Blockchain of Finite-Lifetime Blocks With Applications to Edge-Based IoT
Blockchain of Finite-Lifetime Blocks With Applications to Edge-Based IoT
3, MARCH 2020
Abstract—Edge computing is a promising approach for provi- Blockchain is a peer-to-peer distributed ledger which
sioning distributed cloud services to Internet of Things (IoT) has initially gained success with cryptocurrencies such as
systems. Many recent studies propose that edge nodes use Bitcoin [6]. Because blockchain is nearly forge- and tamper-
blockchain for the decentralized management and access control
of IoT data. However, due to the massive volume of data and proof, it can handle secure transactions and data processing
related transactions, edge servers will eventually run out of space without authoritative intermediary. Blockchain is also charac-
to store the full chain. We introduce scalable and lightweight terized by security, transparency, integrity, and decentralization
architecture called LiTiChain, a blockchain of blocks with finite and is currently applied to various fields, such as finance,
lifetime. In LiTiChain, outdated transactions and blocks, that is, manufacturing, health care, etc., [7]. We consider a scalable
the blocks whose lifetimes are expired, can be safely removed
from the chain. Two graphs are merged into the structure of blockchain architecture suitable for IoT in the edge computing
LiTiChain: 1) a tree representing the order of expiry of lifetimes environment.
and 2) a linear graph representing the order of block creation. Due to the sheer number of connected IoT devices, cen-
We show that this construction not only ensures the connectiv- tralized cloud architecture has scalability problems in gath-
ity of the chain after block deletions but also helps to maintain ering and processing generated data. The edge computing
the block height of shortened chain. LiTiChain also supports
transactions whose lifetime is unknown at the time of creation. framework [8]–[10] alleviates the problems by bringing com-
It is possible that some expired blocks need to be retained in putation, data processing, and storage services closer to the
the chain, in case they are needed to validate remaining blocks, IoT devices. In edge computing, the first-hand processing of
which incurs additional storage costs. A detailed analysis of such IoT data is done at the edge servers which may compress
overhead in storage costs is presented for stochastic and worst and summarize the collected data. The summarized data in
case scenarios. Extensive simulation is performed on actual and
synthetic IoT data so as to gain insights on the storage costs under a greatly reduced size can be later forwarded to the central
various lifetime distributions. It is demonstrated that LiTiChain cloud. The edge layer can offload not only data processing
provides a simple yet effective solution to scalability problems in tasks from cloud but also low-latency compute-intensive tasks
storing blockchains for the IoT ecosystems. from the IoT devices. Recently, there has been much interest
Index Terms—Blockchain, edge computing, Internet of Things in machine-learning tasks which are delay-sensitive requiring
(IoT), security, storage costs. quick inference for speech recognition, translation, image clas-
sification, and video recognition [11]. Edge computing can
I. I NTRODUCTION thus effectively reduce power consumption and computational
load of IoT devices [12]–[17].
HE INTERNET of Things (IoT) industry continues to
T grow fast, and it is projected that over 60 billion devices
will have the Internet connectivity by 2025 with the global
We envision edge-based IoT systems where the edge servers
form a distributed network supporting storage and sharing
of IoT data using blockchain. The idea has been explored
market size surpassing a trillion dollars [1]. As IoT becomes in prior works; for example, EdgeChain [18] is proposed to
prevalent in daily life handling sensitive and private data, the record the activities and transactions among IoT along with
IoT security has become a major concern. With an explo- the resource management. Also, a model for sharing econ-
sive number of connected devices, it is challenging to address omy services based on blockchain is proposed [19], where the
issues in privacy, device reliability, hacking, and data integrity. intelligent processing of multimedia and cyber-physical data
In particular, centralized approaches to the IoT security have occurs at edge nodes which handle key transactions through
faced limitations due to the massive scale of generated data. blockchain. A decentralized storage system for IoT data with
To overcome these problems, a number of recent studies took blockchain-based access control was proposed [20] on top of
decentralized approaches using blockchain [2]–[5]. the decentralized cloud architectures such as Cloudlets [21].
