2021
DOI: 10.3390/jcp1010009
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions

Abstract: During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires blockchain data to be secured with mechanisms that allow on-demand (as opposed to full) disclosure. In this paper, we give a comprehensive overview of blockchain privacy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 101 publications
0
6
0
Order By: Relevance
“…Public blockchains aim to provide security and privacy for user transactions. However, incidents of thefts and data leaks frequently occur [70]. Figure 6 graph helps evaluate such vulnerabilities and how critical nodes, articulation points, and bridges can be identified in a network.…”
Section: Evaluating Security and Privacymentioning
confidence: 99%
“…Public blockchains aim to provide security and privacy for user transactions. However, incidents of thefts and data leaks frequently occur [70]. Figure 6 graph helps evaluate such vulnerabilities and how critical nodes, articulation points, and bridges can be identified in a network.…”
Section: Evaluating Security and Privacymentioning
confidence: 99%
“…Before adding each block to the blockchain, miners accept and verify the transactions using a consensus algorithm such as proof of work. By using proof of work or similar mechanism [15], miners solve very difficult mathematical calculations that should be accepted by other miners on the network [3]. After verifying the correctness of transactions by other miners, a block is appended to the end of the chain [24].…”
Section: Basic Concepts: Blockchain and Dhtmentioning
confidence: 99%
“…Blockchain technology, specifically private blockchains, relies on collaborative maintenance by multiple nodes in the network to ensure transparency and security of transaction and smart contract data. However, there are vulnerabilities that can be exploited by attackers to undermine the integrity of the blockchain network [31]. This section highlights some of the potential attacks that can occur in a private blockchain environment.…”
Section: Blockchain Vulnerabilitiesmentioning
confidence: 99%