Skip to main content

Blockchain Security

  • Chapter
  • First Online:
Blockchain Security in Cloud Computing

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

Blockchain is a technology of Bitcoin which has developed many applications in finance, trade, telecommunication, and manufacturing. This technology was launched in 2008. It was the brainchild of a bunch of people who are popularly known by the pseudonym Satoshi Naskamoto. Bitcoin has developed a popular cryptocurrency and has covered as a virtual money source for market capitalization. Blockchain is a chain of blocks as appears by the name but has a deeper significance. The context of the words “block” and “chain” refers to digital information (the “block”) stored in a public database (the “chain”). Taking note of the distributed database and its drawback like unreliability, intermittent or non-existent nodes lead to data conflicts. Being able to deal with conflicts is the fundamental difference between standard distributed databases and blockchains. Resolution of Conflict, verifying the transaction and transaction auditability, i.e., consensus, is a core function of blockchains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. N.T. Courtois, R. Mercer, Stealth address and key management techniques in Blockchain systems. Proc. ICIS- SP, 2017, pp. 559–66

    Google Scholar 

  2. https://breakermag.com/reddit-ponders-the-venn-diagram-of-blockchain/

  3. J. Bonneau et al., Mixcoin, Anonymity for Bitcoin with Accountable Mixes. Proc. Int’l. Conf. Financial Cryptography and Data SecUrity, Springer, Berlin, Heidelberg, 2014, pp. 486–504

    Google Scholar 

  4. https://intellipaat.com/tutorial/blockchain-tutorial/blockchain-vs-database/

  5. L. Valenta, B. Rowan, Blindcoin: Blinded, accountable mixes for bitcoin. Proc. Int’l. Conf. Financial Cryptography and Data SecUrity, Springer, Berlin, Heidelberg, 2015, pp. 112–126

    Google Scholar 

  6. https://www.quora.com/Whats-the-difference-between-blockchain-and-a-database

  7. T. Ruffing, M-S. Pedro, ValueShuffle: mixing confidential transactions for comprehensive transaction privacy in bitcoin, Proc. Int’l. Conf. Financial Cryptography and Data SECURITY, Springer, Cham, 2017, pp. 133–154

    Google Scholar 

  8. S.K. Sharma, R.K. Modanval, N. Gayathri, S.R. Kumar, C. Ramesh, Impact of application of big data on cryptocurrency, in Cryptocurrencies and Blockchain Technology Applications, (2020), pp. 181–195

    Chapter  Google Scholar 

  9. https://www.entrepreneur.com/article/306420

  10. S.F. Sun et al., RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. Proc. EUROPEAN SYMPOSIUM on Research in COMPUTER SECURITY, Springer, Cham, 2017, pp. 456–74

    Google Scholar 

  11. S.R. Kumar, N. Gayathri, Trust based data transmission mechanism in manet using solsr. In Annual Convention of the Computer Society of India (pp. 169–180). Springer, Singapore., S. R., & Gayathri, N. (2016, December). Trust based data transmission mechanism in MANET using sOLSR. In Annual Convention of the Computer Society of India (pp. 169–180). Springer, Singapore (2016, December)

    Google Scholar 

  12. G. Nagasubramanian, R.K. Sakthivel, R. Patan, A.H. Gandomi, M. Sankayya, B. Balusamy, Securing e-health records using keyless signature infrastructure blockchain technology in the cloud. Neural Comput. & Applic. 32(3), 639–647 (2020)

    Article  Google Scholar 

  13. K. Biswas, V. Muthukkumarasamy, Securing smart cities using blockchain technology. In Proc. IEEE 18th Int. Conf. High Perform. Comput. Commun, IEEE 14th Int. Conf. Smart City, IEEE 2nd Int. Conf. Data Sci. Syst. (HPCC/SmartCity/DSS), Dec. 2016, pp. 1392–1393

    Google Scholar 

  14. R.K. Sakthivel, G. Nagasubramanian, F. Al-Turjman, M. Sankayya, Core-level cybersecurity assurance using cloud-based adaptive machine learning techniques for manufacturing industry. Trans. Emerg. Telecommun. Technol., e3947 (2020)

    Google Scholar 

  15. https://medium.com/@zhangsanbtc/ending-the-soft-hard-fork-debate-a-safe-hard-fork-is- the-same-as-a-soft-fork-c0e96eeb62d0

  16. H. Ethan, F. Baldimtsi, L. Alshenibr, A. Scafuro, S. Goldberg, TumbleBit: An untrusted tumbler for bitcoin-compatible anonymous payments. In Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS), San Diego, CA, USA, Feb. 2017, pp. 1–15

    Google Scholar 

  17. H.R. Hasan, K. Salah, Blockchain-based solution for proof of delivery of physical assets, in Blockchain (Lecture Notes in Computer Science), vol. 10974, (Springer, Seattle, Jun. 2018), pp. 139–152

    Google Scholar 

  18. H. Hasan, K. Salah, Proof of delivery of digital assets using blockchain and smart contracts. IEEE Access 6, 65439–65448 (2018)

    Article  Google Scholar 

  19. https://www.edureka.co/blog/blockchain-mining/

  20. A. Pandey, A. Kumar, A. Singha, N. Gayathri, S.R. Kumar, 4 Blockchain Databases 2. Blockchain, Big Data and Machine Learning: Trends and Applications, 97 (2020)

    Google Scholar 

  21. A.K. Show, A. Kumar, A. Singhal, N. Gayathri, K. Vengatesan Future blockchain technology for autonomous applications/autonomous vehicle. In Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles (pp. 165–177). IGI Global

    Google Scholar 

  22. https://medium.com/baseds/many-nodes-one-distributed-system-9921f85205c4

  23. E. Heilman, F. Baldimtsi, S. Goldberg, Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions, in Financial Cryptography and Data Security, (Springer, Berlin, 2016), pp. 43–60

    Chapter  Google Scholar 

  24. https://en.wikipedia.org/wiki/Merkle_tree

  25. J. Liu, W. Li, G. Karame, N. Asokan, Toward fairness of cryptocurrency payments. IEEE Secur. Priv. 16(3), 81–89 (Jun. 2018)

    Article  Google Scholar 

  26. https://www.researchgate.net/figure/An-example-of-Merkle-tree-Each-leaf-is-a-hash-of-one-packet-Each-internal-node-is-the_fig2_220465950

  27. M. Mut-Puigserver, M. Payeras-Capellà, M. Cabot-Nadal, Blockchain-based fair certified notifications, in Data Privacy Management, Cryptocurrencies and Blockchain Technology (Lecture Notes in Computer Science), vol. 11025, (Springer, Barcelona, 2018), pp. 20–37

    Chapter  Google Scholar 

  28. R. Chandran, S.R. Kumar, N. Gayathri, Genetic algorithm-based tabu search for optimal energy-aware allocation of data center resources. Soft. Comput. 24(21), 16705–16718 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satya Prakash Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yadav, S.P. (2022). Blockchain Security. In: Baalamurugan, K., Kumar, S.R., Kumar, A., Kumar, V., Padmanaban, S. (eds) Blockchain Security in Cloud Computing. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-70501-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-70501-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-70500-8

  • Online ISBN: 978-3-030-70501-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics