A blockchain-based service-centric network stack

[Short general description]: Blockcloud is a Blockchain-based advanced TCP/IP. It utilizes blockchain to systematically solve the trust and incentive problems in service-centric networking, enabling each individual to participate in this great revolution of network production relations. Blockcloud is designed with loose decoupled hierarchical layers, with each layer independently built and self-evolve. Combining with distributed storage, computing, and service & pricing, Blockcloud promotes the entire network as a “consensus machine”, establishing a marketplace for suppliers and users of network resources by an approach similar to “building blocks”. It encourages network service providers to give more and earn more. Blockcloud enhances the stability, security, mobility and scalability of network service, making it possible for massive heterogeneous devices (especially IoT devices) to be accessed in Future Internet.


[Main problems tackled]: 

1) Improving Mobility: The mobility of devices is inherently supported by adopting a service-based communication paradigm introduced by Serval. The centerpiece of Serval architecture is a new Service Access Layer (SAL) that sits above an unmodified network layer, and enables IoT devices to communicate directly on service names. The SAL provides a clean service-level control/data plane split, enabling policy, control, and in-stack name-based routing that connects clients to services. From the service subscriber’s perspective, service is provided by the network and she does not need to manage the direct communication with the exact end-point who provides the service. In such a manner, end-points can seamlessly change network addresses, migrate flows across interfaces, or establish additional flows for efficient and uninterrupted service access.

2) Enhancing Scalability: The distributed nature of services with peer-to-peer technology makes scalability possible. Service registration and discovery become the key features of Blockcloud, which can be easily achieved from the adoption of a Distributed Hash Table (DHT) network.

3) Getting Trust: Devices form a blockchain network where the system runs in a fully decentralized manner. We propose a novel Proof of Service (PoS) consensus mechanism to solve problems about guaranteeing truthful service. The facticity of services provided to the network is automatically checked and guaranteed by the PoS consensus. Cheating providers will be punished or even kicked out from the system. Successful decentralization of the IoT, however, will lie not just in being peer-to-peer, but also in being trustless: an environment in which there is no need for participants to be trusted and no centralized, single point of failure.

4) Protecting Security: The blockchain system and a peer-to-peer network known as Coral form the secure backbone of the Blockcloud network. Communication operations between devices are embedded in the blockchain and service information is stored in Coral, routed by peer nodes (called service miners) and guaranteed by the Proof-of-Service consensus. The system therefore has no central point which is exposed to attackers and security is guaranteed by the consensus mechanism of distributed miners who are economically motivated to be honest.

5) Achieving Fairness: Services are published/subscribed to/from the network. Service providers and subscribers are atomically matched by Blockcloud. The matching process is performed by a smart contract which cannot be controlled any end-point or a centralized party. The smart contract runs a Truthful Continuous Double Auction (TCDA) that prevents cheating and maximizes social welfare of the entire community. TCDA is mathematically strategy-proof, where there is no incentive for any of the traders to lie about or hide their private information from the other traders.

6) Strengthening Incentive: By identifying and matching supply and demand for services in real-time, Blockcloud will create new marketplaces. These complex, real-time digital marketplaces will build upon the foundation established by IoT devices and blockchain networks to expand the reach of this transformation very quickly. They will enable new peerto-peer economic models and foster sharing economies. In the end, the IoT is expected to make the physical world every bit as easy to search, utilize and engage with as the virtual world.


[Main contribution proposal]:

1) Internet of Vehicles: Internet of Vehicles is a typical application of IoT in the field of transportation. It has the characteristics of high-speed fast and unpredictable node movements and multiple nodes participating in scheduling collaboration, which are directly related to personal and property security. Blockcloud combines the advantages of Service-centric Networking (SCN) and Blockchain with stable connectivity and well mobility support in the underlying physical network. It also provides decentralized trust, security, fairness and economic incentive, which can well adapt to the features of the Internet of Vehicles.

2) Smart Health: Blockcloud helps to establish an open, truthful, fair and incentive IoT health data system, ensuring that health data can be securely distributed in legally authorized nodes and the value of data can be truly enjoyed by the owners.

3) Smart Home: Smart devices today rely too much on home gateways, with all intructions processed and transmitted by the gateway. Once the gateway is paralyzed or broken into, all connected devices will be affected. Blockcloud allows smart devices to access the decentralized blockchain network securely and truthfully. It also breaks the “home” boundary and enables smart devices between houses to communicate and collaborate directly, which achieves a real "smart" home.

4) Edge Computing: The advantages of Blockcloud in connectivity, mobility, and computational model can perfectly cope with the problems of extremely unstable nodes in edge computing, ensuring that all nodes can allocate appropriate service resources and obtain proper income. In addition, Blockcloud can verify the authenticity and effectiveness of the node service at a very low cost, thus perfectly solving the problem of low computational nodes and high security verification costs in the edge computing, enabling the entire edge computing service to be secure and reliable.

