Abstract
This paper presents a new consensus algorithm, Proof of Usage (PoU), for the blockchain technology. This consensus is introduced for permissioned (or private) blockchains and is designed for a user-centric personal data market. This market is subject to specific regulations with which conventional blockchains fail to comply. Proof of Usage aims to promote a new paradigm dedicated to usage incentivization, valuation, and control of user data in various sectors, such as banking and insurance. Other consensuses such as Proof of Stake or historical Proof of Work do not encourage coin spending and usage (in fact, Proof of Stake promotes the opposite). However, the value of the currency mainly depends on its use. This paper first introduces a contextualization of blockchain technology and decentralized consensus models. The motivation is then discussed for a new model of personal data exchange in a decentralized but supervised environment. The PoU protocol and its process flow are defined in detail. Furthermore, the paper explores two different approaches regarding the reward mechanism and the incentive model. Finally, the paper focuses on security requirements and how PoU meets such requirements in a permissioned-based blockchain system.
Similar content being viewed by others
Notes
An asymmetric mathematical problem is a mathematical problem that is hard to solve but the solution of which is easy to verify.
FTS is an algorithm that picks a coin and selects its owner as a leader. The more coins a node has, the more likely it will be selected.
In cryptography, a salt is data that are used as an additional input to a one-way function that hashes data. Salts are used to safeguard passwords in storage, but here it is used to generate multiple hashes from a single input.
References
Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system
Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends.. In: 2017 IEEE International Congress on Big Data (BigData Congress). IEEE, pp 557–564
Dwork C, Naor M (1992) Pricing via processing or combatting junk mail.. In: Annual international cryptology conference. Springer, pp 139–147
Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols.. In: Secure information networks. Springer, pp 258–272
King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake.
Bentov I, Lee C, Mizrahi A, Rosenfeld M (2014) Proof of Activity: Extending bitcoin’s proof of work via proof of stake.
Company N (2018) Nem, technical reference, version 1.2.1. Tech. rep., NEM company. https://nem.io/wp-content/themes/nem/files/NEM_techRef.pdf
Buterin V et al (2014) A next-generation smart contract and decentralized application platform.
Sasson EB, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: Decentralized anonymous payments from bitcoin.. In: 2014 IEEE Symposium on Security and Privacy (SP). IEEE, pp 459–474
Miers I, Garman C, Green M, Rubin AD (2013) Zerocoin: Anonymous distributed e-cash from bitcoin.. In: 2013 IEEE Symposium on Security and Privacy (SP). IEEE, pp 397–411
Cachin C (2016) Architecture of the hyperledger blockchain fabric. In: Workshop on distributed cryptocurrencies and consensus ledgers, vol 310
Lartigau J, Bucamp F, de Casaubon DC (2018) Pikciochain: A new eco-system for personal data
Company Pikcio (2018) Pikciochain, the personal data chain, white paper version 2.0. https://www.pikcio.com/pikciochain-whitepaper
Regulation (eu) 2016/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (General Data Protection Regulation). In: Official Journal of the European Union, L119, vol 59. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL
Gill M, Taylor G (2004) Preventing money laundering or obstructing business? financial companies’ perspectives on “know your customer” procedures. Br J Criminol 44(4):582
Muller WH, Kalin CH, Goldsworth JG (2007) Anti-money laundering: International law and practice. Wiley, New York
Merkle RC (1987) A digital signature based on a conventional encryption function.. In: Conference on the theory and application of cryptographic techniques. Springer, pp 369–378
Wang Q, Dunlap T, Cho Y, Qu G (2017) Dos attacks and countermeasures on network devices. In: 26th Wireless and Optical Communication Conference (WOCC), IEEE, pp 1–6, DOI https://doi.org/10.1109/WOCC.2017.7928974
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Masseport, S., Lartigau, J., Darties, B. et al. Proof of usage: user-centric consensus for data provision and exchange. Ann. Telecommun. 75, 153–162 (2020). https://doi.org/10.1007/s12243-020-00753-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-020-00753-8