From Concept to Measurement: A Survey of How the Blockchain Trilemma Is Analyzed
- URL: http://arxiv.org/abs/2505.03768v4
- Date: Mon, 06 Oct 2025 21:48:45 GMT
- Title: From Concept to Measurement: A Survey of How the Blockchain Trilemma Is Analyzed
- Authors: Mansur Masama Aliyu, Niclas Kannengießer, Ali Sunyaev,
- Abstract summary: We systematically reviewed literature on the blockchain trilemma and blockchain benchmarks to synthesize constructs and their operationalizations through metrics.<n>We identified 12 constructs, operationalized through 15 metrics, that capture DoD, scalability, and security.<n>The findings offer insights for distributed database systems that rely on consensus and state machine replication.
- Score: 2.9121235632815607
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The blockchain trilemma highlights the difficulty of simultaneously achieving a high degree of decentralization (DoD), scalability, and security in blockchain systems. While numerous constructs and metrics have been proposed to analyze these subconcepts, existing guidance is fragmented and inconsistent, limiting comparability across studies. This lack of clarity hinders practitioners in identifying Pareto-optimal blockchain system designs that meet common non-functional requirements. We systematically reviewed literature on the blockchain trilemma and blockchain benchmarks to synthesize constructs and their operationalizations through metrics to analyze the trilemma's subconcepts. We identified 12 constructs, operationalized through 15 metrics, that capture DoD, scalability, and security. We explain how these constructs apply across different blockchain systems and provide a structured overview that supports benchmarking and blockchain system design. Beyond blockchain, the findings offer insights for distributed database systems that rely on consensus and state machine replication. This work contributes a harmonized foundation for quantitative analyses of the blockchain trilemma, guiding both researchers in developing analysis approaches and practitioners in evaluating real-world systems.
Related papers
- SEDULity: A Proof-of-Learning Framework for Distributed and Secure Blockchains with Efficient Useful Work [41.41842611951311]
We name the framework SEDULity, which stands for a Secure, Efficient, Distributed, and Useful Learning-based blockchain system.<n>We show that our framework is distributed, secure, and efficiently trains ML models.<n>We further demonstrate that the proposed PoL framework can be extended to other types of useful work and design an incentive mechanism to incentivize task verification.
arXiv Detail & Related papers (2025-12-15T18:55:20Z) - Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey [39.613235136790244]
We systematically analyze over 150 high impact sources from academic journals, digital libraries, and grey literature.<n>We offer a classification of interoperability approaches including Atomic Swaps, Sidechains, Light Clients, and so on, which represent the most comprehensive overview to date.<n>Our findings aim to support researchers, policymakers, and industry leaders in harnessing the transformative potential of blockchain interoperability to address current challenges and drive forward a cohesive multi-chain ecosystem.
arXiv Detail & Related papers (2025-05-08T04:24:50Z) - Dynamic Digital Twins of Blockchain Systems: State Extraction and Mirroring [3.5376671181893897]
This paper constitutes an effort to design a Digital Twin-based blockchain management framework.<n>It aims to adapt the consensus process to fit the conditions of the underlying system.<n>Specifically, this work addresses the problems of extracting the blockchain system and mirroring it in its digital twin.
arXiv Detail & Related papers (2024-12-07T03:54:34Z) - A Game-Theoretic Approach to the Study of Blockchain's Robustness [0.0]
This thesis investigates the robustness of blockchain protocols, specifically focusing on Proof-of-Stake.<n>We define robustness in terms of two critical properties: Safety, which ensures that the blockchain will not have permanent conflicting blocks, and Liveness, which guarantees the continuous addition of new reliable blocks.<n>Our research addresses the gap between traditional distributed systems approaches, which classify agents as either honest or Byzantine (i.e. malicious or faulty), and game-theoretic models that consider rational agents driven by incentives.
arXiv Detail & Related papers (2024-11-28T14:29:14Z) - BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - Analysing Attacks on Blockchain Systems in a Layer-based Approach [0.5999777817331317]
There have been several major attacks on blockchain-based systems, leaving a gap in the trustability of this system.
This article presents a comprehensive study of 23 attacks on blockchain systems and categorizes them using a layer-based approach.
arXiv Detail & Related papers (2024-09-16T09:17:18Z) - Should my Blockchain Learn to Drive? A Study of Hyperledger Fabric [14.834625066344586]
This paper explores the concept of self-driving blockchains, which have the potential to predict workload changes and reconfigure themselves for optimal performance without human intervention.
We identify specific parameters and components in Hyperledger Fabric, a popular permissioned blockchain system, that are suitable for autonomous adaptation and offer potential solutions for the challenges involved.
Our experiments indicate up to 11% improvement in success throughput and a 30% decrease in latency, making this a significant step towards implementing a fully autonomous blockchain system in the future.
arXiv Detail & Related papers (2024-06-10T14:33:59Z) - Blockchains for Internet of Things: Fundamentals, Applications, and Challenges [38.29453164670072]
Not every blockchain system is suitable for specific IoT applications.
Public blockchains are not suitable for storing sensitive data.
We explore the blockchain's application in three pivotal IoT areas: edge AI, communications, and healthcare.
arXiv Detail & Related papers (2024-05-08T04:25:57Z) - What Blocks My Blockchain's Throughput? Developing a Generalizable Approach for Identifying Bottlenecks in Permissioned Blockchains [0.3495246564946556]
We develop a more unified and graphical approach for identifying bottlenecks in permissioned blockchains.
We conduct in-depth case studies on Hyperledger Fabric and Quorum, two widely used permissioned blockchains.
arXiv Detail & Related papers (2024-04-02T13:00:50Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems [43.80265187232706]
Cross-chain bridges are used to facilitate token and data exchanges across blockchains.
Although bridges are becoming increasingly popular, they are still in their infancy and have been attacked multiple times recently.
This paper analyzes the security landscape of cross-chain bridges in a holistic manner.
arXiv Detail & Related papers (2023-12-19T20:13:21Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.