Focus On Blockchain: A Comprehensive Survey On Academic and Application
Focus On Blockchain: A Comprehensive Survey On Academic and Application
100876, China
4 Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX 76019, USA
ABSTRACT As a decentralized distributed ledger, blockchain has developed rapidly since its birth and
has been highly valued by governments, academia, and industry. Start in the financial field, blockchain
technology has been rapidly applied to various fields such as the Internet of Things, supply chain, and
healthcare. Blockchain technology has made sufficient development and innovation, but it also faces many
challenges, such as security, scalability, and waste of resources. This paper starts with the development
history of blockchain and combines the characteristics and technical principles of it to analyze the current
academic research status and application scenarios. Meanwhile, this paper analyzes the existing outstanding
blockchain projects and elaborates on their key advantages and current challenges. With discussing the
ongoing development trend of blockchain, the development direction, and the research trend of blockchain
in the future, this paper provides a useful reference for related research.
INDEX TERMS Blockchain, academic, application, projects, consensus algorithm, smart contract, security,
development trend.
supply chain, etc. It has been continuously combined with II. BLOCKCHAIN BACKGROUND
other application scenarios, gradually heading in the direction A. BLOCKCHAIN CONCEPTS
of ‘‘blockchain +’’ [6]. Various universities and research Satoshi Nakamoto first proposed the concept of blockchain,
institutions attach great importance to this technology and which is a Proof-of-Work chain based on hash. It is used
publish a large number of academic achievements related for online transactions without any financial institution [1].
to blockchain. At present, there are a large number of lit- In this part, we explain the concept of blockchain based on
erature reviews about blockchain techniques, such as the different subject backgrounds and perspectives and summa-
technical architecture [7]–[8], security and privacy [9]–[11], rize the following directions.
network security [12]. And some discussion on a specific At the technical level, blockchain can be regarded as a
area of blockchain [13]–[15] has been raised. The paper [16] technology built on the basis of a series of encryption algo-
presents a comprehensive introduction to the blockchain’s rithms, storage technologies, and peer-to-peer networks, with
architecture, principles and applications from a more tech- features including ‘‘unalterable’’, ‘‘consensus mechanism’’
nical perspective. Unlike the above papers, our paper starts and ‘‘decentralized’’. At the database level, blockchain can
from the perspective of academics and application. It focuses be thought as a giant ledger for bookkeeping [17], [18].
more on academic data information statistics and industry At the economic level, blockchain can build a reliable trust
applications to show the development status and blockchain foundation for both parties who know nothing about trans-
trend. Therefore, this paper is devoted to the holistic research actions with equal and credible. In summary, blockchain is
of blockchain, as shown in Figure 1. 1) Comprehensively an innovative integration solution of multiple existing tech-
expound the concept and characteristics of blockchain from nologies that integrates cryptography technology, distributed
the background and development history. 2) Analyze the consistency protocol, network security, and other related
academic community’s attention to the blockchain, and sum- technologies [19].
marize the latest research results. 3) Analyze the application
scenarios and actual implementation projects of blockchain in B. BLOCKCHAIN PAST AND PRESENT
various fields. 4) Elaborate on the advantages and challenges As shown in Figure 2, from ‘‘New Directions in Cryptogra-
of blockchain under the current situation. 5) Predict and phy’’ published by Diffie and Hellman in 1976 to Libra pro-
discuss the technology development trend and industry trend posed by Facebook in 2019 [20]–[25], blockchain technology
of blockchain. We hope that the work in this paper can provide is constantly developing and improving.
a useful reference for subsequent studies.
D. BLOCKCHAIN INFRASTRUCTURE
The blockchain architecture consists of six different layers,
as shown in Figure 3.
• Data Layer:This layer encapsulates the chain structure
of the underlying data block, and the related digital
signature and time stamp technology, which is the most
underlying data structure in the whole blockchain tech-
nology.
• Network Layer: Including P2P network, communica-
FIGURE 3. The Infrastructure of Blockchain.
tion mechanism, and verification mechanism.
FIGURE 5. (a). The number of blockchain related achievements in IEEE. (b). The universities of blockchain related papers published in IEEE. (c). The
conferences of blockchain related papers published in IEEE.
d: ELSEVIER
The research results show in the Figure 8(a)-(b).
By August 2020, there were 981 records and 10 journals that
had published papers. Academic Research on blockchain has
various types of results, most of which are Research Article,
and the access type is also developing towards open access.
With 2014 as the starting point, attention has been grad-
ually rising, the academic research achievements have been
increasing year by year, and the blockchain has been increas-
ingly influential in the world.
limitations of the existing PoS in terms of fairness and secu- developed other types of consensus algorithms in recent
rity, Lee et al. [38] proposed a new protocol called Proof of years. Blocki and Zhou [40] proposed the Proof of Human
Sharing (PoS) based on fairness and dynamic sharing man- puzzle. The ingenious design of this puzzle is to mine a new
agement. Larimer’s idea was to use rights and interests as the block. It cannot simply depend on the hardware devices, and
evidence of voting [4], rather than the opportunity to mine human participation is also required. Proof of Space [41] is
new block. This consensus algorithm is called Delegated the other consensus algorithm based on proof types, and they
Proof of Stake (DPoS). Some people think that the consen- do not use the concepts of PoW and PoS algorithms. In Proof
sus algorithm used by PPCoin is the first variation of PoS. of Burn, miners must send their coins to an address that
Bentov et al. [39] proposed a solution called Proof of Activity ‘‘burns’’ them, which means others cannot use these coins.
(PoA). This PoA consensus combining PoW and PoS not In Proof of Space, miners invest their money in hard drives,
only solves the double spending attack, but also deals with which is much cheaper than investing in the equipment used
the Tragedy of the commons caused by the PoW consensus. by the PoW algorithm.
TABLE 2 compares the PoW, PoS algorithm, and the combi- This consensus is performed in a special environment
nation of them from multiple angles. called the Trusted Execution Environment (TEE) [42].
In addition to the above mainstream consensus algo- Milutinovic [29] proposed the Proof of Luck consensus algo-
rithms used in the blockchains, many scholars have also rithm, which is also performed in the TEE environment.
TABLE 2. Comparison of Main Consensus Algorithms. verification. Matetic et al. [48] proposed a new Bitcoin pro-
tection method for light client competition, which provided
significant protection for light clients. Ting Cai et al. designed
a Blockchain-Assisted Trust Access Authentication System
for Solid [49]. With the increasing interest of blockchain in
academic research and industry, the security and privacy of
blockchain will attract considerable attention gradually.