Manuscript received July 25, 2019; revised October 22, 2019 and November The challenge with managing IoT data through blockchain
5, 2019; accepted December 3, 2019. Date of publication December 13, 2019; is, however, the scalability in the storage capacity. Currently,
date of current version March 12, 2020. This work was supported by for Bitcoin, more than 225 GB is required to store the full
the National Research Foundation of Korea grant funded by the Korea
Government (MSIT) under Grant 2018R1A2B6007130. (Corresponding chain. The transaction rate of Bitcoin is typically less than
author: Seung Jun Baek.) ten per second. By contrast, the generation rate of data from
The authors are with the Computer Science and Engineering massive-scale IoT devices and the associated transactions will
Department, Korea University, Seoul 02841, South Korea (e-mail:
[email protected]; [email protected]). be significantly higher than those of monetary transactions in
Digital Object Identifier 10.1109/JIOT.2019.2959599 cryptocurrencies. Because each edge server has a direct control
2327-4662 c 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
PYOUNG AND BAEK: BLOCKCHAIN OF FINITE-LIFETIME BLOCKS WITH APPLICATIONS TO EDGE-BASED IoT 2103
over the associated client IoT devices and their data, each fixed, permanent, or indefinite lifetime depending on if the life-
server should be able to fully verify transactions and blocks, time is either deterministically finite, infinite, or undetermined,
i.e., should be a “full node,” and thus should store the full respectively, at the time of creation. This aspect complements
chain. The blockchain is, by design, an ever-growing, perma- the traditional blockchain which is not intended for handling
nent record of data blocks. Thus, the scalability of storage is data of which the validity lasts for a finite duration.
problematic with existing approaches, considering that edge We propose and explore the architecture of LiTiChain in the
servers typically have limited storage space. rest of this article. Due to the variability of block lifetimes,
In this article, we introduce a scalable and lightweight the topology of the proposed blockchain may change over
blockchain architecture called LiTiChain (pronounced as time. Particularly, if past blocks are deleted, the blochchain
litty1 -chain). LiTiChain is a blockchain of blocks with finite data structure may become disconnected. We thus propose a
lifetime. If the lifetime of a block expires, the block can be blockchain structure which merges two types of graphs: the
deleted from the chain. Thus, the size of the chain does not first graph with a tree structure based on the order of expira-
necessarily grow monotonically over time. The lifetime of a tion of lifetimes; and the second graph with a linear structure
block is determined by the lifetime of transactions within the based on the order of creation as in the conventional chain.
block; that is, we mainly consider transactions with lifetimes. We show that the former structure ensures the connectivity of
In addition to storage issues, we give rationale behind con- the chain, whereas the latter increases the height of the chain,
sidering IoT data and transactions with lifetimes. IoT generates i.e., the distance to the genesis block, leading to an improved
time-series data, such as sensor measurements, event logs, strength of security of the chain.
environmental and behavioral data, etc. Certain types of trans- Meanwhile, a block may be retained in LiTiChain although
actions may lose value over time. For example, suppose a its lifetime has expired because there may exist other blocks
customer equipped with an IoT device gets issued with a which refer to the block for validation purposes. The deletion
coupon with expiration date. The issuer of the coupon needs of the referred block will be delayed, which incurs additional
to keep track of the transaction (issuance) until the expiration storage costs. We will discuss methods to reduce such costs
date; however, after the expiration date, there is little point due to overdue blocks. A detailed analysis on how the retention
in storing that information. The depreciation of data and its overhead will affect the total storage cost is provided as well.
transactions over time is common in IoT applications. We summarize our contributions as follows.
Also, there is a growing concern in the privacy of 1) We propose a scalable blockchain architecture called
blockchains. Blockchain is pseudonymous, where a participant LiTiChain, which manages transactions with finite life-
is identified by its public key or hash. However, it is possible to times. In LiTiChain, the expired blocks can be removed
infer the actual identity of users by analyzing their transaction from the chain while maintaining its connectivity.
patterns recorded in the ledger [22], [23]. This issue can be LiTiChain provides a simple solution to storage prob-
partly addressed if some outdated transactions can be erased lems of conventional blockchains and is suitable for
in a timely manner. Besides, the IoT data shared among partic- edge-based IoT ecosystems generating a large number
ipants may contain personal information which its owner may of transactions.
not want to disclose permanently. Thus, a user may request 2) We present both stochastic and worst case analysis on
data or transaction history to be removed from the record. the storage costs incurred by retained blocks. For the
Blockchain has evolved into a platform not only for cryp- stochastic model, we derive the expected cost of reten-
tocurrency but also for transactions in healthcare and insurance tion overhead in a closed form. We also obtain an upper
which contain sensitive personal information, such as disease bound on the worst-case retention cost (RC) of overdue
and genetic information. General data protection regulation blocks.
