A survey of blockchain from security perspective

  • Dipankar DasguptaEmail author
  • John M. Shrein
  • Kishor Datta Gupta
Original Article


The report starts with an overview of the blockchain security system and then highlights the specific security threats and summarizes them. We review with some comments and possible research direction. This survey, we examines the security issues of blockchain model related technologies and their applications. The blockchain is considered a still growing like the internet in 1990. It has the potential to disrupt so many technology areas in the future. But as a new underdeveloped field, it is suffering many setbacks mostly resulting from the security area. Its security concerns coming not only from distributed/decentralized computing issue or Cryptography algorithm issue, from some unexpected field too. Here, in this paper, we tried to classify the security concerns for the blockchain based on our survey from recent research papers. We also tried to show which way blockchain development trends are going.


Blockchain Security Applications Vulnerability Threats 


  1. 1.
    Amine Ferrag M, Derdour M, Mukherjee M, Derhab A (2018) Blockchain technologies for the internet of things: research issues and challenges. IEEE, New YorkGoogle Scholar
  2. 2.
    Avanade (2018) Cloud solutions that deliver the speed you need to become a digital business. Avanade, SeattleGoogle Scholar
  3. 3.
    Bahri L, Carminati B, Ferrari E (2018) Decentralized privacy preserving services for online social networks. Online Soc Netw Media 6:18–25CrossRefGoogle Scholar
  4. 4.
    Bennett R, Pickering M, Sargent J (2018) Innovations in land data governance: unstructured data, nosql, blockchain, and big data analytics unpacked. In: Land and poverty conference 2018. Land governance in an interconnected world, Washington, DC, 19–23 Mar 2018Google Scholar
  5. 5.
    Bernstein DJ, Lange T (2014) Safecurves: choosing safe curves for elliptic-curve cryptography. University of Illinois, ChicagoGoogle Scholar
  6. 6.
    Boireau O (2018) Securing the blockchain against hackers. Netw Secur 2018(1):8–11CrossRefGoogle Scholar
  7. 7.
    Buntinx J (2017) What is bitcoin fungibility. The Merkle, LondonGoogle Scholar
  8. 8.
    Foundation E (ed.) (n.d.) Privacy on the Blockchain. Retrieved November 01, 2018, from
  9. 9.
    Buterin V (n.d.) Ethereum Project. Retrieved November 1, 2018, from
  10. 10.
    Decker C, Wattenhofer R (2013) Information propagation in the Bitcoin network. IEEE P2P 2013 Proceedings, pp. 1–10Google Scholar
  11. 11.
    Choo R, He X, Lin C, He D, Vasilakos AV (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Netw Comput Appl 116:42–52CrossRefGoogle Scholar
  12. 12.
    Carey JE, Gerard SN (2018) U.S. Patent Application No. 15/374,493Google Scholar
  13. 13.
    Chen Y, Li Q, Wang H (2018) Towards Trusted Social Networks with Blockchain Technology. arXiv preprint: arXiv:1801.02796
  14. 14.
    Cichosz SL, Stausholm MN, Kronborg T, Vestergaard P, Hejlesen O (2018) How to use blockchain for diabetes health care data and access management: an operational concept. J Diab Sci technol.
  15. 15.
    Cimpanu C (2017) 74% of all Bitcoin-Related Sites Suffered a DDoS Attack. Retrieved November 1, 2018, from
  16. 16.
    Clauson KA, Breeden EA, Davidson C, Mackey TK (2018) Leveraging blockchain technology to enhance supply chain management in Healthcare. Blockchain in Healthcare TodayGoogle Scholar
  17. 17.
    Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 39:283–297CrossRefGoogle Scholar
  18. 18.
    Dataeum: First Blockchain Solution that Produces 100% Accurate Data through Crowdsourcing (2018) Retrieved November 1, from
  19. 19.
