Abstract
The report starts with an overview of the blockchain security system and then highlights the specific security threats and summarizes them. We review with some comments and possible research direction. This survey, we examines the security issues of blockchain model related technologies and their applications. The blockchain is considered a still growing like the internet in 1990. It has the potential to disrupt so many technology areas in the future. But as a new underdeveloped field, it is suffering many setbacks mostly resulting from the security area. Its security concerns coming not only from distributed/decentralized computing issue or Cryptography algorithm issue, from some unexpected field too. Here, in this paper, we tried to classify the security concerns for the blockchain based on our survey from recent research papers. We also tried to show which way blockchain development trends are going.
















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Amine Ferrag M, Derdour M, Mukherjee M, Derhab A (2018) Blockchain technologies for the internet of things: research issues and challenges. IEEE, New York
Avanade (2018) Cloud solutions that deliver the speed you need to become a digital business. Avanade, Seattle
Bahri L, Carminati B, Ferrari E (2018) Decentralized privacy preserving services for online social networks. Online Soc Netw Media 6:18–25
Bennett R, Pickering M, Sargent J (2018) Innovations in land data governance: unstructured data, nosql, blockchain, and big data analytics unpacked. In: Land and poverty conference 2018. Land governance in an interconnected world, Washington, DC, 19–23 Mar 2018
Bernstein DJ, Lange T (2014) Safecurves: choosing safe curves for elliptic-curve cryptography. University of Illinois, Chicago
Boireau O (2018) Securing the blockchain against hackers. Netw Secur 2018(1):8–11
Buntinx J (2017) What is bitcoin fungibility. The Merkle, London
Foundation E (ed.) (n.d.) Privacy on the Blockchain. Retrieved November 01, 2018, from https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/
Buterin V (n.d.) Ethereum Project. Retrieved November 1, 2018, from http://www.ethereum.org/
Decker C, Wattenhofer R (2013) Information propagation in the Bitcoin network. IEEE P2P 2013 Proceedings, pp. 1–10
Choo R, He X, Lin C, He D, Vasilakos AV (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Netw Comput Appl 116:42–52
Carey JE, Gerard SN (2018) U.S. Patent Application No. 15/374,493
Chen Y, Li Q, Wang H (2018) Towards Trusted Social Networks with Blockchain Technology. arXiv preprint: arXiv:1801.02796
Cichosz SL, Stausholm MN, Kronborg T, Vestergaard P, Hejlesen O (2018) How to use blockchain for diabetes health care data and access management: an operational concept. J Diab Sci technol. https://doi.org/10.1177/1932296818790281
Cimpanu C (2017) 74% of all Bitcoin-Related Sites Suffered a DDoS Attack. Retrieved November 1, 2018, from https://www.bleepingcomputer.com/news/security/74-percent-of-all-bitcoin-related-sites-suffered-a-ddos-attack/
Clauson KA, Breeden EA, Davidson C, Mackey TK (2018) Leveraging blockchain technology to enhance supply chain management in Healthcare. Blockchain in Healthcare Today
Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 39:283–297
Dataeum: First Blockchain Solution that Produces 100% Accurate Data through Crowdsourcing (2018) Retrieved November 1, from https://www.cnbcafrica.com/apo/2018/04/12/dataeum-first-blockchain-solution-that-produces-100-accurate-data-through-crowdsourcing/
de Vries A (2018) Bitcoin’s growing energy problem. Joule 2(5):801–805
Android random number flaw implicated in Bitcoin thefts (2013) Retrieved November 1, 2018, from https://nakedsecurity.sophos.com/2013/08/12/android-random-number-flaw-implicated-in-bitcoin-thefts/
Ducklin P (2018) What are “WannaMine” attacks, and how do I avoid them? Retrieved from https://nakedsecurity.sophos.com/2018/01/31/what-are-wannamine-attacks-and-how-do-i-avoid-them/
Eskandari S, Leoutsarakos A, Mursch T, Clark J (2018) A first look at browser-based cryptojacking. arXiv preprint arXiv:1803.02887
Funk E, Riddell J, Ankel F, Cabrera D (2018) Blockchain technology: a data framework to improve validity, trust, and accountability of information exchange in health professions education. Acad Med 93(12):1791–1794
Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Network, New York
Gräther W, Kolvenbach S, Ruland R, Schütte J, Torres C, Wendland F (2018) Blockchain for education: lifelong learning passport. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)
Grover LK (1996) Fast quantum mechanical algorithm for database search. In: ACM symposium on the theory of computing, pp 212–219
Grover LK (1997) Quantum mechanics helps in searching for a needle in a haystack. Phys Rev Lett 78:325–328
Hegadekatti V, Hegadekatti K (2018) Blockchain applications in medical sciences. Int J Sci Res 7(4)
Heilman E, Zohar A, Goldberg S (2015) Eclipse attacks on bitcoin’s peer-to peer network. In: USENIX conference on security symposium, pp 129–144
Huang X, Xu C, Wang P, Liu H (2018) LNSC: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access 6:13565–13574
Hunt GD, Koved L (2018) U.S. Patent Application No. 15/372,068
IDC (2012) Executive summary: a universe of opportunities and challenges. IDC, Framingham
