Evaluating User Privacy in Bitcoin
Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system.
In this paper, we investigate the privacy provisions in Bitcoin when it is used as a primary currency to support the daily transactions of individuals in a university setting. More specifically, we evaluate the privacy that is provided by Bitcoin (i) by analyzing the genuine Bitcoin system and (ii) through a simulator that faithfully mimics the use of Bitcoin within a university. In this setting, our results show that the profiles of almost 40% of the users can be, to a large extent, recovered even when users adopt privacy measures recommended by Bitcoin. To the best of our knowledge, this is the first work that comprehensively analyzes, and evaluates the privacy implications of Bitcoin.
KeywordsBitcoin user privacy privacy definitions experimental evaluation
Unable to display preview. Download preview PDF.
- 1.Bitcoin – Wikipedia, https://en.bitcoin.it/wiki
- 2.Bitcoin Block Explorer, http://blockexplorer.com/
- 3.Flexcoin –The Bitcoin Bank, http://www.flexcoin.com/
- 4.Bitcoin Gateway, A Peer-to-peer Bitcoin Vault and Payment Network (2011), http://arimaa.com/bitcoin/
- 6.Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash SystemGoogle Scholar
- 7.Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On Bitcoin and Red Balloons. CoRR (2011)Google Scholar
- 8.Brands, S.: Electronic Cash on the Internet. In: Proceedings of the Symposium on the Network and Distributed System Security (1995)Google Scholar
- 14.Karame, G., Androulaki, E., Capkun, S.: Double-Spending Fast Payments in Bitcoin. In: Proceedings of ACM CCS (2012)Google Scholar
- 15.Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology. Fachterminologie Datenschutz und Datensicherheit, 111–144 (2008)Google Scholar
- 16.Reid, F., Harrigan, M.: An Analysis of Anonymity in the Bitcoin System. CoRR (2011), http://www.bibsonomy.org/bibtex/257d6640d03ae4a5668ef8b32656461eb/dblp
- 18.Shokri, R., Theodorakopoulos, G., Boudec, J.L., Hubaux, J.P.: Quantifying location privacy. In: Proceedings of the IEEE Symposium on Security and Privacy (2011)Google Scholar
- 19.Vinh, N.X., Epps, J., Bailey, J.: Information theoretic measures for clusterings comparison: is a correction for chance necessary? In: 26th Annual International Conference on Machine Learning, ICML (2009)Google Scholar
- 20.Vinh, N.X., Epps, J., Bailey, J.: Information Theoretic Measures for Clusterings Comparison: Variants, Properties, Normalization and Correction for Chance. Journal of Machine Learning Research (2010)Google Scholar