Professional Documents
Culture Documents
article info a b s t r a c t
Article history: Services computing can offer a high-level abstraction to support diverse applications via encapsulating
Received 6 May 2020 various computing infrastructures. Though services computing has greatly boosted the productivity
Received in revised form 21 September 2020 of developers, it is faced with three main challenges: privacy and security risks, information silo,
Accepted 7 December 2020
and pricing mechanisms and incentives. The recent advances of blockchain bring opportunities
Available online 1 January 2021
to address the challenges of services computing due to its build-in encryption as well as digital
Keywords: signature schemes, decentralization feature, and intrinsic incentive mechanisms. In this paper, we
Services computing present a survey to investigate the integration of blockchain with services computing. The integration
Blockchain of blockchain with services computing mainly exhibits merits in two aspects: i) blockchain can
Security potentially address key challenges of services computing and ii) services computing can also promote
Smart contract blockchain development. In particular, we categorize the current literature of services computing
Blockchain-as-a-Service based on blockchain into five types: services creation, services discovery, services recommendation,
services composition, and services arbitration. Moreover, we generalize Blockchain as a Service (BaaS)
architecture and summarize the representative BaaS platforms. In addition, we also outline open issues
of blockchain-based services computing and BaaS.
© 2020 Elsevier Inc. All rights reserved.
https://doi.org/10.1016/j.jpdc.2020.12.003
0743-7315/© 2020 Elsevier Inc. All rights reserved.
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
APIs) when free APIs were found to be abused by selfish devel- Table 1
opers to make profits. However, the paid services may dampen Acronym table.
scenarios such as M2M service trading [67] and crowd-sourcing Proof of Work PoW
Proof of Stake PoS
collaboration [55] have driven the development of new pricing
Delegated Proof of Stake DPoS
and incentive mechanisms. Single-Point Failures SPF
The advent of recent blockchain technologies brings opportu- Distributed Denial of Service DDoS
nities to overcome the above challenges of services computing. machine-to-machine M2M
blockchain as a service BaaS
Blockchain was originally designed for digital currencies such
Quality-of-Service QoS
as Bitcoin [74] and Ethereum [93]. Thanks to recent advances Services-Oriented Architecture SOA
in cryptography, distributed systems, consensus algorithms, and Universal Description, Discovery, and Integration UDDI
smart contract, blockchain has evolved into a trustworthy and Directed Acyclic Graph DAG
Internet of Thing IoT
decentralized platform to support diverse applications such as
Amazon Web Services AWS
supply chain, finance, healthcare, energy, intellectual property IBM Blockchain Platform IBP
protection, and IoT [23,42,51,63,66,95,102,103]. Blockchain can
potentially solve the challenges of services computing from the
following perspectives. (1) Built-in encryption and digital signature
schemes of blockchain can integrate with other security coun- discuss how services computing can benefit blockchain devel-
termeasures such as authentication and access control so as to opment. In particular, we name such an alliance of blockchain
enhance the system security and preserve the data privacy. For and services computing as BaaS. We generalize a four-layer BaaS
example, data encryption and access control implemented on top architecture consisting of four layers as shown in Fig. 1 (from
of blockchain can effectively reduce the chance of data misuse bottom to top): (i) blockchain infrastructure layer, (ii) blockchain
and privacy leakage. (2) Decentralization of blockchain can help framework layer, (iii) middleware layer, (iv) application layer. This
to mitigate the security risks and vulnerabilities such as DDoS layered BaaS architecture has the following merits including the
attacks and SPFs. Besides, the auto-execution of smart contracts abstraction so as to hide the underlying complexity of diverse
can help to update the firmware so as to mitigate the security computing facilities and blockchain systems, general interfaces
vulnerabilities [38]. (3) Intrinsic incentive mechanisms may ad- (or services) to support diverse applications and fasten the de-
dress the pricing and incentive problem of services computing. velopment of services, seamless interoperability across different
For example, developers who contribute codes or report bugs can underlying blockchain systems. Recently, many tech giants have
be rewarded a certain amount of digital currency through the announced their BaaS platforms mainly based on their incumbent
automated execution of smart contracts. cloud computing platforms. However, such BaaS platforms are
Therefore, integration of blockchain with services computing still in the early stage and many open research issues such as
can overcome the challenges of services computing. In this article, scalability and elasticity also pose challenges on BaaS.
we investigate the integration of blockchain with services com- The rest of the paper is organized as follows: Section 2
puting. This paper first outlines three major concerns in services overviews the basic concept of blockchain and services com-
computing and briefs blockchain technology. Blockchain can po- puting. Section 3 analyzes the challenges in current services
tentially address the challenges of services computing. The core computing. Sections 4 and 5 then present a survey on services
contributions of this paper can be summarized as two aspects: (1) computing based on blockchain and an overview on blockchain
We investigate how blockchain can serve for services computing as service platforms, respectively. Finally, we conclude this paper
to address the challenges of services computing; (2) We also in Section 7. Table 1 summarizes the key acronyms.
2
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
2.2. Blockchain
3
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
Table 2
Comparison of smart contract platforms.
Smart contract Design purpose Permission Consensus Supporting language Confidentiality
platform
Ethereum [11] A decentralized platform that runs smart Permissionless PoW Solidity Public
contracts
Hyperledger Mainly for enterprise and business Permissioned Pluggable Golang, Java Private
Fabric [12] applications
R3 Corda [19] Corda helps business institutions to Permissioned Raft Kotlin, Java Private
interact with each other via smart
contracts
Quorum [17] An enterprise-focused version of Permissioned Raft Golang Private
Ethereum
EOS [9] Mainly for a decentralized system to Permissionless DPoS Popular programming Public
support various decentralized language
applications
Ripple [20] A decentralized platform that sends and Semi-Permissioned Ripple consensus Popular programming Private
receives money globally without friction language
Stellar [21] Aiming at redefining financial systems Permissionless Stellar Consensus Popular programming Public
to connect users, banks and payments Protocol language
systems
Neo [14] Digitizing assets and automating the Permissionless dBFT Popular programming Public
asset management using smart contracts language
Qtum [16] Leveraging UTXO to ensure security and Permissionless PoS X86-based Public
supporting multiple types of virtual Programming
machines language
Cardano [8] A decentralized public blockchain and Permissionless Ouroboros (a kind Haskell Public
cryptocurrency project of PoS)
IOTA [10] Mainly adopting DAG technology instead Permissionless Tangle Popular programming Public
of chain-like structures widely leveraged language
in existing blockchains
Ethereum firstly adopts the concept of smart contracts on and confidentiality due to different design purposes. As shown
blockchain [11,27]. It is a public permissionless distributed plat- in Table 2, most smart contract platforms have been estab-
form where users can create transactions anonymously. In con- lished on permissionless blockchains, which require no permis-
trast to the Bitcoin network system, Ethereum provides the sion to join and are essentially publicly available. In contrast,
Turing-complete programming language Solidity to develop smart permissioned blockchains strictly require an authority to ac-
contracts that are compiled down to Ethereum Virtual Machine cess and participate in blockchains. The most representative
bytecode and deployed on the Ethereum blockchain for execu- permissioned smart contract platforms include Hyperledger
tion. It uses the PoW consensus algorithm. Fabric, R3 Corda, and Quorum (i.e., Ethereum for enterprise).
