Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

A Survey of Blockchain Technology Security

Ayushi Singh, Gulafsha Shujaat, Isha Singh, Abhishek Tripathi, Divya Thakur
Affiliations
Dept. Computer Science Engineering, Buddha Institute of Technology,Gorakhpur (U.P.), India
:10.22362/ijcert/2019/v6/i04/v6i0401


Abstract
Bitcoin is a popular cryptocurrency that records all transactions in an allotted append-handiest public ledger referred to as a blockchain. The security of Bitcoin heavily relies on the motivation-suitable proof-of-work (PoW) founded dispensed consensus protocol, which is run with the aid of the community nodes known as miners. Because of its inception, blockchain technological know-how has proven promising application possibilities. The spectrum of blockchain functions stages from financial, healthcare, automobile, hazard administration, internet of matters (IoT) to public and social offerings. Several reports focal point on utilizing the blockchain information structure in various applications. These vulnerabilities result in the execution of different security threats to the ordinary functionality of Bitcoin. We then examine the feasibility and robustness of the brand new safety solutions. Moreover, we discuss the current anonymity concerns in Bitcoin and the privateness-related threats to Bitcoin customers together with the evaluation of the comprehensive privacy-keeping solutions.


Citation
Ayushi Singh,Gulafsha Shujaat,Isha Singh,Abhishek Tripathi,Divya Thakur."A Survey of Blockchain Technology Security ". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 04,pp.299-303, April - 2019, URL :https://ijcert.org/ems/ijcert_papers/V6I401.pdf,


Keywords : Blockchain, Bitcoin, Peer to Peer digital currency

References
[1] 	A. Ferrag, . M. Derdour and . M. Mukherjee, “Blockchain technologies for the internet of things: research,” IEEE, 2018. 
[2] 	. B. Carminati, . L. Bahri and . E. Ferrari, “Decentralized privacy preserving services for online social networks,” Online Soc Netw media, 2018. 
[3] 	Z. Zheng , . S. Xie and H.-N. Dai, “Blockchain challenges and opportunities: a survey,” Int. J. Web and Grid Services, vol. 14, 2018. 
[4] 	Unocoin, “What Factors Are Influencing Blockchain Technology,” 2018.
[5] 	X. Li, P. Jiang, Q. Wen and X. Luo, “A survey on the security of blockchain systems,” Future Generation Computer Systems, 2017. 
[6] 	Z. Zheng, S. Xie and H. Wang, “Blockchain challenges and opportunities: A Survey,” Internat. J. Web Grid Serv., 2016. 
[7] 	M. Ghosh, M. Richardson and B. Ford, “A TORPATH TO TORCOIN, PROOF-OF-BANDWIDTH ALTCOINS FOR COMPENSATING RELAYS”. 
[8] 	Intel, “Proof of elapsed time (poet),” 2017. 
[9] 	P. Technologies, “Proof of Authority Chains,” 2017. 
[10] 	A. Gervais, G. Karame and V. Glykantzis, “On the security and performance of proof of work blockchains,,” SIGSAC Conference on Computer and Communications Security, 2016. 
[11] 	W. J. Gordo and C. Catalini, “Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability,” Computational and Structural Biotechnology Journal, 2018. 
[12] 	M. Hölbl, A. Kamišali´ and L. N. Zlatolas, “A Systematic Review of the Use of Blockchain,” Symmetry 2018, 2018. 
[13] 	P. Novotny, D. N. Dillenberger and R. Vaculin, “Permissioned Blockchain Technologies for”.
[14] 	K. Yilmaz, “Comparison of Permissioned Blockchains,” Coinmonks.
[15] 	H. Mayer, “ECDSA Security in Bitcoin and Ethereum: a Research,” 2016. 
[16] 	S. Alliance, “Know your ransomware: Ctb-locker,” 2017.
[17] 	N. Christin, “Traveling the silk road: A measurement analysis of a large anonymous,” The 22nd International Conference on World wide, 2017. 
[18] 	A. Miller, M. Möser, K. Lee and A. Narayanan, “An empirical analysis of linkability in the monero blockchain,” ArXiv preprint, 2017. 
[19] 	E. community, “Official Go implementation of the Ethereum protocol,” 2017.
[20] 	B. Bodó, J. P. Quintais and D. Gervais, “Blockchain and smart contracts: the missing link in copyright licensing,” International Journal of Law and Information Technology, vol. 26, no. 4, 2018. 
[21] 	Z. Zheng, S. Xie and H.-N. Dai, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” IEEE International Congress on Big Data, 2017. 
[22] 	M. Bartoletti, T. Cimoli and L. Pompianu, “Blockchain for social good: a quantitative analysis,” Goodtechs, 2018. 
[23] 	A. Kosba, C. Papamanthou and . A. Miller, “Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,” IEEE Symposium on Security and Privacy, 2016. 


DOI Link : https://doi.org/10.22362/ijcert/2019/v6/i04/v6i0401

Download :
  V6I401.pdf


Refbacks : Currently there are no Refbacks

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to [email protected]