(GDPR) [24] in European Union (EU) protects the fundamen- 3) We extensively perform numerical experiments using the
tal rights to the privacy of data subjects in Europe. The right actual and synthetic IoT data sets. We examine and pro-
to be forgotten (Article 17) stipulates that the record shall be vide insights on the storage costs, topology changes, and
removed if the purpose of collecting personal information has retention overhead of LiTiChain.
been fulfilled or that the information subject has withdrawn its The remainder of this article is organized as follows.
consent. Thus, personal information should be considered for We review the related work in Section II. We describe the
deletion if it is not necessary for the purpose of use or if the system model of our proposed blockchain in Section III. The
retention period has passed. If a user intentionally uploads data algorithms for block creation and deletion are presented in
with explicit contents or private information without consent, Section IV. In Section V, we analyze the worst case in our
the data will permanently remain in the blockchain. Thus, it proposed blockchain. The performance evaluation via simula-
is desirable to remove data that conflicts with societal norms tions is presented in Section VI. Section VII concludes this
and values from the storage even without agreements with the article.
uploader.
The lifetime of a transaction, however, may not be always
available when the transaction is created. LiTiChain is II. R ELATED W ORK
designed to handle three types of transactions: those with a The conventional centralized approaches to IoT security can
be vulnerable in large scale systems. To address the scalability
1 Although now obsolete, litty meant little in the English literature. issues, decentralized methods based on blockchain are recently
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
2104 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 3, MARCH 2020
proposed. Dorri et al. [25] proposed a decentralized, privacy works on distributed storage for IoT data empowered by
preserving, and secure architecture based on blockchain for blockchain. Liang et al. [39] proposed DroneChain to ensure
interconnected smart vehicles. The privacy of user was ensured the secure communication and integrity of data collected from
by changing the public key for each transaction. The authors drones. They simulated the average response time of data
found various applications of their architecture to the auto- transmission with an increasing number of drones and showed
motive industry, such as remote software updates, insurance, the effectiveness in scalability. Biswas et al. [40] proposed a
smart charging for electric vehicles, and car-sharing services. scalable blockchain framework for IoT, where they created a
Novo [26] introduced a distributed access control system for local peer network and achieved increased transaction rate and
IoT using blockchain. The IoT devices are indirectly con- the ledger scalability through all peers. Jiang et al. [41] inte-
nected to blockchain through management hub nodes, where grated Internet of Vehicles (IoV) and blockchain for distributed
the hub node used a signed certificate allowing the IoT devices and secure storage of big data. Li et al. [42] proposed the
to verify its authenticity. Wan et al. [27] proposed a par- blockchain-based large-scale IoT data storage and protection.
tially decentralized Industrial IoT (IIoT) architecture for smart The features of the proposed distributed storage are: the IoT
factory based on blockchain. They combined the Bell-La data are stored off-chain; the access to IoT data is controlled by
Padula model and the Biba model to ensure confidentiality, the majority of miners; and all access activities are recorded
integrity, and availability of data and service. Their proposed in the blockchain. Xu et al. [43] introduced Healthchain, a
scheme achieved an improved security and privacy protection privacy-preserving system for large-scale health data based on
than the centralized IIoT architecture in automatic production blockchain, where the IoT data and doctors’ diagnoses are
platforms. stored in IPFS.
Next, we introduce scalable systems and solutions for The studies in [44] and [45] consider redactable
blockchain. InterPlanetary file system (IPFS) [28], [29] is a blockchains at the block- and transaction-level, respectively.
decentralized and distributed file system with high integrity Deuber et al. [44] proposed a redactable blockchain that avoids
and resiliency. Unlike HTTP Web, IPFS maintains a stable heavy cryptographic primitives and used a consensus-based
system because data can be shared by connected nodes even voting in the permissionless setting. The proposed chain con-
in the presence of disconnected nodes. In order to maintain sists of blocks which are linearly connected by two links, the
the network, miners are paid with Filecoin [30] as a reward old and the new link. If a new block in the candidate block pool
for providing data storage and retrieval. Sharding [31] is an receives approval votes in the majority, the old block can be
on-chain solution that divides the entire network into shards replaced with the new one. The old state of the block is main-
in order to store transactions separately, and then to process tained for validation purposes. However, the chain length and
the stored transactions in parallel. Plasma [32] is an off-chain structure remain unchanged under their framework, and the
solution that enables scalable transactions on Ethereum by work does not address the storage problem for blockchains.