Catering for the demands from enterprises, Hyperledger Fab- Semi-permissioned blockchains sit between permissioned and
ric [12] is a permissioned distributed ledger platform running permissionless blockchains while semi-permissioned blockchains
on the private network where ‘‘chaincode’’ is called instead of are similar to permissionless blockchains in confidentiality. Thus,
‘‘smart contract’’. For enterprise use, Hyperledger Fabric is de- permissioned and semi-permissioned blockchains are categorized
signed to provide pluggable implementation delivering high con- as private blockchains. In Table 2, we only choose Ripple as
fidentiality, resilience, and scalability. Additionally, Hyperledger the semi-permissioned smart contract platform. With respect
also adopts pluggable consensus algorithms to meet business to supporting language, most smart contract platforms support
popular programming languages, which offer better flexibility.
requirements.
Ethereum especially develops a smart contract language Solidity
Similar to Hyperledger Fabric, Corda Enterprise [19] is a com-
whereas R3 Corda and Cardano adopt Kotlin and Haskell as pro-
mercial version of Corda (which is originally open source) to fulfill
gramming languages, respectively. Regarding consensus schemes,
the rising business demands. Each peer in the Corda network can
Section 2.2.3 gives more details.
only see a subset of facts on the ledger. To address the issue of
non-deterministic contract execution, a service called Oracle that 2.2.3. Consensus
is used to sign the transaction if the included fact is true. It adopts Consensus algorithms are proposed to ensure all nodes to
the Notary services to select a consensus algorithm based on their reach consensus in the distributed asynchronous network. Dis-
requirements. tributed consensus is essentially modeled by the Byzantine Gen-
In a nutshell, three mainstream smart contract platforms are eral problem, in which only one node is selected to validate the
introduced above. Additionally, with the advent of smart contract, transaction without controversy [46,47]. To address the Byzantine
an increasing number of smart contract platforms have appeared. General problem, there are typically two ways shown as follows.
We survey and make a comparison of 11 smart contract platforms One type is computing competence. For example, PoW [74]
in terms of design purpose, permission, consensus, supporting selects the node which is the first one to randomly compute
language, and confidentiality, as shown in Table 2. the exact hash value. In contrast to computing-intensive PoW,
Many institutions or companies have developed different PoS selects the validate node according to the wealth and age
smart contract platforms according to different scenarios, as (i.e., stake). In other words, the stakeholders with larger stake
shown in the column ‘‘Design Purpose’’ in Table 2. Moreover, values can have a higher chance to verify the block. Moreover,
each smart contract platform has different settings with respect DPoS inserts a democratic layer with the representative node to
to permission settings, consensus schemes, supporting languages, avoid the centralization in PoS.
4
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
Another type is the communication competence. Based on However, the centralization of services computing can also lead
Byzantine Fault Tolerance (BFT), Practical Byzantine Fault Toler- to the vulnerability of systems to either SPF or malicious attacks
ance (PBFT) [34] is a state-machine replication, in which each (e.g., DDoS attacks) [64].
replica maintains the condition of services and implements the Nowadays, user privacy-sensitive information (i.e., location
operation of services. In PBFT, the system is able to handle 1/3 information, preference, and political attitude) has been exces-
faulty replicas thereby having high scalability and reliability. sively collected and leveraged by services vendors. However,
Paxos [60] and its optimized version Raft [77] implement crash- the customer data that is essentially generated by customers
tolerant state machine replications. In contrast to Raft, Ripple has been controlled by services vendors via user incidental au-
consensus [85] can support a large scale network via aggregating thentication [45]. The advent of blockchain has the potentials
multiple sub-networks (which are trusted). Stellar Consensus to address the privacy and security issues via its intrinsic en-
Protocol [70] is a federated Byzantine agreement where the cryption, pseudonymity, and decentralization. Thus, embracing
consensus first reaches each federation and is then propagated blockchain technology, services computing may overcome the
to the rest of the network. Additionally, Tangle [81] proposed above challenges.
the IOTA organization to pack the blocks into DAG instead of
generating chains. In this way, it can largely reduce the cost and 3.2. Information silo
improve the efficiency of transactions.
An information silo is an isolated information system that
3. Challenges in services computing is incapable of communicating with other information systems.
Information silo obstructs information sharing, consequently hin-
Small (or micro) services can construct software systems and dering the development of data analytics. The isolated services
their components, thus both reconstruction and customization agents divide the whole datasets into small subsets, each of
of software have been greatly improved. As a result, services which is separated from each other, consequently resulting in the
computing has received extensive attention while it also poses information silo. We then discuss two kinds of information silo in
a large body of challenges. In this section, we identify three detail as follows.
major challenges in services computing: (1) security and privacy
risks (in Section 3.1), (2) information silo (in Section 3.2) and (3) 3.2.1. Services recommendation
pricing mechanisms and incentives (in Section 3.3). Among the identical or similar services, services recommen-
dation has been proposed to recommend the appropriate ser-
3.1. Security and privacy risks vices according to the predefined rules via a specific algorithm.
Recently, QoS-aware recommendation algorithms [99,100] have
With the advent of information communication technology, been adopted in most web services recommendation systems.
people enjoy the benefits of a wide diversity of services. Accord- Since the services vendors may not guarantee the QoS (as it
ing to Nielsen’s Total Audience Report [18], Americans aged 18 or declares) and some QoS metrics heavily depend on the network
above spend roughly ten and a half hours a day using services in conditions (sometimes are also related to locations of customers),
different media such as mobile devices, PCs, and other electronic it is necessary for a centralized service agent to collect data,
devices. When using these services, every action taken on the execute algorithms and present the optimal selection results. In
electronic devices generate personal data and logs including user this case, different data collection processes occur across different
behaviors, services trace logs, and user profiles. Services vendors systems, thereby resulting in the appearance of information silo,
collect these data and offer them to third parties without the which leads to a low-accuracy selection and recommendation.
consent of the data subject. As a result, the overwhelming data
generated every day are at a high risk of privacy leakage and 3.2.2. Services composition
security vulnerability. We next discuss these two concerns as In services computing, services composition encompasses the
follows. processes of creating composite services from existing services.
