Open Access   Article Go Back

A Systematic Literature Review of Proof of Work and Proof of Activity: Privacy and Performance

Denis Wapukha Walumbe1 , John Gichuki Ndia2

  1. School of Computing & Informatics, Gretsa University, Thika, Kenya.
  2. School of Computing and Information Technology, Muranga University of Technology Muranga, Kenya.

Section:Research Paper, Product Type: Journal Paper
Volume-11 , Issue-10 , Page no. 37-44, Oct-2023

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v11i10.3744

Online published on Oct 31, 2023

Copyright © Denis Wapukha Walumbe, John Gichuki Ndia . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Denis Wapukha Walumbe, John Gichuki Ndia, “A Systematic Literature Review of Proof of Work and Proof of Activity: Privacy and Performance,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.37-44, 2023.

MLA Style Citation: Denis Wapukha Walumbe, John Gichuki Ndia "A Systematic Literature Review of Proof of Work and Proof of Activity: Privacy and Performance." International Journal of Computer Sciences and Engineering 11.10 (2023): 37-44.

APA Style Citation: Denis Wapukha Walumbe, John Gichuki Ndia, (2023). A Systematic Literature Review of Proof of Work and Proof of Activity: Privacy and Performance. International Journal of Computer Sciences and Engineering, 11(10), 37-44.

BibTex Style Citation:
@article{Walumbe_2023,
author = {Denis Wapukha Walumbe, John Gichuki Ndia},
title = {A Systematic Literature Review of Proof of Work and Proof of Activity: Privacy and Performance},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2023},
volume = {11},
Issue = {10},
month = {10},
year = {2023},
issn = {2347-2693},
pages = {37-44},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5630},
doi = {https://doi.org/10.26438/ijcse/v11i10.3744}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v11i10.3744}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5630
TI - A Systematic Literature Review of Proof of Work and Proof of Activity: Privacy and Performance
T2 - International Journal of Computer Sciences and Engineering
AU - Denis Wapukha Walumbe, John Gichuki Ndia
PY - 2023
DA - 2023/10/31
PB - IJCSE, Indore, INDIA
SP - 37-44
IS - 10
VL - 11
SN - 2347-2693
ER -

VIEWS PDF XML
109 101 downloads 58 downloads
  
  
           

Abstract

Censuses protocols is one of the blockchain framework architecture layer that is critical to the privacy of the technology. Therefore, any attempt to improve on privacy and Performance of blockchain technology will focus on the consensus layer. Understanding the consensus mechanism underly the layer is paramount. This paper focuses on two of the mainstream consensus mechanism; PoW and PoA with a comparison of the advantages and disadvantages of each of the consensus algorithm. The privacy of these algorithms has been evaluated based on the metrics selected from the existing literature. The paper used SLR research method. It consists of three activities: Planning, Execution, and reporting. The activities have several processes and steps that were undertaken. A total of 72 papers were selected for analysis and they were those published between 2019-2023. The review highlighted the wide range of application areas for PoW and PoA, including healthcare, IoT, and industry 4.0. However, PoW`s popularity seemed to decline due to the introduction of faster and more secure blockchain algorithms. Privacy was a common theme, with decentralization, strong encryption, mutability, and scalability being key factors discussed in various studies. Overall, the systematic literature review Future Directions: Future research on PoW should focus on addressing concerns related to diminishing algorithm rewards and incentives for participants. Scholars should put effort in development of more hybrid algorithms that combine PoW with other blockchain algorithms to overcome challenges and gain benefits. In addition, the authors propose that more studies to focus on improving performance of PoA and explore on defining more decentralized algorithms.