4) SCALABILITY FIELD
Scalability is defined as the ability of a system, network,
These emerging consensus algorithms have also made out- or process to handle increasing workloads, or to expand its
standing contributions to the development of blockchain. potentiality for accommodating this growth. For the cur-
rent blockchain, scalability is a problem that prevents it
from being accepted by the mainstream. Currently, Visa,
2) SMART CONTRACT FIELD
the fastest payment network, can process approximately
The smart contract is similar to the upgraded version of many
24,000 payments per second. However, due to the use of
electronic contracts. When the contract meets the conditions,
blockchain, the transaction speed of most cryptocurrencies
it will automatically execute. And at the same time, it can
is inferior and cannot meet demand. At present, it seems
receive and store information. Because of the decentraliza-
that increasing the block size and Lightning Network are
tion, tamper-resistance, and traceability characteristics in the
the only two mode options for expanding the Bitcoin sys-
blockchain. The developers propose to embed the smart con-
tem, but this is actually just the two mainstream methods
tract into the blockchain to avoid malicious tampering of the
currently favored by BCH and BTC [50]. In fact, there are
contract conditions. However, the widely used cryptocurren-
many other suggestions for improving throughput, including
cies do not support complex smart contracts. Das et al. [43]
sidechains, which can ease the pressure on the network with-
proposed the practical framework called FastKitten, which is
out having to switch to a hosting solution similar to Light-
used to execute complex smart contracts at a low cost. In addi-
ning Network. In addition, Payment Channel Network (PCN)
tion, the privacy of smart contracts is the main obstacle to its
has become the most widely deployed solution to alleviate
widespread adoption. Steffen et al. [44] proposed zkay lan-
the scalability problem, allowing most transactions between
guage, which introduced the definition of privacy type of pri-
two users to be handled outside the chain. On this basis,
vate value owners, hid private data with a primitive password,
Malavolta et al. [51] studied and designed a secure and
and then enhanced the correctness of update state through
private PCNS. Smart contract is a kind of automatic imple-
Non-Interactive Zero-Knowledge (NIZK) proof, to solve the
mentation protocol, and the scalability challenge hinders its
privacy problem of smart contracts.
further adoption. Based on this, Dziembowski et al. [52]
proposed State Channel Network (SCN), which can create
3) SECURITY AND PRIVACY FIELD
and close state channels without blockchain interaction, and
The essential security characteristics of the blockchain allow to sign contracts with any number of organizations.
come from the advancement of cryptographic technology Although different blockchains vary in scalability, the dif-
and the design and implementation of the Bitcoin system. ferences between projects are increasing in the process. This
Rui Zhang et al. summarized the inherent security trend will bring great progress to solve the scalability problem
attributes of the blockchain and the parts that need to be of cryptocurrency, and gradually form a perfect solution.
strengthened [10].
Among them, consistency, tamper-resistance, prevention
IV. BLOCKCHAIN APPLICATION SCENARIO
of DDoS attacks, resistance to double-spending attacks, and
A. BLOCKCHAIN APPLICATION INDUSTRY
the use of pseudonyms are all more common mature security
attributes in blockchain, while, unlinkability, confidentiality, The main advantages of blockchain are no intermediary par-
and resistance to majority 51% consensus attacks need to ticipation, efficient and transparent process, low cost, and
be strengthened. In addition, Ganesh et al. [45] proposed high data security. Based on the above advantages, the appli-
a privacy-protected version of the PoS protocol, defining cation of blockchain is very extensive, as shown in TABLE 3,
the concept of anonymous verifiable random functions, and which can penetrate many industries. At present, many lit-
strengthening the security of the PoS protocol. Zhang and eratures divide the application industry of blockchain into
Preneel [46] proposed the future direction of more secure financial industry and non-financial industry. A more detailed
PoW protocols and pointed out several common pitfalls in classification is discussed in this paper.
PoW security analysis.
Rodler et al. [47] have proposed a new smart contract secu- 1) FINANCIAL FIELD
rity technology that protects deployed contracts in a back- Digital currency is the most widely used and accepted appli-
ward compatible manner through runtime monitoring and cation of blockchain. The most familiar one is bitcoin, which
used to be synonymous with blockchain. Digital currency IoT’s needs, a lightweight, scalable blockchain (LSB) is pro-
is the beginning of the combination of the blockchain and posed [56], which guarantees the privacy of IoT. In terms
financial field. of identity authentication, Wazid et al. [57] designed the
At present, there are hundreds of digital currencies in the universal authentication key management protocol UAKMP
market. PRCash [53], a blockchain currency that can pay for the IoT security, which protects users’ privacy and iden-
quickly and has a good level of user privacy and regulatory tity. In terms of data sharing, the IoT design based on the
control, providing a new regulatory mechanism for transac- blockchain can use the blockchain as an auditable storage
tions using cryptographic promises, and regulating expen- layer and a distributed access control layer to achieve flexible
diture limits of zero-knowledge proof. It realizes a more access control management and secure data sharing [58].
effective security method of blockchain in the financial field. In terms of credibility verification, a framework with layers,
Avgouleas et al. [55] built a comprehensive blockchain-based intersect, and self-organization Blockchain Structures (BCS)
framework that can perfectly express the relevant securities is proposed, helping us build trust, significantly reduce costs,
trading logic with codes, realize real-time asset transfer, and and reduce human errors, to protect data security and privacy
accelerate the speed of transaction liquidation. Meanwhile, better for IoT [59]. Integrating blockchain and IoT will bring
blockchain technology can optimize the global financial many advantages to solving IoT’s shortcomings, which can
infrastructure, achieve sustainable development, and create break the existing multiple information islands, promote the
more effective systems than now. They also explore the chal- horizontal flow of information, and multi-party collaboration.
lenges and opportunities of implementing blockchain tech- ‘‘Blockchain + IoT’’ will promote a new round of technology
nology in the banking industry [54]. Therefore, the appli- integration and innovation.
cation of blockchain in the financial field has dramatically
improved security and speed. 3) SUPPLY CHAIN FIELD
It is real that supply chain management systems lack suf-
2) IOT FIELD ficient efficiency and transparency, thus trying to integrate
In addition to the financial field, the Internet of Things may every part in the supply chain is still a difficult problem.
be the field combines with blockchain to produce the most Based on blockchain technology characteristics, Li et al. [60]
sparks, as shown in Figure 10. proposed a new customs supervision model to solve the
IoT and blockchain are two different technologies. IoT problems, the poor customs supervision management, low
represents a large number of data collection devices, while efficiency and high cost in cross-border import e-commerce
blockchain ensures that they do not tamper the data. However, retail business. In terms of the supervision system prob-
the IoT still lacks effective means in the construction of lems from the traditional food industry, such as indus-
the network credit system and value system, and there are trial chain deficiency, data dispersion, and so on, it is a
still many problems in equipment security, identity authen- risk and an area of concern for systems where there is a
tication, data privacy and public, etc. In terms of security need for a high-reliability solution. The Hierarchical Multi-
and privacy, to provide end-to-end security that meets the Domain Block Chain (HMDBC) network structure and the
7) GOVERNMENT FIELD lifestyle of the whole society and may set off a new energy
Blockchain can reduce official fraud, improve efficiency, and revolution.
reduce costs. The ideal state is to achieve a completely paper-
less digital government and minimize corruption. The use of B. BLOCKCHAIN PROJECT
blockchain in taxation may change how the government col- Blockchain technology can help organizations and institu-
lects and disburses funds and improve efficiency [76]. Many tions build trust among, while reducing the cost of trust. In the
countries have adopted blockchain technology to implement blockchain boom, technology giants, venture companies, and
the electronic voting system and realize ‘‘voter authentication academic institutions have joined in and launched one project
and result saving’’. However, the traditional electronic voting after another. According to the classification of blockchain
system has the risk that the data is not open and transparent application industry in the previous section, we sort out the
enough, and it is easy to be tampered with and forged; the projects of corresponding industries, as shown in Figure 11.
user’s private information is exposed; the voters are unable
to verify the voting results [77]. Nadar et al. [78] proposed a 1) FINANCIAL FIELD PROJECTS
new method to realize decentralized voting system by using • Digital currency projects: Digital currency is the
blockchain. Shahzad and Crowcroft [79] proposed a frame- project that has the most public contact among
work to ensure data security by using effective hash tech- blockchain projects, and is mainly used for transactions
nology. The paper introduced the concept of block sealing, such as ordinary currency. At present, there are more
which helps make the blockchain more adjustable to meet than one thousand kinds of digital currency in the world.
the security needs of the voting process. In daily life, many Among them, the more successful projects are bitcoin,
scenarios require identity authentication, such as through ETH, Litecoin, Monero, EOS, Ripple.
