CONCERNS ABOUT DOUBLE SPENDING ATTACK IN BLOCKCHAIN'S SECURITY AND THEIR POTENTIAL SOLUTIONS

Authors

  • Suranjit Kosta Institute of Advance Computing, SAGE University, Indore, Madhya Pradesh, India Author

Keywords:

Blockchain, Security And Privacy, Security Threats

Abstract

Bitcoin's underlying blockchain technology is rapidly rising in popularity as a means to create and manage digital transactions. It's a decentralized, immutable ledger for recording transactions. Many industries, including the Internet of Things, healthcare, energy, supply chain, manufacturing, cyber security, and especially financial services, could benefit from a rethinking of how digital transactions are conceived thanks to this rapidly developing technology. This new technology, however, is still in its formative stages of development. Blockchain has enormous potential, but there are still many questions about how to best use it, including how to ensure its scalability, security, privacy, compliance, and governance. Some research has been done on blockchain security and privacy concerns, but there hasn't been a comprehensive look at how secure blockchain systems actually are. This article evaluated the vulnerabilities already present in the Blockchain and provided a comprehensive evaluation of the security concerns facing blockchain systems. These flaws allow for the activation of a wide variety of security threats that could otherwise prevent Blockchain platforms from functioning as intended.

References

Blockchains & distributed ledger technologies. (n.d.). Retrieved February 27, 2018,

https://blockchainhub.net/blockchains-anddistributed-ledger-technologies-in-general/. Bonneau,J. (n.d.).

S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008

Lloyd's London presents a report called “Emerging Risk Report 2015”

Gervais et al Retrieved February 27, 2018, “Novel quantitative framework to analyze the security and performance implications of various consensus and network parameters of Proof of Work (PoW) blockchains”

Apostolaki, Zohar, and Vanbever, 2017 “Bitcoin's Hijacking”

Conti, M., E, S. K., Lal, C., & Ruj, S. (2017). A survey on security and privacy issues of Bitcoin. ArXiv:1706.00916 [Cs]. Retrieved from http://arxiv.org/abs/1706.00916.

Ellervee, A. (2017). A reference model for Blockchainbased distributed ledger technology. (Unpublished master's thesis), University of Tartu.

Mearian, L. (2018, January 18). What is blockchain? The most disruptive tech in decades. Retrieved February 23, 2018, https:// www. computerworld.com/article/319107 7/security/ what-is-blockchain-the-most-disruptivetech-in-decades.html

Halpin, H., & Piekarska, M. (2017). Introduction to security and privacy on the Blockchain. In Security and Privacy Workshops (EuroS&PW), 2017 IEEE European Symposium on (pp. 1–3). IEEE.

Downloads

Published

2023-06-20

How to Cite

Suranjit Kosta. (2023). CONCERNS ABOUT DOUBLE SPENDING ATTACK IN BLOCKCHAIN’S SECURITY AND THEIR POTENTIAL SOLUTIONS. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND MANAGEMENT INFORMATION SYSTEMS (IJITMIS), 14(1), 59-67. https://lib-index.com/index.php/IJITMIS/article/view/IJITMIS_14_01_007