Skip to main content
Log in

Proof of usage: user-centric consensus for data provision and exchange

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

This paper presents a new consensus algorithm, Proof of Usage (PoU), for the blockchain technology. This consensus is introduced for permissioned (or private) blockchains and is designed for a user-centric personal data market. This market is subject to specific regulations with which conventional blockchains fail to comply. Proof of Usage aims to promote a new paradigm dedicated to usage incentivization, valuation, and control of user data in various sectors, such as banking and insurance. Other consensuses such as Proof of Stake or historical Proof of Work do not encourage coin spending and usage (in fact, Proof of Stake promotes the opposite). However, the value of the currency mainly depends on its use. This paper first introduces a contextualization of blockchain technology and decentralized consensus models. The motivation is then discussed for a new model of personal data exchange in a decentralized but supervised environment. The PoU protocol and its process flow are defined in detail. Furthermore, the paper explores two different approaches regarding the reward mechanism and the incentive model. Finally, the paper focuses on security requirements and how PoU meets such requirements in a permissioned-based blockchain system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. An asymmetric mathematical problem is a mathematical problem that is hard to solve but the solution of which is easy to verify.

  2. FTS is an algorithm that picks a coin and selects its owner as a leader. The more coins a node has, the more likely it will be selected.

  3. In cryptography, a salt is data that are used as an additional input to a one-way function that hashes data. Salts are used to safeguard passwords in storage, but here it is used to generate multiple hashes from a single input.

  4. https://github.com/Pikciochain/Proof_of_Usage

  5. https://monitor.pikciochain.com/

  6. https://explorer.testnet.pikciochain.com/#/

References

  1. Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system

  2. Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends.. In: 2017 IEEE International Congress on Big Data (BigData Congress). IEEE, pp 557–564

  3. Dwork C, Naor M (1992) Pricing via processing or combatting junk mail.. In: Annual international cryptology conference. Springer, pp 139–147

  4. Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols.. In: Secure information networks. Springer, pp 258–272

  5. King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake.

  6. Bentov I, Lee C, Mizrahi A, Rosenfeld M (2014) Proof of Activity: Extending bitcoin’s proof of work via proof of stake.

  7. Company N (2018) Nem, technical reference, version 1.2.1. Tech. rep., NEM company. https://nem.io/wp-content/themes/nem/files/NEM_techRef.pdf

  8. Buterin V et al (2014) A next-generation smart contract and decentralized application platform.

  9. Sasson EB, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: Decentralized anonymous payments from bitcoin.. In: 2014 IEEE Symposium on Security and Privacy (SP). IEEE, pp 459–474

  10. Miers I, Garman C, Green M, Rubin AD (2013) Zerocoin: Anonymous distributed e-cash from bitcoin.. In: 2013 IEEE Symposium on Security and Privacy (SP). IEEE, pp 397–411

  11. Cachin C (2016) Architecture of the hyperledger blockchain fabric. In: Workshop on distributed cryptocurrencies and consensus ledgers, vol 310

  12. Lartigau J, Bucamp F, de Casaubon DC (2018) Pikciochain: A new eco-system for personal data

  13. Company Pikcio (2018) Pikciochain, the personal data chain, white paper version 2.0. https://www.pikcio.com/pikciochain-whitepaper

  14. Regulation (eu) 2016/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (General Data Protection Regulation). In: Official Journal of the European Union, L119, vol 59. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL

  15. Gill M, Taylor G (2004) Preventing money laundering or obstructing business? financial companies’ perspectives on “know your customer” procedures. Br J Criminol 44(4):582

    Article  Google Scholar 

  16. Muller WH, Kalin CH, Goldsworth JG (2007) Anti-money laundering: International law and practice. Wiley, New York

    Google Scholar 

  17. Merkle RC (1987) A digital signature based on a conventional encryption function.. In: Conference on the theory and application of cryptographic techniques. Springer, pp 369–378

  18. Wang Q, Dunlap T, Cho Y, Qu G (2017) Dos attacks and countermeasures on network devices. In: 26th Wireless and Optical Communication Conference (WOCC), IEEE, pp 1–6, DOI https://doi.org/10.1109/WOCC.2017.7928974

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samuel Masseport.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Masseport, S., Lartigau, J., Darties, B. et al. Proof of usage: user-centric consensus for data provision and exchange. Ann. Telecommun. 75, 153–162 (2020). https://doi.org/10.1007/s12243-020-00753-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-020-00753-8

Keywords

Navigation