    de Vries A (2018) Bitcoin’s growing energy problem. Joule 2(5):801–805CrossRefGoogle Scholar
  20. 20.
    Android random number flaw implicated in Bitcoin thefts (2013) Retrieved November 1, 2018, from
  21. 21.
    Ducklin P (2018) What are “WannaMine” attacks, and how do I avoid them? Retrieved from
  22. 22.
    Eskandari S, Leoutsarakos A, Mursch T, Clark J (2018) A first look at browser-based cryptojacking. arXiv preprint arXiv:1803.02887
  23. 23.
    Funk E, Riddell J, Ankel F, Cabrera D (2018) Blockchain technology: a data framework to improve validity, trust, and accountability of information exchange in health professions education. Acad Med 93(12):1791–1794CrossRefGoogle Scholar
  24. 24.
    Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Network, New YorkCrossRefGoogle Scholar
  25. 25.
    Gräther W, Kolvenbach S, Ruland R, Schütte J, Torres C, Wendland F (2018) Blockchain for education: lifelong learning passport. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)Google Scholar
  26. 26.
    Grover LK (1996) Fast quantum mechanical algorithm for database search. In: ACM symposium on the theory of computing, pp 212–219Google Scholar
  27. 27.
    Grover LK (1997) Quantum mechanics helps in searching for a needle in a haystack. Phys Rev Lett 78:325–328CrossRefGoogle Scholar
  28. 28.
    Hegadekatti V, Hegadekatti K (2018) Blockchain applications in medical sciences. Int J Sci Res 7(4)Google Scholar
  29. 29.
    Heilman E, Zohar A, Goldberg S (2015) Eclipse attacks on bitcoin’s peer-to peer network. In: USENIX conference on security symposium, pp 129–144Google Scholar
  30. 30.
    Huang X, Xu C, Wang P, Liu H (2018) LNSC: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access 6:13565–13574CrossRefGoogle Scholar
  31. 31.
    Hunt GD, Koved L (2018) U.S. Patent Application No. 15/372,068Google Scholar
  32. 32.
    IDC (2012) Executive summary: a universe of opportunities and challenges. IDC, FraminghamGoogle Scholar
  33. 33.
    Jain A, Jain A, Chauhan N, Singh V, Thakur N (2018) Seguro Digital storage of documents using BlockchainGoogle Scholar
  34. 34.
    Jiao Y, Wang P, Niyato D, Xiong Z (2018) Social welfare maximization auction in edge computing resource allocation for mobile blockchain. In: 2018 IEEE international conference on communications (ICC), pp 1–6. IEEE, New YorkGoogle Scholar
  35. 35.
    Kim H-W, Jeong Y-S (2018) Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain. Hum-Centric Comput Inf Sci 8(1):11CrossRefGoogle Scholar
  36. 36.
    Lee J-H (2018) Bidaas: blockchain based id as a service. IEEE Access 6:2274–2278CrossRefGoogle Scholar
  37. 37.
    Li GD, Jenni Kassem M (2018) Blockchain in the built environment: analysing current applications and developing an emergent framework. Northumbria, NewcastleGoogle Scholar
  38. 38.
    Li M, Weng J, Yang A, Lu W, Zhang Y, Hou L, Liu J-N, Xiang Y, Deng RH (2017) Crowdbc: a blockchain-based decentralized framework for crowdsourcing. In: Technical report, IACR Cryptology, ePrint archive, University of California, Santa Barbara, vol 444Google Scholar
  39. 39.
    Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing, pp 468–477. IEEE Press, New YorkGoogle Scholar
  40. 40.
    Lin C, He D, Huang X, Choo K-KR, Vasilakos A V (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116:42–52CrossRefGoogle Scholar
  41. 41.
    Lu Y, Tang Q, Wang G (2018) Zebralancer: private and anonymous crowdsourcing system atop open blockchain. arXiv preprint: arXiv:1803.01256
  42. 42.
    Maria A, Zohar V (2017) Hijacking bitcoin: routing attacks on cryptocurrencies,. In: IEEE symposium on security and privacy, pp 375–392Google Scholar
  43. 43.
    Menn J (2013) Exclusive: secret contract tied NSA and security industry pioneer. Retrieved November 1, 2018, from