introducing blockchain-in-blockchain structure consisting of Derler et al. [45] introduced a policy-based chameleon-hash
child- and parent-chain. Transactions are offloaded to and are functions (PCHs) for fine-grained and controlled rewriting in
processed by the child-chain, where the processed transactions blockchain. The scheme uses the property of chameleon-hash
are verified and stored at the parent chain in the form of the functions such that the hash collisions can be generated after
Merkel root of their hashes. making arbitrary changes to blocks, only by authorities in pos-
The following studies consider an architecture combining session of a secret key, which is otherwise collision resistant.
IoT, blockchain, and edge computing. Sharma et al. [33] The secret key which can “unlock” the interlocked chain of
presented a distributed cloud architecture using blockchain. In blocks (called the trapdoor key), which makes blocks mod-
the edge of the IoT network, a distributed fog node consist- ifiable, needs to be shared among the authorities. However,
ing of software-defined networking (SDN) controllers based there is a risk of a small number of authorities entitled to
on blockchain is used for a low-latency service of com- redact transactions being compromised, in which case the
puting resources. Fog nodes are used as assisted computing entire system can fail.
resources where the raw data is stored in distributed cloud None of the aforementioned works have explicitly addressed
storage. Pan et al. [18] designed an edge-IoT framework the issue of storing ever-growing blockchain along with the
called “EdgeChain” based on blockchain and smart contracts. possibility of block removals. Conversely, LiTiChain can be
EdgeChain is a credit-based resource management system applied to all of the above works, whenever there is need for
to control the resources offered to IoT devices by the edge lightweight blockchain which can delete outdated blocks so as
servers. Kang et al. [34] proposed a reputation-based sharing to secure storage spaces for edge servers acting as full nodes.
of vehicle data with consortium blockchain and smart con-
tract. Their scheme is intended for secure and efficient data
III. P ROPOSED M ETHOD
management in the vehicular edge network, where the control
and storage of data is done at the edge nodes which are the A. System Model
roadside units (RSUs). We consider an IoT system consisting of a IoT devices and
The scalability is crucial for the storage of a massive amount a network of edge servers. Each IoT device is associated with
of data collected from IoT devices. Blockchain has been an edge server in the vicinity. Each edge server is responsible
applied to the storage on clouds [35], [36] as well as the dis- for processing and storing data collected from a group of IoT
tributed storage [37], [38]. In the following, we summarize devices, where the edge servers communicate with one another
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
PYOUNG AND BAEK: BLOCKCHAIN OF FINITE-LIFETIME BLOCKS WITH APPLICATIONS TO EDGE-BASED IoT 2105
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
2106 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 3, MARCH 2020
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
PYOUNG AND BAEK: BLOCKCHAIN OF FINITE-LIFETIME BLOCKS WITH APPLICATIONS TO EDGE-BASED IoT 2107
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
2108 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 3, MARCH 2020
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
PYOUNG AND BAEK: BLOCKCHAIN OF FINITE-LIFETIME BLOCKS WITH APPLICATIONS TO EDGE-BASED IoT 2109
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
2110 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 3, MARCH 2020
exponentially distributed with parameter μ, that is from S and denote the ith smallest number by li . We have the
following relation among si ’s and li ’s:
g(x) = μ exp(−μx), x ≥ 0.
0 = s1 < s2 < · · · < s n < l1 < l2 < · · · < l n .
2 2
Then, we get from (1)
⎧ Note that strict inequalities hold because endtimes are distinct.
⎪
⎪ 1 Theorem 2: We have that
⎨ , λ=μ
E0 [C] = 4μλ T n
2
⎪
⎪
1
−
1
, λ = μ. [N∞ (t)dt − N0 (t)]dt ≤ (li − si ).