border customs, airport security, cashing checks or opening • Global payment projects:With the continuous devel-
bank accounts. The government needs to prove and manage opment of credit card payments and mobile payments
the identity. In many cases, identity is easy to be forged. in recent years, the traditional cash payments in reality
And blockchain can help to solve the problem of identity have been gradually away from people’s lives. Com-
authentication. Kuperberg et al. [80] conducted a thorough pared with the traditional global payment mentioned
analysis of the opportunities brought by the combination of above, the global payment system and settlement func-
the latest blockchain technology and the electronic identity tion of the blockchain is unique and epoch-making. The
document (EID) issued by the government, including the following is a list of some blockchain global payment
existing implementation and pilot. Odelu [81] proposed a new projects.
key management mechanism of blockchain based on user a: InterLedger PROJECT OF RIPPLE
authentication and analyzed the mechanism strictly, which Ripple, American finance and technology company, has
showed that the proposed protocol could resist all kinds of
launched the InterLedger project. This project is a practitioner
possible attacks. The combination of blockchain and govern-
of global cross-border payment based on blockchain. The
ment services can maximize the efficiency of work. Utilizing
purpose is to create a unified global unified payment standard
technical means can increase the people’s trust and build a
and a unified network financial communication protocol.
safer society. At present, banks in more than ten countries have joined
the project to cooperate, and in addition, they have received
8) ENERGY FIELD
support from companies such as Apple and Microsoft.
Blockchain technology, as a new database technology, can b: STELLAR PROJECT OF IBM
increase the mutual trust of multi-stakeholders in the energy IBM launched the blockchain global payment system World
network. Its decentralization, openness, and transparency are Wire, in which Stellar protocol constitutes a key part of
in line with the concept of the energy network and have the technical framework for real-time cross-border payment.
attracted more and more attention in energy field. At present, Stellar’s new platform enables real-time clearing and settle-
the application of blockchain in energy field mainly focuses ment of cross-border transactions. IBM believes that World
on distributed intelligent energy systems and energy sharing. Wire can integrate with any existing payment system at any
Mengelkamp et al. [82] provides a distributed market plat- time and support payment at any scale, any destination and
form for energy producers and consumers to trade energy any asset type in a high security environment.
without centralized institutions. Gao et al. [83] combined
smart grid with blockchain technology, and use smart con- c: LIBRA PROJECT OF FACEBOOK
tract to establish trading procedures to provide trust between Libra’s mission is to build a simple, borderless currency
participants on the network. The system is proved to be very and global payment system for billions of people. Libra is
effective since users can monitor how to use electricity. When composed of three parts, which will work together to create a
the energy meets the blockchain, the collision and blending more inclusive financial system: a) It is based on a secure,
of the two are related to the long-term and overall situation, scalable, and reliable blockchain. b) It is backed by asset
which will have a significant impact on the production and reserves that give it intrinsic value. c) It is governed by an
independent Libra association whose mission is to promote platform has completed the first real-time cross-border finan-
the development of this financial ecosystem. cial transaction.
• Financial services project:Scenarioization of financial
services is a trend, and blockchain will make many 2) IOT FIELD PROJECTS
changes to traditional financial models and business pro- a: AMBROSUS
cesses. Blockchain reconstructs the financial services Ambrosus is a blockchain-powered IoT network for food and
scene, connects the bank’s financial system and services pharmaceutical enterprises, enabling secure and frictionless
to the scene, and makes the information more symmet- dialogue. The core technology is a decentralized protocol by
rical and transparent. combining various sensors, smart contracts on AMB-NET,
secure storage and robust developer tools components for
d: BSAVE PROJECT tracking, storing and transmitting, thus it can be used in
In March 2019, British Basve company launched research on supply chain, IoT and health-care application scenarios.
a platform providing users with online storage bitcoin asset,
b: CHAIN OF THING (CoT)
so that users can directly obtain income from their bitcoin
assets. The company’s goal is to fundamentally simplify the Chain of Things (CoT) plays an important role of bitcoin and
process of online savings and investment, fully exploit the blockchain technology in providing a better foundation for
financial service potential of digital currency, and provide securing IoT and securing data from IoT devices. Dubbed
convenience for people all over the world. the 4th industrial revolution, the ‘Internet of Things’ will
consist of a vast network of sensor nodes that will generate
e: CORDA PROJECT an unprecedented flow of global data. These devices will
R3, a global blockchain alliance organization, has been quietly execute smart contracts with physical actuators that
committed to developing a third-party financial transaction will manage many aspects of our future lives.
platform with the help of blockchain technology. Corda
c: IOTA
project is a distributed ledger launched by R3 which uses
blockchain technology to record and manage financial con- It is not only a blockchain but also a feeless and open secure
tracts. Corda is used to recording, manage, and synchronize trust layer, protocol for IoT and scalable distributed ledger.
financial contracts between traditional financial institutions, The tangle, characteristic of its network, immutably records
which is largely inspired by the blockchain system, excluding the exchange of data and value for ensuring the trustworthy
some designs that are not suitable for banking application and tamper-resistance of information. It enables new possibil-
scenarios. ities in many fields and will continue to enrich technological
maturity and others.
f: WE.TRADE PROJECT
We.trade a financial trading blockchain platform jointly d: SLOCK.IT
developed by nine well-known banks, which aims to Based on the Ethereum network, Slock.it with the name of a
provide enterprises with the tracking of fund flow and Universal Sharing Network (USN) is an open marketplace for
transaction management, and improve the efficiency of real and virtual products renting, sharing or selling. It enables
cross-border financial transactions. The We.trade blockchain humans and machines to securely participate in the evolving
security vulnerabilities are usually related to the consen- At the same time, due to the anonymity of the blockchain
sus mechanism used to confirm and validate transactions. digital currency, bitcoin often appears in the dark network
These security vulnerabilities include DDoS, block discard- transactions, money laundering crimes and virus blackmail
ing, eclipse attack [92], selfish mining, Sybil attack [93], programs. Laws and regulations could impact how far and
51% attack, double spend attack [94]. Blockchain projects how fast the technology could develop [97]. The events indi-
are open-source. The characteristics of open source are con- cate that our blockchain related regulatory system and means
ducive to the development and promotion of blockchain, but are not advanced enough, which provides an opportunity for
also provide opportunities for attackers. The lack of code crime.
evaluation in blockchain leads to frequent security events,
which limits the development of blockchain. 4) INDUSTRIAL APPLICATION CHALLENGE
b: POTENTIAL HACKING The slow promotion of standardization and the lack of inno-
vation in business models are the biggest obstacles to imple-
Blockchain design limits the attack of some hackers. For
menting blockchain technology in the industry. Currently,
example, if a hacker wants to tamper with the blockchain’s
the blockchain implementation still lacks industry best prac-
data, he needs to have 51% computing power. But the benefits
tices and standards for reference. At the same time, the appli-
of using 51% computing power to attack the whole system
cation of blockchain faces policy risks. By summarizing
are not as much as the benefits of using 51% computing
the existing implementation difficulties, it is hoped that it
power to mine normally, so, hackers will not choose to attack
will help the implementation and landing of subsequent
blockchain in an ideal state. Due to the immense attack-
blockchain solutions.
ing cost to perform the 51% attack, it was considered very
unlikely for a long period [95]. However, we just have to
consider such a situation. Hackers are not only trying to 5) RESOURCE WASTE CHALLENGE
obtain benefits, but only want to destroy or show their own Blockchain is a large ledger of distributed storage, each node
technical advantages. Under strict planning and organization, keeps a ledger, but repeated data storage will cause serious
the possibility of blockchain system being broken is also waste of storage resources. Taking bitcoin as an example,
theoretically there. the mining process will produce high power consumption.
