Skip to main content
Log in

A survey of blockchain from security perspective

  • Original Article
  • Published:
Journal of Banking and Financial Technology Aims and scope Submit manuscript

Abstract

The report starts with an overview of the blockchain security system and then highlights the specific security threats and summarizes them. We review with some comments and possible research direction. This survey, we examines the security issues of blockchain model related technologies and their applications. The blockchain is considered a still growing like the internet in 1990. It has the potential to disrupt so many technology areas in the future. But as a new underdeveloped field, it is suffering many setbacks mostly resulting from the security area. Its security concerns coming not only from distributed/decentralized computing issue or Cryptography algorithm issue, from some unexpected field too. Here, in this paper, we tried to classify the security concerns for the blockchain based on our survey from recent research papers. We also tried to show which way blockchain development trends are going.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Amine Ferrag M, Derdour M, Mukherjee M, Derhab A (2018) Blockchain technologies for the internet of things: research issues and challenges. IEEE, New York

    Google Scholar 

  2. Avanade (2018) Cloud solutions that deliver the speed you need to become a digital business. Avanade, Seattle

    Google Scholar 

  3. Bahri L, Carminati B, Ferrari E (2018) Decentralized privacy preserving services for online social networks. Online Soc Netw Media 6:18–25

    Article  Google Scholar 

  4. Bennett R, Pickering M, Sargent J (2018) Innovations in land data governance: unstructured data, nosql, blockchain, and big data analytics unpacked. In: Land and poverty conference 2018. Land governance in an interconnected world, Washington, DC, 19–23 Mar 2018

  5. Bernstein DJ, Lange T (2014) Safecurves: choosing safe curves for elliptic-curve cryptography. University of Illinois, Chicago

    Google Scholar 

  6. Boireau O (2018) Securing the blockchain against hackers. Netw Secur 2018(1):8–11

    Article  Google Scholar 

  7. Buntinx J (2017) What is bitcoin fungibility. The Merkle, London

    Google Scholar 

  8. Foundation E (ed.) (n.d.) Privacy on the Blockchain. Retrieved November 01, 2018, from https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/

  9. Buterin V (n.d.) Ethereum Project. Retrieved November 1, 2018, from http://www.ethereum.org/

  10. Decker C, Wattenhofer R (2013) Information propagation in the Bitcoin network. IEEE P2P 2013 Proceedings, pp. 1–10

  11. Choo R, He X, Lin C, He D, Vasilakos AV (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Netw Comput Appl 116:42–52

    Article  Google Scholar 

  12. Carey JE, Gerard SN (2018) U.S. Patent Application No. 15/374,493

  13. Chen Y, Li Q, Wang H (2018) Towards Trusted Social Networks with Blockchain Technology. arXiv preprint: arXiv:1801.02796

  14. Cichosz SL, Stausholm MN, Kronborg T, Vestergaard P, Hejlesen O (2018) How to use blockchain for diabetes health care data and access management: an operational concept. J Diab Sci technol. https://doi.org/10.1177/1932296818790281

  15. Cimpanu C (2017) 74% of all Bitcoin-Related Sites Suffered a DDoS Attack. Retrieved November 1, 2018, from https://www.bleepingcomputer.com/news/security/74-percent-of-all-bitcoin-related-sites-suffered-a-ddos-attack/

  16. Clauson KA, Breeden EA, Davidson C, Mackey TK (2018) Leveraging blockchain technology to enhance supply chain management in Healthcare. Blockchain in Healthcare Today

  17. Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 39:283–297

    Article  Google Scholar 

  18. Dataeum: First Blockchain Solution that Produces 100% Accurate Data through Crowdsourcing (2018) Retrieved November 1, from https://www.cnbcafrica.com/apo/2018/04/12/dataeum-first-blockchain-solution-that-produces-100-accurate-data-through-crowdsourcing/

  19. de Vries A (2018) Bitcoin’s growing energy problem. Joule 2(5):801–805

    Article  Google Scholar 

  20. Android random number flaw implicated in Bitcoin thefts (2013) Retrieved November 1, 2018, from https://nakedsecurity.sophos.com/2013/08/12/android-random-number-flaw-implicated-in-bitcoin-thefts/