⎩
μ − λ λ + μ 2μ 0 i=1
We prove the theorem by following the proof outlined
B. Worst-Case RC in [48] which proposes the string reversal algorithm which
Next, we consider deterministic setup which yields the worst will be explained in the sequel. Define f (x) := max(x, 0).
possible RC. The goal is to obtain an upper bound on the Lemma 1: For any real numbers s1 , s2 < l1 , l2
incurred RC. We consider the RC associated with a finite
number of blocks during a finite-time horizon. f (l1 − s1 ) + f (l2 − s2 ) > f (l1 − l2 ) + f (s1 − s2 ).
Assumption 1: Our assumptions for analysis are as follows. Proof: The proof for Lemma 1 is similar to proof of
1) A total of n blocks b1 , . . . , bn with endtimes e1 , . . . , en [48, Lemma 1]. For s1 , s2 < l1 , l2 , we have inequalities
are created in sequence.
2) The blocks have distinct endtimes. l2 > s 1
3) The last block bn is created before the earliest endtime (l2 − s2 ) > (s1 − s2 )
among all the blocks. (l1 − s1 ) > (l1 − l2 )
Due to Assumption 1 3), no blocks are deleted until all of
(l1 − s1 ) + (l2 − s2 ) > (l1 − l2 ) + (s1 − s2 ). (2)
the n blocks are created. Also from the assumptions, RC is
completely determined by the ordering of e1 , . . . , en . We con- From (2), we can show the following in four cases.
sider the ordering for the worst possible RC, which gives an 1) If l1 > l2 and s1 > s2
upper bound of RC for all possible cases. Below, we formu-
late the worst-case analysis as the combinatorial optimization f (l1 − s1 ) + f (l2 −s2 ) > f (l1 − l2 ) + f (s1 − s2 ).
problem. 2) If l1 > l2 and s1 ≤ s2
We will consider the total storage costs for cases of K = ∞
and K = 0. We will compare two cases, because evaluating f (l1 − s1 ) + f (l2 − s2 ) > f (l1 − l2 ).
case K = ∞ will give a full account of RC in our scheme, 3) If l1 ≤ l2 and s1 > s2
whereas no RC will be incurred under case K = 0. Let N∞ (t)
and N0 (t) denote the total number of blocks in the blockchain f (l1 − s1 ) + f (l2 − s2 ) > f (s1 − s2 ).
at time t with K = ∞ and K = 0, respectively. Assume
4) If l1 ≤ l2 and s1 ≤ s2
b1 is created at time 0, and let T denote the latest endtime
among e1 , . . . , en . We would like to compare the total storage f (l1 − s1 ) + f (l2 − s2 ) > 0.
cost incurred during the lifetime of the chain. Because the
blocks have unit size, the total storage cost for case K = ∞ From (2) and the above four cases, Lemma 1 is proved.
is given by Let X be an ordered sequence of n numbers x1 , . . . , xn .
Define
T
n−1
N∞ (t)dt
0 C(X) = f (xi+1 − xi ).
i=1
that is, it is the area under N∞ (t) by definition. Similarly,
T
we consider 0 N0 (t)dt which is also equal to the sum of the Lemma 2: Consider sequence X that is an arbitrary per-
lifetime of the blocks. The total RC of case K = ∞ is then mutation of s1 , s2 , . . . , l1 , l2 , . . . ,. We can find permutation
given by X ∗ which maximizes C(X) by successively applying a string
T reversal algorithm [48] to X. We have that
[N∞ (t) − N0 (t)]dt n
2
0 ∗
C(X ) = (li − si ).
for which we will find an upper bound. i=1
We introduce the following notations. Denote the earliest
Proof: We will follow similar arguments as those of
endtime by ê. Consider set S such that
[48, Lemma 2]. We consider the even and odd cases of n.
S := {e1 − ê, e2 − ê, . . . , en − ê}. Case 1 (n = 2k): Consider X1 which is an arbitrary per-
mutation of s1 , s2 , . . . , l1 , l2 , . . . Suppose we apply the string
Consider (n/2) smallest numbers of S and denote the ith reversal algorithm to X1 , change it to X2 as follows. We say X
smallest number by si . Next, consider the rest of numbers is in alternating arrangement [48] if the odd-indexed elements
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
PYOUNG AND BAEK: BLOCKCHAIN OF FINITE-LIFETIME BLOCKS WITH APPLICATIONS TO EDGE-BASED IoT 2111
of X or x1 , x3 , x5 , . . . is some permutation of small values The upper bound is achieved if e1 , . . . , en are in alter-
s1 , s2 , . . . and the even-indexed elements of X are a permuta- nating arrangement such that endtimes with odd indices
tion of l1 , l2 , . . . Suppose X1 is not in alternating arrangement, e1 , e3 , e5 , . . . are given by some permutation of small endtimes
we regard X1 as a string and operate on a substring of X1 which ê + s1 , ê + s2 , ê + s3 , . . . , and the endtimes with even indices
is not alternating such that are given by some permutation of large endtimes ê + l1 , ê + l2 ,
ê + l3 , . . .
