Skip to main content

Security, Privacy, Trust Management and Performance Optimization of Blockchain Technology

  • Chapter
  • First Online:

Part of the book series: Studies in Big Data ((SBD,volume 83))

Abstract

Blockchain is a developing technology which provides data storage, secure transactions and establishing trust in an open environment. Blockchain is widely implemented in cryptocurrency systems like Bitcoins, smart contracts, smart grids over IoT devices etc. Blockchain also has wide applications in healthcare, automobile industries, private and public sectors. This growing popularity of Blockchain is luring hackers to perform various cyber-attacks in order to detect vulnerabilities in the applied Blockchain system. A vulnerable block chain system is open for network breaches, data thefts and information manipulations. Therefore, it is important to design a Blockchain system with proper security, privacy and trust management. However, increasing security and privacy in Blockchain reduces its performance because security and privacy policies are overhead to the applied Blockchain system. Therefore, it is also important to optimize the performance of Blockchain system with proper implementation of security and privacy. This chapter discuss the current scenarios of security, privacy and trust issues in Blockchain. The chapter also discuss the proposed solutions regarding these issues. Further, the chapter discuss the performance analysis on increasing security and privacy in the Blockchain technology and proposed optimizations in the literature. This chapter is then conclude by providing few research directions for improving security, privacy and trust in Blockchain technology while keeping its performance optimized.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Acharya, S., Wang, J., Ge, Z., Znati, T. F., & Greenberg, A. (2006). Traffic aware firewall optimization strategies. In Proceedings of the 12th IEEE International Conference on Communications (ICC’06) (pp. 2225–2230).

    Google Scholar 

  • Anjum, A., Sporny, M., & Sill, A. (2017). Blockchain standards for compliance and trust. Cloud Computing, 4, 84–90.

    Article  Google Scholar 

  • Boyen, X., Carr, C., & Haines, T. (2016). Blockchain-free cryptocurrencies: A framework for truly decentralised fast transactions. Cryptology, 1, 1–13.

    Google Scholar 

  • Fischer, M. J., Lynch, N. A., & Paterson, M. S. (1985). Impossibility of distributed consensus with one faulty process. Journal of the ACM, 32, 374–382.

    Article  MathSciNet  Google Scholar 

  • Fournaris, A. P., Dimopoulos, C., Moschos, A., & Koufopavlou, O. (2019). Design and leakage assessment of side channel attack resistant binary edwards elliptic curve digital signature algorithm Architectures. Microprocessors and Microsystems, 64, 73–87.

    Article  Google Scholar 

  • García-Bañuelos, L., Ponomarev, A., Dumas, M., & Weber, I. (2017). Optimized execution of business processes on blockchain. In Proceedings to the 1st International Conference on Business Process Management (BPM’17) (pp. 130–146).

    Google Scholar 

  • Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015). Eclipse attacks on bitcoin’s peer-to-peer network. In Proceedings to the 24th USENIX Security Symposium (USENIX’15) (pp. 129–144).

    Google Scholar 

  • Huang, X., Xu, C., Wang, P., & Liu, H. (2018). LNSC: A security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access, 6, 13565–13574.

    Article  Google Scholar 

  • Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 1, 36–63.

    Article  Google Scholar 

  • Kochovski, P., Gec, S., Stankovski, V., Bajec, M., & Drobintsev, P. D. (2019). Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Generation Computer Systems, 101, 747–759.

    Article  Google Scholar 

  • Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the 37th IEEE Security and Privacy Workshops (S&P’16) (pp. 839–858).

    Google Scholar 

  • Li, Q.-L., Ma, J.-Y., & Chang, Y.-X. (2018). Blockchain queue theory. In Proceedings of the 7th International Conference on Computational Social Networks (pp. 25–40).

    Google Scholar 

  • Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., & Njilla, L. (2017). Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID’17) (pp. 468–477).

    Google Scholar 

  • Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2017). A survey on the security of blockchain systems. Future Generation Computer Systems, 107, 841–853.

    Article  Google Scholar 

  • Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., et al. (2018). Creditcoin: A privacy preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Transactions on Intelligent Transportation Systems, 19, 2204–2220.

    Google Scholar 

  • Liu, M., Yu, F. R., Teng, Y., Leung, V. C., & Song, M. (2019). Performance optimization for blockchain-enabled industrial internet of things (IIoT) systems: A deep reinforcement learning approach. IEEE Transactions on Industrial Informatics, 15, 3559–3570.

