Bitcoin-Blockchain Technology: Security Perspective

Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology that allows Bitcoin to operate. Bitcoin has already cemented itself as a popular virtual currency, and it will soon become a pressing requirem...

Full description

Saved in:
Bibliographic Details
Published in2022 3rd International Conference on Intelligent Engineering and Management (ICIEM) pp. 291 - 296
Main Authors Ansar, Syed Anas, Arya, Swati, Aggrawal, Shruti, Yadav, Jaya, Pathak, Prabhash Chandra
Format Conference Proceeding
LanguageEnglish
Published IEEE 27.04.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology that allows Bitcoin to operate. Bitcoin has already cemented itself as a popular virtual currency, and it will soon become a pressing requirement for citizens. Furthermore, with digital currencies proliferating all over the world, security must not be overlooked, especially when there have been numerous attacks and security vulnerabilities on bitcoin's blockchain. However, the lucrative system has drawn opponents and attackers who are continually attempting to exploit flaws in the technology in order to get profit. This paper contemplates the bitcoin's transaction process, with a focus on obscuring the true identities of clients and their coins prior to transacting, and then elucidating on the following: SHA-256 function, the primary threats to Bitcoin's security, along with some countermeasures to be undertaken.
AbstractList Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology that allows Bitcoin to operate. Bitcoin has already cemented itself as a popular virtual currency, and it will soon become a pressing requirement for citizens. Furthermore, with digital currencies proliferating all over the world, security must not be overlooked, especially when there have been numerous attacks and security vulnerabilities on bitcoin's blockchain. However, the lucrative system has drawn opponents and attackers who are continually attempting to exploit flaws in the technology in order to get profit. This paper contemplates the bitcoin's transaction process, with a focus on obscuring the true identities of clients and their coins prior to transacting, and then elucidating on the following: SHA-256 function, the primary threats to Bitcoin's security, along with some countermeasures to be undertaken.
Author Yadav, Jaya
Pathak, Prabhash Chandra
Arya, Swati
Ansar, Syed Anas
Aggrawal, Shruti
Author_xml – sequence: 1
  givenname: Syed Anas
  surname: Ansar
  fullname: Ansar, Syed Anas
  email: syed000anas@gmail.com
  organization: Babu Banarasi Das University,Department of Computer Application,Lucknow,India
– sequence: 2
  givenname: Swati
  surname: Arya
  fullname: Arya, Swati
  email: swatiarya.g1@gmail.com
  organization: Babu Banarasi Das University,Department of Computer Application,Lucknow,India
– sequence: 3
  givenname: Shruti
  surname: Aggrawal
  fullname: Aggrawal, Shruti
  email: drshruti.cse@gmail.com
  organization: Thapar Institute of Engineering and Technology,Department of Computer Science and Engineering,Patiala,India
– sequence: 4
  givenname: Jaya
  surname: Yadav
  fullname: Yadav, Jaya
  email: jaya9236@gmail.com
  organization: University of Lucknow,Department of Computer Science,Lucknow,India