Key-Words / Index Term

Proof of Work, Proof of Stake, Proof Action, Privacy, Blockchain, performance

References

[1]. V. Neziri, I. Shabani, R. Dervishi, and B. Rexha, “Assuring Anonymity and Privacy in Electronic Voting with Distributed Technologies Based on Blockchain,” Applied Sciences (Switzerland), Vol.12, No.11, 2022. doi: 10.3390/app12115477.
[2]. S. Wadhwa, S. Rani, Kavita, S. Verma, J. Shafi, and M. Wozniak, “Energy Efficient Consensus Approach of Blockchain for IoT Networks with Edge Computing,” Sensors, Vol.22, No.10, 2022. doi: 10.3390/s22103733.
[3]. S. Bouraga, “A taxonomy of blockchain consensus protocols: A survey and classification framework,” Expert Syst Appl, Vol.168, 2021. doi: 10.1016/j.eswa.2020.114384.
[4]. I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, “Proof of activity: Extending bitcoin’s proof of work via proof of stake [extended abstract],” ACM SIGMETRICS Performance Evaluation Review, Vol.42, No.3, 2014.
[5]. B. Mi, Y. Weng, D. Huang, Y. Liu, and Y. Gan, “A novel PoW scheme implemented by probabilistic signature for blockchain,” Computer Systems Science and Engineering, Vol.39, No.2, 2021. doi: 10.32604/csse.2021.017507.
[6]. C. Pu, A. Wall, I. Ahmed, and K. K. R. Choo, “SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones,” in Proceedings - IEEE International Conference on Mobile Data Management, 2022. doi: 10.1109/MDM55031.2022.00033.
[7]. [7] A. A. Laghari, A. A. Khan, R. Alkanhel, H. Elmannai, and S. Bourouis, “Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs),” Electronics (Switzerland),Vol.12, No.3, 2023. doi:10.3390/electronics12030677.
[8]. C. W. Hsueh and C. T. Chin, “Toward Trusted IoT by General Proof-of-Work,” Sensors, Vol.23, No.1, 2023. doi: 10.3390/s23010015.
[9]. R. Xu and Y. Chen, “Fed-DDM: A Federated Ledgers based Framework for Hierarchical Decentralized Data Marketplaces,” in Proceedings - International Conference on Computer Communications and Networks, ICCCN, 2021. doi: 10.1109/ICCCN52240.2021.9522359.
[10]. H. H. M. Mahmoud, W. Wu, and Y. Wang, “Proof of learning: Two Novel Consensus mechanisms for data validation using Blockchain Technology in Water Distribution System,” in 2022 27th International Conference on Automation and Computing: Smart Systems and Manufacturing, ICAC 2022, 2022. doi: 10.1109/ICAC55051.2022.9911156.
[11]. K. Qian, Y. Liu, Y. Han, and K. Wang, “Performance Benchmarking and Optimization for IIoT-oriented Blockchain,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2021. doi: 10.1007/978-3-030-68884-4_33.
[12]. S. Bouraga, “A taxonomy of blockchain consensus protocols: A survey and classification framework,” Expert Syst Appl, Vol.168, 2021, doi: 10.1016/j.eswa.2020.114384.
[13]. T. Machacek, M. Biswal, and S. Misra, “Proof of X: Experimental insights on blockchain consensus algorithms in energy markets,” in 2021 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2021, 2021. doi: 10.1109/ISGT49243.2021.9372194.
[14]. L. Shi, T. Wang, J. Li, S. Zhang, and S. Guo, “Pooling is Not Favorable: Decentralize Mining Power of PoW Blockchain Using Age-of-Work,” IEEE Transactions on Cloud Computing, 2022, doi: 10.1109/TCC.2022.3226496.
[15]. W. Lv, N. Wang, X. Xie, and Z. Hong, “A Classification-Based Blockchain Architecture for Smart Home with Hierarchical PoW Mechanism,” Buildings, Vol.12, No.9, 2022, doi: 10.3390/buildings12091321.
[16]. I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, “Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake,” Cryptology ePrint Archive, Vol.452, No.3, 2014.