Cambridge University uses the Cambridge bitcoin electric-
c: THREATS FROM QUANTUM COMPUTERS ity consumption index (CBECI) to track the use of bitcoin
In data storage, blockchain uses public-key encryption, digi- power, which shows that the electricity consumption of bit-
tal signature, hash function and other cryptographic compo- coin accounts for 0.20% of the total electricity consump-
nents. To meet the needs of higher privacy protection, some tion of the world every year, 0.17% of the total electricity
blockchain schemes also need ring signature, zero knowledge production of the world every year, which exceeds the total
proof and other privacy protection technologies. The secu- electricity consumption of Austria or Colombia and other
rity of these cryptographic components directly affects the countries electricity.
security of blockchain data. In the short term, these cryptog-
raphy technologies will not be threatened, but with the rise 6) SPACE STORAGE CHALLENGE
of quantum computing, the existing cryptography algorithms Each node in the blockchain must save complete backup data.
may face a devastating blow. As the amount of transaction data increase, the storage space
it takes up is also increasing. Taking bitcoin as an example,
2) SCALABILITY-RELATED CHALLENGE there are more than 600000 blocks on the main chain at
Due to the increase in the number of participants in the present, and the synchronous and complete block data needs
blockchain system, there is another challenge in the scalabil- more than 200G of space, which has a very high demand for
ity and computing resources of the system. Scalability is still a storage space resources. It is a crucial problem restricting the
key barrier when the blockchain technology is widely used in development of the blockchain.
real business environments [96]. With the increasing scale of
nodes in the blockchain system, the broadcast mode adopted 7) TALENT SHORTAGE CHALLENGE
by blockchain technology may lead to data delay and network The whole blockchain industry is still in the early stage of
performance degradation, or even paralysis. In addition, with development, similar to the Internet industry in the 1990s
the increase in data volume, the efficiency of query and data or the early 21st century, few people really understand
mining has been difficult to meet people’s needs. blockchain. Moreover, blockchain is the integration of var-
ious technologies, including cryptography, economics, and
3) LEGAL SUPERVISION CHALLENGE computer science, which is more complicated than the Inter-
As blockchain technology has been widely concerned in net and has a higher threshold for in-depth research. There-
recent years, the corresponding legal provisions are not per- fore, blockchain related technical talents have been very
fect. Many countries and regions have different attitudes scarce, which is the pain point restricting the development
towards blockchain, lacking a unified regulatory standard. of the whole industry.
VI. BLOCKCHAIN DEVELOPMENT TREND social tools, games, trading platforms, etc. We can develop
A. BLOCKCHAIN TECHNOLOGY DEVELOPMENT TREND DApp directly on the basis of the valuable resource of data.
Blockchain itself is a comprehensive technology, and it hasn’t
2) FROM DIGITAL CURRENCY TO NON-FINANCIAL FIELD
been around for a long time, so there is still a long way to go.
From a technical perspective, the future development trend of In the future, blockchain can be used as a general-purpose
the blockchain is roughly as follows. technology to accelerate the penetration of digital currency
into other fields and carry out innovative integration with var-
ious industries. The development of blockchain mainly will
1) UNSTRUCTURED CHAIN STORAGE be involved by two camps. The first camp is cryptocurrency.
Structured block data in blockchain storage has certain Starting from currency, it will gradually advance to the field
advantages. But like today’s big data technology, it uses of asset management, deposit and certificate, and penetrate
unstructured data processing technology. Therefore, once the the field of credit investigation. The second is the IT camp,
blockchain can efficiently accept and process unstructured starting from information sharing, to build the credit core at
data, a blockchain technology belonging to the future Internet low cost, and gradually cover all fields.
will come. However, improving the chain structure is a very
high technical threshold, and it is also a significant challenge 3) IOT AND BLOCKCHAIN
to the technical level of the research and development team. Blockchain provides a secure and scalable framework for
communication between IoT facilities, and therefore brings
many advantages [101]–[103]. Undoubtedly, blockchain and
2) CONSENSUS ALGORITHM
the IoT are one of the best combinations in this era.
Consensus algorithm is the key part to the development We believe that, in the future, the contribution of the two
of blockchain technology, is the foundation of the whole technologies to human beings and the whole society will be
blockchain trust, and affects the transaction processing abil- endless and hard to inestimable.
ity, security and scalability of blockchain. The PoW consen-
sus algorithm used by Bitcoin has strong anti-attack ability, 4) BLOCKCHAIN AND ARTIFICIAL INTELLIGENCE
and good performance in solving data consistency, but con- The cooperation between AI and blockchain can make a
suming too much energy is the disadvantage. Some consensus difference in privacy protection, energy consumption, scal-
algorithms proposed in the later stage can solve the problem ability, efficiency and security [104]. Artificial intelligence
of energy consumption to a certain extent, but they still have is to cultivate the centralized intelligence on the closed data
significant limitations and functional degradation. Consensus platform, while blockchain is to promote the centralized
algorithm plays an important role in the whole blockchain, application in the open data environment. If we can find the
and any progress of consensus algorithm could dramatically right way to make two technologies work together, a little
change the development process of blockchain in the future. collision can produce a huge spark in an instant.
The future consensus algorithm will develop to superior per-
formance, high adaptability and scalability [98]. 5) BLOCKCHAIN DATA ANALYSIS
Since blockchain technology has been widely concerned,
3) CROSS-CHAIN TECHNOLOGY accumulated a large amount of user transaction data. In this
A single blockchain is an information island, and there age when data represent value, all data are our wealth. The
are two completely closed worlds between one chain to data of blockchain has the characteristics of openness, which
another. To realize the mutual communication of blockchain, provides unprecedented opportunities for researchers to ana-
cross-chain technology emerged. However, the existing lyze blockchain data and solve related problems [105-107].
blockchain technology is not mature, it is impossible to Nowadays, there are some worrying problems in blockchain,
expand in the infrastructure. At present, there are many such as private information disclosure, illegal financial activ-
researches on cross-chain technology [99-100], but most of ities, and so on. On the basis of blockchain value mining,
them are studying cross chain exchange between digital cur- analyzing the privacy of blockchain and discovering the char-
rencies, which is not revolutionary. The actual cross-chain acteristics of illegal behavior can help us build a safe and legal
technology is far from what we expected. Perhaps, when we blockchain environment.
break through the fixed block structure, cross-chain tech-
VII. CONCLUSION
nology will have a qualitative leap. Therefore, cross-chain
Blockchain technology, with its characteristics of anonymity,
technology is the direction we should strive to study in the
decentralization, traceability and non-tampering, has set off
future.
a wave of research in academic and social applications.
