A Survey of Blockchain Technology Security

Main Article Content

Ayushi Singh
Gulafsha Shujaat
Isha Singh
Abhishek Tripathi
Divya Thakur

Abstract

Bitcoin is a popular cryptocurrency that records all transactions in an allotted append-handiest public ledger referred to as a blockchain. The security of Bitcoin heavily relies on the motivation-suitable proof-of-work (PoW) founded dispensed consensus protocol, which is run with the aid of the community nodes known as miners. Because of its inception, blockchain technological know-how has proven promising application possibilities. The spectrum of blockchain functions stages from financial, healthcare, automobile, hazard administration, internet of matters (IoT) to public and social offerings. Several reports focal point on utilizing the blockchain information structure in various applications. These vulnerabilities result in the execution of different security threats to the ordinary functionality of Bitcoin. We then examine the feasibility and robustness of the brand new safety solutions. Moreover, we discuss the current anonymity concerns in Bitcoin and the privatenessrelated threats to Bitcoin customers together with the evaluation of the comprehensive privacy-keeping solutions.

Article Details

How to Cite
[1]
Ayushi Singh, Gulafsha Shujaat, Isha Singh, Abhishek Tripathi, and Divya Thakur, “A Survey of Blockchain Technology Security”, Int. J. Comput. Eng. Res. Trends, vol. 6, no. 4, pp. 299–303, Apr. 2019.
Section
Survey

References

A. Ferrag, M. Derdour and. M. Mukherjee, "Blockchain technologies for the internet of things: research," IEEE, 2018.

. B. Carminati, . L. Bahri and . E. Ferrari, “Decentralized privacy preserving services for online social networks,” Online Soc Netw media, 2018.

Z. Zheng , . S. Xie and H.-N. Dai, “Blockchain challenges and opportunities: a survey,” Int. J. Web and Grid Services, vol. 14, 2018.

Unocoin, “What Factors Are Influencing Blockchain Technology,” 2018.

X. Li, P. Jiang, Q. Wen and X. Luo, “A survey on the security of blockchain systems,” Future Generation Computer Systems, 2017.

Z. Zheng, S. Xie and H. Wang, “Blockchain challenges and opportunities: A Survey,” Internat. J. Web Grid Serv., 2016.

M. Ghosh, M. Richardson and B. Ford, “A TORPATH TO TORCOIN, PROOF-OF-BANDWIDTH ALTCOINS FOR COMPENSATING RELAYS”.

Intel, “Proof of elapsed time (poet),” 2017.

P. Technologies, “Proof of Authority Chains,” 2017.

A. Gervais, G. Karame and V. Glykantzis, “On the security and performance of proof of work blockchains,,” SIGSAC Conference on Computer and Communications Security, 2016.

W. J. Gordo and C. Catalini, “Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability,” Computational and Structural Biotechnology Journal, 2018.

M. Hölbl, A. Kamišali´ and L. N. Zlatolas, “A Systematic Review of the Use of Blockchain,” Symmetry 2018, 2018.

P. Novotny, D. N. Dillenberger and R. Vaculin, “Permissioned Blockchain Technologies for”.

K. Yilmaz, “Comparison of Permissioned Blockchains,” Coinmonks.

H. Mayer, “ECDSA Security in Bitcoin and Ethereum: a Research,” 2016.

S. Alliance, “Know your ransomware: Ctb-locker,” 2017.

N. Christin, “Traveling the silk road: A measurement analysis of a large anonymous,” The 22nd International Conference on World wide, 2017.

A. Miller, M. Möser, K. Lee and A. Narayanan, “An empirical analysis of linkability in the monero blockchain,” ArXiv preprint, 2017.

E. community, “Official Go implementation of the Ethereum protocol,” 2017.

B. Bodó, J. P. Quintais and D. Gervais, “Blockchain and smart contracts: the missing link in copyright licensing,” International Journal of Law and Information Technology, vol. 26, no. 4, 2018.

Z. Zheng, S. Xie and H.-N. Dai, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” IEEE International Congress on Big Data, 2017.

M. Bartoletti, T. Cimoli and L. Pompianu, “Blockchain for social good: a quantitative analysis,” Goodtechs, 2018.

A. Kosba, C. Papamanthou and . A. Miller, “Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,” IEEE Symposium on Security and Privacy, 2016.