X1 = , . . . , s3 , [s4 , . . . , l2 ], l3 , . . .
We provide a looser bound on the ratio of storage costs
X2 = , . . . , s3 , [l2 , . . . , s4 ], l3 , . . . when n is even. We show that the storage overhead due to RC
That is, the substring in the bracket of X1 is reversed in order is at most twice the storage cost without RC.
to yield the substring in the brackets in X2 . We can write C(X1 ) Corollary 1: Suppose n is even. We have that
and C(X2 ) as follows: T
0 N∞ (t)dt
k
2 i=1 li
C(X1 ) = + f (s4 − s3 ) + f (l3 − l2 ) T
≤ k
≤ 2.
0 N0 (t)dt i=1 (si + li )
C(X2 ) = + f (l2 − s3 ) + f (l3 − s4 )
Proof: Let n = 2k. Clearly we have that
where means the common cost for X1 and X2 . By Lemma 1,
we have that C(X2 ) > C(X1 ). T k
This implies that we can successively apply string rever- N0 (t)dt = nê + (si + li )
sal algorithm to X and increase the cost function C(X) 0 i=1
until X is in alternating arrangement. Due to the property
of f , it is clear that all strings X in alternating arrange- which implies that, by Theorem 2
ment have the same cost. Specifically, consider X ∗ = k k
T
s1 , l1 , s2 , l2 s3 , l3 , . . . , sk−1 , lk−1 , sk , lk . We have that for arbi- N∞ (t)dt ≤ nê + (si + li ) + (li − si )
trary string X 0 i=1 i=1
C(X) ≤ C(X ∗ ) k
= nê + 2 li .
= (l1 − s1 ) + (s2 − l1 ) + (l2 − s2 )
i=1
+ · · · + (sk − lk−1 ) + (lk − sk )
k k Thus, we have that
= li − si . T
0 N∞ (t)dt
k k
nê + 2 i=1 li 2 i=1 li
i=1 i=1
T
≤ k
≤ k
Case 2 (n = 2k +1): The proof is nearly identical to case 1. 0 N0 (t)dt nê + i=1 (si + li ) i=1 (si + li )
We can show that the maximum cost is achieved by alternating k
2 i=1 li
arrangement of string. The maximum cost can be achieved by ≤ k
=2
string X ∗ = s1 , m, l1 , s2 , l2 s3 , l3 , . . . , sk−1 , lk−1 , sk , lk , where i=1 li
m is the k + 1th largest number, or the element in the middle for which we used ê ≥ 0 and li > si ≥ 0 for all i.
of string s1 , s2 , . . . , l1 , l2 , . . . We have that
C(X) ≤ C(X ∗ ) VI. P ERFORMANCE E VALUATION
= (m − s1 ) + (l1 − m) + (l2 − s2 )
In this section, we evaluate the performance of our
+ · · · + (lk−1 − sk−1 ) + (lk − sk ) blockchain system through simulation. We focus on evaluating
k k average storage occupied by blocks and average block heights.
= li − si .
i=1 i=1
A. Performance Metrics
Proof of Theorem 2: The RC for case K = ∞ is bounded As previously, let N(t) denote the number of blocks in
above as follows. By definition, the RC of block i is given by the chain at time t. We assume all the blocks have the unit
max(ei+1 −ei , 0) = f (ei+1 −ei ). Thus, the total RC is given by size. Thus, the average storage space occupied by the chain
n−1
is proportional to N(t). We define the time average of storage
occupied by the chain by
C= f (ei+1 − ei ).
i=1 1 T
T N := lim N(t)dt.