The seamless and dynamic integration of business sectors can
3.1.1. Privacy leakage determine the quality of composite services. Most of the ser-
Services computing is faced with risks of privacy leakage. Take vices composition architectures only collect data and execute the
an online bookstore as an example. Alice is a mother and she composite result once so that they may not share the results
wants to buy books for her children via an online bookstore. with others [61]. It may require the repetition of executing a
Alice registered an account in the bookstore with her privacy- similar process again to achieve the same (or similar) service
sensitive information, including name, gender, phone number, composition. Consequently, it will cause the resource waste due
and personal address. When Alice is surfing in the bookstore, the to the information silo.
bookstore will save all browsing records. All of these customer In brief, information silo greatly reduces the accuracy of
records will be stored in centralized servers owned by services services recommendation and services composition. Also, in-
vendors (e.g., the bookstore). These privacy-sensitive data may be formation silo produces unnecessary duplicate costs. The iso-
misused by vendors (e.g., selling to third parties to analyze user lated collecting datasets hamper the progress of services
portraits), leading to privacy leakage. computing. Hence, it is crucial to address information silo in
services computing.
3.1.2. Security risks
In addition to the privacy leakage, the customer privacy- 3.3. Pricing mechanisms and incentives
sensitive data stored at centralized servers of services vendors
may be hacked by malicious attackers [65]. Moreover, when a The most important driving effort for enterprises is gain-
service is invoked, it will generate running logs including sys- ing profits. Over past decades, companies have evolved from
tem information, transaction information, faults, and errors. The selling pure products (e.g., personal computers, laptops, and mo-
system logs can help to restore systems after faults, or locate bile phones) to service-product continua. Different from physical
root causes when an error occurs. Generally, services trace logs goods that have been possessed by buyers after purchasing, ser-
can only be utilized by system developers or administrators. vices that are impalpable can only be non-permanently owned
5
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
and higher financial gains. The critical issues in BPM include 4.5. Services arbitration based on blockchain
evaluating and verifying the trustworthiness of digitized assets
and transforming them accordingly. Owning to the merits of Cloud services have recently been adopted by an increasing
BPM, Viriyasitavat et al. [89], Carminati et al. [33] and Weber number of business institutions thanks to their high agility and
et al. [91] proposed blockchain-based frameworks for services superior cost performance index (CPI). However, a critical issue
composition on top of BPM. These frameworks can address the arises: no trusted-third-party ensures the correct execution of
the workflow in a trustless environment. For example, services
fundamental trust problem in collaborative process execution
providers that do not obey the agreement may breach their
using blockchain. It is worth mentioning that smart contracts
obligations. The integration of service arbitration with blockchain
were adopted to automate the workflows of BPM so as to provide
technologies can potentially overcome the challenge.
the transparent inter-operations of service vendors in [89].
There are a few studies on this issue. Zou et al. [105] present a
Despite building a simple distributed framework for services services contract management scheme based on blockchain tech-
composition, other researchers construct blockchain-based QoS- nology to address the issue of an untrusted distributed environ-
aware services composition frameworks. In particular, both Wang ment when executing services in a distributed network. In such a
et al. [90] and Viriyasitavat et al. [89] proposed QoS-aware ser- trusted environment, every participant that maintains a local ser-
vices composition models. To optimize the runtime performance vices registry acts as an independent node in blockchain. This ser-
of services composition, a smart contract-based negotiation vices contract management scheme eliminates the information
framework was proposed in [90] where the transactions are per- asymmetry and information silo in services computing.
formed automatically and reliably. This can be achieved through
the signed agreement between the services requesters and ven- 5. Blockchain based on services computing
dors. At runtime, if a services vendor is getting troubles, this
framework can identify it and find another services vendor to re- Up to now, blockchain has been proposed for more than a
place it. Rather than using centralized services brokers, decade, but the following difficulties still hinder the impeding
momentum of its progress. (i) Scarcity of experienced developers.
blockchain-based services composition approaches generally sup-
It is not easy to fully understand the working of such a composite
port automatic composition according to the runtime QoS. Smart
blockchain system. Thus, developers usually have to spend a lot of
contracts record the state of services and take down all the
time and effort in comprehending and controlling such a system,
compositions in the transaction. Services composition thereby is consequently leading to the difficulty in training experienced
more reliable and can quickly respond. developers. (ii) Complex deployment and usage. We usually build
a complex blockchain system for better scalability. Unfortunately,
the increasing complexity of blockchain systems brings about a
4.4. Services recommendation based on blockchain
more complex deployment and usage of blockchain. (iii) Costly
maintenance. Ranging from a small application system to a large-
Some identical or similar functional services have been pro- scale distributed system, maintenance is always the most tiring,
visioned in services market. Therefore, services recommendation troublesome, and technical work. Particularly in blockchain, in-
can help to select high-quality services from a great diversity herited from the distributed system, small network latency may
of services. Relying on the trusted third-party, existing service be accumulated to services disruption.
recommendation systems collect data and deliver recommended In this section, we first discuss how services computing affect
results while also leading to the vulnerabilities of privacy and blockchain and introduce the paramount application, Blockchain
as a Service, in Section 5.1. Next, we present BaaS architecture in
security due to the centralization. To help users discover more po-
Section 5.2 and BaaS platforms in Section 5.3.
tential high-quality services, services vendors need to eliminate
information silo via sharing data in a secure, privacy-protected
5.1. Blockchain as a service
manner. To address these challenges, a fair amount of solutions
have been proposed on P2P systems [31,58] or secure multi-party To date, services computing, devoting to advocating the
protocols [87] over the past decades. thought of encapsulating functions into services, is serving in var-
However, the existing distributed solutions can solely address ious industries, and blockchain is no exception. We can thereby
one of the challenges in services computing and still require a observe from the aforementioned challenges that a good choice to
trusted third-party. As a distributed system and a public ledger, simplify the complex system is to provide a high-level abstraction
blockchain encrypts the stored data so as to protect data privacy of functionalities. There are various manners of integrating func-
and security with high reliability. Therefore, the above peer- tions as a service (namely X as a Service), such as Infrastructure
to-peer schemes and multi-party protocols can be integrated as a Service, Platform as a Service, Software as a Service. X as
with blockchain to further improve services recommendation sys- a Service manner can potentially enhance the scalability and
tems. Combining credits of privacy-preservation of blockchain, Li reusability of blockchain.
et al. [62] proposed a blockchain-based QoS-aware web services Therefore, BaaS has been proposed to offer the services for
blockchain to build and deploy, execute, monitor, and manipu-
recommendation framework. At the same time, Cai et al. [29]
late the business logic procedures across the entire enterprise.
proposed a personalized blockchain-based prediction approach.