[17]. X. Chen, K. Nguyen, and H. Sekiya, “On the Latency Performance in Private Blockchain Networks,” IEEE Internet Things J, vol. 9, no. 19, 2022, doi: 10.1109/JIOT.2022.3165666.
[18]. A. Alrowaily, M. Alghamdi, I. Alkhazi, A. B. Hassanat, M. M. S. Arbab, and C. Z. Liu, “Modeling and Analysis of Proof-Based Strategies for Distributed Consensus in Blockchain-Based Peer-to-Peer Networks,” Sustainability, vol. 15, no. 2, 2023, doi: 10.3390/su15021478.
[19]. S. Pandey, Vanshika, Anshul, and R. K. Dwivedi, “A Secure Design of Healthcare System with Blockchain and Internet of Things (IoT),” in IDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings, 2023. doi: 10.1109/IDCIoT56793.2023.10053491.
[20]. S. Kaur, S. Chaturvedi, A. Sharma, and J. Kar, “A Research Survey on Applications of Consensus Protocols in Blockchain,” Security and Communication Networks, vol. 2021. 2021. doi: 10.1155/2021/6693731.
[21]. [21] L. Xiong, T. Peng, F. Li, S. Zeng, and H. Wu, “Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT,” IEEE Syst J, vol. 17, no. 1, 2023, doi: 10.1109/JSYST.2022.3221959.
[22]. [22] H. Yang, J. Shen, J. Lu, T. Zhou, X. Xia, and S. Ji, “A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/5781354.
[23]. M. S. Jalali, A. Landman, and W. J. Gordon, “Telemedicine, privacy, and information security in the age of COVID-19,” Journal of the American Medical Informatics Association, vol. 28, no. 3. Oxford University Press, pp.671–672, Mar. 01, 2021. doi: 10.1093/jamia/ocaa310.
[24]. H. Habibzadeh, B. H. Nussbaum, F. Anjomshoa, B. Kantarci, and T. Soyata, “A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities,” Sustainable Cities and Society, Vol.50, 2019. doi: 10.1016/j.scs.2019.101660.
[25]. N. Qamar, Y. Yang, A. Nadas, and Z. Liu, “Querying Medical Datasets while Preserving Privacy,” in Procedia Computer Science, Elsevier B.V., pp.324–331, 2016. doi: 10.1016/j.procs.2016.09.049.
[26]. R. Seigel, S. T. Lashway, M. M. K. Stein, and C. J. Rundell, “Telehealth and digital health privacy regulations,” in Diabetes Digital Health and Telehealth, 2022. doi: 10.1016/B978-0-323-90557-2.00020-0.
[27]. M. AbdulRaheem, J. B. Awotunde, C. Chakraborty, E. A. Adeniyi, I. D. Oladipo, and A. K. Bhoi, “Security and privacy concerns in smart healthcare system,” in Implementation of Smart Healthcare Systems using AI, IoT, and Blockchain, 2023. doi: 10.1016/b978-0-323-91916-6.00002-3.
[28]. W. Liang and N. Ji, “Privacy challenges of IoT-based blockchain: a systematic review,” Cluster Comput, Vol.25, No.3, 2022, doi: 10.1007/s10586-021-03260-0.
[29]. E. R. Weitzman and M. Floyd, “Privacy and diabetes digital technologies and telehealth services,” in Diabetes Digital Health and Telehealth, 2022. doi: 10.1016/B978-0-323-90557-2.00011-X.
[30]. A. D. Dhass, S. Raj Anand, and R. Krishna, “Implementation of Blockchain-Based Security and Privacy in Energy Management,” in Green Energy and Technology, 2021. doi: 10.1007/978-3-030-64565-6_18.
[31]. W. Wang et al., “A privacy protection scheme for telemedicine diagnosis based on double blockchain,” Journal of Information Security and Applications, Vol.61, 2021. doi: 10.1016/j.jisa.2021.102845.
[32]. F. J. de Haro-Olmo, Á. J. Varela-Vaca, and J. A. Álvarez-Bermejo, “Blockchain from the perspective of privacy and anonymisation: A systematic literature review,” Sensors (Switzerland), Vol.20, No.24, pp.1–21, Dec. 2020, doi: 10.3390/s20247171.
