Affiliations Dept. Computer Science Engineering, Buddha Institute of Technology,Gorakhpur (U.P.), India
Bitcoin is a popular cryptocurrency that records all transactions in an allotted append-handiest public ledger referred to as a blockchain. The security of Bitcoin heavily relies on the motivation-suitable proof-of-work (PoW) founded dispensed consensus protocol, which is run with the aid of the community nodes known as miners. Because of its inception, blockchain technological know-how has proven promising application possibilities. The spectrum of blockchain functions stages from financial, healthcare, automobile, hazard administration, internet of matters (IoT) to public and social offerings. Several reports focal point on utilizing the blockchain information structure in various applications. These vulnerabilities result in the execution of different security threats to the ordinary functionality of Bitcoin. We then examine the feasibility and robustness of the brand new safety solutions. Moreover, we discuss the current anonymity concerns in Bitcoin and the privateness-related threats to Bitcoin customers together with the evaluation of the comprehensive privacy-keeping solutions.
Ayushi Singh,Gulafsha Shujaat,Isha Singh,Abhishek Tripathi,Divya Thakur."A Survey of Blockchain Technology Security ". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 04,pp.299-303, April - 2019, URL :https://ijcert.org/ems/ijcert_papers/V6I401.pdf,
Keywords : Blockchain, Bitcoin, Peer to Peer digital currency
 A. Ferrag, . M. Derdour and . M. Mukherjee, “Blockchain technologies for the internet of things: research,” IEEE, 2018.
 . B. Carminati, . L. Bahri and . E. Ferrari, “Decentralized privacy preserving services for online social networks,” Online Soc Netw media, 2018.
 Z. Zheng , . S. Xie and H.-N. Dai, “Blockchain challenges and opportunities: a survey,” Int. J. Web and Grid Services, vol. 14, 2018.
 Unocoin, “What Factors Are Influencing Blockchain Technology,” 2018.
 X. Li, P. Jiang, Q. Wen and X. Luo, “A survey on the security of blockchain systems,” Future Generation Computer Systems, 2017.
 Z. Zheng, S. Xie and H. Wang, “Blockchain challenges and opportunities: A Survey,” Internat. J. Web Grid Serv., 2016.
 M. Ghosh, M. Richardson and B. Ford, “A TORPATH TO TORCOIN, PROOF-OF-BANDWIDTH ALTCOINS FOR COMPENSATING RELAYS”.
 Intel, “Proof of elapsed time (poet),” 2017.
 P. Technologies, “Proof of Authority Chains,” 2017.
 A. Gervais, G. Karame and V. Glykantzis, “On the security and performance of proof of work blockchains,,” SIGSAC Conference on Computer and Communications Security, 2016.
 W. J. Gordo and C. Catalini, “Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability,” Computational and Structural Biotechnology Journal, 2018.
 M. Hölbl, A. Kamišali´ and L. N. Zlatolas, “A Systematic Review of the Use of Blockchain,” Symmetry 2018, 2018.
 P. Novotny, D. N. Dillenberger and R. Vaculin, “Permissioned Blockchain Technologies for”.
 K. Yilmaz, “Comparison of Permissioned Blockchains,” Coinmonks.
 H. Mayer, “ECDSA Security in Bitcoin and Ethereum: a Research,” 2016.
 S. Alliance, “Know your ransomware: Ctb-locker,” 2017.
 N. Christin, “Traveling the silk road: A measurement analysis of a large anonymous,” The 22nd International Conference on World wide, 2017.
 A. Miller, M. Möser, K. Lee and A. Narayanan, “An empirical analysis of linkability in the monero blockchain,” ArXiv preprint, 2017.
 E. community, “Official Go implementation of the Ethereum protocol,” 2017.
 B. Bodó, J. P. Quintais and D. Gervais, “Blockchain and smart contracts: the missing link in copyright licensing,” International Journal of Law and Information Technology, vol. 26, no. 4, 2018.
 Z. Zheng, S. Xie and H.-N. Dai, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” IEEE International Congress on Big Data, 2017.
 M. Bartoletti, T. Cimoli and L. Pompianu, “Blockchain for social good: a quantitative analysis,” Goodtechs, 2018.
 A. Kosba, C. Papamanthou and . A. Miller, “Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,” IEEE Symposium on Security and Privacy, 2016.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.