Note 0 N0 (t)dt is simply the sum of the lifetimes of the T→∞ T 0
T
blocks. Also due to Assumption 1, we have that 0 N∞ (t)dt =
T We define the longest path from the newly created block to the
C + 0 N0 (t)dt. From Lemma 2, we have that genesis block as the height of a block. The average height D
n
2 is defined as taking the average block heights over all blocks
C≤ (li − si ). in the chain measured at the instants of block creation and
i=1 deletion.
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
2112 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 3, MARCH 2020
Fig. 8. Distribution of lifetime. (a) Operation time distribution from taxi trip record. (b) Distribution of Z. (c) Distribution of Ẑ. (d) Distribution of Z̃.
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
PYOUNG AND BAEK: BLOCKCHAIN OF FINITE-LIFETIME BLOCKS WITH APPLICATIONS TO EDGE-BASED IoT 2113
Fig. 9. Average total storage, total storage cost ratio, and height under LiTiChain.
bimodally distributed lifetime (case 2). Fig. 9(a) and (d) shows originally short lifetime, but are changed to have the long life-
the average storage cost against varying values of height con- time, will take about 25% of the total blocks. This is 50%
straint K. Fig. 9(a) and (d) shows the plots of storage occupied increase in the proportion of the blocks with a long lifetime.
by blocks averaged over time interval [0, W] against window Assuming the blocks with the long lifetime will occupy most
value W. We observe that the average storage blows up for of the total storage, the overhead of RC will be close to 50% of
conventional blockchain because it permanently stores all the the baseline storage. From Fig. 9(e), we indeed observe that the
incoming transactions. However, for our schemes, the average overhead due to RC rises over 40% if K = ∞. Interestingly,
storage converges quickly to stable values. similar overhead is observed in Fig. 9(b) with lifetime dis-
Fig. 9(b) and (e) shows the average storage N for varying tribution with single tail given by Fig. 8(a). This seems to
height constraint K. The baseline case is K = 0, and the aver- be because most of the blocks have a short lifetime from the
age storage for changing K is normalized to the baseline in shape in Fig. 8(a). Thus, if blocks with short lifetimes are
the figures. Fig. 9(b) and (e) shows the average storage are referred to by a few blocks with long lifetime, the increased
about 100%–142% and 100%–140% of the baseline storage overhead in the RC is expected to be significant to the overall
depending on K. Note that Fig. 9(b), (c), (e), and (f) is plotted storage.
against a set of K values, and their horizontal axis is not to Blocks Generated in Bursts: Next, we consider the case
scale. By controlling height constraint K from 0 to ∞, we where blocks are generated in bursts. Specifically, we eval-
achieve varying degrees of the tradeoff between security and uate the storage cost of a finite number of, say n, blocks,
storage costs. As K becomes larger, the average height of the where all the n blocks are created during a short time period
blocks increases, strengthening the security of the chain. With relative to their lifetimes. Note that this setup is similar to
smaller values of K, the block heights tend to be shallow, Assumption 1 in the RC analysis. Our goal is to compare the
however, the overall RC will decrease, leading to a reduced RC from worst case analysis with the RC from the previous
storage requirement for the blockchain. data sets. We proved that the maximum RC incurs if the end-
Let us compare the performances of cases 1 and 2. We times are in alternating arrangement. In the simulation, we
observe that the overhead due to RC tends to be similar for compare the theoretical worst-case cost with the cases the end-
cases 1 and 2. For case 2, we may consider the following times of blocks are in a random arrangement according to the
back-of-the-envelop calculation on the overhead due to RC. data sets.
Suppose the lifetime can take only two values: 1) very long and In the simulation, 50 blocks are created in burst, where the
2) very short. Assume that the probability of a block having block lifetimes are sampled from the distributions of cases 1
either length of lifetime is 0.5. Then roughly half of the total and 2. We assume that the blocks are created at distinct time
blocks will be created with the short lifetime. Furthermore, instants but within a negligibly short period of time, so that
roughly half of those will be referred to by a block with the the order of block endtimes is equal to that of the lifetimes.
long lifetime which arrived next to it. Thus, the blocks with For each case, the storage costs for K = 0 and K = ∞
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
2114 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 3, MARCH 2020
(a) (b)
(c) (d)
Fig. 10. Average total storage cost ratio under burst data.