This paper introduces the development background and
B. BLOCKCHAIN INDUSTRY DEVELOPMENT TREND basic concepts of blockchain, analyzes and summarizes the
1) BLOCK DATA APPLICATION DEVELOPMENT eight application scenarios of blockchain by investigating
Block data can be used not only as data records, but also the blockchain related researches of many universities and
as input of programs to help other applications, such as research institutions, and then investigates the physical imple-
mentation projects of blockchain in various fields. Finally, [15] N. O. Nawari and S. Ravindran, ‘‘Blockchain and the built environ-
we summarize the advantages and challenges of blockchain ment: Potentials and limitations,’’ J. Building Eng., vol. 25, Sep. 2019,
Art. no. 100832.
technology and put forward the future development trend of [16] W. Gao, W. G. Hatcher, and W. Yu, ‘‘A survey of blockchain: Techniques,
blockchain technology. Through the above analysis, we draw applications, and challenges,’’ in Proc. 27th Int. Conf. Comput. Commun.
the following conclusions. In recent years, the research on Netw. (ICCCN), Hangzhou, China, Jul. 2018, pp. 1–11, doi: 10.1109/
ICCCN.2018.8487348.
blockchain technology has been widely carried out in var- [17] D. Yaga, P. Mell, N. Roby, and K. Scarfone, ‘‘Blockchain technology
ious universities, and the quantity and quality of published overview,’’ NIST, Gaithersburg, MD, USA, Tech. Rep. 8202, 2018.
papers have been further improved. As a result, a variety of [18] Z. Zheng, S. Xie, H.-N. Dai, X. Chen, and H. Wang, ‘‘Blockchain chal-
lenges and opportunities: A survey,’’ Int. J. Web Grid Services, vol. 14,
blockchain projects have been generated in different fields, no. 4, pp. 352–375, 2018.
with a wide range of application scenarios, which can be [19] C. Decker and R. Wattenhofer, ‘‘Information propagation in the bitcoin
combined with the Internet of Things, supply chain, medical network,’’ in Proc. IEEE P2P, Trento, Italy, Sep. 2013, pp. 1–10.
and other fields. But the technology still faces challenges [20] W. Diffie and M. Hellman, ‘‘New directions in cryptography,’’ IEEE
Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, Nov. 1976.
such as security, scalability, and waste of resources. We, [21] R. L. Rivest, A. Shamir, and L. Adleman, ‘‘A method for obtaining digital
therefore, proposed the future blockchain development trend. signatures and public-key cryptosystems,’’ Commun. ACM, vol. 21, no. 2,
In terms of technology, it will develop towards unstructured pp. 120–126, Feb. 1978.
[22] R. C. Merkle, ‘‘Protocols for public key cryptosystems,’’ in Proc. IEEE
chain storage and cross chain technology. While in industry, Symp. Secur. Privacy, Oakland, CA, USA, Apr. 1980, pp. 122–133.
it will develop in the direction of ‘‘blockchain +’’ and inte- [23] L. Lamport, R. Shostak, and M. Pease, ‘‘The byzantine generals prob-
grate more closely with different fields. The development of lem,’’ ACM Trans. Program. Lang. Syst., vol. 4, no. 3, pp. 382–401,
Jul. 1982.
blockchain relies on the close connection between academia [24] N. Koblitz, ‘‘Elliptic curve cryptosystems,’’ Math. Comput., vol. 48,
and industry and focuses on the combination of industry no. 177, pp. 203–209, 1987.
and research, to make it better and faster for the benefit of [25] L. Lamport, ‘‘The part-time parliament,’’ ACM Trans. Comput. Syst.,
vol. 16, no. 2, pp. 133–169, May 1998.
mankind.
[26] X. Li, Y. Mei, J. Gong, F. Xiang, and Z. Sun, ‘‘A blockchain pri-
vacy protection scheme based on ring signature,’’ IEEE Access, vol. 8,
REFERENCES pp. 76765–76772, 2020.
[27] L. Xiao, W. Huang, Y. Xie, W. Xiao, and K.-C. Li, ‘‘A blockchain-
[1] S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. based traceable IP copyright protection algorithm,’’ IEEE Access, vol. 8,
[Online]. Available: https://bitcoin.org/bitcoin.pdf pp. 49532–49542, 2020.
[2] M. Crosby, P. Pattanayak, S. Verma, and V. Kalyanaraman, ‘‘Blockchain [28] X. Li, F. Lv, F. Xiang, Z. Sun, and Z. Sun, ‘‘Research on key technologies
technology: Beyond bitcoin,’’ Appl. Innov., vol. 2, pp. 6–10, Jun. 2016. of logistics information traceability model based on consortium chain,’’
[3] I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, ‘‘Proof of activity: IEEE Access, vol. 8, pp. 69754–69762, 2020.
Extending bitcoin’s proof of work via proof of stake,’’ ACM SIGMET- [29] M. Milutinovic, W. He, H. Wu, and M. Kanwal, ‘‘Proof of luck:
RICS Perform. Eval. Rev., vol. 42, no. 3, pp. 34–37, Dec. 2014. An efficient blockchain consensus protocol,’’ in Proc. 1st Workshop Syst.
[4] D. Larimer, ‘‘Delegated proof-of-stake (DPoS),’’ EOS, Bitshare White Softw. Trusted Execution (SysTEX), Trento, Italy, 2016, pp. 1–6.
Paper 1.0, 2014. [30] M. C. Kus Khalilov and A. Levi, ‘‘A survey on anonymity and privacy in
[5] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, ‘‘Hawk: bitcoin-like digital cash systems,’’ IEEE Commun. Surveys Tuts., vol. 20,
The blockchain model of cryptography and privacy-preserving smart no. 3, pp. 2543–2585, 3rd Quart., 2018.
contracts,’’ in Proc. IEEE Symp. Secur. Privacy (SP), San Jose, CA, USA, [31] J. Gu, B. Sun, X. Du, J. Wang, Y. Zhuang, and Z. Wang, ‘‘Consortium
May 2016, pp. 839–858. blockchain-based malware detection in mobile devices,’’ IEEE Access,
[6] K. Christidis and M. Devetsikiotis, ‘‘Blockchains and smart contracts for vol. 6, pp. 12118–12128, 2018.
the Internet of Things,’’ IEEE Access, vol. 4, pp. 2292–2303, 2016. [32] P. Daian, I. Eyal, A. Juels, and E. G. Sirer, ‘‘(Short Paper) piecework:
[7] J. Yli-Huumo, D. Ko, S. Choi, S. Park, and K. Smolander, ‘‘Where Generalized outsourcing control for proofs of work,’’ in Proc. Int. Conf.
is current research on blockchain technology?—A systematic review,’’ Financial Cryptogr. Data Secur., Sliema, Malta, 2017, pp. 182–190.
PLoS ONE, vol. 11, no. 10, Oct. 2016, Art. no. e0163477. [33] A. Miller, A. Kosba, J. Katz, and E. Shi, ‘‘Nonoutsourceable scratch-
off puzzles to discourage bitcoin mining coalitions,’’ in Proc. 22nd ACM
[8] M. Belotti, N. Bozic, G. Pujolle, and S. Secci, ‘‘A vademecum on
SIGSAC Conf. Comput. Commun. Secur. (CCS), Denver, CO, USA, 2015,
blockchain technologies: When, which, and how,’’ IEEE Commun. Sur-
pp. 680–691.
veys Tuts., vol. 21, no. 4, pp. 3796–3838, 4th Quart., 2019, doi: 10.1109/
[34] I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse, ‘‘Bitcoin-NG:
COMST.2019.2928178.
A scalable blockchain protocol,’’ in Proc. USENIX Conf. Netw. Syst.
[9] T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, ‘‘Security
Design Implement. (NSDI), Santa Clara, CA, USA, 2016, pp. 45–59.
services using blockchains: A state of the art survey,’’ IEEE Commun.
[35] Y. Sompolinsky and A. Zohar, ‘‘Secure high-rate transaction processing
Surveys Tuts., vol. 21, no. 1, pp. 858–880, 1st Quart., 2019, doi: 10.
in bitcoin,’’ in Proc. Int. Conf. Financial Cryptogr. Data Secur., San Juan,
1109/COMST.2018.2863956.
Puerto Rico, 2015, pp. 507–527.
[10] R. Zhang, R. Xue, and L. Liu, ‘‘Security and privacy on blockchain,’’ [36] V. Bagaria, S. Kannan, D. Tse, G. Fanti, and P. Viswanath, ‘‘Prism:
ACM Comput. Surv., vol. 52, no. 3, pp. 1–34, 2019. Deconstructing the blockchain to approach physical limits,’’ in Proc.