Jain A, Jain A, Chauhan N, Singh V, Thakur N (2018) Seguro Digital storage of documents using Blockchain
Jiao Y, Wang P, Niyato D, Xiong Z (2018) Social welfare maximization auction in edge computing resource allocation for mobile blockchain. In: 2018 IEEE international conference on communications (ICC), pp 1–6. IEEE, New York
Kim H-W, Jeong Y-S (2018) Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain. Hum-Centric Comput Inf Sci 8(1):11
Lee J-H (2018) Bidaas: blockchain based id as a service. IEEE Access 6:2274–2278
Li GD, Jenni Kassem M (2018) Blockchain in the built environment: analysing current applications and developing an emergent framework. Northumbria, Newcastle
Li M, Weng J, Yang A, Lu W, Zhang Y, Hou L, Liu J-N, Xiang Y, Deng RH (2017) Crowdbc: a blockchain-based decentralized framework for crowdsourcing. In: Technical report, IACR Cryptology, ePrint archive, University of California, Santa Barbara, vol 444
Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing, pp 468–477. IEEE Press, New York
Lin C, He D, Huang X, Choo K-KR, Vasilakos A V (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116:42–52
Lu Y, Tang Q, Wang G (2018) Zebralancer: private and anonymous crowdsourcing system atop open blockchain. arXiv preprint: arXiv:1803.01256
Maria A, Zohar V (2017) Hijacking bitcoin: routing attacks on cryptocurrencies,. In: IEEE symposium on security and privacy, pp 375–392
Menn J (2013) Exclusive: secret contract tied NSA and security industry pioneer. Retrieved November 1, 2018, from https://www.reuters.com/article/us-usa-security-rsa/exclusive-secret-contract-tied-nsa-and-security-industry-pioneer-idUSBRE9BJ1C220131220
Musch M, Wressnegger C, Johns M, Rieck K (2018) Web-based cryptojacking in the wild. arXiv preprint: arXiv:1808.09474
Nowiński W, Kozma M (2017) How can blockchain technology disrupt the existing business models? Entrep Bus Econ Rev 5(3):173–188
List Of High Profile Cryptocurrency Hacks So Far (August 24th 2017). (2017, August 24). Retrieved November 1, 2018, from http://storeofvalueblog.com/posts/cryptocurrency-hacks-so-far-august-24th/
Otte P, de Vos M, Pouwelse J (2017) Trustchain: a sybil-resistant scalable blockchain. Future Gener Comput Syst
Keutmann (2018) Keutmann/Trustchain. Retrieved November 1, 2018, from https://github.com/keutmann/Trustchain
Poon J, Buterin V (2017) Plasma: Scalable autonomous smart contracts. White paper
Prinz W (2018) Blockchain and CSCW—shall we care? In: Proceedings of 16th European conference on computer-supported cooperative work-exploratory papers. European Society for Socially Embedded Technologies (EUSSET)
Qin D, Wang C, Jiang Y (2018) Rpchain: a blockchain-based academic social networking service for credible reputation building. In: International conference on blockchain. Springer, New York, pp 183–198
The IRS Has a Way to ID Bitcoin Tax Cheats (n.d.) Retrieved November 1, 2018, from http://fortune.com/2017/08/22/irs-tax-cheats-bitcoin-chainalysis/
Schneier on Security (2007) Retrieved November 1, 2018, from https://www.schneier.com/essays/archives/2007/11/did_nsa_put_a_secret.html
Schneier NFB (2003) Practical cryptography. Wiley, Indianapolis
Shah SN (2018) Distributed electronic document review in a blockchain system and computerized scoring based on textual and visual feedback, 16 Jan 2018. US patent 9870591
Nilsson K (2017) Breaking open the MtGox case, part 1. Retrieved November 1, 2018, from https://blog.wizsec.jp/2017/07/breaking-open-mtgox-1.html
Stevens M, Pierre K, Albertini A, Markov Y, Bursztein E (2017) The first collision for full SHA-1. In: Katz J, Shacham H (eds) Advances in cryptology–crypto 2017. Springer, New York
Swan M, Brunswicker S (2018) Blockchain economic networks and algorithmic trust. In: AMCIS 2018
Turkanović M, Hölbl M, Košič K, Heričko M, Kamišalić A (2018) Eductx: a blockchain-based higher education credit platform. IEEE Access 6:5112–5127
University Stanford (2011) Pertinent side channel attacks on elliptic curve cryptographic systems. Stanford University, Stanford
Vo HT, Kundu A, Mohania MK (2018) Research directions in blockchain data management and analytics. In: EDBT, pp 445–448
Wang F (2015) Eclipse attacks on bitcoin’s peer-to-peer network. https://medium.com/mit-security-seminar/eclipse-attacks-on-bitcoin-s-peer-to-peer-network-e0da797302c2
Wang Q, Qin B, Hu J, Xiao F (2017) Preserving transaction privacy in bitcoin. Future Generation Comput Syst. https://doi.org/10.1016/j.future.2017.08.026
Wang S, Taha A, Wang J (2018) Blockchain-assisted crowdsourced energy systems. arXiv preprint: arXiv:1802.03099
Weaknesses. (n.d.). Retrieved November 1, 2018, from https://en.bitcoin.it/wiki/Weaknesses
Wirth C, Kolain M (2018) Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)
Zhang R (2018) Blockchain scalability: prospective solutions for bitcoin, ethereum, and other blockchain networks
Zhao H, Bai P, Peng Y, Xu R (2018) Efficient key management scheme for health blockchain. CAAI Trans Intell Technol 3(2):75–82
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Dasgupta, D., Shrein, J.M. & Gupta, K.D. A survey of blockchain from security perspective. J BANK FINANC TECHNOL 3, 1–17 (2019). https://doi.org/10.1007/s42786-018-00002-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s42786-018-00002-6