Deploying BaaS on cloud computing platforms, customers are
Both of them are the variants of matrix factorization.
allowed to leverage cloud-based solutions to design, develop, and
In summary, to guarantee the reliability of services users
host blockchain applications that can run on top of smart con-
is a challenging task for services recommenders. Blockchain- tracts and functions over blockchain networks. Services vendors
based services recommenders can effectively address this is- here can manage all the necessary tasks and activities in order
sue while protecting the privacy of users. However, researches to support agile and operational infrastructures while customers
on blockchain-based services recommendation have yet been only need to employ BaaS to execute tasks and activities [2].
at a preliminary stage. For example, most studies only conduct Moreover, abstracting the blockchain system into coarse-
insufficient experiments in a simplified network environment. grained services within BaaS can help to construct decoupled
8
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
services infrastructure. For example, the module that monitor- to reach a maximal utility of limited resources. Since access con-
ing blockchain performance can be abstracted into a separate trol is to regulate the access of data, data security can be guaran-
service, which is developed and maintained by a small group of teed in BaaS with appropriate authentication and authorization.
specialists. After further subdividing functionalities into services, As a result, the middleware layer guarantees the reliability and
the blockchain system offers a flexible combination of services, scalability of BaaS.
and each of them is relatively independent. Hence, by using these Blockchain Framework Layer. The third layer is to construct a
services, it brings convenience for developers to build a more blockchain framework based on blockchain infrastructure. The
complex blockchain-based application. blockchain framework generally refers to the smart contract plat-
Existing BaaS platforms have generally been implemented in form as mentioned in Section 2. In this layer, a smart contract
a four-layer architecture (from top to bottom): Application Layer, platform provides tokenized programs written by specific lan-
Middleware Layer, Blockchain Framework Layer, Blockchain Infras- guages and specified by execution environments (e.g., virtual
tructure Layer as shown in Fig. 4. BaaS architecture is further machines). From the perspective of stability and diversity, the
illustrated in Section 5.2. In the past few years, tech giants es- BaaS framework supports popular smart contract platforms such
tablished their own BaaS platforms including but not limited to as Hyperledger Fabric, Ethereum, Quorum (Ethereum for enter-
Microsoft Azure, IBM Blockchain Platform, AWS. Other startups prise), R3 Corda, EOS, Stellar at present. Blockchain developers
have also released their novel BaaS platforms. We summarize the can therefore build the business logic written in specific program
representative BaaS platforms in Section 5.3. codes running on top of stable environments.
Blockchain Infrastructure Layer. The blockchain infrastructure
5.2. BaaS architecture layer locates at the bottom of BaaS architecture. Since blockchain
is essentially a distributed system, blockchain infrastructure of-
BaaS creates a convenient, scalable, and high-performance fers communication/networking services with corresponding
blockchain ecosystem to develop, build, deploy, and manipulate computational resources such as the physical machines, virtual
blockchain applications. Current BaaS solutions can be usually machines, or the emerging docker containers to execute smart
divided into four layers (from top to bottom): Application Layer, contracts. Both the difficulty to deploy blockchain infrastruc-
Middleware Layer, Blockchain Framework Layer, Blockchain Infras- ture and the high cost of blockchain operation and maintenance
tructure Layer, as shown in Fig. 4. Each layer can be treated as a impede the development momentum in the blockchain. Fortu-
single modular service that contains multiple simple functional nately, the blockchain infrastructure layer deployed on top of
components. We next introduce each layer in details: existing cloud platforms thereby allows developers to build their
Application Layer. On top of the BaaS architecture is the ap- blockchain applications without the necessity of establishing
plication layer. Similar to other systems, blockchain-based appli- underneath networks from scratch.
cations are developed over the underlying blockchain infrastruc-
ture. In this manner, BaaS developers are not required to fully
5.3. Current BaaS platforms
understand blockchain internals but only methods of invoking
BaaS services to build a blockchain application. In this way, devel-
opers can focus on the business logic of applications while BaaS With the advances of blockchain technologies, many tech gi-
vendors only need to deploy decentralized applications on top of ants (such as Microsoft, IBM, Amazon) established their own BaaS
a blockchain infrastructure. As presented in Fig. 4, BaaS supports platforms on top of existing cloud computing infrastructures.
the large-scale potential blockchain markets including but not Most of these BaaS platforms have been developed on the four-
limited to games [3], finance [32,44,68], public sector [57,76], layer architecture as introduced in Section 5.2. In this section,
IoT [35,38], healthcare [22,41,73] and supply chain [53,59]. we will briefly introduce representative BaaS platforms of IBM,
Middleware Layer. The second layer in the BaaS structure is Microsoft Azure, and AWS from the perspective of the four-layer
the middleware layer, which acts as an interconnection agent be- architecture and make a clear comparison between them from
tween the application layer and the blockchain framework layer. perspectives of blockchain infrastructure, blockchain framework,
On the one hand, the middleware layer hides the complexity of supporting services, target users as summarized in Table 4.
the underlying blockchain and offers the user-friendly interfaces
to application developers in the above application layer. This 5.3.1. Azure blockchain workbench
layer essentially includes some fundamental system manipulation Azure Blockchain Workbench [4] released by Microsoft is one
services such as monitoring, data analysis, resource scheduling, of the first major BaaS platforms to companies and develop-
and access control. In particular, monitoring services [104] au- ers. It claims to provide a low-risk, low-cost, fast, and fault-
dit and measure the performance of blockchain systems and tolerance blockchain solution to business in the BaaS manner.
inform developers to take some actions when anomalies occur. Azure Blockchain Workbench essentially constructs the BaaS plat-
Additionally, data stored on the public ledger can be collected form using the existing cloud computing platform Microsofe Azure
and analyzed to develop blockchain applications [37]. Resource as the infrastructure for the blockchain infrastructure layer. To
scheduling algorithms approach the optimal resource allocation improve its scalability, Azure Blockchain Workbench supports
9
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
Table 4
Comparison of Blockchain as a Service (BaaS) platforms.