  44. 44.
    Musch M, Wressnegger C, Johns M, Rieck K (2018) Web-based cryptojacking in the wild. arXiv preprint: arXiv:1808.09474
  45. 45.
    Nowiński W, Kozma M (2017) How can blockchain technology disrupt the existing business models? Entrep Bus Econ Rev 5(3):173–188Google Scholar
  46. 46.
    List Of High Profile Cryptocurrency Hacks So Far (August 24th 2017). (2017, August 24). Retrieved November 1, 2018, from Scholar
  47. 47.
    Otte P, de Vos M, Pouwelse J (2017) Trustchain: a sybil-resistant scalable blockchain. Future Gener Comput SystGoogle Scholar
  48. 48.
    Keutmann (2018) Keutmann/Trustchain. Retrieved November 1, 2018, from
  49. 49.
    Poon J, Buterin V (2017) Plasma: Scalable autonomous smart contracts. White paperGoogle Scholar
  50. 50.
    Prinz W (2018) Blockchain and CSCW—shall we care? In: Proceedings of 16th European conference on computer-supported cooperative work-exploratory papers. European Society for Socially Embedded Technologies (EUSSET)Google Scholar
  51. 51.
    Qin D, Wang C, Jiang Y (2018) Rpchain: a blockchain-based academic social networking service for credible reputation building. In: International conference on blockchain. Springer, New York, pp 183–198Google Scholar
  52. 52.
    The IRS Has a Way to ID Bitcoin Tax Cheats (n.d.) Retrieved November 1, 2018, from
  53. 53.
    Schneier on Security (2007) Retrieved November 1, 2018, from
  54. 54.
    Schneier NFB (2003) Practical cryptography. Wiley, IndianapoliszbMATHGoogle Scholar
  55. 55.
    Shah SN (2018) Distributed electronic document review in a blockchain system and computerized scoring based on textual and visual feedback, 16 Jan 2018. US patent 9870591Google Scholar
  56. 56.
    Nilsson K (2017) Breaking open the MtGox case, part 1. Retrieved November 1, 2018, from
  57. 57.
    Stevens M, Pierre K, Albertini A, Markov Y, Bursztein E (2017) The first collision for full SHA-1. In: Katz J, Shacham H (eds) Advances in cryptology–crypto 2017. Springer, New YorkGoogle Scholar
  58. 58.
    Swan M, Brunswicker S (2018) Blockchain economic networks and algorithmic trust. In: AMCIS 2018Google Scholar
  59. 59.
    Turkanović M, Hölbl M, Košič K, Heričko M, Kamišalić A (2018) Eductx: a blockchain-based higher education credit platform. IEEE Access 6:5112–5127CrossRefGoogle Scholar
  60. 60.
    University Stanford (2011) Pertinent side channel attacks on elliptic curve cryptographic systems. Stanford University, StanfordGoogle Scholar
  61. 61.
    Vo HT, Kundu A, Mohania MK (2018) Research directions in blockchain data management and analytics. In: EDBT, pp 445–448Google Scholar
  62. 62.
    Wang F (2015) Eclipse attacks on bitcoin’s peer-to-peer network.
  63. 63.
    Wang Q, Qin B, Hu J, Xiao F (2017) Preserving transaction privacy in bitcoin. Future Generation Comput Syst. Google Scholar
  64. 64.
    Wang S, Taha A, Wang J (2018) Blockchain-assisted crowdsourced energy systems. arXiv preprint: arXiv:1802.03099
  65. 65.
    Weaknesses. (n.d.). Retrieved November 1, 2018, from
  66. 66.
    Wirth C, Kolain M (2018) Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)Google Scholar
  67. 67.
    Zhang R (2018) Blockchain scalability: prospective solutions for bitcoin, ethereum, and other blockchain networksGoogle Scholar
  68. 68.
    Zhao H, Bai P, Peng Y, Xu R (2018) Efficient key management scheme for health blockchain. CAAI Trans Intell Technol 3(2):75–82CrossRefGoogle Scholar

Copyright information

© Institute for Development and Research in Banking Technology 2018

Authors and Affiliations

  • Dipankar Dasgupta
    • 1
    Email author
  • John M. Shrein
    • 1
  • Kishor Datta Gupta
    • 1
  1. 1.The University of MemphisMemphisUSA

Personalised recommendations