-
AdaChain: A Learned Adaptive Blockchain
Authors:
Chenyuan Wu,
Bhavana Mehta,
Mohammad Javad Amiri,
Ryan Marcus,
Boon Thau Loo
Abstract:
This paper presents AdaChain, a learning-based blockchain framework that adaptively chooses the best permissioned blockchain architecture in order to optimize effective throughput for dynamic transaction workloads. AdaChain addresses the challenge in the Blockchain-as-a-Service (BaaS) environments, where a large variety of possible smart contracts are deployed with different workload characteristi…
▽ More
This paper presents AdaChain, a learning-based blockchain framework that adaptively chooses the best permissioned blockchain architecture in order to optimize effective throughput for dynamic transaction workloads. AdaChain addresses the challenge in the Blockchain-as-a-Service (BaaS) environments, where a large variety of possible smart contracts are deployed with different workload characteristics. AdaChain supports automatically adapting to an underlying, dynamically changing workload through the use of reinforcement learning. When a promising architecture is identified, AdaChain switches from the current architecture to the promising one at runtime in a way that respects correctness and security concerns. Experimentally, we show that AdaChain can converge quickly to optimal architectures under changing workloads, significantly outperform fixed architectures in terms of the number of successfully committed transactions, all while incurring low additional overhead.
△ Less
Submitted 17 July, 2023; v1 submitted 3 November, 2022;
originally announced November 2022.
-
Declarative Smart Contracts
Authors:
Haoxian Chen,
Gerald Whitters,
Mohammad Javad Amiri,
Yuepeng Wang,
Boon Thau Loo
Abstract:
This paper presents DeCon, a declarative programming language for implementing smart contracts and specifying contract-level properties. Driven by the observation that smart contract operations and contract-level properties can be naturally expressed as relational constraints, DeCon models each smart contract as a set of relational tables that store transaction records. This relational representat…
▽ More
This paper presents DeCon, a declarative programming language for implementing smart contracts and specifying contract-level properties. Driven by the observation that smart contract operations and contract-level properties can be naturally expressed as relational constraints, DeCon models each smart contract as a set of relational tables that store transaction records. This relational representation of smart contracts enables convenient specification of contract properties, facilitates run-time monitoring of potential property violations, and brings clarity to contract debugging via data provenance. Specifically, a DeCon program consists of a set of declarative rules and violation query rules over the relational representation, describing the smart contract implementation and contract-level properties, respectively. We have developed a tool that can compile DeCon programs into executable Solidity programs, with instrumentation for run-time property monitoring. Our case studies demonstrate that DeCon can implement realistic smart contracts such as ERC20 and ERC721 digital tokens. Our evaluation results reveal the marginal overhead of DeCon compared to the open-source reference implementation, incurring 14% median gas overhead for execution, and another 16% median gas overhead for run-time verification.
△ Less
Submitted 27 July, 2022;
originally announced July 2022.
-
The Bedrock of Byzantine Fault Tolerance: A Unified Platform for BFT Protocol Design and Implementation
Authors:
Mohammad Javad Amiri,
Chenyuan Wu,
Divyakant Agrawal,
Amr El Abbadi,
Boon Thau Loo,
Mohammad Sadoghi
Abstract:
Byzantine Fault-Tolerant (BFT) protocols have recently been extensively used by decentralized data management systems with non-trustworthy infrastructures, e.g., permissioned blockchains. BFT protocols cover a broad spectrum of design dimensions from infrastructure settings such as the communication topology, to more technical features such as commitment strategy and even fundamental social choice…
▽ More
Byzantine Fault-Tolerant (BFT) protocols have recently been extensively used by decentralized data management systems with non-trustworthy infrastructures, e.g., permissioned blockchains. BFT protocols cover a broad spectrum of design dimensions from infrastructure settings such as the communication topology, to more technical features such as commitment strategy and even fundamental social choice properties like order-fairness. The proliferation of different BFT protocols has rendered it difficult to navigate the BFT landscape, let alone determine the protocol that best meets application needs. This paper presents Bedrock, a unified platform for BFT protocols design, analysis, implementation, and experiments. Bedrock proposes a design space consisting of a set of design choices capturing the trade-offs between different design space dimensions and providing fundamentally new insights into the strengths and weaknesses of BFT protocols. Bedrock enables users to analyze and experiment with BFT protocols within the space of plausible choices, evolve current protocols to design new ones, and even uncover previously unknown protocols. Our experimental results demonstrate the capability of Bedrock to uniformly evaluate BFT protocols in new ways that were not possible before due to the diverse assumptions made by these protocols. The results validate Bedrock's ability to analyze and derive BFT protocols.