[11] E. Zaghloul, T. Li, M. W. Mutka, and J. Ren, ‘‘Bitcoin and blockchain: ACM SIGSAC Conf. Comput. Commun. Secur., New York, NY, USA,
Security and privacy,’’ IEEE Internet Things J., vol. 7, no. 10, Nov. 2019, pp. 585–602.
pp. 1028–10313, Oct. 2020, doi: 10.1109/JIOT.2020.3004273. [37] A. Kiayias, A. Russell, B. David, and R. Oliynykov, ‘‘Ouroboros:
[12] P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and A provably secure proof-of-stake blockchain protocol,’’ in Proc. Annu.
K.-K.-R. Choo, ‘‘A systematic literature review of blockchain cyber Int. Cryptol. Conf., Santa Barbara, CA, USA, 2017, pp. 357–388.
security,’’ Digit. Commun. Netw., vol. 6, no. 2, pp. 147–156, May 2020. [38] D. R. Lee, Y. Jang, and H. Kim, ‘‘Poster: A proof-of-stake (PoS)
[13] X. Wang, X. Zha, W. Ni, R. P. Liu, Y. J. Guo, X. Niu, and K. Zheng, ‘‘Sur- blockchain protocol using fair and dynamic sharding management,’’ in
vey on blockchain for Internet of Things,’’ Comput. Commun., vol. 136, Proc. ACM SIGSAC Conf. Comput. Commun. Secur., New York, NY,
pp. 10–29, Feb. 2019. USA, Nov. 2019, pp. 2553–2555.
[14] A. Ahl, M. Yarime, K. Tanaka, and D. Sagawa, ‘‘Review of blockchain- [39] I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, ‘‘Proof of activity:
based distributed energy: Implications for institutional development,’’ Extending Bitcoin’s proof of work via proof of stake,’’ ACM SIGMET-
Renew. Sustain. Energy Rev., vol. 107, pp. 200–211, Jun. 2019. RICS Perform. Eval. Rev., vol. 42, no. 3, pp. 34–37, Dec. 2014.
[40] J. Blocki and H. S. Zhou, ‘‘Designing proof of human-work puzzles for [62] M. Montecchi, K. Plangger, and M. Etter, ‘‘It’s real, trust me! Establishing
cryptocurrency and beyond,’’ in Proc. Theory Cryptogr. Conf., Berlin, supply chain provenance using blockchain,’’ Bus. Horizons, vol. 62, no. 3,
Germany, 2016, pp. 517–546. pp. 283–293, May 2019.
[41] S. Dziembowski, S. Faust, V. Kolmogorov, and K. Pietrzak, ‘‘Proofs of [63] C. G. Schmidt and S. M. Wagner, ‘‘Blockchain and supply chain relations:
space,’’ in Proc. Annu. Cryptol. Conf., Santa Barbara, CA, USA, 2015, A transaction cost theory perspective,’’ J. Purchasing Supply Manage.,
pp. 585–605. vol. 25, no. 4, Oct. 2019, Art. no. 100552.
[42] M. Sabt, M. Achemlal, and A. Bouabdallah, ‘‘Trusted execution envi- [64] J. Li, F. Qu, X. Tu, T. Fu, J. Guo, and J. Zhu, ‘‘Public philanthropy
ronment: What it is, and what it is not,’’ in Proc. IEEE Trust- logistics platform based on blockchain technology for social welfare
com/BigDataSE/ISPA, vol. 1, Aug. 2015, pp. 57–64. maximization,’’ in Proc. 8th Int. Conf. Logistics, Informat. Service Sci.
[43] P. Das, L. Eckey, T. Frassetto, D. Gens, K. Hostáková, P. Jauernig, (LISS), Aug. 2018, pp. 1–9.
S. Faust, and A.-R. Sadeghi, ‘‘FastKitten: Practical smart contracts on [65] D. Sun, W. Ying, X. Zhang, and L. Feng, ‘‘Developing a blockchain-
bitcoin,’’ in Proc. USENIX Secur. Symp., Berkeley, CA, USA, 2019, based loyalty programs system to hybridize business and charity: An
pp. 801–818. action design research,’’ in Proc. 40th Int. Conf. Inf. Syst. (ICIS), Munich,
[44] S. Steffen, B. Bichsel, M. Gersbach, N. Melchior, P. Tsankov, and Germany, 2019.
M. Vechev, ‘‘Zkay: Specifying and enforcing data privacy in smart [66] B. Reinsberg, ‘‘Blockchain technology and the governance of foreign
contracts,’’ in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., aid,’’ J. Institutional Econ., vol. 15, no. 3, pp. 413–429, Jun. 2019.
New York, NY, USA, Nov. 2019, pp. 1759–1776. [67] S. Jain and R. Simha, ‘‘Blockchain for the common good: A digital
[45] C. Ganesh, C. Orlandi, and D. Tschudi, ‘‘Proof-of-stake protocols for currency for citizen philanthropy and social entrepreneurship,’’ in Proc.
privacy-aware blockchains,’’ in Proc. Annu. Int. Conf. Theory Appl. Cryp- IEEE Int. Conf. Internet Things (iThings) IEEE Green Comput. Commun.
tograph. Techn., Darmstadt, Germany, 2019, pp. 690–719. (GreenCom) IEEE Cyber, Phys. Social Comput. (CPSCom) IEEE Smart
[46] R. Zhang and B. Preneel, ‘‘Lay down the common metrics: Evaluating Data (SmartData), Jul. 2018, pp. 1387–1394.
proof-of-work consensus protocols’ security,’’ in Proc. IEEE Symp. Secur. [68] A. Alammary, S. Alhazmi, M. Almasri, and S. Gillani, ‘‘Blockchain-
Privacy (SP), San Francisco, CA, USA, May 2019, pp. 175–192. based applications in education: A systematic review,’’ Appl. Sci., vol. 9,
[47] M. Rodler, W. Li, G. O. Karame, and L. Davi, ‘‘Sereum: Protecting exist- no. 12, p. 2400, Jun. 2019.
ing smart contracts against re-entrancy attacks,’’ in Proc. Netw. Distrib. [69] M. Han, Z. Li, J. He, D. Wu, Y. Xie, and A. Baba, ‘‘A novel blockchain-
Syst. Secur. Symp., San Diego, CA, USA, 2019, pp. 1–15. based education records verification solution,’’ in Proc. 19th Annu. SIG
[48] S. Matetic, K. Wüst, M. Schneider, K. Kostianinen, G. Karame, and Conf. Inf. Technol. Edu., New York, NY, USA, Sep. 2018, pp. 178–183.
S. Capkun, ‘‘BITE: Bitcoin lightweight client privacy using trusted exe- [70] A. Srivastava, P. Bhattacharya, A. Singh, A. Mathur, O. Prakash, and
cution,’’ in Proc. USENIX Secur. Symp., Berkeley, CA, USA, 2019, R. Pradhan, ‘‘A distributed credit transfer educational framework based
pp. 783–900. on blockchain,’’ in Proc. 2nd Int. Conf. Adv. Comput., Control Commun.
[49] T. Cai, Z. Yang, W. Chen, Z. Zheng, and Y. Yu, ‘‘A blockchain-assisted Technol. (IAC3T), Allahabad, India, Sep. 2018, pp. 54–59.
trust access authentication system for solid,’’ IEEE Access, vol. 8,
[71] R. Chaudhari, R. Deshmukh, V. Bari, S. Rajput, and K. Rode, ‘‘Medicine
pp. 71605–71616, 2020.
traceability system using blockchain,’’ Int. J. Trend Sci. Res. Develop.,
[50] Y. Kwon, H. Kim, J. Shin, and Y. Kim, ‘‘Bitcoin vs. Bitcoin cash:
vol. 3, no. 4, pp. 346–349, 2019.
