CTB-PKI: Clustering and Trust Enabled Blockchain Based PKI System for Efficient Communication in P2P Network

The decentralization feature of public and private blockchain-based applications is achieved by selecting different nodes as validators or Certificate Authority ( CA ) for each transaction. Public blockchain uses Proof of Work ( PoW ) to search for the validator. PoW causes an enormous amount of e...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2022, Vol.10, p.124277-124290
Hauptverfasser: Panigrahi, Amrutanshu, Nayak, Ajit Kumar, Paul, Rourab, Sahu, Bibhuprasad, Kant, Shashi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The decentralization feature of public and private blockchain-based applications is achieved by selecting different nodes as validators or Certificate Authority ( CA ) for each transaction. Public blockchain uses Proof of Work ( PoW ) to search for the validator. PoW causes an enormous amount of energy. Therefore, Proof of Stake ( PoS ), and Proof of Authority ( PoA ) emerged as alternate solutions. Selection of a new CA using PoS or PoA algorithms for each transaction may improve transaction security. However, a network may have a large number of transactions and participants. Selecting a CA for each transaction using PoS or PoA may cause a significant amount of block propagation delay, which can reduce network efficiency drastically. This paper proposes a different approach to increase the efficiency of Blockchain-based Public Key Infrastructure ( BC-PKI ). The proposed approach creates clusters of participant nodes based on their validation time, response time, and trust. This method selects a cluster based on the budget of response time and validation time given by the node that intends to start a transaction. Thereafter, the node which has the highest trust in that cluster is chosen as a CA for the next transaction. Instead of searching on all participant nodes, our approach searches on the nodes of the chosen cluster which reduces the searching space of the CA selection process. This research work adopts a trust evaluation approach where the trust factor is
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2022.3222807