Enhancing Privacy and Improving Security in Scalable Blockchain
2019, Journal of Southwest Jiaotong University
https://doi.org/10.35741/ISSN.0258-2724.54.5.7Abstract
Bitcoin is a decentralized blockchain-based cryptocurrency that has taken the world by storm. Since its introduction in 2009, it has grown tremendously in terms of popularity and market cap. The idea of having a decentralized public ledger while maintaining anonymity and security attracted the attention of developers and customers alike. Special nodes in the bitcoin network, called miners, are responsible for making the network secure by using a concept called proof-of-work. A certain degree of anonymity is also maintained as no personally identifiable information of a person, like name, address, etc., is linked to the bitcoin wallet. In terms of bitcoin, a user is anonymous if different interactions of the user cannot be linked to each other or the user. Recent research shows that bitcoin is not as anonymous as it appears to be. The inherently public nature of blockchain technology makes it difficult to achieve privacy. The purpose of this paper is to review how varying degrees of ...
References (41)
- BONNEAU, J., MILLER, A., CLARK, J., NARAYANAN, A., KROLL, J.A., and FELTEN, E.W. (2015) SoK: Research perspectives and challenges for bitcoin and cryptocurrencies. Proceedings of the 2015 IEEE Symposium on Security and Privacy, pp. 104-121.
- BARRERA, A. (2014) A guide to bitcoin (part I): A look under the hood. [Online] Available from: http://tech.eu/features/808/bitcoin-part- one/ [Accessed 12/03/19].
- EYAL, I. (2015) The miner's dilemma. Proceedings of the 2015 IEEE Symposium on Security and Privacy, pp. 89-103.
- GERVAIS, A., KARAME, G.O., WU¨ST, K., GLYKANTZIS, V., RITZDORF, H., and CAPKUN, S. (2016) On the security and performance of proof of work blockchains. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3-16.
- ANDROULAKI, E., KARAME, G.O., ROESCHLIN, M., SCHERER, T., and CAPKUN, S. (2013) Evaluating user privacy in bitcoin. Proceedings of the International Conference on Financial Cryptography and Data Security, pp. 34- 51.
- KOSBA, A., MILLER, A., SHI, E., WEN, Z., and PAPAMANTHOU, C. (2016) Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Proceedings of the 2016 IEEE Symposium on, Security and Privacy, pp. 839-858.
- GERVAIS, A., CAPKUN, S., KARAME, G.O., and GRUBER, D. (2014) On the privacy provisions of bloom filters in lightweight bitcoin clients. Proceedings of the 30th Annual Computer Security Applications Conference, pp. 326-335.
- BIRYUKOV, A., KHOVRATOVICH, D., and PUSTOGAROV, I. (2014) Deanonymisation of clients in bitcoin p2p network. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15-29.
- BLOCKCHAIN (2018) Bitcoin address. [Online] Available from: https://blockchain.info/address/1JC6DLS J8PEEsSXViVA8ZvPwWS55RYgMs3 [Accessed 12/03/19].
- BIRYUKOV, A. and PUSTOGAROV, I. (2015) Bitcoin over tor is not a good idea. Proceedings of the 2015 IEEE Symposium on Security and Privacy, pp. 122-134.
- KOGIAS, E.K., JOVANOVIC, P., GAILLY, N., KHOFFI, I., GASSER, L., and FORD, B. (2016) Enhancing bitcoin security and performance with strong consistency via collective signing. Proceedings of the 25th USENIX Security Symposium, pp. 279-296.
- E-LEARNING SPOT (2017) Bitcoin mixing to improve anonymity. [Online] Available from: http://learningspot.altervista.org/bitcoin- mixing-to-improve-anonymity/ [Accessed 15/04/19].
- E-LEARNING SPOT (2017) Bitcoin decentralized mixing. [Online] Available from: http://learningspot.altervista.org/bitcoin- decentralized-mixing/ [Accessed 15/04/19].
