Skip to main content
Log in

Portrait of decentralized application users: an overview based on large-scale Ethereum data

  • Regular Paper
  • Published:
CCF Transactions on Pervasive Computing and Interaction Aims and scope Submit manuscript

Abstract

Decentralized application (DApp) is an emerging technology designed to address distrust, privacy, and security issues. However, we note that the research community in human factors has not conducted in-depth research on user behavior in this unique distributed environment yet. In this paper, unlike a small sample of user interviews, we attempt to profile DApp users through publicly available data. Using Ethereum as an example, we build a series of datasets containing more than 73.8 million transactions generated by 230,000 addresses. By transforming hexadecimal addresses into readable application names, we analyze the behavioral characteristics of the user based on the categories of DApp. Furthermore, we apply an unsupervised clustering method on the 230,000 addresses to distinguish investors and players and analyze their behavioral patterns and sensitivity to blockchain markets, such as ETH prices. In addition, we implement heuristics to demonstrate how blockchain data mining can facilitate practical systems, including anomaly detection and recommend systems. Finally, we discuss future directions for studying human factors in a decentralized context and hope that this work will attract more research attention and support the development of DApp and further Metaverse ecosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. https://dappradar.com/.

  2. https://dapptotal.com/.

  3. https://www.stateofthedapps.com/.

  4. https://etherscan.io/.

  5. https://github.com/Gullintani/BlockchainDataAnalysis.

  6. https://www.cryptokitties.co/.

  7. https://bitcointalk.org/.

  8. https://eos.io/.

References

  • Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: Proceedings of the 20th International Conference on Very Large Data Bases, VLDB ’94, p. 487–499. Morgan Kaufmann Publishers Inc., San Francisco(1994)

  • Bellotti, V., Carroll, J.M., Han, K.: Random acts of kindness: the intelligent and context-aware future of reciprocal altruism and community collaboration. In: 2013 International Conference on Collaboration Technologies and Systems (CTS), pp. 1–12 (2013)

  • Bellotti, V.M., Cambridge, S., Hoy, K., Shih, P.C., Handalian, L.R., Han, K., Carroll, J.M.: Towards community-centered support for peer-to-peer service exchange: Rethinking the timebanking metaphor. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’14, p. 2975–2984. Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2556288.2557061

  • Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in a bitcoin p2p network.In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS ’14, p. 15–29. Association for ComputingMachinery, New York, NY, USA (2014).

  • Cai, W., Wang, Z., Ernst, J., Hong, Z., Feng, C.: Decentralized applications: the blockchain-empowered software system. IEEE Access 6, 53019–53033 (2018). https://doi.org/10.1109/ACCESS.2018.2870644

    Article  Google Scholar 

  • Carroll, J.M., Bellotti, V.: Creating value together: the emerging design space of peer-to-peer currency and exchange. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW ’15, p. 1500–1510. Association for Computing Machinery, New York (2015). https://doi.org/10.1145/2675133.2675270

  • Chan, W., Olmsted, A.: Ethereum transaction graph analysis, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 498–500, (2017)

  • Chen, T., Zhu, Y., Li, Z., Chen, J., Li, X., Luo, X., Lin, X., Zhange, X.: Understanding Ethereum via Graph Analysis, IEEE Conference on Computer Communications, pp. 1484–1492, (2018)

  • Coindesk.: A David vs. Goliath battle is brewing in ethereum decentralized exchange race. (2019). https://www.coindesk.com/bancor-uniswap-dex-competition

  • DAppTotal.: Eth-all time-active dapps. (2020). https://dapptotal.com/analytics

  • Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’92, p. 139–147. Springer, Berlin (1992)

  • Elsden, C., Manohar, A., Briggs, J., Harding, M., Speed, C., Vines, J.: Making sense of blockchain applications: a typology for HCI. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI ’18, p. 1–14. Association for Computing Machinery, New York (2018). https://doi.org/10.1145/3173574.3174032

  • Ethereum.: Contract ABI specification. (2020a). https://solidity.readthedocs.io/en/v0.5.3/abi-spec.html