  21. Ducklin P (2018) What are “WannaMine” attacks, and how do I avoid them? Retrieved from https://nakedsecurity.sophos.com/2018/01/31/what-are-wannamine-attacks-and-how-do-i-avoid-them/

  22. Eskandari S, Leoutsarakos A, Mursch T, Clark J (2018) A first look at browser-based cryptojacking. arXiv preprint arXiv:1803.02887

  23. Funk E, Riddell J, Ankel F, Cabrera D (2018) Blockchain technology: a data framework to improve validity, trust, and accountability of information exchange in health professions education. Acad Med 93(12):1791–1794

    Article  Google Scholar 

  24. Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Network, New York

    Book  Google Scholar 

  25. Gräther W, Kolvenbach S, Ruland R, Schütte J, Torres C, Wendland F (2018) Blockchain for education: lifelong learning passport. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)

  26. Grover LK (1996) Fast quantum mechanical algorithm for database search. In: ACM symposium on the theory of computing, pp 212–219

  27. Grover LK (1997) Quantum mechanics helps in searching for a needle in a haystack. Phys Rev Lett 78:325–328

    Article  Google Scholar 

  28. Hegadekatti V, Hegadekatti K (2018) Blockchain applications in medical sciences. Int J Sci Res 7(4)

  29. Heilman E, Zohar A, Goldberg S (2015) Eclipse attacks on bitcoin’s peer-to peer network. In: USENIX conference on security symposium, pp 129–144

  30. Huang X, Xu C, Wang P, Liu H (2018) LNSC: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access 6:13565–13574

    Article  Google Scholar 

  31. Hunt GD, Koved L (2018) U.S. Patent Application No. 15/372,068

  32. IDC (2012) Executive summary: a universe of opportunities and challenges. IDC, Framingham

    Google Scholar 

  33. Jain A, Jain A, Chauhan N, Singh V, Thakur N (2018) Seguro Digital storage of documents using Blockchain

  34. Jiao Y, Wang P, Niyato D, Xiong Z (2018) Social welfare maximization auction in edge computing resource allocation for mobile blockchain. In: 2018 IEEE international conference on communications (ICC), pp 1–6. IEEE, New York

  35. Kim H-W, Jeong Y-S (2018) Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain. Hum-Centric Comput Inf Sci 8(1):11

    Article  Google Scholar 

  36. Lee J-H (2018) Bidaas: blockchain based id as a service. IEEE Access 6:2274–2278

    Article  Google Scholar 

  37. Li GD, Jenni Kassem M (2018) Blockchain in the built environment: analysing current applications and developing an emergent framework. Northumbria, Newcastle

    Google Scholar 

  38. Li M, Weng J, Yang A, Lu W, Zhang Y, Hou L, Liu J-N, Xiang Y, Deng RH (2017) Crowdbc: a blockchain-based decentralized framework for crowdsourcing. In: Technical report, IACR Cryptology, ePrint archive, University of California, Santa Barbara, vol 444

  39. Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing, pp 468–477. IEEE Press, New York

  40. Lin C, He D, Huang X, Choo K-KR, Vasilakos A V (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116:42–52

    Article  Google Scholar 

  41. Lu Y, Tang Q, Wang G (2018) Zebralancer: private and anonymous crowdsourcing system atop open blockchain. arXiv preprint: arXiv:1803.01256

  42. Maria A, Zohar V (2017) Hijacking bitcoin: routing attacks on cryptocurrencies,. In: IEEE symposium on security and privacy, pp 375–392

  43. Menn J (2013) Exclusive: secret contract tied NSA and security industry pioneer. Retrieved November 1, 2018, from https://www.reuters.com/article/us-usa-security-rsa/exclusive-secret-contract-tied-nsa-and-security-industry-pioneer-idUSBRE9BJ1C220131220

  44. Musch M, Wressnegger C, Johns M, Rieck K (2018) Web-based cryptojacking in the wild. arXiv preprint: arXiv:1808.09474

  45. Nowiński W, Kozma M (2017) How can blockchain technology disrupt the existing business models? Entrep Bus Econ Rev 5(3):173–188