BaaS platform Azure blockchain workbench IBM blockchain platform AWS blockchain platform
Blockchain infrastructure Azure Kubernetes ECS, EC2
Blockchain framework Ethereum, Hyperledger fabric, Quorum Hyperledger fabric Ethereum, Hyperledger fabric
and R3 Corda
Supporting services REST APIs for managing and Dev tools and operation tools Managed services and Amazon QLDB
message-based APIs for integration
Target user Mostly for enterprise use For various enterprise use For retail customers and multi-parties
processes. Nowadays, several proposals have been put forth based contracts [101]. On the other hand, data stored on the
on Oracle. Oraclize [6] is one of the successful oracle vendors to public ledger can be visible to everyone despite the user
serve as a notary to fetch data directly from the smart contract pseudonymity of blockchain. It is shown in [42] that exten-
requires. However, the authentication in Oracle has not been well sive analysis of multiple transactions can essentially identify
addressed yet. one common user account. Therefore, security assurance
and privacy protection are still open issues in BaaS research
6.2. Open issues in BaaS community.
Services vendors are attempting to develop robust and scal- 6.2.2. Non-technical issues
able BaaS platforms yet the development of BaaS is at a very Apart from technical issues, non-technical issues also hin-
preliminary stage. Many provisioned services are not suitable to der the development of BaaS. We describe several typical non-
be deployed in practical industrial environments. Such issues are technical issues as follows.
expected to be resolved in the future. We categorize these issues
into two types: technical issues and non-technical issues, which • Complicated system configuration. Although most of BaaS
are discussed as follows. solutions provide a whole life cycle of blockchain services,
they generally only offer services interfaces for creating
6.2.1. Technical issues blockchain applications. The complexity of underlying
Integrating with blockchain technologies, technical issues also blockchain infrastructure and various frameworks also ex-
cover the whole life cycle of BaaS. Thus each component inside hausts developers who need to learn extensive blockchain
BaaS has a more or less impact concerning the effectiveness of knowledge (such as cryptography and decentralized consen-
BaaS. We simply conclude these technical difficulties of each sus) from scratch.
component in BaaS from a high-level abstraction. • High cost. The incumbent blockchain systems are suffering
from the high equipment cost and maintenance expendi-
• Poor scalability. Existing blockchain frameworks can only
ture, which reduce the motivations of enterprises to adopt
process a small number of on-chain transactions in order
BaaS solutions. Cost-effective BaaS solutions are expected to
to support small scale applications such as the public sector
be further explored in the future.
and healthcare, which have low requirements on the system
throughput, i.e., less than 10 transactions per second (TPS).
• High regulatory risk. Even though many countries encour-
age business institutes to transform conventional business
However, they cannot cater to the increasing demands from
modes into blockchain-based modes, the process of trans-
large scale applications such as financial and IoT services,
which may require several thousand TPS. forming the information chain to the value chain also brings
financial risks as well as regulatory difficulty. For exam-
• Absence of elasticity. Many business applications may have
ple, it is difficult to monitor and prevent the decentral-
dynamic requirements for system performance. For exam-
ple, an application may request a huge amount of resources ized blockchain from malicious behaviors (such as money
at a certain time while its requirement may significantly laundering). Thus, it is also an open question to design
affect the QoS of other users. However, existing blockchain blockchains that are regulatory while still maintaining de-
systems cannot fulfill the burst demands elastically. It is centralization.
necessary to monitor the realtime performance and tune • Unified Standard. The absence of a unified standard for di-
blockchain systems to fulfill the dynamic demands. verse blockchain systems is a root cause for many technical
• Optimization of resource utilization. It is often less cost- issues (e.g., the absence of elasticity and flexibility). Similar
effective to purchase and deploy extract computing facilities to the development of the Internet, which has defined a
to meet the elasticity and scalability requirements. Thus, it general protocol stack to unify all message formats and
is necessary to optimize the resource usage via maximizing interaction manners, we believe that the future blockchain
the spare computational resources and improving the total community will also form a unified set of rules or mod-
utilization of various components of the system. It is worth- ular protocols/schemes to support diverse blockchain sys-
while to investigate several open issues: (1) the quantitative tems. The unified blockchain standard will help to overcome
analysis of resource utilization, (2) optimization strategies the obstacles across different blockchain systems and im-
(e.g., incentive, pricing, and optimization mechanisms) to prove the application flexibility, consequently promoting
maximize the resource utilization. the development of BaaS.
• Lack of flexibility. Current BaaS platforms cannot fulfill vari-
ous application scenarios. Future BaaS should be pluggable 7. Conclusion
to diverse application scenarios. In particular, the serverless
architecture has gained much attention in the past few This paper firstly presents an overview on blockchain and ser-
years and it is expected to be mainstream architecture for vices computing. We investigate the state-of-the-art literature on
future services computing. In the serverless architecture, an services computing and summarize three major concerns: (i) pric-
application will be resolved into diverse independent com- ing mechanisms and incentives, (ii) information silo, (iii) security
ponents that provide general interfaces like APIs to adapt to and privacy risks. The four key characteristics of the emerging
different systems [36]. When blockchain is integrated into blockchain technology can potentially address the above chal-
serverless architecture in the future, users will be able to lenges of services computing. We then analyze services comput-
customize their applications based on diverse underlying ing based on blockchain from five perspectives: services creation,
blockchain systems. However, some technical issues are ex- services discovery, services composition, services recommenda-
pected to be addressed before the fusion of blockchain with tion, services arbitration. Furthermore, we briefly review existing
a serverless architecture. BaaS solutions and compare them from the hierarchical architec-
• Security and privacy protections. On the one hand, blockchain ture of BaaS. We also summarize key issues both in blockchain-
systems also have their own security vulnerabilities such as based services computing and BaaS. In summary, we believe that
border gateway protocol (BGP) routing hijack attack and de- the advent of blockchain technology will promote the renaissance
centralized autonomous organization (DAO) attack in smart of services computing.
11
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
CRediT authorship contribution statement [29] W. Cai, X. Du, J. Xu, A personalized QoS prediction method for web
services via blockchain-based matrix factorization, Sensors 19 (12) (2019)
Xiaoyun Li: Performed the analysis, Wrote the paper. Zibin 2749.
[30] R.D. Callaway, M. Devetsikiotis, Y. Viniotis, A. Rodriguez, An autonomic
Zheng: Conceived and designed the analysis, Wrote the paper.
service delivery platform for service-oriented network environments, IEEE
Hong-Ning Dai: Conceived and designed the analysis, Wrote the Trans. Serv. Comput. 3 (2) (2010) 104–115.
paper. [31] J. Canny, Collaborative filtering with privacy, in: Proceedings 2002 IEEE
Symposium on Security and Privacy, IEEE, 2002, pp. 45–57.
Declaration of competing interest [32] B. Cant, A. Khadikar, A. Ruiter, J. Bronebakk, J. Coumaros, J. Buvat,
A. Gupta, Smart Contracts in Financial Services: Getting from Hype to
The authors declare that they have no known competing finan- Reality, Capgemini Consulting, 2016, pp. 1–24.
cial interests or personal relationships that could have appeared [33] B. Carminati, C. Rondanini, E. Ferrari, Confidential business process ex-
ecution on blockchain, in: 2018 IEEE International Conference on Web
to influence the work reported in this paper.
Services (ICWS), IEEE, 2018, pp. 58–65.