- ABDULSHAHEED, H.R., BINTI, S.A., and SADIQ, I.I. (2018) A Review on Smart Solutions Based-On Cloud Computing and Wireless Sensing. International Journal of Pure and Applied Mathematics, 119(18), pp. 461- 486.
- MANGAL, A. (2019) What Is Monero (XMR)? An In-Depth Guide to the Privacy Coin. [Online] Available from: https://coincentral.com/what-is-monero/ [Accessed 20/05/19].
- SASSON, E.B., CHIESA, A., GARMAN, C., GREEN, M., MIERS, I., TROMER, E., and VIRZA, M. (2014) Zerocash: Decentralized anonymous payments from bitcoin. Proceedings of the 2014 IEEE Symposium on Security and Privacy, pp. 459-474.
- TIWARI, A. (2017) Everything about Tor: What is Tor? How Tor works? [Online] Fossbytes. Available from: https://fossbytes.com/everything-tor-tor- tor-works/ [Accessed 25/06/19].
- MILLER, A., JUELS, A., SHI, E., PARNO, B., and KATZ, J. (2014) Permacoin: Repurposing bitcoin work for data preservation. Proceedings of the 2014 IEEE Symposium on Security and Privacy, pp. 475-490.
- BARAZANCHI, I.A., ABDULSHAHEED, H.R., SHAWKAT, S.A., and BINTI, S.R. (2019) Identification key scheme to enhance network performance in wireless body area network. Periodicals of Engineering and Natural Sciences, 7(2), pp. 895-906.
- BDULSHAHEED, H.R., YASEEN, Z.T., and AL-BARAZANCHI, I.I. (2019) New Approach for Big Data Analysis Using Clustering Algorithms in Information. Journal of Advanced Research in Dynamical & Control Systems, 2(4), pp. 1194-1197. [21] ANDRYCHOWICZ, M., DZIEMBOWSKI, S., MALINOWSKI, D., and MAZUREK, L. (2014) Secure multiparty computations on bitcoin. Proceedings of the 2014 IEEE Symposium on Security and Privacy, pp. 443-458.
- ALRUBAYE, A.M.K. (2014) Intrusion Detection System Based on Carpenter / Grossberg Artificial Neural Network. Master Thesis. Department of Computer Science, Middle East University. 参考文
- BONNEAU , J. , MILLER , A. , CLARK , J. , NARAYANAN , A. , KROLL , J.A 。和 FELTEN , E.W 。 (2015 年)索克:比特币和加密货币 的研究前景和挑战。 2015 年电气工程 师学会安全与隐私专题研讨会论文集, 第 104-121 页。
- BARRERA , A. ( 2014 )比特币 指南 (第一部分):深入了解。 [在线]可 从 以 下 网 站 获 得: http://tech.eu/features/808/bitcoin-part- one/ [访问时间 12/03/19]。
- EYAL , I 。(2015 ) 矿 工 的 困 境 。 2015 年电气工程师学会安全与隐私专 题研讨会论文集,第 89-103 页。
