BLOCKCHAIN IN SECURITY: EVOLUTION, PPLICATIONS AND CHALLENGES

Dr. Maassoumeh (Afsaneh) Javadi

Abstract


Currently, blockchain as a core technology of many application has received attention. It is actually a distributed database which maintains a data record list that continuously grows. The secured distributed key behind of blockchain have the potential to address many online transactional applications such as Bitcoin. Due to increasing the usage of blockchain technology, especially in security- based applications, in this paper, we provide an analysis of security issues in the blockchain. Furthermore, we will discuss some use cases as well as challenges in this area

Keywords


Bitcoin, Blockchain, Encryption, Security,

Full Text:

PDF

References


https://blockchain.info

Transparency Market Research, Available online https://www.transparencymarketresearch.com/ blockchain-technology-market.html

https://bitcoin.org/en

A. Antonopoulus, “Mastering Bitcoin: Programming the Open Blockchain”, 2nd Edition, O’Reilly Press, 2017.

I. Eyal, A.E. Gencer, E.G. Sirer, and R. Renesse, “Bitcoin-NG: A scalable blockchain protocol”, In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), CA, USA, February 2016.

https://en.wikipedia.org/wiki/Block_chain_(database)

J. Park, and J. Park, “Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions”, Symmetry, vol.9, no.8, 2017, 9.164.10.3390/sym9080164.

M. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends”, IEEE International Congress on Big Data (BigData Congress),USA,2017, DOI: 10.1109/BigDataCongress.2017.85

https://en.wikipedia.org/wiki/Bitcoin_network/

K. Fanning, and D. P. Centers, “Blockchain and its coming impact on financial services”, Journal of Corporate Accounting & Finance, vol.27, no.5, p.p.53-57, 2016.

A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “Medrec: Using blockchain for medical data access and permission management”, IEEE International Conference on Open and Big Data (OBD), pp.25-30, USA, 2016.

S. Underwood, “Blockchain beyond bitcoin”, Communications of the ACM, vol.59, no.11, p.p.15-17, 2016.

P.B. Samuel, “The Primary Challenge to Blockchain Technology”, Available online at https:// www.forbes.com, 2017.

M. Kiran, and M. Stannett, “Bitcoin risk analysis” Available: http://www.nemode.ac.uk/wp-content/ uploads/2015/02/2015-Bit-Coin-risk-analysis.pdf , Dec. 2014

G. Wood, “Ethereum: A secure decentralized generalized transaction ledger”, Ethereum Project Yellow Paper, vol.151, 2014.

N. Yamada, M. Tsukuda, J. Nemoto, K, Naganuma, N. Nishijima and T. Sato “Work on the Potential and Challenges of Blockchain Technology”, Hitachi Review, vol.66, no.1, p.p.31-35, 2017.

A. Lielacher, “Five Challenges Blockchain Technology Must Overcome Before Mainstream Adoption”, Bitcoin Magazine, January 2018.

G. Zyskind, and O. Nathan, “Decentralizing privacy: Using blockchain to protect personal data”, IEEE Security and Privacy Workshops (SPW), pp.180-184, 2015.

M. Pilkington, “Blockchain technology: principles and applications”, Research handbook on digital transformations, p.p.225-235, 2016.

A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C.P.A. Ogah, and Z. Sun, “Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems”, IEEE Internet of Things Journal, vol.4, no.6, pp.1832-1843, 2017.

S. Singh and N. Singh, “Blockchain: Future of financial and cyber security”, 2nd International IEEE Conference on Contemporary Computing and Informatics (IC3I), p.p.463-467, India, 2016.

Framework for Blockchain-based business integration, online: https://medium.com/@UnibrightIO/ blockchain-evolution-from-1-0-to-4-0-3fbdbccfc666 , 2017.

M. Conti, S. Kumar, C. Lal and S. Ruj, “A Survey on Security and Privacy Issues of Bitcoin”, IEEE Communications Surveys & Tutorials, 2018, DOI: 10.1109/COMST.2018.2842460




DOI: https://doi.org/10.26483/ijarcs.v13i5.6913

Refbacks

  • There are currently no refbacks.




Copyright (c) 2022 International Journal of Advanced Research in Computer Science