  • Ethereum.: Web3.js documentation. (2020b). https://web3js.readthedocs.io/en/v1.2.6/

  • Etherscan.: Ether daily price (USD) chart. (2020a). https://etherscan.io/chart/etherprice

  • Etherscan.: Ethereum unique addresses chart. (2020b). https://etherscan.io/chart/address

  • Gao, X., Clark, G.D., Lindqvist, J.: Of two minds, multiple addresses, and one ledger: characterizing opinions, knowledge, and perceptions of bitcoin across users and non-users. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI ’16, p. 1656–1668. Association for Computing Machinery, New York (2016). https://doi.org/10.1145/2858036.2858049

  • Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, p. 3–16. Association for Computing Machinery, New York (2016). https://doi.org/10.1145/2976749.2978341

  • Jourdan, M., Blandin, S., Wynter, L., Deshpande, P.: Characterizing entities in the bitcoin blockchain. 55–62. (2018). https://doi.org/10.1109/ICDMW.2018.00016

  • King, S., and S. Nadal, Ppcoin: Peer-to-peer crypto-currency with proof-of-stake, pp. 1, August 19, (2012).

  • Kohonen, T.: The self-organizing map. Proc. IEEE 78(9), 1464–1480 (1990). https://doi.org/10.1109/5.58325

    Article  Google Scholar 

  • Krombholz, K., Judmayer, A., Gusenbauer, M., Weippl, E.: The other side of the coin: user experiences with bitcoin security and privacy. In: Grossklags, J., Preneel, B. (eds.) Financial Cryptography and Data Security, pp. 555–580. Springer, Berlin (2017)

    Chapter  Google Scholar 

  • Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: Characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, IMC ’13, p. 127–140. Association for Computing Machinery, New York, NY, USA (2013).

  • Olson, J.S., Kellogg, W.A.: Ways of Knowing in HCI. Springer Publishing Company, Incorporated, Berlin (2014)

    Book  Google Scholar 

  • Presthus, W., O’Malley, N.O.: Motivations and barriers for end-user adoption of bitcoin as digital currency. Procedia Comput. Sci. 121, 89–97 (2017). https://doi.org/10.1016/j.procs.2017.11.013. CENTERIS 2017—International Conference on ENTERprise Information Systems/ProjMAN 2017—International Conference on Project MANagement/HCist 2017—International Conference on Health and Social Care Information Systems and Technologies, CENTERIS/ProjMAN/HCist 2017

  • Prinz, W.: Blockchain and CSCW—shall we care? (2018). https://doi.org/10.18420/ecscw2018_13

  • Ranshous, S., Joslyn, C., Kreyling, S., Nowak, K., Samatova, N., West, C., Winters, S.: Exchange pattern mining in the bitcoin transaction directed hypergraph, Financial Cryptography and Data Security (FC 2017), Springer, pp. 248–263 (2017). https://doi.org/10.1007/978-3-319-70278-0_16

  • Thielsch, M.T., Blotenberg, I., Jaron, R.: User evaluation of websites: from first impression to recommendation. Interact. Comput. 26(1), 89–102 (2013). https://doi.org/10.1093/iwc/iwt033

    Article  Google Scholar 

  • Werbach, K.: Trust, but verify: why the blockchain needs the law. Berkeley Technol. Law J. 33, 487 (2017)

    Google Scholar 

  • Wiki.: Initial coin offering. (2020). https://en.wikipedia.org/wiki/Initial_coin_offering

  • Wood, D.: Ethereum: a secure decentralised generalised transaction ledger, Yellow Paper (2014). http://gavwood.com/paper.pdf.

  • Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564 (2017)

Download references

Acknowledgements

This work was supported by Shenzhen Science and Technology Program (Grant No. JCYJ20210324124205016).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Cai.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Min, T., Cai, W. Portrait of decentralized application users: an overview based on large-scale Ethereum data. CCF Trans. Pervasive Comp. Interact. 4, 124–141 (2022). https://doi.org/10.1007/s42486-022-00094-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42486-022-00094-6

Keywords

Navigation