[33]. A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K. K. R. Choo, “Blockchain-Enabled Authentication Handover with Efficient Privacy Protection in SDN-Based 5G Networks,” IEEE Trans Netw Sci Eng, vol. 8, no. 2, 2021, doi: 10.1109/TNSE.2019.2937481.
[34]. H. A. Al Hamid, S. M. M. Rahman, M. Shamim Hossain, A. Almogren, and A. Alamri, “A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography,” IEEE Access, vol. 5, 2017, doi: 10.1109/ACCESS.2017.2757844.
[35]. G. Capece and F. Lorenzi, “Blockchain and healthcare: Opportunities and prospects for the ehr,” Sustainability (Switzerland), vol. 12, no. 22, 2020, doi: 10.3390/su12229693.
[36]. T. Frikha, A. Chaari, F. Chaabane, O. Cheikhrouhou, and A. Zaguia, “Healthcare and Fitness Data Management Using the IoT-Based Blockchain Platform,” J Healthc Eng, vol. 2021, 2021, doi: 10.1155/2021/9978863.
[37]. D. T. Myran et al., “Physician Health Care Visits for Mental Health and Substance Use during the COVID-19 Pandemic in Ontario, Canada,” JAMA Netw Open, vol. 5, no. 1, 2022, doi: 10.1001/jamanetworkopen.2021.43160.
[38]. K. Kumari and K. Saini, “Data handling & drug traceability: Blockchain meets healthcare to combat counterfeit drugs,” International Journal of Scientific and Technology Research, vol. 9, no. 3, 2020.
[39]. S. Mbunya, C. Asirwa, and D. Felker, “Telemedicine: Bridging the Gap Between Rural and Urban Oncologic Healthcare in Kenya,” J Glob Oncol, vol. 4, no. Supplement 2, 2018, doi: 10.1200/jgo.18.91500.
[40]. B. Yang and P. Y. Hsueh, “An socio-technical approach to securing health informatics,” Eur J Epidemiol, vol. 31, 2016.
[41]. A. O. Almagrabi, R. Ali, D. Alghazzawi, A. AlBarakati, and T. Khurshaid, “Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things,” Computers, Materials and Continua, vol. 68, no. 1, 2021, doi: 10.32604/cmc.2021.014753.
[42]. T. Ahmed, M. M. Al Aziz, and N. Mohammed, “De-identification of electronic health record using neural network,” Sci Rep, vol. 10, no. 1, 2020, doi: 10.1038/s41598-020-75544-1.
[43]. K. Azbeg, O. Ouchetto, and S. Jai Andaloussi, “BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security,” Egyptian Informatics Journal, vol. 23, no. 2, 2022, doi: 10.1016/j.eij.2022.02.004.
[44]. P. Krebs and D. T. Duncan, “Health app use among US mobile phone owners: A national survey,” JMIR mHealth and uHealth, Vol.3, No.4, 2015. doi: 10.2196/mhealth.4924.
[45]. S. Aggarwal, N. Kumar, M. Alhussein, and G. Muhammad, “Blockchain-Based UAV Path Planning for Healthcare 4.0: Current Challenges and the Way Ahead,” IEEE Netw, Vol.35, No.1, 2021, doi: 10.1109/MNET.011.2000069.
[46]. P. Esmaeilzadeh, “Use of AI-based tools for healthcare purposes: A survey study from consumers’ perspectives,” BMC Medical Informatics and Decision Making, Vol.20, No.1, 2020. doi: 10.1186/s12911-020-01191-1.
[47]. K. Wac, A. T. van Halteren, R. G. A. Bults, and T. H. F. Broens, “Context-aware QoS provisioning in an m-health service platform,” in International Journal of Internet Protocol Technology, 2007. doi: 10.1504/IJIPT.2007.012373.
[48]. C. M. Chen, Z. Chen, S. Kumari, and M. C. Lin, “LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things,” Sensors, Vol.22, No.14, 2022. doi: 10.3390/s22145401.
[49]. C. G. Kamotho and F. Bukachi, “Telemedicine is an effective way to manage cardiovascular disease in rural Kenya and to achieve universal healthcare,” Eur Heart J, Vol.41, no. Supplement_2, 2020. doi: 10.1093/ehjci/ehaa946.3485.
[50]. S. Subha and P. Perumal, “An analysis of a secure communication for healthcare system using wearable devices based on elliptic curve cryptography,” World Review of Science, Technology and Sustainable Development, Vol.18, No.1, 2022. doi: 10.1504/wrstsd.2022.10042352.
