Affiliations Dept. Computer Science Engineering, Buddha Institute of Technology,Gorakhpur (U.P.), India
Bitcoin is a popular cryptocurrency that records all transactions in an allotted append-handiest public ledger referred to as a blockchain. The security of Bitcoin heavily relies on the motivation-suitable proof-of-work (PoW) founded dispensed consensus protocol, which is run with the aid of the community nodes known as miners. Because of its inception, blockchain technological know-how has proven promising application possibilities. The spectrum of blockchain functions stages from financial, healthcare, automobile, hazard administration, internet of matters (IoT) to public and social offerings. Several reports focal point on utilizing the blockchain information structure in various applications. These vulnerabilities result in the execution of different security threats to the ordinary functionality of Bitcoin. We then examine the feasibility and robustness of the brand new safety solutions. Moreover, we discuss the current anonymity concerns in Bitcoin and the privateness-related threats to Bitcoin customers together with the evaluation of the comprehensive privacy-keeping solutions.
Ayushi Singh,Gulafsha Shujaat,Isha Singh,Abhishek Tripathi,Divya Thakur."A Survey of Blockchain Technology Security ". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 04,pp.299-303, April - 2019, URL :https://ijcert.org/ems/ijcert_papers/V6I401.pdf,
Keywords : Blockchain, Bitcoin, Peer to Peer digital currency
 A. Ferrag, . M. Derdour and . M. Mukherjee, â€œBlockchain technologies for the internet of things: research,â€ IEEE, 2018.
 . B. Carminati, . L. Bahri and . E. Ferrari, â€œDecentralized privacy preserving services for online social networks,â€ Online Soc Netw media, 2018.
 Z. Zheng , . S. Xie and H.-N. Dai, â€œBlockchain challenges and opportunities: a survey,â€ Int. J. Web and Grid Services, vol. 14, 2018.
 Unocoin, â€œWhat Factors Are Influencing Blockchain Technology,â€ 2018.
 X. Li, P. Jiang, Q. Wen and X. Luo, â€œA survey on the security of blockchain systems,â€ Future Generation Computer Systems, 2017.
 Z. Zheng, S. Xie and H. Wang, â€œBlockchain challenges and opportunities: A Survey,â€ Internat. J. Web Grid Serv., 2016.
 M. Ghosh, M. Richardson and B. Ford, â€œA TORPATH TO TORCOIN, PROOF-OF-BANDWIDTH ALTCOINS FOR COMPENSATING RELAYSâ€.
 Intel, â€œProof of elapsed time (poet),â€ 2017.
 P. Technologies, â€œProof of Authority Chains,â€ 2017.
 A. Gervais, G. Karame and V. Glykantzis, â€œOn the security and performance of proof of work blockchains,,â€ SIGSAC Conference on Computer and Communications Security, 2016.
 W. J. Gordo and C. Catalini, â€œBlockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability,â€ Computational and Structural Biotechnology Journal, 2018.
 M. HÃ¶lbl, A. KamiÅ¡aliÂ´ and L. N. Zlatolas, â€œA Systematic Review of the Use of Blockchain,â€ Symmetry 2018, 2018.
 P. Novotny, D. N. Dillenberger and R. Vaculin, â€œPermissioned Blockchain Technologies forâ€.
 K. Yilmaz, â€œComparison of Permissioned Blockchains,â€ Coinmonks.
 H. Mayer, â€œECDSA Security in Bitcoin and Ethereum: a Research,â€ 2016.
 S. Alliance, â€œKnow your ransomware: Ctb-locker,â€ 2017.
 N. Christin, â€œTraveling the silk road: A measurement analysis of a large anonymous,â€ The 22nd International Conference on World wide, 2017.
 A. Miller, M. MÃ¶ser, K. Lee and A. Narayanan, â€œAn empirical analysis of linkability in the monero blockchain,â€ ArXiv preprint, 2017.
 E. community, â€œOfficial Go implementation of the Ethereum protocol,â€ 2017.
 B. BodÃ³, J. P. Quintais and D. Gervais, â€œBlockchain and smart contracts: the missing link in copyright licensing,â€ International Journal of Law and Information Technology, vol. 26, no. 4, 2018.
 Z. Zheng, S. Xie and H.-N. Dai, â€œAn Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,â€ IEEE International Congress on Big Data, 2017.
 M. Bartoletti, T. Cimoli and L. Pompianu, â€œBlockchain for social good: a quantitative analysis,â€ Goodtechs, 2018.
 A. Kosba, C. Papamanthou and . A. Miller, â€œHawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,â€ IEEE Symposium on Security and Privacy, 2016.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.