Document Type : Research Article
Department of Computer Engineering, Ferdowsi University of Mashhad, Mashhad, Iran.
In recent years, blockchain technology has been used in many fields, including IoT and Smartphones. Since most of these devices are battery constrained and have low processing capabilities, conventional blockchains are not suitable for these types of systems. In this field, critical challenges that need to be addressed are providing security for transactions and power consumption. An available solution to meet the mentioned challenges is TrustChain. Unlike conventional blockchains, TrustChain does not have a single global chain. Instead, each node is responsible for building and maintaining its local chain.
With all the benefits, TrustChain is vulnerable to the whitewashing attack and suffers from client vulnerability issues. Moreover, once a fatal error occurs, the recovery time of each TrustChain node is considerably high. In this paper, we
propose a solution to address the attacks mentioned above by implementing an authentication system with MongoDB on top of TrustChain. Moreover, we connected TrustChain to the distributed cloud storage to significantly reduce the recovery time of nodes in fatal errors (up to 80%). Finally, we evaluate improved TrustChain with the PoW-based smartphone-oriented blockchains from two aspects of security and power consumption, proving that improved TrustChain does not significantly affect the lifetime of the smartphone battery. Its power consumption is less than mentioned blockchains and is more secure
than these systems against main attacks.
 Pim Otte, Martijn de Vos, and Johan Pouwelse. Trustchain: A sybil-resistant scalable blockchain. Future Generation Computer Systems, 107:770–780, 2020.
 Qin Wang, Jiangshan Yu, Shiping Chen, and Yang Xiang. Sok: Diving into dagbased blockchain systems. arXiv preprint
 Saurabh Singh, ASM Sanwar Hosen, and Byungun Yoon. Blockchain security attacks, challenges, and solutions for the future distributed iot network. IEEE Access, 9:13938–13959, 2021.
 Uplexa white paper. https://uplexa.com/media/uPlexa-Whitepaper-EN.pdf. Accessed: 20221-8-17.
 Bitcoin white paper. https://www.mibcoin. io/. Accessed: 20221-8-17.
 Aleksandr Ometov, Yulia Bardinova, Alexandra Afanasyeva, Pavel Masek, Konstantin Zhidanov, Sergey Vanurin, Mikhail Sayfullin, Viktoriia Shubina, Mikhail Komarov, and Sergey Bezzateev. An overview on blockchain for smartphones: State-of-the-art, consensus, implementation, challenges and future trends. IEEE Access, 8:103994–104015, 2020.
 Keke Gai, Jinnan Guo, Liehuang Zhu, and Shui Yu. Blockchain meets cloud computing: a survey. IEEE Communications Surveys & Tutorials, 22(3):2009–2030, 2020.
 R3-corda: Access the documentation for corda- our open source blockchain platform. https: //docs.corda.net/. Accessed: 20221-8-17.
 Coti: a decentralized, high performance cryptocurrency ecosystem optimized for creating digital payment networks and stable coins. https://coti.io/files/COTI-technicalwhitepaper.pdf. Accessed: 20221-8-17.
 Avalanche platform. https://assets.websitefiles.com/5d80307810123f5ffbb34d6e/ 6008d7bbf8b10d1eb01e7e16_Avalanche%20Platform%20Whitepaper.pdf. Accessed: 20221-8-17.
 Jiangshan Yu, David Kozhaya, Jeremie Decouchant, and Paulo Esteves-Verissimo. Repucoin: Your reputation is your power. IEEE Transactions on Computers, 68(8):1225–1237, 2019.
 Lijun Sun, Qian Yang, Xiao Chen, and Zhenxiang Chen. Rc-chain: Reputation-based crowdsourcing blockchain for vehicular networks. Journal of Network and Computer Applications, 176:102956, 2021.
 Minghui Xu, Shuo Liu, Dongxiao Yu, Xiuzhen Cheng, Shaoyong Guo, and Jiguo Yu. Cloudchain: a cloud blockchain using shared memory consensus and rdma. IEEE Transactions on Computers, 2022.
 Kapil Aggarwal and Santosh Kumar Yadav. Decentralized cloud and file system for blockchain environment. In Soft Computing for Security Applications, pages 331–339. Springer, 2022.
 Mallikarjun Reddy Dorsala, VN Sastry, and Sudhakar Chapram. Blockchain-based solutions for cloud computing: A survey. Journal of Network and Computer Applications, 196:103246, 2021.
 Mongodb. https://docs.mongodb.com/ manual/sharding/. Accessed: 20221-8-17.
 Mongo data encryption. https://www.mongodb. com/basics/mongodb-encryption. Accessed: 20221-8-17.
 Dfinity, the internet computer for geeks. https://dfinity.org/whitepaper.pdf. Accessed: 20221-8-17.
 Storj whitepaper. https://www.storj.io/ whitepaper. Accessed: 20221-8-17.
 extract battery information for android devices. https://github.com/seyedsalar/TrustChain-battery-parameters-/tree/
main. Accessed: 20221-8-17.
 Jingpei Wang, Mufeng Wang, Zhenyong Zhang, and Hengye Zhu. Towards a trust evaluation framework against malicious behaviors of industrial iot. IEEE Internet of Things Journal, 2022.