    Article  Google Scholar 

  • Luu, L., Chu, D.-H., Olickel, H., Saxena, P., & Hobor, A. (2016). Making smart contracts smarter. In Proceedings of the 21st ACM International Conference on Special Interest Group on Security, Audit and Control (SIGSAC’16) (pp. 254–269).

    Google Scholar 

  • Malik, S., Dedeoglu, V., Kanhere, S. S., & Jurdak, R. (2019). TrustChain: Trust management in blockchain and IoT supported supply chains. In Proceedings of the 2nd IEEE International Conference on Blockchain (ICBC’19) (pp. 184–193).

    Google Scholar 

  • Mehibel, N., & Hamadouche, M. (2020). A new enhancement of elliptic curve digital signature algorithm. Journal of Discrete Mathematical Sciences and Cryptography, 23, 743–757.

    Article  MathSciNet  Google Scholar 

  • Mirkin, M., Ji, Y., Pang, J., Klages-Mundt, A., Eyal, I., & Jules, A. (2019). BDoS: Blockchain denial of service. arXiv:1912.07497 .

  • Moubarak, J., Chamoun, M., & Filiol, E. (2018). Developing a K-Ary malware using blockchain. In Proceedings of the 13th IEEE/IFIP Network Operations and Management Symposium (NOMS’18) (pp. 1–4).

    Google Scholar 

  • Namasudra, S., & Deka, G. (2018). Taxonomy of DNA-based security models. In Advances of dna computing in cryptography (pp. 37–52).

    Google Scholar 

  • Namasudra, S., Deka, G. C., Johri, P., Hosseinpour, M., & Gandomi, A. H. (2020). The revolution of blockchain: State of the art and research challenges. Archives of Computational Methods in Engineering.

    Google Scholar 

  • Otte, P., de Vos, M., & Pouwelse, J. (2017). TrustChain: A sybil-resistant scalable blockchain. Future Generation Computer Systems, 107, 770–780.

    Article  Google Scholar 

  • Pinzón, C., & Rocha, C. (2016). Double-spend attack models with time advantange for bitcoin. Electronic Notes in Theoretical Computer Science, 329, 79–103.

    Article  MathSciNet  Google Scholar 

  • Pletinckx, S., Trap, C., & Doerr, C. (2018). Malware coordination using the blockchain: An analysis of the cerber ransomware. In Proceedings of the 6th IEEE International Conference on Communications and Network Security (CNS’18) (pp. 1–9).

    Google Scholar 

  • Sirer, E. (2016). Bitcoin guarantees strong, not eventual consistency. Distributed: Hacking.

    Google Scholar 

  • Statista. (n.d.). (https://www.statista.com/statistics/647231/worldwideblockchain-technology-market-size)

  • Thakkar, P., Nathan, S., & Viswanathan, B. (2018). Performance benchmarking and optimizing hyperledger fabric blockchain platform. In Proceedings of the 26th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (Mascots) (pp. 264–276).

    Google Scholar 

  • Wattenhofer, R. (2016). The cience of the blockchain. CreateSpace Independent Publishing Platform.

    Google Scholar 

  • Wu, F. (1988). Real-time network security monitoring, assessment and optimization. International Journal of Electrical Power & Energy Systems, 10, 83–100.

    Article  Google Scholar 

  • Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. (2018). Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things Journal, 6, 1495–1505.

    Article  Google Scholar 

  • Yuan, Y., & Wang, F.-Y. (2018). Blockchain and cryptocurrencies: Model, techniques, and applications. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 48, 1421–1428.

    Article  Google Scholar 

  • Zhang, S., & Lee, J.-H. (2019). Double-spending with a sybil attack in the bitcoin decentralized network. IEEE Transactions on Industrial Informatics, 15, 5715–5722.

    Article  Google Scholar 

  • Zilliqa. (n.d.). (https://www.zilliqa.com/)

  • Zyskind, G., Nathan, O., et al. (2015). Decentralizing privacy: Using blockchain to protect personal data. In Proceedings of the 36th IEEE Security and Privacy Workshops (S&P’15) (pp. 180–184).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mayank Swarnkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Swarnkar, M., Bhadoria, R.S., Sharma, N. (2021). Security, Privacy, Trust Management and Performance Optimization of Blockchain Technology. In: Namasudra, S., Deka, G.C. (eds) Applications of Blockchain in Healthcare. Studies in Big Data, vol 83. Springer, Singapore. https://doi.org/10.1007/978-981-15-9547-9_3

Download citation

Publish with us

Policies and ethics