Abstract
Recently the race toward trusted distributed systems has attracted a huge interest, mostly due to the advances in crypto-currencies platforms such as Bitcoin. Currently, different Distributed Ledger Technologies (DLTs) are competing to demonstrate their capabilities and show how they can overcome the limitations faced by others. The common denominator among all distributed ledger technologies is their reliance on a distributed, decentralized peer-to-peer network and a set of modular mechanisms such as cryptographic hashes and consensuses mechanisms. However, their implementations vary substantially in terms of the used data structure, fault tolerance and consensus approaches. This divergence affects the nature of each instance of the DLT in terms of cost, security, latency and performance. In this paper, we present a snapshot of four existing implementations of DLTs. The particularities of each technology and an initial comparison between them is discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hashgraph is new competitor for blockchain. https://bit.ly/2LAMNdN. Accessed 19 July 2018
Ali, M.S., Dolui, K., Antonelli, F.: IoT data privacy via blockchains and IPFS. In: Proceedings of the Seventh International Conference on the Internet of Things, p. 14. ACM (2017)
Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media, Inc., Sebastopol (2014)
Baird, L.: The swirlds hashgraph consensus algorithm: fair, fast, byzantine fault tolerance. Swirlds, Inc., Technical report SWIRLDS-TR-2016 1 (2016)
Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A., Rückert, M.: On the security of the Winternitz one-time signature scheme. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 363–378. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21969-6_23
Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers (2016)
El Ioini, N., Pahl, C.: Trustworthy orchestration of container based edge computing using permissioned blockchain. In: International Conference on Internet of Things: Systems, Management and Security (2018)
Hill, T., Westbrook, R.: SWOT analysis: it’s time for a product recall. Long Range Plann. 30(1), 46–52 (1997)
Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. IJ Netw. Secur. 19(5), 653–659 (2017)
Pahl, C., El Ioini, N., Helmer, S.: A decision framework for blockchain platforms for IoT and edge computing. In: International Conference on Internet of Things, Big Data and Security (2018)
Pahl, C., El Ioini, N., Helmer, S., Lee, B.: An architecture pattern for trusted orchestration in IoT edge clouds. In: 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), pp. 63–70. IEEE (2018)
Popov, S.: Iota: The tangle. https://iota.org/IOTA_Whitepaper.pdf (2016). Accessed 19 July 2018
Walport, M.: Distributed ledger technology: beyond blockchain. UK Government Office for Science (2016)
Xu, X., et al.: A taxonomy of blockchain-based systems for architecture design. In: 2017 IEEE International Conference on Software Architecture (ICSA), pp. 243–252. IEEE (2017)
Zheng, Z., Xie, S., Dai, H.N., Wang, H.: Blockchain challenges and opportunities: a survey. Work Pap.-2016 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
El Ioini, N., Pahl, C. (2018). A Review of Distributed Ledger Technologies. In: Panetto, H., Debruyne, C., Proper, H., Ardagna, C., Roman, D., Meersman, R. (eds) On the Move to Meaningful Internet Systems. OTM 2018 Conferences. OTM 2018. Lecture Notes in Computer Science(), vol 11230. Springer, Cham. https://doi.org/10.1007/978-3-030-02671-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-02671-4_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02670-7
Online ISBN: 978-3-030-02671-4
eBook Packages: Computer ScienceComputer Science (R0)