5) Sharing Economy: Blockcloud provides a completely decentralized system for the sharing economy, which solves the problem of excessive power of the platform and heavy burdens and risks to the participating parties. Blockcloud ensures that the credit information of both parties is truthful, the authorization who shares resources is reliable, and fees are settled quickly and securely.


[Innovation]: Blockcloud has four layers, with two layers (transactionchain layer and servicechain layer) in the control plane and two layers (routing layer and service layer) in the service plane.

1) Transactionchain Layer: The transactionchain occupies the lowest tier. Blockcloud operations are encoded in transactions on the underlying transactionchain. The transactionchain stores the transactions of the network as a global ledger and. While Blockcloud holds an evolving concept that provides the feasibility and compatibility of different underling blockchain technologies, due to the characteristic of IoT, the chosen technology for the transactionchain layer must be elastic, efficient, secure, scalable and cost-effective. Currently, the Blockcloud team proposes to use Compacted Directed Acyclic Graph (CoDAG), which can be mathematically proved to be efficient for large-scale and dynamic IoT scenarios. CoDAG improves the traditional DAG structure to guarantee fast confirmation time and liveness property.

2) Servicechain Layer: Above Layer 1 is a servicechain, which defines new operations without requiring changes to the underlying blockchain. Only Blockcloud nodes are aware of this layer and underlying blockchain nodes are agnostic to it. Blockcloud operations are defined in the servicechain layer and are encoded in valid blockchain transactions as additional metadata. Blockchain nodes do see the raw transactions, but the logic to process Blockcloud operations only exists at the servicechain level. The rules for accepting or rejecting Blockcloud operations are also defined in the servicechain. Accepted operations are processed by the servicechain to construct a database that stores information on the global state of the system along with state changes at any given blockchain block. Servicechains can be used to build a variety of state machines. Currently, Blockcloud defines two state machines - a global service management system and a service matching and pricing system.

3) Routing Layer: Blockcloud separates the task of routing requests (i.e., how to discover service) from the actual providing of service. This avoids the need for the system to adopt any particular management service from the onset, and instead allows multiple service providers to coexist, including both commercial entity and peer-to-peer systems. Blockcloud uses service files for storing routing information, which are similar to DNS zone files in their format. The servicechain binds names to respective hash (service file) and stores these bindings in the control plane, whereas the service files themselves are stored in the routing layer. Users do not need to trust the routing layer because the integrity of service files can be verified by checking the hash (zone file) in the control plane.

4) Service Layer: The top-most layer is the service layer, which serves the actual services for the network. All service names are signed by the key of the respective owner of a service. By providing services outside of the transactionchain, Blockcloud allows arbitrary IoT services that a provided by a variety of IoT devices. Users do not need to trust the service provider because they can verify the authenticity of the service by proof-of-service in the control plane.