△ Less
Submitted 3 August, 2022; v1 submitted 9 May, 2022;
originally announced May 2022.
-
Qanaat: A Scalable Multi-Enterprise Permissioned Blockchain System with Confidentiality Guarantees
Authors:
Mohammad Javad Amiri,
Boon Thau Loo,
Divyakant Agrawal,
Amr El Abbadi
Abstract:
Today's large-scale data management systems need to address distributed applications' confidentiality and scalability requirements among a set of collaborative enterprises. This paper presents Qanaat, a scalable multi-enterprise permissioned blockchain system that guarantees the confidentiality of enterprises in collaboration workflows. Qanaat presents data collections that enable any subset of en…
▽ More
Today's large-scale data management systems need to address distributed applications' confidentiality and scalability requirements among a set of collaborative enterprises. This paper presents Qanaat, a scalable multi-enterprise permissioned blockchain system that guarantees the confidentiality of enterprises in collaboration workflows. Qanaat presents data collections that enable any subset of enterprises involved in a collaboration workflow to keep their collaboration private from other enterprises. A transaction ordering scheme is also presented to enforce only the necessary and sufficient constraints on transaction order to guarantee data consistency. Furthermore, Qanaat supports data consistency across collaboration workflows where an enterprise can participate in different collaboration workflows with different sets of enterprises. Finally, Qanaat presents a suite of consensus protocols to support intra-shard and cross-shard transactions within or across enterprises.
△ Less
Submitted 17 July, 2022; v1 submitted 22 July, 2021;
originally announced July 2021.
-
Saguaro: An Edge Computing-Enabled Hierarchical Permissioned Blockchain
Authors:
Mohammad Javad Amiri,
Ziliang Lai,
Liana Patel,
Boon Thau Loo,
Eric Lo,
Wenchao Zhou
Abstract:
We present Saguaro, a permissioned blockchain system designed specifically for edge computing networks. Saguaro leverages the hierarchical structure of edge computing networks to reduce the overhead of wide-area communication by presenting several techniques. First, Saguaro proposes coordinator-based and optimistic protocols to process cross-domain transactions with low latency where the lowest co…
▽ More
We present Saguaro, a permissioned blockchain system designed specifically for edge computing networks. Saguaro leverages the hierarchical structure of edge computing networks to reduce the overhead of wide-area communication by presenting several techniques. First, Saguaro proposes coordinator-based and optimistic protocols to process cross-domain transactions with low latency where the lowest common ancestor of the involved domains coordinates the protocol or detects inconsistency. Second, data are collected over hierarchy enabling higher-level domains to aggregate their sub-domain data. Finally, transactions initiated by mobile edge devices are processed without relying on high-level fog and cloud servers. Our experimental results across a wide range of workloads demonstrate the scalability of Saguaro in supporting a range of cross-domain and mobile transactions.
△ Less
Submitted 14 September, 2022; v1 submitted 21 January, 2021;
originally announced January 2021.
-
On minimal coverings of groups by proper normalizers
Authors:
M. Amiri,
S. Haji,
S. M. Jafarian Amiri
Abstract:
For a group $G$, a {\it normalizer covering} of $G$ is a finite set of proper normalizers of some subgroups of $G$ whose union is $G$. We study $p$-groups ($p$ a prime) having a normalizer covering and find the minimal size of a normalizer covering for all nilpotent groups. As an application, we determine some non-nilpotent groups having a nilpotent normalizer covering.
For a group $G$, a {\it normalizer covering} of $G$ is a finite set of proper normalizers of some subgroups of $G$ whose union is $G$. We study $p$-groups ($p$ a prime) having a normalizer covering and find the minimal size of a normalizer covering for all nilpotent groups. As an application, we determine some non-nilpotent groups having a nilpotent normalizer covering.
△ Less
Submitted 25 June, 2024; v1 submitted 1 September, 2020;
originally announced September 2020.