[34] M. Castro, B. Liskov, et al., Practical byzantine fault tolerance, in: OSDI,
Acknowledgments vol. 99, 1999, pp. 173–186..
[35] W. Chen, M. Ma, Y. Ye, Z. Zheng, Y. Zhou, IoT service based on jointcloud
The research is supported by the Key-Area Research and De- blockchain: The case study of smart traveling, in: 2018 IEEE Symposium
velopment Program of Guangdong Province (No. 2018B010109 on Service-Oriented System Engineering (SOSE), IEEE, 2018, pp. 216–221.
001), the National Natural Science Foundation of China (No. [36] H. Chen, L.-J. Zhang, FBaaS: Functional Blockchain as a Service, in:
International Conference on Blockchain, Springer, 2018, pp. 243–250.
62032025, No. U1811462), and the Project of Core Blockchain of
[37] W. Chen, Z. Zheng, J. Cui, E. Ngai, P. Zheng, Y. Zhou, Detecting ponzi
Ministry of Education of China (No. 2020KJ010801).
schemes on ethereum: Towards healthier blockchain technology, in:
Proceedings of the 2018 World Wide Web Conference on World Wide
References Web, International World Wide Web Conferences Steering Committee,
2018, pp. 1409–1418.
[1] Gartner Top 10 strategic IoT technologies and Trends, accessed: [38] K. Christidis, M. Devetsikiotis, Blockchains and smart contracts for the
2019-02-25. [Online]. Available: https://www.gartner.com/en/newsroom/ internet of things, IEEE Access 4 (2016) 2292–2303.
press-releases/2018-11-07-gartner-identifies-top-10-strategic-iot- [39] M.A. Cusumano, The changing software business: Moving from products
technologies-and-trends. to services, Computer 41 (1) (2008) 20–27.
[2] Blockchain as a Service(BaaS), 2018, [Online]. Available: https://www. [40] S.E. Czerwinski, B.Y. Zhao, T.D. Hodes, A.D. Joseph, R.H. Katz, An architec-
investopedia.com/terms/b/blockchainasaservice-baas.asp. ture for a secure service discovery service, in: MobiCom, Vol. 99, 1999,
[3] CryptoKitties, 2019, https://www.cryptokitties.co. pp. 24–35.
[4] Blockchain Technology and Applications, 2019, [Online]. Available: https:
[41] H.-N. Dai, M. Imran, N. Haider, Blockchain-enabled Internet of Medical
//azure.microsoft.com/en-us/solutions/blockchain/.
Things to Combat COVID-19, IEEE Internet Things Mag. (2020) 1–7.
[5] IBM Blockchain Platform, 2019, [Online]. Available: https://www.ibm.
[42] H.-N. Dai, Z. Zheng, Y. Zhang, Blockchain for internet of things: A survey,
com/blockchain/platform.
IEEE Internet Things J. 6 (5) (2019) 8076–8094.
[6] Oraclize, 2019, http://docs.oraclize.it.
[43] V. Daza, R. Di Pietro, I. Klimek, M. Signorini, Connect: Contextual
[7] Blockchain on AWS, 2019, [Online]. Available: https://aws.amazon.com/
name discovery for blockchain-based services in the iot, in: 2017 IEEE
partners/blockchain/.
[8] Cardano, 2019, https://github.com/input--output-hk/cardano-sl/. International Conference on Communications (ICC), IEEE, 2017, pp. 1–6.
[9] EOS, 2019, https://github.com/EOSIO/eos. [44] P. De Filippi, Blockchain-based crowdfunding: what impact on artistic
[10] EOS, 2019, https://www.iota.org. production and art consumption? Obs. Cult. (19) (2015).
[11] Go ethereum, 2019, https://github.com/ethereum/go-ethereum/. [45] P. De Filippi, S. McCarthy, Cloud computing: Centralization and data
[12] Hyperledger fabric, 2019, https://hyperledger-fabric.readthedocs.io/en/ sovereignty, 2012.
release-1.4/. [46] T.T.A. Dinh, R. Liu, M. Zhang, G. Chen, B.C. Ooi, J. Wang, Untangling
[13] IBM blockchain platform technical overview, 2019, https://www.ibm.com/ blockchain: A data processing view of blockchain systems, IEEE Trans.
downloads/cas/Q9DGBLV7. Knowl. Data Eng. 30 (7) (2018) 1366–1385.
[14] NEO, 2019, https://github.com/neo-project/neo. [47] M. Du, X. Ma, Z. Zhang, X. Wang, Q. Chen, A review on consensus algo-
[15] Overview of Amazon web services, 2019, https://docs.aws.amazon.com/ rithm of blockchain, in: 2017 IEEE International Conference on Systems,
aws-technical-content/latest/aws-overview/aws-overview.pdf. Man, and Cybernetics (SMC), IEEE, 2017, pp. 2567–2572.
[16] Qtum, 2019, https://github.com/qtumproject/qtum. [48] K. Gai, Y. Wu, L. Zhu, M. Qiu, M. Shen, Privacy-preserving energy trading
[17] Quorum, 2019, https://www.jpmorgan.com/global/Quorum. using consortium blockchain in smart grid, IEEE Trans. Ind. Inf. (2019).
[18] Quorum, 2019, [Online]. Available: https://www.nielsen.com/us/en/ [49] F.G. Goethals, M. Snoeck, W. Lemahieu, J. Vandenbulcke, Considering
insights/reports/2018/q2-2018-total-audience-report.html. (de) centralization in a web services world, in: Second International
[19] R3 corda, 2019, https://docs.corda.net. Conference on Internet and Web Applications and Services (ICIW’07),
[20] Ripple, 2019, https://ripple.com. IEEE, 2007, p. 22.
[21] Stellar, 2019, https://github.com/stellar/docs.
[50] X. Gu, K. Nahrstedt, B. Yu, Spidernet: An integrated peer-to-peer service
[22] A. Azaria, A. Ekblaw, T. Vieira, A. Lippman, Medrec: Using blockchain
composition framework, in: Proceedings. 13th IEEE International Sympo-
for medical data access and permission management, in: 2016 2nd
sium on High Performance Distributed Computing, 2004, IEEE, 2004, pp.
International Conference on Open and Big Data (OBD), IEEE, 2016, pp.
110–119.
25–30.
[51] S. Hakak, W.Z. Khan, G.A. Gilkar, M. Imran, N. Guizani, Securing smart
[23] I. Bashir, Mastering Blockchain, Packt Publishing Ltd., 2017.
cities through blockchain technology: Architecture, requirements, and
[24] B. Benatallah, M. Dumas, Q.Z. Sheng, A.H. Ngu, Declarative composition
challenges, IEEE Network 34 (1) (2020) 8–14.
and peer-to-peer provisioning of dynamic web services, in: Proceedings
18th International Conference on Data Engineering, IEEE, 2002, pp. [52] N. Herbaut, N. Negru, A model for collaborative blockchain-based video
297–308. delivery relying on advanced network services chains, IEEE Commun.
