A Survey on Vulnerabilities and Performance Evaluation Criteria in Blockchain Technology

  • Rishi Kumar Srivastav
  • Devendra Agrawal
    Goel Institute of Technology & Management Lucknow
  • Anurag Shrivastava
    Babu Banarasi Das Northern India Institute of Technology LUCKNOW

Abstract

The blockchain technology firstly presented by Haber and Stornetta in the year 1990, and first time blockchain technology used in Bitcoin by Satoshi Nakamoto in 2008. The blockchain technology is truly decentralized technology. In blockchain technology, every block has consisted three main parts that is data, hash block, and the previous hash block. Hash is controls the uniqueness of each block and it is unique for each block. Each block also contains the hash of the previous block; thus, the blocks are connected to each other. A blockchain can divided into three categories public blockchain, consortium blockchain and private blockchain. The proposed paper provided the comparative and analytical review on the blockchain consensus algorithms.
  • Referencias
  • Cómo citar
  • Del mismo autor
  • Métricas
Alsunaidi, S. J., & Alhaidari, F. A. (2019). Paper presented at the 2019 International Conference on Computer and Information Sciences (ICCIS). A Survey of Consensus Algorithms for Blockchain Technology.

Allwein, E. L., Schapire, R. E., & Singer, Y. (2001). Reducing multiclass to binary: A unifying approach for margin classifiers. The Journal of Machine Learning Re- search, 1, 113–141.

Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, tech- nology, and governance. Journal of Economic Perspectives, 29 (2), 213–238.

Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., et al. (2019). SoK: Consensus in the age of blockchains. In Paper presented at the Proceedings of the 1st ACM Conference on Advances in Financial Technologies

Bashir, I. (2017). Mastering blockchain. Packt Publishing Ltd

Bissias, G., Levine, B.N.,.Ozisik, A.P.,.& Andresen, G. (2016). An analysis of attacks on blockchain consensus. arXiv: 1610.07985.

Boireau, O. (2018). Securing the blockchain against hackers. Network Security, 2018 (1), 8–11.

Buntinx, J. (2018). What Is Proof-of-Weight? Retrieved March 31, 2019, from https: //nulltx.com/what- is- proof- of- weight/#.

Casino, F., Dasaklis, T. K., & Patsakis, C. (2019). A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics and Informatics, 36, 55–81.

Castro, M., & Liskov, B. (1999). Practical Byzantine fault tolerance. Paper presented at the OSDI.

Croman, K., Decker, C., Eyal, I., Gencer, A. E., Juels, A., Kosba, A., et al. (2016). On scaling decentralized blockchains. Paper presented at the International Conference on Financial Cryptography and Data Security.

Damasevicius, R., Ziberkas, G., Stuikys, V., & Toldinas, J. (2012). Energy consumption of hash functions. Elektronika ir elektrotechnika, 18 (10), 81–84.

Dasgupta, D., Shrein, J. M., & Gupta, K. D. (2019). A survey of blockchain from secu- rity perspective. Journal of Banking and Financial Technology, 3 (1), 1–17.

Dib, O., Brousmiche, K.-. L., Durand, A., Thea, E., & Hamida, E. B. (2018). Consortium blockchains: Overview, applications and challenges. International Journal On Ad- vances in Telecommunications, 11 (1&2).

Digiconomist. (2020). Bitcoin Energy Consumption Index. Retrieved 16/06/2020 from https://digiconomist.net/BITCOIN- ENERGY- CONSUMPTION.

Douceur, J. R. (2002). The sybil attack. Paper presented at the International workshop on peer-to-peer systems.

Dziembowski, S., Faust, S., Kolmogorov, V., & Pietrzak, K. (2015). Proofs of space. Paper presented at the Annual Cryptology Conference.

Gilad, Y., Hemo, R., Micali, S., Vlachos, G., & Zeldovich, N. (2017). Algorand: Scaling byzantine agreements for cryptocurrencies. In Paper presented at the Proceedings of the 26th Symposium on Operating Systems Principles.

Feng, Q., He, D., Zeadally, S., Khan, M. K., & Kumar, N. (2018). A survey on privacy protection in blockchain system. Journal of Network and Computer Applications.

Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Jan- icke, H. (2018). Blockchain technologies for the internet of things: Research is- sues and challenges. IEEE Internet of Things Journal, 6 (2), 2188–2204

Haber, S., & Stornetta, W. S. (1990). How to time-stamp a digital document. Paper presented at the Conference on the Theory and Application of Cryptography.

Hasanova, H., Baek, U. j., Shin, M. g., Cho, K., & Kim, M. S. (2019). A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. Interna- tional Journal of Network Management, 29 (2), e2060.

Korpela, K., Hallikas, J., & Dahlberg, T. (2017). Digital supply chain transformation toward blockchain integration. Paper presented at the proceedings of the 50th Hawaii international conference on system sciences.

Kroll, J. A., Davey, I. C., & Felten, E. W. (2013). The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In Paper presented at the Proceedings of WEIS.

Kumar Raghuvanshi, K., Khurana, P., & Bindal, P. (2014). Study and comparative anal- ysis of different hash algorithm. Journal of Engineering Computers & Applied Sci- ences, 3, 1–3.

Larimer, D. (2014). Delegated proof-of-stake (dpos). Bitshare whitepaper, Retrieved March 31, 2019, from https://docs.bitshares.org/bitshares/dpos.html.

P4Titan. (2014). A Peer-to-Peer Crypto-Currency with Proof-of-Burn. Retrieved March 10, 2019, from https://github.com/slimcoin-project/slimcoin-project.github.io/ raw/master/whitepaperSLM.pdf.

Panarello, A., Tapas, N., Merlino, G., Longo, F., & Puliafito, A. (2018). Blockchain and IoT integration: A systematic survey. Sensors (Basel), 18 (8). doi: 10.3390/ s18082575.

Salimitari, M., & Chatterjee, M. (2018). An Overview of Blockchain and Consensus Protocols for IoT Networks. arXiv: 1809.05613.

Satoshi Nakamoto (2019). Bitcoin: A peer-to-peer electronic cash system. https://bitcoinsv.io/bitcoin.pdf.

Shi, Y., Peng, Y., Kou, G., & Chen, Z. (2008). Introduction to data mining techniques via multiple criteria optimization approaches and applications. Data Warehous- ing and Mining: Concepts, Methodologies, Tools, and Applications, 3.

Tang, H., Shi, Y., & Dong, P. (2019). Public blockchain evaluation using entropy and TOPSIS. Expert Systems with Applications, 117, 204–210.

Tuwiner, J. (2020). Bitcoin Mining Pools. Retrieved from 18/06/2020 from https:// www.buybitcoinworldwide.com/mining/pools/.

Vallois, V., & Guenane, F. A. (2017). Paper presented at the 2017 1st Cyber Security in Networking Conference (CSNet).

Zhang, D., Shi, Y., Tian, Y., & Zhu, M. (2009). A class of classification and regression methods by multiobjective programming. Frontiers of Computer Science in China, 3 (2), 192–204.

Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017b). An overview of blockchain technology: Architecture, consensus, and future trends. Paper presented at the 2017 IEEE International Congress on Big Data (BigData Congress).

Zhang, H., Wang, J., & Ding, Y. (2019). Blockchain-based decentralized and secure keyless signature scheme for smart grid. Energy, 180, 955–967.
Srivastav, R. K., Agrawal, D., & Shrivastava, A. (2020). A Survey on Vulnerabilities and Performance Evaluation Criteria in Blockchain Technology. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 9(2), 91–105. https://doi.org/10.14201/ADCAIJ20209291105

Downloads

Download data is not yet available.

Author Biographies

Rishi Kumar Srivastav

,
BBD University
Assistant ProfessorDept. CSE BBD University Lucknow

Devendra Agrawal

,
Goel Institute of Technology & Management Lucknow
Director Academics Goel Institute of Technology & Management Lucknow

Anurag Shrivastava

,
Babu Banarasi Das Northern India Institute of Technology LUCKNOW
Professor and Head, CSE Babu Banarasi Das Northern India Institute of Technology LUCKNOW
+