Team - Founders:
Are the founders known? Do they have relevant experience and connections?
  • 1. Unknown people. No serious background information available.
  • 2. Partial information available, no relevant experience.
  • 3. Background information available, no relevant experience.
  • 4. Solid, relevant background and connections available.
  • 5. Solid, well known, experienced and well connected founders.
Team - Advisors:
What level of commitment, experience and connections do the advisers bring?
  • 1. No reputable advisors with relevant experience.
  • 2. Few advisors with little to no relevant experience.
  • 3. Advisers with relevant experience.
  • 4. Reputable advisors with relevant experience and connections.
  • 5. High profile highly experienced, well connected and committed advisors.
Product - Technology Layer:
Is the product innovative? Does it contribute to the blockchain ecosystem?
  • 1. No, the product is just a clone with no contribution.
  • 2. The product is a dapp with minimal interest and little contribution to the ecosystem.
  • 3. The product is a dapp, exchange or protocol addressing a real problem or need.
  • 4. Innovative product offering a solution to a high interest problem.
  • 5. Innovative protocol tackling critical problems of highest interest.
Product - Proof of concept:
Is the proof of concept comprehensive? Does it address a real problem or need?
  • 1. No, incoherent concept or no need for it.
  • 2. Difficult concept to understand, hardly any need or problem to solve.
  • 3. Clear concept which addresses a real problem.
  • 4. Clear, well thought concept which addresses a real problem of high interest.
  • 5. Exceptional proof of concept addressing a critical problem.
Product - MVP:
Has the concept been tested? Is there an MVP? How far is the launch?
  • 1. Untested concept.
  • 2. Initial tests, no MVP.
  • 3. MVP ready, Alpha launch.
  • 4. MVP ready, Beta launch.
  • 5. Fully working initial product.
Token Economics - Token utility:
Does the token have any utility? Is it a core function to the network?
  • 1. No, the token has no utility.
  • 2. Token has a limited, unclear utility.
  • 3. The token has some added, but not inherent value.
  • 4. The token is embedded in the network and has inherent value.
  • 5. The token has both inherent and added value and is embedded at the core of the network.
Token Economics - Network effect:
Are strong network effects built into the system? Are incentives aligned to encourage the growth of the network?
  • 1. No network effects built in.
  • 2. Minimal network effects, unclear incentives.
  • 3. Network effects and incentives present.
  • 4. Solid network effects with clear incentives due to inherent utility.
  • 5. Strong network effects, aligned incentives and high utility value.
Business Evaluation - Valuation:
Is the valuation reasonable ? Sufficient but not too high for the scope of the project?
  • 1. No, the valuation is ludicrous, the project could do with 1/10 of the sum.
  • 2. Valuation is higher than the project would need. Likely a money grab.
  • 3. Valuation is reasonable for the scope of the project.
  • 4. Valuation is modest for the caliber of the project.
  • 5. Valuation is impressively modest relative to the high caliber of the project.
Business Evaluation - Market potential:
What is the market potential? Does the project look like it could penetrate the market and conquer the world?
  • 1. No clear market potential.
  • 2. Limited market potential.
  • 3. Reasonable market and growth potential.
  • 4. Solid market and growth potential.
  • 5. Exceptional market and growth potential.
Business Evaluation - Competition:
Does the project have competition? How strong does it look relative to its competition?
  • 1. Awful position competing with many strong players.
  • 2. Weak position facing strong competition.
  • 3. Reasonable position facing strong competition.
  • 4. Solid position facing weak competition.
  • 5. Exceptional position, facing almost no competition.
Business Evaluation - Supply sold:
Does the team distribute a reasonable amount of the tokens so as to encourage create strong incentives and network effects?
  • 1. Negligible supply, greedy team.
  • 2. Small supply, poor incentives.
  • 3. Modest supply, weak incentives.
  • 4. Reasonable supply, responsible team.
  • 5. Large supply, solid inventive, committed team.
Business Evaluation - Vesting:
Does the team have a sufficient stake to have aligned incentives? Do they have a vesting schedule implemented?
  • 1. Large stake, no vesting.
  • 2. Small stakes, no vesting.
  • 3. Modest stakes, no vesting.
  • 4. Reasonable stakes, modest vesting.
  • 5. Solid stake, healthy vesting.
Hype and media presence:
Is the project present on social media and chats? Is there interest for it?
  • 1. No presence, negative image.
  • 2. Modest exposure and no interest.
  • 3. Reasonable exposure and modest interest.
  • 4. Solid exposure and high interest.
  • 5. Exceptional exposure, high interest and considerable hype.
Final Score


Zhongxing Ming
Shu Yang
Chairman / SCN Lab Principal
Dai Pan
Dong Huo
Strategic Scientist
Qi Li
Network Security Expert
Wei Xiao
Data Scientist
Claire Xiong
Director of Business and Communications
Peter Ran
North American Commercial Director
Lucy Liu
North American Marketing Director
Kun Hu
Head of Development
Zhenzhou Wu
Cloud Platform Director
Kun Liu
Head of Marketing


Fred Baker
Internet pioneer and former IETF chair
Hoan Soo Lee
Partner of CMB International / Co-founder and COO of Give2gether in Boston
Jiangchuan Liu
IEEE Fellow / 252 international academic papers, 2 international patents, 7 software products
Ke Xu
Professor, doctoral supervisor and deputy director of Department of Computer Science and Technology, Tsing- hua University.
Dan Wang
Expert of national rail engineering center / Chief Designer of Guangzhou TV tower sensor system
Qian Wang
Professor and Doctoral Supervisor of Wuhan University / Ph.D of Illinois Institute of Technology
Linghe Kong
Professor of Shanghai Jiao Tong University / Post-doctor of Columbia University, New York / Ph.D in computer engineering
Sheng Zhong
Ph.D in Computer Science, Yale University / Professor of Nanjing University / Deputy Director of Department of Computer Science and Technology
Qianhong Wu
Professor of School of Electronics and Information Engineering, Beihang University / Ph.D in cryptology, Xidian University
Kun Yang
Distinguished professor of Recruitment Program of Global Experts / Ph.D in Electronic Engineering, University College London
Liehuang Zhu
Assistant dean of School of Computer Science & Technology, BIT / Ph.D of School of Computer Science & Technology, BIT
Mingwei Xu
National Distinguished Yong Scholar of China / Professor and Doctoral Supervisor of Department of Computer Science and Technology, Tsinghua University
Ahmed Alsayadi
Core member of Baidu Arab search engine / Founder of two AI companies.
Guang Cheng
Dean of School of Cyberspace security, Southeast University / Ph.D of School of Computer Science and Engineering, Southeast University
Haibin Kan
Professor and doctoral supervisor of Fudan University / Leader of Coding and Information Security Laboratory and Institute of Computer Theory of Fudan University


Published at