[25] A. Bouguettaya, M. Singh, M. Huhns, Q.Z. Sheng, H. Dong, Q. Yu, A.G. Mag. 55 (9) (2017) 70–76.
Neiat, S. Mistry, B. Benatallah, B. Medjahed, et al., A service computing [53] E. Hofmann, U.M. Strewe, N. Bosia, Supply Chain Finance and Blockchain
manifesto: the next 10 years, Commun. ACM 60 (4) (2017) 64–72. Technology: The Case of Reverse Securitisation, Springer, 2017.
[26] J. Bronsted, K.M. Hansen, M. Ingstrup, Service composition issues in [54] W. Hoschek, The web service discovery architecture, in: SC’02: Proceed-
pervasive computing, IEEE Pervasive Comput. 9 (1) (2010) 62–70. ings of the 2002 ACM/IEEE Conference on Supercomputing, IEEE, 2002,
[27] V. Buterin, et al., A next-generation smart contract and decentralized p. 38.
application platform, white paper, 2014. [55] J. Huang, L. Kong, H.-N. Dai, W. Ding, L. Cheng, G. Chen, X. Jin, P. Zeng,
[28] R. Buyya, C.S. Yeo, S. Venugopal, Market-oriented cloud computing: Vi- Blockchain based mobile crowd sensing in industrial systems, IEEE Trans.
sion, hype, and reality for delivering it services as computing utilities, in: Ind. Inf. (2020) 1.
2008 10th IEEE International Conference on High Performance Computing [56] M.N. Huhns, M.P. Singh, Service-oriented computing: Key concepts and
and Communications, IEEE, 2008, pp. 5–13. principles, IEEE Internet Comput. 9 (1) (2005) 75–81.
12
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
[57] H. Hyvärinen, M. Risius, G. Friis, A blockchain-based approach towards [86] L. Shao, J. Zhang, Y. Wei, J. Zhao, B. Xie, H. Mei, Personalized QoS pre-
overcoming financial fraud in public sector services, Bus. Inf. Syst. Eng. diction for web services via collaborative filtering, in: IEEE International
59 (6) (2017) 441–456. Conference on Web Services (ICWS 2007), IEEE, 2007, pp. 439–446.
[58] C. Kaleli, H. Polat, P2P collaborative filtering with privacy, Turk. J. Electr. [87] E. Shmueli, T. Tassa, Secure multi-party protocols for item-based col-
Eng. Comput. Sci. 18 (1) (2010) 101–116. laborative filtering, in: Proceedings of the Eleventh ACM Conference on
[59] K. Korpela, J. Hallikas, T. Dahlberg, Digital supply chain transforma- Recommender Systems, ACM, 2017, pp. 89–97.
tion toward blockchain integration, in: Proceedings of the 50th Hawaii [88] N. Szabo, Smart contracts: building blocks for digital markets, EXTROPY,
International Conference on System Sciences, 2017. J. Transhumanist Thought 18 (16) (1996).
[60] L. Lamport, et al., Paxos made simple, ACM SIGACT News 32 (4) (2001) [89] W. Viriyasitavat, L. Da Xu, Z. Bi, A. Sapsomboon, Blockchain-based
18–25. business process management (bpm) framework for service composition
[61] A.L. Lemos, F. Daniel, B. Benatallah, Web service composition: a survey in industry 4.0, J. Intell. Manuf. (2018) 1–12.
of techniques and tools, ACM Comput. Surv. 48 (3) (2016) 33.
[90] P. Wang, J. Meng, J. Chen, T. Liu, Y. Zhan, W.-T. Tsai, Z. Jin, Smart-
[62] X. Li, E. Du, C. Chen, Z. Zheng, T. Cai, Q. Yan, Blockchain-based credible contract based negotiation for adaptive QoS-aware service composition,
and privacy-preserving QoS-aware web service recommendation, in: In- IEEE Trans. Parallel Distrib. Syst. (2018).
ternational Conference on Blockchain and Trustworthy Systems, Springer,
[91] I. Weber, X. Xu, R. Riveret, G. Governatori, A. Ponomarev, J. Mendling,
2019, pp. 621–635.
Untrusted business process monitoring and execution using blockchain,
[63] W. Liang, Y. Fan, K. Li, D. Zhang, J. Gaudiot, Secure data storage and
in: International Conference on Business Process Management, Springer,
recovery in industrial blockchain network environments, IEEE Trans. Ind.
2016, pp. 329–347.
Inf. (2020) 1–10.
[92] Y. Wei, M.B. Blake, Service-oriented computing and cloud computing:
[64] W. Liang, W. Huang, J. Long, K. Zhang, K. Li, D. Zhang, Deep reinforce-
Challenges and opportunities, IEEE Internet Comput. 14 (6) (2010) 72–75.
ment learning for resource protection and real-time detection in iot
environment, IEEE Internet Things J. (2020) 1–11. [93] G. Wood, Ethereum: A secure decentralised generalised transaction
[65] W. Liang, K. Li, J. Long, X. Kui, A.Y. Zomaya, An industrial network ledger, Ethereum project yellow paper, 151, 2014, pp. 1–32.
intrusion detection algorithm based on multifeature data clustering [94] J. Xiao, R. Boutaba, QoS-aware service composition and adaptation in
optimization model, IEEE Trans. Ind. Inf. 16 (3) (2020) 2063–2071. autonomic communication, IEEE J. Sel. Areas Commun. 23 (12) (2005)
[66] W. Liang, D. Zhang, X. Lei, M. Tang, K. Li, A. Zomaya, Circuit copyright 2344–2360.
Blockchain: Blockchain-based homomorphic encryption for IP circuit [95] S. Xie, Z. Zheng, W. Chen, J. Wu, H.-N. Dai, M. Imran, Blockchain for cloud
protection, IEEE Trans. Emerg. Top. Comput. (2020) 1. exchange: A survey, Comput. Electr. Eng. 81 (2020) 106526.
[67] K. Liu, W. Chen, Z. Zheng, Z. Li, W. Liang, A novel debt-credit mechanism [96] W. Xiong, L. Xiong, Smart contract based data trading mode using
for blockchain-based data-trading in internet of vehicles, IEEE Internet blockchain and machine learning, IEEE Access 7 (2019) 102 331–102 344.
Things J. 6 (5) (2019) 9098–9111. [97] L. Zeng, B. Benatallah, A.H. Ngu, M. Dumas, J. Kalagnanam, H. Chang,
[68] M. Mainelli, B. Manson, Chain reaction: How blockchain technology might Qos-aware middleware for web services composition, IEEE Trans. Softw.
transform wholesale insurance, Long Finance (2016). Eng. 30 (5) (2004) 311–327.
