Bitcoin: A Meticulous Analysis

2019 ◽  
Vol 16 (2) ◽  
pp. 786-792
Author(s):  
Sasi Kala K. Rani ◽  
D. Ramya ◽  
D. Gokul ◽  
C. Sibiya ◽  
S. Sreya

Bitcoin is the worldwide crypto currency and it is the digital payment system known as the decentralized digital currency. All the transactions are recorded in a public ledger known as block chain. It has no central authority or no single administrator. This paper studies about the technical view of the bitcoin system, the problems faced in the peer-to-peer network, schemes used for improving the quality of transactions, and also the security issues faced by the user while proceeding with these transactions. It includes the major advantages of bitcoin transactions and its worldwide usage. The other side of bitcoin includes the usage of it in ransom ware attack and in other illegal activities. Finally this paper also comprises why bitcoin is not widely accepted in India.

2021 ◽  
Vol Volume 17, Issue 4 ◽  
Author(s):  
Massimo Bartoletti ◽  
Letterio Galletta ◽  
Maurizio Murgia

Decentralized blockchain platforms have enabled the secure exchange of crypto-assets without the intermediation of trusted authorities. To this purpose, these platforms rely on a peer-to-peer network of byzantine nodes, which collaboratively maintain an append-only ledger of transactions, called blockchain. Transactions represent the actions required by users, e.g. the transfer of some units of crypto-currency to another user, or the execution of a smart contract which distributes crypto-assets according to its internal logic. Part of the nodes of the peer-to-peer network compete to append transactions to the blockchain. To do so, they group the transactions sent by users into blocks, and update their view of the blockchain state by executing these transactions in the chosen order. Once a block of transactions is appended to the blockchain, the other nodes validate it, re-executing the transactions in the same order. The serial execution of transactions does not take advantage of the multi-core architecture of modern processors, so contributing to limit the throughput. In this paper we develop a theory of transaction parallelism for blockchains, which is based on static analysis of transactions and smart contracts. We illustrate how blockchain nodes can use our theory to parallelize the execution of transactions. Initial experiments on Ethereum show that our technique can improve the performance of nodes.


The recent trend of today’s digital media is the usage of poisoned website to mine crypto currencies, these currencies are alternatives to traditional currencies which work based on decentralization, bit coin was the first currency to be establish in this way, crypto currencies are protected with block chain which can be simplified as growing chain. This block chain is managed by peer to peer network, based upon this blockchain network crypto jacking takes place, and hence cryptojacking is mining of one's digital currencies without their knowledge, hackers find cryptojacking more profitable because they are a lotcheaper and safe than compared to other digital thefts. Tracking and finding the cause of theft becomes very hard in this method because mining kits can be purchased at a very cheap cost. There are primarily two methods to be followed to get to the computer and to perform cryptojacking, one is to run a infected code on the host computer and the other is to make the user click the content with threat but widely both will be used for increased profit outcome. In this paper an overview of crypto currencies, method of decentralization, various mining techniques followed and different types of cybercrimes prevalent are discussed.


2015 ◽  
Vol 14 (4) ◽  
pp. 617 ◽  
Author(s):  
Chris Rose

Bitcoin was not the first attempt at a digital currency, but it has been the most successful and it is now being accepted by a number of major retailers. Bitcoin is a cryptocurrency and operates as a peer-to-peer network. Its security is guaranteed by cryptographic algorithms instead of governments and has the potential to become a major means of payment for e-commerce and may even materialize as a viable challenge to traditional money-transfer providers. Instead of serving one country or some countries, Bitcoin serves the entire world.


2011 ◽  
pp. 131-144
Author(s):  
Sridhar Asvathanarayanan

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.