are compared with the worst case in which the lifetimes are total storage cost is relatively low. In case, Fig. 10(d), there
reordered such that they are exactly in alternating arrangement. are many blocks with short lifetime, and there will be a few
Fig. 10(a) and (b) shows the comparison for the data sets in blocks held back by long-lived blocks. However, if they get
cases 1 and 2, respectively. The storage costs are averaged over retained by long-lived blocks, the relative increase in the stor-
200 times for each plot. The cost ratio of K = ∞ (resp. the age cost is high. The ratio of retained short-lived blocks and
worst case) relative to baseline with no RC (K = 0) is about its effect on the total storage cost is most “balanced” in the
136% (resp. 149%) in case 1. For case 2, the ratio is similar, case of Fig. 10(c), i.e., at the mixing proportion of 0.5 as in
given by 133% and 155%, respectively. The gap of cost ratio case 2, which yields the highest overhead due to the RC.
between K = ∞ and the worst case is higher for bimodal
distributions (13% versus 21%). This shows that indeed with
bimodal distribution in which short-lived blocks are held back VII. C ONCLUSION
by long-lived blocks, the worst case with alternating arrange- In this article, we proposed LiTiChain, a blockchain with
ment can do much worse than randomized arrangement. In finite-lifetime blocks, which is suitable for edge-based IoT
reality, it is unlikely that the alternating arrangement occurs systems. Through LiTiChain, we address the problem of con-
by chance; nonetheless, it is useful to know the upper bound ventional blockchain such that it is a permanently growing list
on the additional costs required to store the blockchain in its of information chunks. The issue of storing long blockchains
entirety. at full nodes can be resolved, if the outdated information
Next, we examine how the RC is affected by the change in can be removed in a timely manner. We introduced a tree-
the mixing proportion of the Gaussian mixture in the lifetime structured EOG which organizes the blocks according to their
distribution. Fig. 10(c) and (d) shows the storage cost ratio endtimes, so that the blocks can be deleted in an orderly fash-
for (3) and (4) in case 3, respectively. The cost ratio of case ion while maintaining the connectivity of the chain. In order to
K = ∞ (resp. the worst case) to case K = 0 is about 112% achieve various degrees of tradeoff between RC and the over-
(resp. 115%) for (3). For (4), the cost ratio is given by 133% all block heights, we proposed K-height block insertion. We
and 143%, respectively. We see that the relative overhead due also proposed the block renewal methods so as to deal with
to RC is in the order of (b) > (d) > (c) for the distributions transactions with indefinite lifetimes. The simulation results
in Fig. 10. The result can be explained as follows. In case of demonstrated the effect of the aforementioned tradeoff on the
distribution, Fig. 10(c), because most blocks have long life- total storage costs depending on the properties of lifetime
times, and thus most short-lived blocks are likely to be retained distributions. Future work will include devising a permission-
by long-lived blocks. However, the proportion of short-lived less version of erasable blockchains with insertion/deletion
blocks is small in the first place; thus the effect of RC on the throughputs acceptable for the IoT systems.
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
PYOUNG AND BAEK: BLOCKCHAIN OF FINITE-LIFETIME BLOCKS WITH APPLICATIONS TO EDGE-BASED IoT 2115
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.
2116 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 3, MARCH 2020
Chan Kyu Pyoung received the B.S. degree in information and telecommuni- Seung Jun Baek (Member, IEEE) received the B.S. degree from Seoul
cation engineering from Incheon National University, Incheon, South Korea, National University, Seoul, South Korea, in 1998, and the M.S. and Ph.D.
in 2010, and the M.S. degree in computer and radio communications engi- degrees in electrical and computer engineering from the University of Texas
neering from Korea University, Seoul, South Korea, in 2012, where he is at Austin, TX, USA, in 2002 and 2007, respectively.
currently pursuing the Ph.D. degree. From 2007 to 2009, he was a Member of Technical Staff with the
His research interests include network resource management in cloud and Communications and Medical Systems Laboratory, DSP Systems R&D
edge, network virtualization, software-defined networking, and blockchain Center, Texas Instruments, Dallas, TX, USA. In 2009, he joined the
system. College of Informatics, Computer Science and Engineering Department,
Korea University, Seoul, where he is currently a Full Professor. His research
interests include mobile computing systems, machine learning, and data-driven
optimization.
Authorized licensed use limited to: UNIVERSITY COLLEGE CORK. Downloaded on December 08,2024 at 09:44:46 UTC from IEEE Xplore. Restrictions apply.