[69] Y. Manevich, A. Barger, Y. Tock, Service discovery for hyperledger fabric, [98] Y. Zhao, Y. Yu, Y. Li, G. Han, X. Du, Machine learning based privacy-
in: Proceedings of the 12th ACM International Conference on Distributed preserving fair data trading in big data market, Inform. Sci. 478 (2019)
and Event-Based Systems, ACM, 2018, pp. 226–229. 449–460.
[70] D. Mazieres, The Stellar Consensus Protocol: A Federated Model for [99] Z. Zheng, H. Ma, M.R. Lyu, I. King, Wsrec: A collaborative filtering based
Internet-Level Consensus, Stellar Development Foundation, 2015. web service recommender system, in: 2009 IEEE International Conference
[71] D.A. Menascé, QoS issues in web services, IEEE Internet Comput. 6 (6) on Web Services, IEEE, 2009, pp. 437–444.
(2002) 72–75. [100] Z. Zheng, H. Ma, M.R. Lyu, I. King, QoS-aware web service recommen-
[72] S. Meng, W. Dou, X. Zhang, J. Chen, Kasr: a keyword-aware service dation by collaborative filtering, IEEE Trans. Serv. Comput. 4 (2) (2011)
recommendation method on mapreduce for big data applications, IEEE 140–152.
Trans. Parallel Distrib. Syst. 25 (12) (2014) 3221–3231.
[101] Z. Zheng, S. Xie, H.-N. Dai, W. Chen, X. Chen, J. Weng, M. Imran, An
[73] M. Mettler, Blockchain technology in healthcare: The revolution
overview on smart contracts: Challenges, advances and platforms, Future
starts here, in: 2016 IEEE 18th International Conference on e-Health
Gener. Comput. Syst. 105 (2020) 475–491.
Networking, Applications and Services (Healthcom), IEEE, 2016, pp. 1–3.
[102] Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An overview of blockchain
[74] S. Nakamoto, et al., Bitcoin: A peer-to-peer electronic cash system, 2008.
technology: Architecture, consensus, and future trends, in: 2017 IEEE
[75] H. Ohnishi, Y. Yamato, M. Kaneko, T. Moriya, M. Hirano, H. Sunaga, Service
International Congress on Big Data (BigData Congress), IEEE, 2017, pp.
delivery platform for telecom-enterprise-internet combined services, in:
557–564.
Proceedings of the Global Communications Conference, 2007. GLOBECOM
[103] Z. Zheng, S. Xie, H.-N. Dai, H. Wang, Blockchain challenges and
’07, Washington, DC, USA, 26–30 November 2007, 2007, pp. 108–112.
opportunities: A survey, Int. J. Web and Grid Serv. 14 (4) (2018) 352–375.
[76] S. Ølnes, Beyond bitcoin enabling smart government using blockchain
technology, in: International Conference on Electronic Government, [104] P. Zheng, Z. Zheng, X. Luo, X. Chen, X. Liu, A detailed and real-
Springer, 2016, pp. 253–264. time performance monitoring framework for blockchain systems, in:
[77] D. Ongaro, J. Ousterhout, In search of an understandable consensus 2018 IEEE/ACM 40th International Conference on Software Engineer-
algorithm, in: 2014 USENIX Annual Technical Conference (USENIX ATC ing: Software Engineering in Practice Track (ICSE-SEIP), IEEE, 2018, pp.
14), 2014, pp. 305–319. 134–143.
[78] M.P. Papazoglou, Service-oriented computing: Concepts, characteristics [105] J. Zou, Y. Wang, M.A. Orgun, A dispute arbitration protocol based on
and directions, in: Proceedings of the Fourth International Conference a peer-to-peer service contract management scheme, in: 2016 IEEE
on Web Information Systems Engineering, 2003. WISE 2003, IEEE, 2003, International Conference on Web Services (ICWS), IEEE, 2016, pp. 41–48.
pp. 3–12. [106] J. Zou, B. Ye, L. Qu, Y. Wang, M.A. Orgun, L. Li, A proof-of-trust consensus
[79] M.P. Papazoglou, P. Traverso, S. Dustdar, F. Leymann, Service-oriented protocol for enhancing accountability in crowdsourcing services, IEEE
computing: State of the art and research challenges, Computer 40 (11) Trans. Serv. Comput. 12 (3) (2018) 429–445.
(2007) 38–45.
[80] M.P. Papazoglou, P. Traverso, S. Dustdar, F. Leymann, Service-oriented
computing: a research roadmap, Int. J. Coop. Inf. Syst. 17 (02) (2008)
Xiaoyun Li is a Ph.D student at Sun Yat-sen Uni-
223–255.
versity, Guangzhou, China. She received a B.S. in
[81] S. Popov, The tangle, cit. on 131 (2016).
Software Engineering from Sun Yat-sen University,
[82] D. Raggett, The web of things: Challenges and opportunities, Computer
Guangzhou, China, in 2019. Her research interests
48 (5) (2015) 26–32.
include blockchain-technique, reliability in distributed
[83] S. Ran, A model for web services discovery with QoS, ACM Sigecom Exch. system, machine learning.
4 (1) (2003) 1–10.
[84] M. Ruta, F. Scioscia, S. Ieva, G. Capurso, E. Di Sciascio, Semantic blockchain
to improve scalability in the internet of things, Open J. Internet Things
(OJIOT) 3 (1) (2017) 46–61.
[85] D. Schwartz, N. Youngs, A. Britto, et al., The ripple protocol consensus
algorithm, in: Ripple Labs Inc White Paper, Vol. 5, 2014.
13
X. Li, Z. Zheng and H.-N. Dai Journal of Parallel and Distributed Computing 150 (2021) 1–14
Zibin Zheng is a professor at Sun Yat-sen Univer- Hong-Ning Dai is an Associate Professor in Faculty
sity, Guangzhou, China. He received Ph.D. degree from of Information Technology at Macau University of
The Chinese University of Hong Kong in 2011. He Science and Technology. He obtained his Ph.D. in Com-
received ACM SIGSOFT Distinguished Paper Award at puter Science and Engineering from the Department
ICSE’ 10, Best Student Paper Award at ICWS’ 10, and of Computer Science and Engineering at the Chinese
IBM Ph.D. Fellowship Award. His research interests University of Hong Kong. His research interests include
include services computing, software engineering, and blockchain, big data analytics, and the Internet of
blockchain. Things. He is serving as associate editors/editors of IEEE
Systems Journal, IEEE Access, Connection Science, and
Ad Hoc Networks.
14