Author(s):  
Rajendra G. Singh ◽  
Margaret A. Bernard

In this research, improving on the quality of Reusable Learning Objects (RLOs) on a Peer-To-Peer (P2P) network is considered. The RLO was first redesigned to have a fundamentally inherent pedagogical structure, which gave it an immediate foundational level of quality in terms of opportunities related to reusability. Applying the Learning Object Review Instrument 1.5 (LORI 1.5) demonstrated that some of the elements are inherent in this new RLO design, so there was no need to constantly have such features evaluated with LORI. A modified LORI was therefore developed in order to evaluate the remaining features of the RLO. The research identified these remaining elements to produce a Review Rubric for scoring the RLO’s quality. In addition, an algorithm is given which considers one or more subject-matter experts as part of a review process. Utilizing the subject-matter experts in a P2P network involved the creation of special nodes to ensure data integrity and post-availability of the review scores for RLOs. The research concludes that the redesigned RLOs along with the corresponding Review Rubric and scoring algorithm produces a system suitable for a P2P network, where for the first time, RLOs can be shared of assured quality to promote eLearning within P2P networks.


2013 ◽  
Vol 664 ◽  
pp. 1076-1081
Author(s):  
Xin Chen

Recently, some proposals suggest to use a peer-to-peer network instead of servers to facilitate SIP user registration and location in IMS communication systems. Due to the lack of central authority, security issue becomes one of the main problems in such P2P IMS systems. In this paper, we propose a novel security architecture for P2P IMS system. By using this architecture, our P2P IMS system becomes a fully distributed secure system in which there is not a central server indeed. Furthermore, our system is a scalable system which is capable of anonymous yet accountable real time communication based on SIP protocol which enables the system compatible with any existing IMS systems.


Author(s):  
Burcu Sakız ◽  
Ayşen Hiç Gencer

Bitcoin is the first decentralized innovative alternative digital currency, which was introduced in 2009 and is now one of the most widely used crypto-currencies. As digital assets, crypto-currencies utilize encryption technology and electronic payment system based on cryptographic proof instead of trust in a central authority, such as a government or a central bank. The Blockchain system, which is the underlying infrastructure for transferring any crypto-currency, is a shared form of recording that facilitates the recording of assets and transactions in an open network. Blockchain enables bitcoin transfer transactions from peer to peer without any intermediary, such as a bank or a transfer agency. In this study, artificial intelligence algorithms are developed in order to forecast the bitcoin price by taking into account monthly average prices of the previous three years.


Author(s):  
Wojciech Mincewicz

Cryptocurrencies are a decentralized, peer–to–peer network architecture, cryptographically secured, based on trust and consensus, type of virtual currency, incompletely fulfilling some functions of money. They constitute a new interdisciplinary subject of scientific research. In the article, the author indicates potential areas of empirical exploration that can be conducted by representatives of social sciences. The four areas identified were: research on attitudes and opinions, the behavior of the community of cryptocurrency users, products of Internet culture and the structure of the Internet, including, in particular, the block chain. The research is based on well–established techniques, classic in research practice, which, due to the different nature of virtual and physical reality, are modified and adapted to technical conditions.


Author(s):  
Burcu Sakız ◽  
E. Ayşen Hiç Gencer

Satoshi Nakamoto is the name used by the presumed pseudonymous person or persons believed to be the inventor of cryptocurrency Bitcoin, came up with the concept of blockchain as a core component of it when published a white paper on “BitCoin: A peer to peer electronic cash system” in 2008, blockchain technology made its public debut. Bitcoin is generally considered the first decentralized cryptocurrency and since the release of it, over 6,000 altcoins have been created. Cryptocurrencies use decentralized control as opposed to well-known, traditional centralized digital currency and also central banking systems. The decentralized control of each cryptocurrency works through distributed ledger technology, typically a blockchain. Blockchain is a system that in which a record of transactions made in cryptocurrencies are maintained across several computers/servers that are linked in a peer-to-peer network. Blockchain based applications provides many opportunities to create a more sustainable world. This paper contribute to the discussion on future avenues for sustainability especially in terms of cryptocurrencies and blockchain based platforms and services.


2008 ◽  
pp. 1070-1079
Author(s):  
Sridhar Asvathanarayanan

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.


Sign in / Sign up

Export Citation Format

Share Document