node must contain the complete chain. When the storage capacity of a full node is less than that of the complete chain, this node cannot be a member of blockchain system. With the input data increasing, the number of full nodes in blockchains would decrease. The security of blockchains would significantly reduce. Therefore, we provide the ElasticChain, which can improve storage scalability under the premise of ensuring blockchain data safety. The full nodes in ElasticChain store the part of the complete chain based on the duplicate ratio regulation algorithm. Meanwhile, the node reliability verification method was used for increasing the stability of full nodes and reducing the risk of data imperfect recovering caused by the reduction of duplicate number. The experimental results on real datasets show that ElasticChain has the same stability, fault tolerance and security with the current blockchain system and it improves the storage scalability extremely.



This research was partially supported by the National Natural Science Foundation of China (Nos. 61472069, 61402089, 61402298, and U1401256), the Fundamental Research Funds for the Central Universities (Nos. N161602003, N171607010, N161904001, and N160601001), the Natural Science Foundation of Liaoning Province (No. 2015020553, and 20170540702). Junchang Xin is the corresponding author.


  1. 1.
    Eyal, I., Gencer, A.E., Renesse, R.V.: Bitcoin-NG: a scalable blockchain protocol, pp. 45–59 (2015)Google Scholar
  2. 2.
    Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Research perspectives and challenges for bitcoin and cryptocurrencies, pp. 104–121 (2015)Google Scholar
  3. 3.
    Yuan, Y., Wang, F.Y.: Blockchain: the state of the art and future trends. Acta Automatica Sinica (2016)Google Scholar
  4. 4.
    Blockmeta: The Blockchain Data of Bitcoin. Accessed 28 Sept 2017
  5. 5.
    Li, J., Wolf, T.: A one-way proof-of-work protocol to protect controllers in software-defined networks. In: Symposium on Architectures for NETWORKING and Communications Systems, pp. 123–124 (2016)Google Scholar
  6. 6.
    Herbert, J., Litchfield, A.: A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology. In: Australasian Computer Science Conference, pp. 27–35 (2015)Google Scholar
  7. 7.
    Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Security and Privacy Workshops, pp. 180–184 (2015)Google Scholar
  8. 8.
    Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by blockchains, pp. 181–194 (2016)Google Scholar
  9. 9.
    Hari, A., Lakshman, T.V.: The internet blockchain: a distributed, tamper-resistant transaction framework for the internet. In: ACM Workshop on Hot Topics in Networks, pp. 204–210 (2016)Google Scholar
  10. 10.
    Gervais, A., Karame, G.O., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: ACM Sigsac Conference on Computer and Communications Security, pp. 3–16 (2016)Google Scholar
  11. 11.
    Karame, G.: On the security and scalability of bitcoin’s blockchain. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1861–1862 (2016)Google Scholar
  12. 12.
    Bentov, I., Lee, C., Mizrahi, A., Rosenfeld, M.: Proof of activity: extending bitcoins proof of work via proof of stake. ACM SIGMETRICS Perform. Eval. Rev. 42(3), 34–37CrossRefGoogle Scholar
  13. 13.
    Distler, T., Cachin, C., Kapitza, R.: Resource-efficient byzantine fault tolerance. IEEE Trans. Comput. 65(9), 2807–2819 (2016)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: ACM Conference on Computer and Communications Security, pp. 906–917 (2012)Google Scholar
  15. 15.
    Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: International Conference on Financial Cryptography and Data Security, pp. 436–454 (2014)Google Scholar
  16. 16.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008)Google Scholar
  17. 17.
    Borel, E.: Probabilities and Life. Dover Publications Inc., New York (1962)zbMATHGoogle Scholar
  18. 18.
    Juels, A.: PORs: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security, pp. 584–597 (2007)Google Scholar
  19. 19.
    Armknecht, F., Bohli, J.M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 831–843 (2014)Google Scholar
  20. 20.
    Dinh, A., Wang, J., Chen, G., Ooi, B.C., Tan, K.-L.: Blockbench: a framework for analyzing private blockchains (2017)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Dayu Jia
    • 1
  • Junchang Xin
    • 1
    • 2
    Email author
  • Zhiqiong Wang
    • 3
  • Wei Guo
    • 4
  • Guoren Wang
    • 5
  1. 1.School of Computer Science and EngineeringNortheastern UniversityShenyangChina
  2. 2.Key Laboratory of Big Data Management and AnalyticsShenyangChina
  3. 3.School of Sino-Dutch Biomedical and Information EngineeringNortheastern UniversityShenyangChina
  4. 4.School of ComputerShenyang Aerospace UniversityShenyangChina
  5. 5.School of Computer Science and TechnologyBeijing Institute of TechnologyBeijingChina

Personalised recommendations