-
SEPAR: Towards Regulating Future of Work Multi-Platform Crowdworking Environments with Privacy Guarantees
Authors:
Mohammad Javad Amiri,
Joris Duguépéroux,
Tristan Allard,
Divyakant Agrawal,
Amr El Abbadi
Abstract:
Crowdworking platforms provide the opportunity for diverse workers to execute tasks for different requesters. The popularity of the "gig" economy has given rise to independent platforms that provide competing and complementary services. Workers as well as requesters with specific tasks may need to work for or avail from the services of multiple platforms resulting in the rise of multi-platform cro…
▽ More
Crowdworking platforms provide the opportunity for diverse workers to execute tasks for different requesters. The popularity of the "gig" economy has given rise to independent platforms that provide competing and complementary services. Workers as well as requesters with specific tasks may need to work for or avail from the services of multiple platforms resulting in the rise of multi-platform crowdworking systems. Recently, there has been increasing interest by governmental, legal and social institutions to enforce regulations, such as minimal and maximal work hours, on crowdworking platforms. Platforms within multi-platform crowdworking systems, therefore, need to collaborate to enforce cross-platform regulations. While collaborating to enforce global regulations requires the transparent sharing of information about tasks and their participants, the privacy of all participants needs to be preserved. In this paper, we propose an overall vision exploring the regulation, privacy, and architecture dimensions for the future of work multi-platform crowdworking environments. We then present SEPAR, a multi-platform crowdworking system that enforces a large sub-space of practical global regulations on a set of distributed independent platforms in a privacy-preserving manner. SEPAR, enforces privacy using lightweight and anonymous tokens, while transparency is achieved using fault-tolerant blockchains shared across multiple platforms. The privacy guarantees of SEPAR against covert adversaries are formalized and thoroughly demonstrated, while the experiments reveal the efficiency of SEPAR in terms of performance and scalability.
△ Less
Submitted 21 October, 2020; v1 submitted 3 May, 2020;
originally announced May 2020.
-
SharPer: Sharding Permissioned Blockchains Over Network Clusters
Authors:
Mohammad Javad Amiri,
Divyakant Agrawal,
Amr El Abbadi
Abstract:
Scalability is one of the main roadblocks to business adoption of blockchain systems. Despite recent intensive research on using sharding techniques to enhance the scalability of blockchain systems, existing solutions do not efficiently address cross-shard transactions. In this paper, we introduce SharPer, a permissioned blockchain system that improves scalability by clustering (partitioning) the…
▽ More
Scalability is one of the main roadblocks to business adoption of blockchain systems. Despite recent intensive research on using sharding techniques to enhance the scalability of blockchain systems, existing solutions do not efficiently address cross-shard transactions. In this paper, we introduce SharPer, a permissioned blockchain system that improves scalability by clustering (partitioning) the nodes and assigning different data shards to different clusters where each data shard is replicated on the nodes of a cluster. SharPer supports both intra-shard and cross-shard transactions and processes intra-shard transactions of different clusters as well as cross-shard transactions with non-overlap** clusters simultaneously. In SharPer, the blockchain ledger is formed as a directed acyclic graph where each cluster maintains only a view of the ledger. SharPer also incorporates a flattened protocol to establish consensus among clusters on the order of cross-shard transactions. The experimental results reveal the efficiency of SharPer in terms of performance and scalability especially in workloads with a low percentage of cross-shard transactions.
△ Less
Submitted 16 February, 2020; v1 submitted 1 October, 2019;
originally announced October 2019.
-
SeeMoRe: A Fault-Tolerant Protocol for Hybrid Cloud Environments
Authors:
Mohammad Javad Amiri,
Sujaya Maiyya,
Divyakant Agrawal,
Amr El Abbadi
Abstract:
Large scale data management systems utilize State Machine Replication to provide fault tolerance and to enhance performance. Fault-tolerant protocols are extensively used in the distributed database infrastructure of large enterprises such as Google, Amazon, and Facebook, as well as permissioned blockchain systems like IBM's Hyperledger Fabric. However, and in spite of years of intensive research,…
▽ More
Large scale data management systems utilize State Machine Replication to provide fault tolerance and to enhance performance. Fault-tolerant protocols are extensively used in the distributed database infrastructure of large enterprises such as Google, Amazon, and Facebook, as well as permissioned blockchain systems like IBM's Hyperledger Fabric. However, and in spite of years of intensive research, existing fault-tolerant protocols do not adequately address all the characteristics of distributed system applications. In particular, hybrid cloud environments consisting of private and public clouds are widely used by enterprises. However, fault-tolerant protocols have not been adapted for such environments. In this paper, we introduce SeeMoRe, a hybrid State Machine Replication protocol to handle both crash and malicious failures in a public/private cloud environment. SeeMoRe considers a private cloud consisting of nonmalicious nodes (either correct or crash) and a public cloud with both Byzantine faulty and correct nodes. SeeMoRe has three different modes which can be used depending on the private cloud load and the communication latency between the public and the private cloud. We also introduce a dynamic mode switching technique to transition from one mode to another. Furthermore, we evaluate SeeMoRe using a series of benchmarks. The experiments reveal that SeeMoRe's performance is close to the state of the art crash fault-tolerant protocols while tolerating malicious failures.