– sequence: 5
  givenname: Prabhash Chandra
  surname: Pathak
  fullname: Pathak, Prabhash Chandra
  email: pathakprabhash2@gmail.com
  organization: Babu Banarasi Das University,Department of Computer Application,Lucknow,India
BookMark eNotz7FOwzAQgGEjwUALT8BAXiDB5_M5DhuNCkQqAokyV459oRYhrtKAlLdnoNO_fdK_EOdDGliIW5AFgKzumrpZv5BWCgollSoqSwi2OhMLMIa0KcnYS4GrOPkUh3zVJ__l9y4O2Zb9fkh9-pzvs3f2P2Oc5uyNx-OB_RR_-UpcdK4_8vWpS_HxuN7Wz_nm9ampHzZ5BLBTHpDK0nHQ6Aw660k7CBQ6zaYLstUKW2U82VYjWfAYgvOtk52SprSBFC7Fzb8bmXl3GOO3G-fd6QP_ALAyQzY
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICIEM54221.2022.9853189
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1665467568
9781665467568
EndPage 296
ExternalDocumentID 9853189
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-d3577aed43a63a8c54a1d5df4e6fd0b423b26c58b43581c3ddacba0f20678d523
IEDL.DBID RIE
IngestDate Wed Jun 26 19:25:13 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-d3577aed43a63a8c54a1d5df4e6fd0b423b26c58b43581c3ddacba0f20678d523
PageCount 6
ParticipantIDs ieee_primary_9853189
PublicationCentury 2000
PublicationDate 2022-April-27
PublicationDateYYYYMMDD 2022-04-27
PublicationDate_xml – month: 04
  year: 2022
  text: 2022-April-27
  day: 27
PublicationDecade 2020
PublicationTitle 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM)
PublicationTitleAbbrev ICIEM
PublicationYear 2022
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8752345
Snippet Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology...
SourceID ieee
SourceType Publisher
StartPage 291
SubjectTerms Anonymity
Bitcoin
Blockchain
Blockchains
Online banking
PoW (Proof-of-Work)
Pressing
Proof of Work
Security
SHA-256 Function
Title Bitcoin-Blockchain Technology: Security Perspective
URI https://ieeexplore.ieee.org/document/9853189
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LawIxEB7UU09t0dI3e-ixu-5mk92kR0XRgkVoBW8yeVER1lJ2L_76JutWaemhtxACeZH58iUz3wA8UIYmy6U7aSR3BAUVC7k0JBRCM2eTuVW17OLsJZss6POSLVvweIiFMcbUzmcm8sX6L19vVeWfyvrCYUvCRRvaPCb7WK3GZSuJRX86nI5mjBLiaR8hUdP6R9qUGjXGpzD77m_vLLKJqlJGavdLivG_AzqD3jE-L5gfkOccWqboQjpYl2q7LsKBw6eNeneUPzg-nD8Fr02mumB-jK_swWI8ehtOwiYlQrh2TKAMdcryHI2mKWYpcsUoJpppS01mdSzd3UiSTDEuqdc1U6nWqCTG1ou0c-1I5wV0im1hLiGgOkPLrDO86K512iLNqUwEpzoliIm4gq6f8Opjr3qxauZ6_Xf1DZz4Rff_LCS_hU75WZk7B9elvK_36QuzNZew
link.rule.ids 310,311,786,790,795,796,802,27956,55107
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedCTyib-tgePtmvTpEk8bmxsuo6BG-w28qs4Bp1Ie_GvN-nqhuLBWwiB5BGSL9_Le98DeMBEmIRKe9IQtQRFKOIzaZDPuSb2TmaZqmQX00kynOPnBVk04HGXC2OMqYLPTOCa1V--3qjSuco63GJLxPgBHFqcD-k2W6sO2opC3hn1Rv2UYIQc8UMoqMf_KJxS4cbgBNLvGbfhIuugLGSgPn-JMf53SafQ3mfoedMd9pxBw-QtiLurQm1Wud-1CLVWb5b0e3vX-ZP3Wteq86b7DMs2zAf9WW_o10UR_JXlAoWvY0KpMBrHIokFUwSLSBOdYZNkOpT2dSRRogiT2CmbqVhroaQIMyfTzrSlnefQzDe5uQAP60RkJLNXr7APO50JTLGMOMM6RkJE_BJazuDl-1b3YlnbevV39z0cDWfpeDkeTV6u4dhtgPt1QfQGmsVHaW4teBfyrtqzL-ICmwQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+3rd+International+Conference+on+Intelligent+Engineering+and+Management+%28ICIEM%29&rft.atitle=Bitcoin-Blockchain+Technology%3A+Security+Perspective&rft.au=Ansar%2C+Syed+Anas&rft.au=Arya%2C+Swati&rft.au=Aggrawal%2C+Shruti&rft.au=Yadav%2C+Jaya&rft.date=2022-04-27&rft.pub=IEEE&rft.spage=291&rft.epage=296&rft_id=info:doi/10.1109%2FICIEM54221.2022.9853189&rft.externalDocID=9853189