Coexistence or downfall of bitcoin cash?’’ in Proc. IEEE Symp. Secur.
[72] X. Xia, X. Lin, W. Dong, and Z. He, ‘‘Design of traceability system for
Privacy (SP), San Francisco, CA, USA, May 2019, pp. 935–951.
medical devices based on blockchain,’’ J. Phys., Conf. Ser., vol. 1314,
[51] G. Malavolta, P. Moreno-Sanchez, C. Schneidewind, A. Kate, and
Oct. 2019, Art. no. 012067.
M. Maffei, ‘‘Anonymous multi-hop locks for blockchain scalability and
[73] R. Kumar and R. Tripathi, ‘‘Traceability of counterfeit medicine supply
interoperability,’’ in Proc. Netw. Distrib. Syst. Secur. Symp., San Diego,
chain through blockchain,’’ in Proc. 11th Int. Conf. Commun. Syst. Netw.,
CA, USA, 2019, pp. 1–30.
Jan. 2019, pp. 568–570.
[52] S. Dziembowski, L. Eckey, S. Faust, J. Hessse, and K. Hostáková, ‘‘Multi-
party virtual state channels,’’ in Proc. Annu. Int. Conf. Theory Appl. [74] S. Rouhani, L. Butterworth, A. D. Simmons, D. G. Humphery, and
Cryptograph. Techn., Darmstadt, Germany, 2019, pp. 625–656. R. Deters, ‘‘MediChainTM: A secure decentralized medical data asset
[53] K. Wüst, K. Kostiainen, V. Čapkun, and S. Čapkun, ‘‘PRCash: Fast, management system,’’ in Proc. IEEE Int. Conf. Internet Things (iThings)
private and regulated transactions for digital currencies,’’ in Proc. Int. IEEE Green Comput. Commun. (GreenCom) IEEE Cyber, Phys. Social
Conf. Financial Cryptogr. Data Secur., Saint Kitts, Nevis, vol. 11598, Comput. (CPSCom) IEEE Smart Data (SmartData), Halifax, NS, Canada,
2019, pp. 158–178. Jul. 2018, pp. 1533–1538.
[54] L. Cocco, A. Pinna, and M. Marchesi, ‘‘Banking on blockchain: Costs [75] A. A. Alomar, M. Z. A. Bhuiyan, and A. Basu, S. Kiyomoto, and
savings thanks to the blockchain technology,’’ Future Internet, vol. 9, M. S. Rahman, ‘‘Privacy-friendly platform for healthcare data in cloud
no. 3, p. 25, Jun. 2017. based on blockchain environment,’’ Future Gener. Comput. Syst., vol. 95,
[55] E. Avgouleas and A. Kiayias, ‘‘The promise of blockchain technology for pp. 511–521, Jun. 2019.
global securities and derivatives markets: The new financial ecosystem [76] A. E. Nemade, S. S. Kadam, R. N. Choudhary, S. S. Fegade, and
and the ’holy grail’ of systemic risk containment,’’ Eur. Bus. Org. Law K. Agarwal, ‘‘Blockchain technology used in taxation,’’ in Proc. Int. Conf.
Rev., vol. 20, no. 1, pp. 81–110, 2019. Vis. Towards Emerg. Trends Commun. Netw. (ViTECoN), Vellore, India,
[56] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, ‘‘LSB: Mar. 2019, pp. 1–4.
A lightweight scalable blockchain for IoT security and anonymity,’’ [77] S. Xiao, X. A. Wang, W. Wang, and H. Wang, ‘‘Survey on blockchain-
J. Parallel Distrib. Comput., vol. 134, pp. 180–197, Dec. 2019. based electronic voting,’’ in Proc. Int. Conf. Intell. Netw. Collaborative
[57] M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo, ‘‘Design Syst., Oita, Japan, vol. 1035, 2019, pp. 559–567.
of secure user authenticated key management protocol for generic IoT [78] T. Nadar, M. Rawal, J. Patel, A. Shah, and A. S. Revathi, ‘‘A novel
networks,’’ IEEE Internet Things J., vol. 5, no. 1, pp. 269–282, Feb. 2018. approach to implement decentralized voting system using blockchain,’’
[58] H. Shafagh, L. Burkhalter, A. Hithnawi, and S. Duquennoy, ‘‘Towards in Proc. Int. Conf. Wireless Commun., vol. 36, 2020, pp. 471–479.
blockchain-based auditable storage and sharing of IoT data,’’ in Proc. [79] B. Shahzad and J. Crowcroft, ‘‘Trustworthy electronic voting using
Cloud Comput. Secur. Workshop (CCSW), New York, NY, USA, 2017, adjusted blockchain technology,’’ IEEE Access, vol. 7, pp. 24477–24488,
pp. 45–50. 2019.
[59] C. Qu, M. Tao, J. Zhang, X. Hong, and R. Yuan, ‘‘Blockchain based [80] M. Kuperberg, S. Kemper, and C. Durak, ‘‘Blockchain usage for
credibility verification method for IoT entities,’’ Secur. Commun. Netw., government-issued electronic IDs: A survey,’’ in Proc. Int. Conf. Adv. Inf.
vol. 2018, pp. 1–11, Jun. 2018. Syst. Eng., Rome, Italy, vol. 349, 2019, pp. 155–167.
[60] M. Li, S. P. Guan, and R. R. Du, ‘‘Research on the application of customs [81] V. Odelu, ‘‘IMBUA: Identity management on blockchain for biometrics-
supervision on cross-border import e-commerce retail business from the based user authentication,’’ in Proc. Int. Congr. Blockchain Appl., Ávila,
perspective of blockchain,’’ in Proc. 6th Int. Conf. Manage. Sci. Manage. Spain, vol. 1010, 2019, pp. 1–10.
Innov. (MSMI), 2019, pp. 1–5. [82] E. Mengelkamp, B. Notheisen, C. Beer, D. Dauer, and C. Weinhardt,
[61] Q. Tao, X. Cui, X. Huang, A. M. Leigh, and H. Gu, ‘‘Food safety super- ‘‘A blockchain-based smart grid: Towards sustainable local energy mar-
vision system based on hierarchical multi-domain blockchain network,’’ kets,’’ Comput. Sci.-Res. Develop., vol. 33, nos. 1–2, pp. 207–214,
IEEE Access, vol. 7, pp. 51817–51826, 2019. Feb. 2018.
[83] J. Gao, K. O. Asamoah, E. B. Sifah, A. Smahi, Q. Xia, H. Xia, X. Zhang, [105] D. Di Francesco Maesa, A. Marino, and L. Ricci, ‘‘Data-driven analysis of
and G. Dong, ‘‘GridMonitoring: Secured sovereign blockchain based bitcoin properties: Exploiting the users graph,’’ Int. J. Data Sci. Analytics,
monitoring on smart grid,’’ IEEE Access, vol. 6, pp. 9917–9925, 2018. vol. 6, no. 1, pp. 63–80, Aug. 2018.
[84] K. Wu, B. Peng, H. Xie, and Z. Huang, ‘‘An information entropy method [106] P. Zheng, Z. Zheng, X. Luo, X. Chen, and X. Liu, ‘‘A detailed and
to quantify the degrees of decentralization for blockchain systems,’’ in real-time performance monitoring framework for blockchain systems,’’
Proc. IEEE 9th Int. Conf. Electron. Inf. Emergency Commun. (ICEIEC), in Proc. 40th Int. Conf. Softw. Eng. Softw. Eng. Pract. (ICSE-SEIP),
Beijing, China, Jul. 2019, pp. 1–6. Gothenburg, Sweden, 2018, pp. 134–143.