△ Less
Submitted 18 June, 2019;
originally announced June 2019.
-
Towards Global Asset Management in Blockchain Systems
Authors:
Victor Zakhary,
Mohammad Javad Amiri,
Sujaya Maiyya,
Divyakant Agrawal,
Amr El Abbadi
Abstract:
Permissionless blockchains (e.g., Bitcoin, Ethereum, etc) have shown a wide success in implementing global scale peer-to-peer cryptocurrency systems. In such blockchains, new currency units are generated through the mining process and are used in addition to transaction fees to incentivize miners to maintain the blockchain. Although it is clear how currency units are generated and transacted on, i…
▽ More
Permissionless blockchains (e.g., Bitcoin, Ethereum, etc) have shown a wide success in implementing global scale peer-to-peer cryptocurrency systems. In such blockchains, new currency units are generated through the mining process and are used in addition to transaction fees to incentivize miners to maintain the blockchain. Although it is clear how currency units are generated and transacted on, it is unclear how to use the infrastructure of permissionless blockchains to manage other assets than the blockchain's currency units (e.g., cars, houses, etc). In this paper, we propose a global asset management system by unifying permissioned and permissionless blockchains. A governmental permissioned blockchain authenticates the registration of end-user assets through smart contract deployments on a permissionless blockchain. Afterwards, end-users can transact on their assets through smart contract function calls (e.g., sell a car, rent a room in a house, etc). In return, end-users get paid in currency units of the same blockchain or other blockchains through atomic cross-chain transactions and governmental offices receive taxes on these transactions in cryptocurrency units.
△ Less
Submitted 22 May, 2019;
originally announced May 2019.
-
Characterization of P-groups By Sum of Element Orders
Authors:
S. M. Jafarian Amiri,
Mohsen Amiri
Abstract:
Let $G$ be a finite group. Then we denote $ψ(G) = \sum_{x\in G}o(x)$ where $o(x)$ is the order of the element $x$ in $G$. In this paper we characterize some finite $p$-groups ($p$ a prime) by $ψ$ and their orders.
Let $G$ be a finite group. Then we denote $ψ(G) = \sum_{x\in G}o(x)$ where $o(x)$ is the order of the element $x$ in $G$. In this paper we characterize some finite $p$-groups ($p$ a prime) by $ψ$ and their orders.
△ Less
Submitted 14 March, 2019;
originally announced March 2019.
-
ParBlockchain: Leveraging Transaction Parallelism in Permissioned Blockchain Systems
Authors:
Mohammad Javad Amiri,
Divyakant Agrawal,
Amr El Abbadi
Abstract:
Many existing blockchains do not adequately address all the characteristics of distributed system applications and suffer from serious architectural limitations resulting in performance and confidentiality issues. While recent permissioned blockchain systems, have tried to overcome these limitations, their focus has mainly been on workloads with no-contention, i.e., no conflicting transactions. In…
▽ More
Many existing blockchains do not adequately address all the characteristics of distributed system applications and suffer from serious architectural limitations resulting in performance and confidentiality issues. While recent permissioned blockchain systems, have tried to overcome these limitations, their focus has mainly been on workloads with no-contention, i.e., no conflicting transactions. In this paper, we introduce OXII, a new paradigm for permissioned blockchains to support distributed applications that execute concurrently. OXII is designed for workloads with (different degrees of) contention. We then present ParBlockchain, a permissioned blockchain designed specifically in the OXII paradigm. The evaluation of ParBlockchain using a series of benchmarks reveals that its performance in workloads with any degree of contention is better than the state of the art permissioned blockchain systems.
△ Less
Submitted 4 February, 2019;
originally announced February 2019.
-
Validation of Collaborative Business Processes using Goals Model
Authors:
Amir Ebrahimifard,
Mostafa Khoramabadi Arani,
Mohammad Javad Amiri,
Saeed Parsa
Abstract:
Validating process model against corresponding requirements is one of the most important problems in domain of collaborative processes. In this paper collaborative processes are modeled using the interaction view of BPMN 2.0 standard. Then, requirements are extracted with a goal modeling technique. Different scenarios of each requirement show possible paths for the system. These paths are modeled…
▽ More
Validating process model against corresponding requirements is one of the most important problems in domain of collaborative processes. In this paper collaborative processes are modeled using the interaction view of BPMN 2.0 standard. Then, requirements are extracted with a goal modeling technique. Different scenarios of each requirement show possible paths for the system. These paths are modeled by sequence diagram and collaborative processes are validated according to the corresponding requirements using Savara tool.
△ Less
Submitted 9 July, 2017;
originally announced July 2017.