Skip to main content

Security and Privacy Issues of Blockchain Technology

  • Chapter
  • First Online:
Advanced Applications of Blockchain Technology

Part of the book series: Studies in Big Data ((SBD,volume 60))

Abstract

Blockchain is a technology that is developed using a combination of various techniques such as mathematics, algorithms, cryptography, economic models, etc. Blockchain is a public ledger of all crypto currency transactions that are digitized and decentralized. All the transactions of cryptocurrencies are stored in chronological order to help users in tracking the transactions without maintaining any central record of the transactions. Application prospects of blockchain are promising and have been delivering the result since its inception. Blockchain technology has evolved from initial cryptocurrency to new-age smart contracts and has been implemented and applied in many fields. Although a lot of studies have been carried out on the security and privacy issues of blockchain, but a systematic examination on the security of blockchain systems is still missing. In this chapter, we will try to demonstrate a systematic illustration on the security threats to blockchain and survey the corresponding real attacks by examining popular blockchain systems. We will discuss the security and the privacy of blockchain along with their impact with regards to different trends and applications in this chapter. The chapter is intended to discuss key security attacks and the enhancements that will help develop better blockchain systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secur. Comput. 1 (2016). https://doi.org/10.1109/tdsc.2016.2613521

  2. Capurso, N., Song, T., Cheng, W., Yu, J., Cheng, X.: An android-based mechanism for energy efficient localization depending on indoor/outdoor context. IEEE Internet Things J. 4, 299–307 (2017). https://doi.org/10.1109/JIOT.2016.2553100

    Article  Google Scholar 

  3. Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A.V., Rong, X.: Data mining for the internet of things: literature review and challenges. Int. J. Distrib. Sens. Netw. 11, 431047 (2015). https://doi.org/10.1155/2015/431047

    Article  Google Scholar 

  4. Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in internet of things: challenges and solutions. arXiv:1608.05187

  5. Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: Blockchain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55, 119–125 (2017). https://doi.org/10.1109/MCOM.2017.1700879

    Article  Google Scholar 

  6. Duan, Z., Yan, M., Cai, Z., Wang, X., Han, M., Li, Y.: Truthful incentive mechanisms for social cost minimization in mobile crowdsourcing systems. Sensors 16, 81 (2016). https://doi.org/10.3390/s16040481

    Article  Google Scholar 

  7. Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: safety, security and privacy. J. Adv. Res. 5, 491–497 (2014). https://doi.org/10.1016/j.jare.2014.02.006

    Article  Google Scholar 

  8. Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: EUROCRYPT 2015, vol. 9057, pp. 281–310 (2015). https://doi.org/10.1007/978-3-662-46803-6_10

    Chapter  Google Scholar 

  9. Joshi, A., Han, M., Wang, Y.: A survey on security and privacy issues of blockchain technology. Math. Found. Comput. 1(2), 121–147 (2018). https://doi.org/10.3934/mfc.2018007

    Article  Google Scholar 

  10. Working of blockchain. http://aimsciences.org/article/doi/10.3934/mfc.2018007

  11. Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19(5), 653–659 (2017). https://doi.org/10.6633/ijns.201709.19(5).01

  12. Gupta, N.: R Agrawal—NoSQL security. Adv. Comput. 109, 101–132 (2018)

    Article  Google Scholar 

  13. Miller, A., Moser, M., Lee, K., Narayanan,A.: An empirical analysis of linkability in the monero blockchain (2017). arXiv:1704.04299

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gupta, N. (2020). Security and Privacy Issues of Blockchain Technology. In: Kim, S., Deka, G. (eds) Advanced Applications of Blockchain Technology. Studies in Big Data, vol 60. Springer, Singapore. https://doi.org/10.1007/978-981-13-8775-3_10

Download citation

Publish with us

Policies and ethics