Bitcoin-Blockchain Technology: Security Perspective
Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology that allows Bitcoin to operate. Bitcoin has already cemented itself as a popular virtual currency, and it will soon become a pressing requirem...
Saved in:
Published in | 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM) pp. 291 - 296 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
27.04.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology that allows Bitcoin to operate. Bitcoin has already cemented itself as a popular virtual currency, and it will soon become a pressing requirement for citizens. Furthermore, with digital currencies proliferating all over the world, security must not be overlooked, especially when there have been numerous attacks and security vulnerabilities on bitcoin's blockchain. However, the lucrative system has drawn opponents and attackers who are continually attempting to exploit flaws in the technology in order to get profit. This paper contemplates the bitcoin's transaction process, with a focus on obscuring the true identities of clients and their coins prior to transacting, and then elucidating on the following: SHA-256 function, the primary threats to Bitcoin's security, along with some countermeasures to be undertaken. |
---|---|
AbstractList | Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology that allows Bitcoin to operate. Bitcoin has already cemented itself as a popular virtual currency, and it will soon become a pressing requirement for citizens. Furthermore, with digital currencies proliferating all over the world, security must not be overlooked, especially when there have been numerous attacks and security vulnerabilities on bitcoin's blockchain. However, the lucrative system has drawn opponents and attackers who are continually attempting to exploit flaws in the technology in order to get profit. This paper contemplates the bitcoin's transaction process, with a focus on obscuring the true identities of clients and their coins prior to transacting, and then elucidating on the following: SHA-256 function, the primary threats to Bitcoin's security, along with some countermeasures to be undertaken. |
Author | Yadav, Jaya Pathak, Prabhash Chandra Arya, Swati Ansar, Syed Anas Aggrawal, Shruti |
Author_xml | – sequence: 1 givenname: Syed Anas surname: Ansar fullname: Ansar, Syed Anas email: syed000anas@gmail.com organization: Babu Banarasi Das University,Department of Computer Application,Lucknow,India – sequence: 2 givenname: Swati surname: Arya fullname: Arya, Swati email: swatiarya.g1@gmail.com organization: Babu Banarasi Das University,Department of Computer Application,Lucknow,India – sequence: 3 givenname: Shruti surname: Aggrawal fullname: Aggrawal, Shruti email: drshruti.cse@gmail.com organization: Thapar Institute of Engineering and Technology,Department of Computer Science and Engineering,Patiala,India – sequence: 4 givenname: Jaya surname: Yadav fullname: Yadav, Jaya email: jaya9236@gmail.com organization: University of Lucknow,Department of Computer Science,Lucknow,India – sequence: 5 givenname: Prabhash Chandra surname: Pathak fullname: Pathak, Prabhash Chandra email: pathakprabhash2@gmail.com organization: Babu Banarasi Das University,Department of Computer Application,Lucknow,India |
BookMark | eNotz7FOwzAQgGEjwUALT8BAXiDB5_M5DhuNCkQqAokyV459oRYhrtKAlLdnoNO_fdK_EOdDGliIW5AFgKzumrpZv5BWCgollSoqSwi2OhMLMIa0KcnYS4GrOPkUh3zVJ__l9y4O2Zb9fkh9-pzvs3f2P2Oc5uyNx-OB_RR_-UpcdK4_8vWpS_HxuN7Wz_nm9ampHzZ5BLBTHpDK0nHQ6Aw660k7CBQ6zaYLstUKW2U82VYjWfAYgvOtk52SprSBFC7Fzb8bmXl3GOO3G-fd6QP_ALAyQzY |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICIEM54221.2022.9853189 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1665467568 9781665467568 |
EndPage | 296 |
ExternalDocumentID | 9853189 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i118t-d3577aed43a63a8c54a1d5df4e6fd0b423b26c58b43581c3ddacba0f20678d523 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:25:13 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i118t-d3577aed43a63a8c54a1d5df4e6fd0b423b26c58b43581c3ddacba0f20678d523 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9853189 |
PublicationCentury | 2000 |
PublicationDate | 2022-April-27 |
PublicationDateYYYYMMDD | 2022-04-27 |
PublicationDate_xml | – month: 04 year: 2022 text: 2022-April-27 day: 27 |
PublicationDecade | 2020 |
PublicationTitle | 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM) |
PublicationTitleAbbrev | ICIEM |
PublicationYear | 2022 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8752345 |
Snippet | Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 291 |
SubjectTerms | Anonymity Bitcoin Blockchain Blockchains Online banking PoW (Proof-of-Work) Pressing Proof of Work Security SHA-256 Function |
Title | Bitcoin-Blockchain Technology: Security Perspective |
URI | https://ieeexplore.ieee.org/document/9853189 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LawIxEB7UU09t0dI3e-ixu-5mk92kR0XRgkVoBW8yeVER1lJ2L_76JutWaemhtxACeZH58iUz3wA8UIYmy6U7aSR3BAUVC7k0JBRCM2eTuVW17OLsJZss6POSLVvweIiFMcbUzmcm8sX6L19vVeWfyvrCYUvCRRvaPCb7WK3GZSuJRX86nI5mjBLiaR8hUdP6R9qUGjXGpzD77m_vLLKJqlJGavdLivG_AzqD3jE-L5gfkOccWqboQjpYl2q7LsKBw6eNeneUPzg-nD8Fr02mumB-jK_swWI8ehtOwiYlQrh2TKAMdcryHI2mKWYpcsUoJpppS01mdSzd3UiSTDEuqdc1U6nWqCTG1ou0c-1I5wV0im1hLiGgOkPLrDO86K512iLNqUwEpzoliIm4gq6f8Opjr3qxauZ6_Xf1DZz4Rff_LCS_hU75WZk7B9elvK_36QuzNZew |
link.rule.ids | 310,311,786,790,795,796,802,27956,55107 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedCTyib-tgePtmvTpEk8bmxsuo6BG-w28qs4Bp1Ie_GvN-nqhuLBWwiB5BGSL9_Le98DeMBEmIRKe9IQtQRFKOIzaZDPuSb2TmaZqmQX00kynOPnBVk04HGXC2OMqYLPTOCa1V--3qjSuco63GJLxPgBHFqcD-k2W6sO2opC3hn1Rv2UYIQc8UMoqMf_KJxS4cbgBNLvGbfhIuugLGSgPn-JMf53SafQ3mfoedMd9pxBw-QtiLurQm1Wud-1CLVWb5b0e3vX-ZP3Wteq86b7DMs2zAf9WW_o10UR_JXlAoWvY0KpMBrHIokFUwSLSBOdYZNkOpT2dSRRogiT2CmbqVhroaQIMyfTzrSlnefQzDe5uQAP60RkJLNXr7APO50JTLGMOMM6RkJE_BJazuDl-1b3YlnbevV39z0cDWfpeDkeTV6u4dhtgPt1QfQGmsVHaW4teBfyrtqzL-ICmwQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+3rd+International+Conference+on+Intelligent+Engineering+and+Management+%28ICIEM%29&rft.atitle=Bitcoin-Blockchain+Technology%3A+Security+Perspective&rft.au=Ansar%2C+Syed+Anas&rft.au=Arya%2C+Swati&rft.au=Aggrawal%2C+Shruti&rft.au=Yadav%2C+Jaya&rft.date=2022-04-27&rft.pub=IEEE&rft.spage=291&rft.epage=296&rft_id=info:doi/10.1109%2FICIEM54221.2022.9853189&rft.externalDocID=9853189 |