A Comprehensive Review of the Security and Privacy Issues in Blockchain Technologies

2022 ◽  
pp. 180-199
Author(s):  
Mangesh Manikrao Ghonge ◽  
N. Pradeep ◽  
Renjith V. Ravi ◽  
Ramchandra Mangrulkar

The development of blockchain technology relies on a variety of disciplines, including cryptography, mathematics, algorithms, and economic models. All cryptocurrency transactions are recorded on a digital and decentralized public ledger known as the blockchain. Customers may keep track of their crypto-transactions by looking at a chronological list rather than a centralized ledger. The blockchain's application potential is bright, and it has already produced results. In various fields, blockchain technology has been incorporated and deployed, from the earliest days of cryptocurrencies to the present day with new-age smart contracts. No comprehensive study on blockchain security and privacy has yet been done despite numerous studies in this area over the years. In this chapter, the authors talked about blockchain's security and privacy issues as well as the impact they've had on various trends and applications. This chapter covers both of these topics.

Author(s):  
Yehia Ibrahim Alzoubi ◽  
Ahmad Al-Ahmad ◽  
Ashraf Jaradat

<span lang="EN-US">Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.</span>


Author(s):  
Pengcheng Xia ◽  
Haoyu Wang ◽  
Bingyu Gao ◽  
Weihang Su ◽  
Zhou Yu ◽  
...  

The prosperity of the cryptocurrency ecosystem drives the need for digital asset trading platforms. Beyond centralized exchanges (CEXs), decentralized exchanges (DEXs) are introduced to allow users to trade cryptocurrency without transferring the custody of their digital assets to the middlemen, thus eliminating the security and privacy issues of traditional CEX. Uniswap, as the most prominent cryptocurrency DEX, is continuing to attract scammers, with fraudulent cryptocurrencies flooding in the ecosystem. In this paper, we take the first step to detect and characterize scam tokens on Uniswap. We first collect all the transactions related to Uniswap V2 exchange and investigate the landscape of cryptocurrency trading on Uniswap from different perspectives. Then, we propose an accurate approach for flagging scam tokens on Uniswap based on a guilt-by-association heuristic and a machine-learning powered technique. We have identified over 10K scam tokens listed on Uniswap, which suggests that roughly 50% of the tokens listed on Uniswap are scam tokens. All the scam tokens and liquidity pools are created specialized for the "rug pull" scams, and some scam tokens have embedded tricks and backdoors in the smart contracts. We further observe that thousands of collusion addresses help carry out the scams in league with the scam token/pool creators. The scammers have gained a profit of at least $16 million from 39,762 potential victims. Our observations in this paper suggest the urgency to identify and stop scams in the decentralized finance ecosystem, and our approach can act as a whistleblower that identifies scam tokens at their early stages.


Author(s):  
Sara Jeza Alotaibi

Today's era of globalization and digital transformation has produced many modern technologies that have influenced modern societies, blockchain being one. This chapter will set out definitions and criteria related to what blockchain is, its advantages and limitations, and its relation to the modern techniques used in the conclusion of smart contracts; and the impact of this technology on fighting administrative and financial corruption. Within this chapter, the central focus is on a new form of contracts founded as a result of the challenge of aligning the current system of the contract with the application of blockchain technology (i.e., to replace the idea of credit intermediation in dealing [notary, bank, management] with another thought based on a peer-to-peer system to increase contractual security and to establish the principle of self-implementation of the contract without the need to mediate with others).


2022 ◽  
pp. 38-67
Author(s):  
Toni Zhimomi ◽  
Mohammad Saad Alam ◽  
Hafiz Malik

Charging infrastructure is a key factor in successful electric vehicle adoption. Charging stations are still a fragmented market in terms of ownership, lack of standards, and charging protocols. The increasing decentralised grid has made energy and communication flow bi-directional. Challenges arise in maintaining the increasing decentralised structure, security, and privacy of the network. Blockchain facilitates the interconnectedness of such a distributed and decentralised network. Blockchain's versatility lies in its transparent and immutable decentralized architecture that enables direct transactions between users without the need of a middleman. It provides powerful safeguards against cyberattacks with its advanced cryptography enabling privacy-preserving authentication. This chapter presents a comprehensive review on the application of blockchain technology in EV charging infrastructure such as facilitating the peer-to-peer energy exchange, increased security and privacy, immutable transactions, and mitigating trust issues among the participants in the charging infrastructure.


2021 ◽  
Vol 8 (2) ◽  
pp. 881-888 ◽  
Author(s):  
Bhabendu Kumar Mohanta ◽  
Debasish Jena ◽  
Somula Ramasubbareddy ◽  
Mahmoud Daneshmand ◽  
Amir H. Gandomi

Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


Tap ◽  
2017 ◽  
Author(s):  
Anindya Ghose

This epilogue presents a few closing thoughts about the impact of mobile technology on society at large. It argues that the future of mobile advertising depends on a bargain that consumers and firms need to strike with each other. Both sides will have to make some investments and offer some trust for this give-and-take relationship to prosper. Consumers will need to find better ways to strike a personal balance between their lives and mobile technology. They will need to make the choice about how much they let technology intrude and inform their lives. They will hold the key to how open or private they want to be with their data. But this does not relieve businesses of their responsibilities. They need to pay attention and take their roles very seriously in this ecosystem. They should surprise and impress consumers while helping them with their needs the way a butler or a concierge would. More importantly, they need to take data security and privacy issues seriously.


Sign in / Sign up

Export Citation Format

Share Document