    Google Scholar 

  46. List Of High Profile Cryptocurrency Hacks So Far (August 24th 2017). (2017, August 24). Retrieved November 1, 2018, from http://storeofvalueblog.com/posts/cryptocurrency-hacks-so-far-august-24th/

  47. Otte P, de Vos M, Pouwelse J (2017) Trustchain: a sybil-resistant scalable blockchain. Future Gener Comput Syst

  48. Keutmann (2018) Keutmann/Trustchain. Retrieved November 1, 2018, from https://github.com/keutmann/Trustchain

  49. Poon J, Buterin V (2017) Plasma: Scalable autonomous smart contracts. White paper

  50. Prinz W (2018) Blockchain and CSCW—shall we care? In: Proceedings of 16th European conference on computer-supported cooperative work-exploratory papers. European Society for Socially Embedded Technologies (EUSSET)

  51. Qin D, Wang C, Jiang Y (2018) Rpchain: a blockchain-based academic social networking service for credible reputation building. In: International conference on blockchain. Springer, New York, pp 183–198

  52. The IRS Has a Way to ID Bitcoin Tax Cheats (n.d.) Retrieved November 1, 2018, from http://fortune.com/2017/08/22/irs-tax-cheats-bitcoin-chainalysis/

  53. Schneier on Security (2007) Retrieved November 1, 2018, from https://www.schneier.com/essays/archives/2007/11/did_nsa_put_a_secret.html

  54. Schneier NFB (2003) Practical cryptography. Wiley, Indianapolis

    MATH  Google Scholar 

  55. Shah SN (2018) Distributed electronic document review in a blockchain system and computerized scoring based on textual and visual feedback, 16 Jan 2018. US patent 9870591

  56. Nilsson K (2017) Breaking open the MtGox case, part 1. Retrieved November 1, 2018, from https://blog.wizsec.jp/2017/07/breaking-open-mtgox-1.html

  57. Stevens M, Pierre K, Albertini A, Markov Y, Bursztein E (2017) The first collision for full SHA-1. In: Katz J, Shacham H (eds) Advances in cryptology–crypto 2017. Springer, New York

    Google Scholar 

  58. Swan M, Brunswicker S (2018) Blockchain economic networks and algorithmic trust. In: AMCIS 2018

  59. Turkanović M, Hölbl M, Košič K, Heričko M, Kamišalić A (2018) Eductx: a blockchain-based higher education credit platform. IEEE Access 6:5112–5127

    Article  Google Scholar 

  60. University Stanford (2011) Pertinent side channel attacks on elliptic curve cryptographic systems. Stanford University, Stanford

    Google Scholar 

  61. Vo HT, Kundu A, Mohania MK (2018) Research directions in blockchain data management and analytics. In: EDBT, pp 445–448

  62. Wang F (2015) Eclipse attacks on bitcoin’s peer-to-peer network. https://medium.com/mit-security-seminar/eclipse-attacks-on-bitcoin-s-peer-to-peer-network-e0da797302c2

  63. Wang Q, Qin B, Hu J, Xiao F (2017) Preserving transaction privacy in bitcoin. Future Generation Comput Syst. https://doi.org/10.1016/j.future.2017.08.026

    Google Scholar 

  64. Wang S, Taha A, Wang J (2018) Blockchain-assisted crowdsourced energy systems. arXiv preprint: arXiv:1802.03099

  65. Weaknesses. (n.d.). Retrieved November 1, 2018, from https://en.bitcoin.it/wiki/Weaknesses

  66. Wirth C, Kolain M (2018) Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)

  67. Zhang R (2018) Blockchain scalability: prospective solutions for bitcoin, ethereum, and other blockchain networks

  68. Zhao H, Bai P, Peng Y, Xu R (2018) Efficient key management scheme for health blockchain. CAAI Trans Intell Technol 3(2):75–82

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dipankar Dasgupta.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dasgupta, D., Shrein, J.M. & Gupta, K.D. A survey of blockchain from security perspective. J BANK FINANC TECHNOL 3, 1–17 (2019). https://doi.org/10.1007/s42786-018-00002-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42786-018-00002-6

Keywords

Navigation