The governance technology for blockchain systems: a survey
Guocheng ZHU, Debiao HE, Haoyang AN, Min LUO, Cong PENG
The governance technology for blockchain systems: a survey
After the Ethereum DAO attack in 2016, which resulted in significant economic losses, blockchain governance has become a prominent research area. However, there is a lack of comprehensive and systematic literature review on blockchain governance. To deeply understand the process of blockchain governance and provide guidance for the future design of the blockchain governance model, we provide an in-depth review of blockchain governance. In this paper, first we introduce the consensus algorithms currently used in blockchain and relate them to governance theory. Second, we present the main content of off-chain governance and investigate two well-known off-chain governance projects. Third, we investigate four common on-chain governance voting techniques, then summarize the seven attributes that the on-chain governance voting process should meet, and finally analyze four well-known on-chain governance blockchain projects based on the previous research. We hope this survey will provide an in-depth insight into the potential development direction of blockchain governance and device future research agenda.
blockchain governance / off-chain governance / on-chain governance / voting
Guocheng Zhu received the Bachelor degree in 2019 from the School of Computer Science, Xidian University, China. He is currently working toward a Master degree at the Key Laboratory of Aerospace Information Security and Trusted Computing (Ministry of Education), School of Cyber Science and Engineering, Wuhan University, China. His research interests mainly include applied cryptography and blockchain technology
Debiao He received the PhD degree in applied mathematics from the School of Mathematics and Statistics, Wuhan University, China in 2009. He is currently a Professor of the School of Cyber Science and Engineering, Wuhan University, China. He has authored or coauthored more than 100 research papers in refereed international journals and conferences, such as IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, and Usenix Security Symposium. His main research interests include cryptography and information security, in particular, cryptographic protocols. He is in the Editorial Board of several international journals, such as ACM Distributed Ledger Technologies: Research & Practice, Frontiers of Computer Science, and IEEE Transactions on Computers
Haoyang An received his BS degree in information security from Hefei University of Technology, China in 2019 and received his MS degree in computer science (dual degree) from Central China Normal University, China and University of Wollongong, Australia in 2021. He is currently a PhD candidate at Wuhan University, China. His research interests include cryptography and blockchain
Min Luo received his PhD degree in computer science from Wuhan University, China in 2003. He is currently a Professor at the School of Cyber Science and Engineering, Wuhan University, China. He has published papers in international conferences/journals, such as S&P, ACM TRETS, IEEE SYST J, and IEEE TVT. His research interests mainly include applied cryptography and blockchain technology
Cong Peng received his PhD degree in applied mathematics from the School of Mathematics and Statistics, Wuhan University, China in 2021. He is currently an Associate Professor of the School of Cyber Science and Engineering, Wuhan University, China. His research interests mainly include applied cryptography and data security
[1] |
Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, 2008, 2120
|
[2] |
Wood G . Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014, 151: 1–32
|
[3] |
Bhattacharya S, Victor N, Chengoden R, Ramalingam M, Selvi G C, Maddikunta P K R, Donta P K, Dustdar S, Jhaveri R H, Gadekallu T R . Blockchain for internet of underwater things: State-of-the-art, applications, challenges, and future directions. Sustainability, 2022, 14( 23): 15659
|
[4] |
Nguyen G N, Le Viet N H, Elhoseny M, Shankar K, Gupta B B, El-Latif A A A . Secure blockchain enabled cyber–physical systems in healthcare using deep belief network with resnet model. Journal of Parallel and Distributed Computing, 2021, 153: 150–160
|
[5] |
Rani S, Babbar H, Srivastava G, Gadekallu T R, Dhiman G . Security framework for internet-of-things-based software-defined networks using blockchain. IEEE Internet of Things Journal, 2023, 10( 7): 6074–6081
|
[6] |
Mamta , Gupta B B, Li K C, Leung V C M, Psannis K E, Yamaguchi S . Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA Journal of Automatica Sinica, 2021, 8( 12): 1877–1890
|
[7] |
Gupta B B, Mamta , Mehla R, Alhalabi W, Alsharif H . Blockchain technology with its application in medical and healthcare systems: a survey. International Journal of Intelligent Systems, 2022, 37( 11): 9798–9832
|
[8] |
Lin J H, Primicerio K, Squartini T, Decker C, Tessone C J. Lightning network: a second path towards centralisation of the Bitcoin economy*. New Journal of Physics, 2020, 22(8): 083022
|
[9] |
Webb N . A fork in the blockchain: income tax and the bitcoin/bitcoin cash hard fork. North Carolina Journal of Law & Technology, 2018, 19( 4): 283–311
|
[10] |
Bitcoin Cash. Bitcoin cash. See bitcoincash website, 2019
|
[11] |
del Castillo M. The DAO attacked: Code issue leads to $60 million ether theft. See baypayforumblockchain-coins/the-dao-attacked-code-issue-leads-to-60-million-ether-theft website, 2016
|
[12] |
Ethereum Classic. Ethereum classic. Ethereum Classic. See ethereumclassic.github website, 2017
|
[13] |
Weill P . DonâĂŹt just lead, govern: how top-performing firms govern it. MIS Quarterly Executive, 2004, 3( 1): 1–17
|
[14] |
Posthumus S, Von Solms R. A framework for the governance of information security. Computers & security, 2004, 23(8): 638-646
|
[15] |
Micheli M, Ponti M, Craglia M, Berti Suman A. Emerging models of data governance in the age of datafication. Big Data & Society, 2020, 7(2): 2053951720948087
|
[16] |
Reddy S, Allan S, Coghlan S, Cooper P. A governance model for the application of AI in health care. Journal of the American Medical Informatics Association, 2020, 27(3): 491-497
|
[17] |
Liu Y, Lu Q, Zhu L, Paik H Y, Staples M . A systematic literature review on blockchain governance. Journal of Systems and Software, 2023, 197: 111576
|
[18] |
Liu Y, Lu Q, Yu G, Paik H Y, Perera H, Zhu L. A pattern collection for blockchain governance. 2022, arXiv preprint arXiv: 2203.00268
|
[19] |
Liu Y, Lu Q, Yu G, Paik H Y, Zhu L . Defining blockchain governance principles: a comprehensive framework. Information Systems, 2022, 109: 102090
|
[20] |
Kiayias A, Lazos P. SoK: blockchain governance. In: Proceedings of the 4th ACM Conference on Advances in Financial Technologies. 2022, 61−73
|
[21] |
van Pelt R, Jansen S, Baars D, Overbeek S . Defining blockchain governance: A framework for analysis and comparison. Information Systems Management, 2021, 38( 1): 21–41
|
[22] |
Schuh F, Larimer D. Bitshares 2.0: general overview. See cb-dev-platform-images.s3.eu-west-1.amazonaws.com/project/whitepaper/bitshares website, 2017
|
[23] |
Duffield E, Diaz D. Dash: a privacy-centric crypto-currency. See exodus.com/assets/docs/dash-whitepaper website, 2015
|
[24] |
Kim M S, Chung J Y. Sustainable growth and token economy design: the case of steemit. Sustainability, 2018, 11(1): 167
|
[25] |