- GERVAIS , A. , KARAME , G.O. , WUST , K. , GLYKANTZIS , V. , RITZDORF , H 。和 CAPKUN , S 。 (2016 年),关于工作量证明区块链 的 安 全 性 和 性 能 。 2016 年 ACM SIGSAC 计算机和通信安全会议论文集, 第 3-16 页。
- E. ANDROULAKI,G.O。KARAME, M。ROESCHLIN,T。SCHERER 和 S. CAPKUN,S。(2013)评估比特币中 的用户隐私。金融密码学和数据安全 国际会议论文集,第 34-51 页。
- KOSBA,A.,MILLER,A.,SHI,E., WEN,Z。和 PAPAMANTHOU,C。 (2016 年)鹰:加密和隐私保护智能 合约的区块链模型。 2016 电气工程师 学会安全与隐私专题研讨会论文集, 第 839-858 页。
- GERVAIS , A. , CAPKUN , S. , KARAME , G.O 和 GRUBER , D 。 (2014 年),关于轻量级比特币客户 中盛开过滤器的隐私条款。第 30 届年 度计算机安全应用程序会议论文集, 第 326-335 页。
- BIRYUKOV , A. , KHOVRATOVICH , D. 和 PUSTOGAROV,I.(2014)比特 币 p2p 网络中客户的匿名化。 2014 年 ACM SIGSAC 计算机和通信安全会议 论文集,第 15-29 页。
- 区块链(2018)比特币地址。 [在线]可 从 以 下 网 站 获 得: https://blockchain.info/address/1JC6DLS J8PEEsSXViVA8ZvPwWS55RYgMs3 [访问日期:12/03/19]。
- BIRYUKOV,A。和 PUSTOGAROV, I。(2015)比特币过高并不是一个好 主意。 2015 年电气工程师学会安全与 隐私专题研讨会论文集,第 122-134
- KOGIAS,E.K.,JOVANOVIC,P., GAILLY,N.,KHOFFI,I.,GASSER, L. 和 FORD,B.(2016)通过集体签 名增强比特币的安全性和性能。第 25
- 届 USENIX 安全研讨 会 论 文 集 , 第 279-296 页。 [12] 电子学习点(2017)比特币混合以提 高匿名性。 [ 在 线 ] 可从以下网站获 得: http://learningspot.altervista.org/bitcoin- mixing-to-improve-anonymity/ [ 访问日 期 19/04/15]。 [13] 电子学习点(2017)比特币去中心化 混合。 [ 在 线 ] 可 从以 下 网 站 获 得: http://learningspot.altervista.org/bitcoin- decentralized-mixing/ [ 访问日期: 19/04/15]。
- H.R. ABDULSHAHEED,S.A。BINTI 和 I.I. SADIQ。 (2018)基于云计算 和无线传感的智能解决方案回顾。国 际纯粹数学与应 用数学杂 志,119 (18),第 461-486 页。 [15] MANGAL,A.(2019)什么是门罗币 得: https://coincentral.com/what-is-monero/ [19.05.20 访问]。
- SASSON , E.B. , CHIESA , A. , GARMAN , C.GREEN , M. , MIERS , I. ,TROMER , E。和 VIRZA , M 。 (2014 年)零现金:分散式匿名比特 币付款。 2014 年电气工程师学会安全 与隐私专题研讨会论文集,第 459-474
- 页。 [17] TIWARI,A.(2017)关于托尔的一 切:托尔 是什么 ? 托 尔 是如何工作 的? [ 在 线 ] 字 节 。可 从 以 下 网 站 获 得:https : //fossbytes.com/everything- tor-tor-tor-works/ [访问时间:19/06/25]。
- MILLER,A.,JUELS,A.,SHI,E., PARNO,B. 和 KATZ,J.(2014)永 久币:重新利用比特币工作来保存数 据。 2014 年电气工程师学会安全与隐 私专题研讨会论文集,第 475-490 页。
- I.A. 巴拉赞 奇,H.R 。 ABDULSHAHEED,S.A。SHAWKAT 和 S.R. BINTI。 (2019)用于增强无 线人体局域网中网络性能的识别关键 方案。工程和自然科学期刊,7(2), 第 895-906 页。
- H.R. BDULSHAHEED , Z.T 。 YASEEN 和 I.I. AL-BARAZANCHI。 (2019)使用信息中的聚类算法进行 大数据分析的新方法。动力与控制系 统高级研究杂志,2(4),第 1194- 1197 页。
- M. ANDRYCHOWICZ , S 。 DZIEMBOWSKI, D 。 MALINOWSKI 和 L. MAZUREK(2014)比特币的安 全多方计算。 2014 年电气工程师学会 安全与隐 私 专题研 讨 会 论 文集,第 443-458 页。
- ALRUBAYE,A.M.K。 (2014)基于 木匠/格罗斯伯格人工神经网络的入侵 检测系统。硕士论文。中东大学计算 机科学系。