[85] F. Wessling, C. Ehmke, O. Meyer, and V. Gruhn, ‘‘Towards blockchain [107] P. Tasca, A. Hayes, and S. Liu, ‘‘The evolution of the bitcoin economy:
tactics: Building hybrid decentralized software architectures,’’ in Proc. Extracting and analyzing the network of payment relationships,’’ J. Risk
IEEE Int. Conf. Softw. Archit. Companion (ICSA-C), Hamburg, Germany, Finance, vol. 19, no. 2, pp. 94–126, 2018.
Mar. 2019, pp. 234–237.
[86] F. Hawlitschek, B. Notheisen, and T. Teubner, ‘‘The limits of trust-free YIJUN ZOU was born in Jiangsu Province, China.
systems: A literature review on blockchain technology and trust in the He received the M.Sc. degree in management from
sharing economy,’’ Electron. Commerce Res. Appl., vol. 29, pp. 50–63, the University of International Business and Eco-
May 2018. nomics. He is currently pursuing the Ph.D. degree
[87] W. Hong, Y. Cai, Z. Yu, and X. Yu, ‘‘An agri-product traceability sys- in management science and engineering with the
tem based on IoT and blockchain technology,’’ in Proc. 1st IEEE Int.
Beijing University of Posts and Telecommunica-
Conf. Hot Inf.-Centric Netw. (HotICN), Shenzhen, China, Aug. 2018,
tions. He is also the Vice Director of the Depart-
pp. 254–255.
[88] J. Li and X. Wang, ‘‘Research on the application of blockchain in the
ment of Finance, BUPT. He is also the Account-
traceability system of agricultural products,’’ in Proc. 2nd IEEE Adv. ing Leader of the Chinese Central Government
Inf. Manage., Communicates, Electron. Autom. Control Conf. (IMCEC), Department. His research interests include big
Xi’an, China, May 2018, pp. 2637–2640. data, blockchain, data assets, and financial management.
[89] X. Liu, Z. Wang, C. Jin, F. Li, and G. Li, ‘‘A blockchain-based
medical data sharing and protection scheme,’’ IEEE Access, vol. 7, TING MENG received the B.S. degree in soft-
pp. 118943–118953, 2019. ware engineering from Yanshan University, China,
[90] S. V. Bojja, G. Fanti, and P. Viswanath, ‘‘Dandelion: Redesigning the in 2018. She is currently pursuing the M.S. degree
bitcoin network for anonymity,’’ ACM Meas. Anal. Comput. Syst., vol. 1,
with the School of Software Engineering, Beijing
no. 1, pp. 1–34, 2017.
University of Posts and Telecommunications. Her
[91] Q. Feng, D. He, S. Zeadally, M. K. Khan, and N. Kumar, ‘‘A survey
on privacy protection in blockchain system,’’ J. Netw. Comput. Appl., research interests include blockchain privacy pro-
vol. 126, pp. 45–58, Jan. 2019. tection, blockchain transaction data analysis, and
[92] A. Singh, T.-W. Ngan, P. Druschel, and D. S. Wallach, ‘‘Eclipse attacks network security.
on overlay networks: Threats and defenses,’’ in Proc. IEEE INFOCOM.
25TH IEEE Int. Conf. Comput. Commun., Barcelona, Spain, Apr. 2006,
pp. 1–12.
[93] J. R. Douceur, ‘‘The Sybil attack,’’ in Proc. Int. Workshop Peer-Peer Syst., PENG ZHANG received the B.S. degree in soft-
Cambridge, MA, USA, 2002, pp. 251–260. ware engineering from Shanxi University, China,
[94] G. Karame, E. Androulaki, and S. Capkun, ‘‘Two bitcoins at the price in 2018. He is currently pursuing the M.S.
of one? Double-spending attacks on fast payments in bitcoin,’’ IACR degree with the School of Software Engineering,
Cryptol. ePrint Arch., vol. 2012, no. 248, 2012. Beijing University of Posts and Telecommunica-
[95] S. Sayeed and H. Marco-Gisbert, ‘‘Assessing blockchain consensus and tions. His research interests include blockchain
security mechanisms against the 51% attack,’’ Appl. Sci., vol. 9, no. 9, privacy protection, blockchain consensus algo-
p. 1788, Apr. 2019. rithm, and network security.
[96] J. Xie, F. R. Yu, T. Huang, R. Xie, J. Liu, and Y. Liu, ‘‘A survey
on the scalability of blockchain systems,’’ IEEE Netw., vol. 33, no. 5,
pp. 166–173, Sep. 2019.
[97] A. A. Monrat, O. Schelen, and K. Andersson, ‘‘A survey of blockchain WENZHEN ZHANG received the B.S. degree in
from the perspectives of applications, challenges, and opportunities,’’
software engineering from the Beijing University
IEEE Access, vol. 7, pp. 117134–117151, 2019.
of Posts and Telecommunications, in 2019, where
[98] L. Ismail and H. Materwala, ‘‘A review of blockchain architecture and
consensus protocols: Use cases, challenges, and solutions,’’ Symmetry, she is currently pursuing the M.S. degree with
vol. 11, no. 10, p. 1198, 2019. the School of Software Engineering. Her research
[99] Q. Wang, S. Wang, P. Zhang, L. He, X. Li, S. Cheng, and S. Zhou, interests include blockchain privacy protection,
‘‘An achieving data exchange cross-chain alliance protocol,’’ J. Phys., blockchain, traction data analysis, and network
Conf. Ser., vol. 1213, Jun. 2019, Art. no. 042037. security.
[100] J. Y. Zie, J. C. Deneuville, J. Briffaut, and B. Nguyen, ‘‘Extending atomic
cross-chain swaps,’’ in Proc. DPM, Int. Workshop Data Privacy Manage.
CBT, Int. Workshop Cryptocurrencies Blockchain Technol., Luxembourg
City, Luxembourg, vol. 11737, 2019, pp. 219–229. HUIYANG LI was born in Taiyuan, Shanxi, China,
[101] D. Fakhri and K. Mutijarsa, ‘‘Secure IoT communication using in 1992. She received the B.S. degree in elec-
blockchain technology,’’ in Proc. Int. Symp. Electron. Smart Devices tronic information engineering from the Tian-
(ISESD), Bandung, Indonesia, Oct. 2018, pp. 1–6. jin College, University of Science & Technology
[102] H. Cui, Z. Chen, Y. Xi, H. Chen, and J. Hao, ‘‘IoT data management and
Beijing, Tianjin, China, in 2014, and the M.S.
lineage traceability: A blockchain-based solution,’’ in Proc. IEEE/CIC
degree in software engineering from The Univer-
Int. Conf. Commun. Workshops China (ICCC Workshops), Changchun,
China, Aug. 2019, pp. 239–244.
sity of Texas at Arlington, Arlington, TX, USA,
[103] M. S. Devi, R. Suguna, and P. M. Abhinaya, ‘‘Integration of blockchain in 2017, where she is currently pursuing the Ph.D.
and IoT in satellite monitoring process,’’ in Proc. IEEE Int. Conf. Electr., degree in computer science. Since 2018, she has
Comput. Commun. Technol. (ICECCT), Coimbatore, India, Feb. 2019, been a Research Assistant with the ACES Labora-
pp. 1–6. tory, The University of Texas at Arlington. Her research interests include the
[104] K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al-Fuqaha, SLO Tail latency guaranteed data center job scheduling, blockchain, resource
‘‘Blockchain for AI: Review and open research challenges,’’ IEEE management in cloud, and edge computing.
Access, vol. 7, pp. 10127–10149, 2019.