Jepson C. Dtb001: Decred technical brief. See decred.org/dtb001 website, 2015
|
[26] |
Goodman L M. Tezos-a self-amending crypto-ledger white paper. See tezos.com/whitepaper website, 2014
|
[27] |
Elrom E. EOS.IO Wallets and Smart Contracts. The Blockchain Developer, 2019, 213–256
|
[28] |
Bentov I, Lee C, Mizrahi A, Rosenfeld M . Proof of activity: extending bitcoin’s proof of work via proof of stake [extended abstract]y. ACM SIGMETRICS Performance Evaluation Review, 2014, 42( 3): 34–37
|
[29] |
Alves D. Proof-of-Concept (POC) of Restaurant’s food requests in the Lisk Blockchain/sidechain. Journal of Physics: Conference Series, 2021, 1828(1): 012110
|
[30] |
Hanke T, Movahedi, M., Williams D. DFINITY technology overview series consensus system, 2018
|
[31] |
Dursun T, Üstündağ B B . A novel framework for policy based on-chain governance of blockchain networks. Information Processing & Management, 2021, 58( 4): 102556
|
[32] |
Pasquini R. Quadratic funding under constrained matching funds. SSRN Electronic Journal, 2020, doi: 10.2139/ssrn.3702318
|
[33] |
Abdullah M A, Ibrahim M A R, Shapiee M N A, et al. The classification of skateboarding tricks via transfer learning pipelines, PeerJ Computer Science, 2021, 7: e680
|
[34] |
Fan X, Chai Q, Zhong Z. MULTAV: a multi-chain token backed voting framework for decentralized blockchain governance. In: Proceedings of the 3rd International Conference on Blockchain. 2020, 33−47
|
[35] |
Merrill P, Austin T H, Rietz J, Pearce J. Ping-pong governance: token locking for enabling blockchain self-governance. In: Proceedings of the 1st Mathematical Research for Blockchain Economy. 2020, 13−29
|
[36] |
Groves T, Ledyard J O . Some limitations of demand revelaing processes. Public Choice, 1977, 29( 2): 107–124
|
[37] |
Berg A, Berg C, Novak M. Crypto Public Choice. SSRN Electronic Journal, 2018, doi: 10.2139/ssrn.3236025
|
[38] |
Posner E A, Weyl E G . Quadratic voting and the public good: introduction. Public Choice, 2017, 172( 1): 1–22
|
[39] |
Weyl E G . The robustness of quadratic voting. Public Choice, 2017, 172( 1): 75–107
|
[40] |
Demers A, Greene D, Hauser C, Irish W, Larson J, Shenker S, Sturgis H, Swinehart D, Terry D. Epidemic algorithms for replicated database maintenance. In: Proceedings of the 6th Annual ACM Symposium on Principles of Distributed Computing. 1987, 1−12
|
[41] |
Becze M, Jameson H. Eip-1: Eip purpose and guidelines. See eips.ethereum.org/EIPS/eip-1 website, 2015
|
[42] |
Chaum D L . Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 1981, 24( 2): 84–90
|
[43] |
Chaum D, van Heyst E. Group signatures. In: Proceedings of Workshop on the Theory and Application of of Cryptographic Techniques. 1991, 257−265
|
[44] |
Rivest R L, Shamir A, Tauman Y. How to leak a secret. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 552−565
|
[45] |
Kulyk O, Neumann S, Marky K, Budurushi J, Volkamer M . Coercion-resistant proxy voting. Computers & Security, 2017, 71: 88–99
|
[46] |
Clarkson M R, Chong S, Myers A C. Civitas: toward a secure voting system. In: Proceedings of 2008 IEEE Symposium on Security and Privacy (sp 2008). 2008, 354−368
|
[47] |
Zhao C, Zhao S, Zhao M et al. Secure multi-party computation: theory, practice and applications. Information Sciences, 2019, 476: 357-372
|
[48] |
Allombert V, Bourgoin M, Tesson J. Introduction to the Tezos blockchain. In: Proceedings of 2019 International Conference on High Performance Computing & Simulation (HPCS). 2019, 1-10
|
[49] |
Everts M H, Muller F. Will that smart contract really do what you expect it to do?. Groningen: TNO, 2018
|
[50] |
Khan N, Kchouri B, Yatoo N A, Kräussl Z, Patel A, State R. Tokenization of sukuk: Ethereum case study. Global Finance Journal, 2022, 51: 100539
|
/
〈 | 〉 |