[51]. P. Perumal and S. Subha, “An analysis of a secure communication for healthcare system using wearable devices based on elliptic curve cryptography,” World Review of Science, Technology and Sustainable Development, Vol.18, No.1, 2022, doi: 10.1504/WRSTSD.2022.119327.
[52]. K. Sowjanya, M. Dasgupta, and S. Ray, “An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems,” in International Journal of Information Security, 2020. doi: 10.1007/s10207-019-00464-9.
[53]. P. Esmaeilzadeh and T. Mirzaei, “Comparison of consumers’ perspectives on different health information exchange (HIE) mechanisms: an experimental study,” Int J Med Inform, Vol.119, 2018. doi: 10.1016/j.ijmedinf.2018.08.007.
[54]. D. Puthal and S. P. Mohanty, “Proof of Authentication: IoT-Friendly Blockchains,” IEEE Potentials, Vol.38, No.1, 2019, doi: 10.1109/MPOT.2018.2850541.
[55]. Y. Su, K. Nguyen, and H. Sekiya, “Latency Evaluation in Ad-hoc IoT-Blockchain Network,” in WSCE 2022 - 2022 5th World Symposium on Communication Engineering, 2022. doi: 10.1109/WSCE56210.2022.9916023.
[56]. S. Alrubei, E. Ball, and J. Rigelsford, “Securing IoT-Blockchain Applications through Honesty-Based Distributed Proof of Authority Consensus Algorithm,” in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, 2021. doi: 10.1109/CyberSA52016.2021.9478257.
[57]. A. Ali et al., “An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network,” Sensors, Vol.22, No.2, 2022, doi: 10.3390/s22020572.
[58]. G. Sagirlar, J. D. Sheehan, and E. Ragnoli, “On the design of co-operating blockchains for IoT,” in Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020, 2020. doi: 10.1109/ICICT50521.2020.00093.
[59]. S. M. Alrubei, E. Ball, and J. M. Rigelsford, “The Use of Blockchain to Support Distributed AI Implementation in IoT Systems,” IEEE Internet Things J, Vol.9, No.16, 2022, doi: 10.1109/JIOT.2021.3064176.
[60]. A. Hakiri and B. Dezfouli, “Towards a Blockchain-SDN Architecture for Secure and Trustworthy 5G Massive IoT Networks,” in SDN-NFV Sec 2021 - Proceedings of the 2021 ACM International Workshop on Software Defined Networks and Network Function Virtualization Security, co-located with CODAYSPY 2021, 2021. doi: 10.1145/3445968.3452090.
[61]. C. Rupa, D. Midhunchakkaravarthy, M. K. Hasan, H. Alhumyani, and R. A. Saeed, “Industry 5.0: Ethereum blockchain technology based DApp smart contract,” Mathematical Biosciences and Engineering, Vol.18, No.5, 2021, doi: 10.3934/MBE.2021349.
[62]. S. Shyam, S. J. Devaraj, K. Ezra, J. Delattre, and G. K. Lynus, “Design and implementation of UWB-based cyber-physical system for indoor localization in an industry environment,” in Intelligent Edge Computing for Cyber Physical Applications, 2023. doi: 10.1016/b978-0-323-99412-5.00010-1.
[63]. Z. Ullah, B. Raza, H. Shah, S. Khan, and A. Waheed, “Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment,” IEEE Access, Vol.10, 2022, doi: 10.1109/ACCESS.2022.3164081.
[64]. Y. Supreet, P. Vasudev, H. Pavitra, M. Naravani, and D. G. Narayan, “Performance Evaluation of Consensus Algorithms in Private Blockchain Networks,” in Proceedings - 2020 International Conference on Advances in Computing, Communication and Materials, ICACCM 2020, 2020. doi: 10.1109/ICACCM50413.2020.9213019.
[65]. N. Lasla, L. Al-Sahan, M. Abdallah, and M. Younis, “Green-PoW: An energy-efficient blockchain Proof-of-Work consensus algorithm,” Computer Networks, Vol.214, 2022, doi: 10.1016/j.comnet.2022.109118.