24/7 writing help on your phone
Save to my list
Remove from my list
Block chain Technology is spread all over the world in various sectors. Blockchain Technology is transparent in various areas such as supply chain management, international payment, interbanking, and so on. Recently rapid increase is reported in incidents of scrutiny and security breaches compromising users’ privacy call which leads into question about blockchain technology security. These days due to excessive usage of e and m i.e; internet and mobile third-parties collect and control massive amounts of personal data and transaction.
This paper provides a review regarding the intersection of dangers ,malicious attack ,Cyber crime and risks relying on blockchains. This paper we describe, explore and analyze the security issues and highlight several attacks that might be occurred in the proposed system. Is blockchain technology capable to fight against the malicious online activity i.e. blockchain technology is safe or not?
Blockchain is transparent and decentralized distributed database technology which is used in various sectors like supply chain management, international payment, Internet banking.
A blockchain is a is a discrete database records or public guideline of all the transactions or digital events that have been implemented among all the participating parties .Blockchain extent approval ideal deals with brokers by way of the Internet itself. The blockchain contains a valuable records of every single transaction which made by user. Blockchain technology is best described as one that enables records to be shared by all network nodes, updated by miners, monitored by everyone, and owned and controlled by no one.Blockchain called as the backbone of the whole crypto-currency system.
The Blockchain is typically accessed by a peer-to-peer network, observing to a protocol for validating original chunks. Once recorded, the data in any given chunk cannot be altered retroactively without the modification of all blocks and knowledge of the network majority. Bitcoins are a crypto-currency and digital payment system. Bitcoins exist only in the cloud, like Paypal, Citrus or Paytm. Even though they are virtual, rather than physical, they are used like cash when transferred between people through the internet.Blockchain technology and the bitcoin have today become a similar platform where societies have been carrying out their normal transactions.
All online transactions rely on trusting someone to verify the truth it can be a certification authority telling us certain digital certificate is trustworthy,a bank telling us that a financial remittance has been deliveredreliably to a creditor ,an email services provider verifying that our email has been delivered ,or a social network such as posting of life events on social network like Facebook.The real fact is that we live our life precariously in the digital world by relying on a central trusted entity for the security and privacy of our digital assets.These third party sources can be hacked and hateful attack.Although blockchain technology prevents several types of hateful attacks and reduces many risks, it does not remove all types of attacks . This paper has review the blockchain technology for identifying online fraud, identifies certain fraud and malicious activities that the blockchain technology can effectively prevent, and makes recommendations for strategically fighting various attacks to which blockchain technology may be weak. Further research is necessary to recover the technology and related anti-attack measures for digital identity theft, money laundering, and hacking.
The block chain is the source of where the data is stored and all old transactions are secure transactions by storing them in a Merkle Tree   that prevents an operation can be carried out for duplicate or without the corresponding funds or double spent. – Mining  .The mining process is unique and is the basis for the creation of the block chain and the generation of new currency. No mining there is no way to guarantee blocks consistency. Also, this method provides satisfaction to BitCoin generating new currency. BlockChain, makes it very attractivetechnology to solve the current Financial as well as non-financial business problems.A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Now a days cyber-attacks have become even more complicated and advanced. The evolution of crypto currency and Blockchain technology has been so prompt, that even those who haven’t listen and knowledge about crypto-currency or blockchain. . Fig 1: HowBlockchain Technology Works Features of Block chain technology: SHA256 Hash Function: Hash function is useful for a one-way’ cryptographic function, the output is not encryption’ i.e it cannot be decrypted back to the original text. Public Key Cryptography: This technique helpful for the user to create a set of keys referred as Public key and Private Key. In this technique, Public key is shared with others whereas the Private Key is kept as a secret by the user. Distributed Ledger & Peer to Peer Network: All the blocks of data is spread among all users by Blockchain technology , i.e., the ledger has no main location where it is stored. Every user are on the network having their own a copy of the ledger.
Proof of Work: The online message has a unique identity .It gives us proof of ownership of document, online successfulpayment message. It gives the proof that the transaction is genuine.
Types of Blockchain:Blockchain technology can be implemented public, private and semi-private sector .Private blockchain offers fast transaction and peer to peer network communication that give facility who has access to the data at any time. Two types of developers are responsible for block chain technology Core Blockchain Developers and Blockchain Software Developers.Core Blockchain Developer: Developer developed the design, architecture, and security of a blockchain systemof whole entire network
Blockchain Software Developer: Blockchain Software Developers have different roles. To build applications for Smart Smart Contracts, front-end designs. Blockchain technology can be implemented in public, private and semi private sector. Private blockchain offers fast transaction and peer to peer network communication that give facility who has access to the data at any time. Two types of developers are responsible for block chain technology Core Blockchain Developers and Blockchain Software Developers.
They provide transactions are absolute .Public block chain can hide the actions of user transaction.An designer liable for evolving and optimizing blockchain protocols, crafting the architecture of blockchain systems, developing smart contracts and web apps using blockchain technology are commonly called blockchain developer,but somewhere between the two private and semiprivate sector block chain developers chose public and private blockchain. That time Government which are not responsible for implementations of blockchain ,limiting the users who may participate in the blockchain and bitcointechnology. Blockchain technology includes features necessary for creating trust inan information system namely many unknown stakeholders, fraud and a missingcommon framework, lack of transparency, and different IT capabilities.Therefore, it is essential to consider carefully, in which cases the use of blockchain makes sense. Personal data, and sensitive data in general, should not be trusted in the hands of third-parties, where they are susceptible to attacks and misuse.I
In addition to that blockchain technology is best described as onethat enables records to be shared by all network nodes, updated by miners, block chain technology may offer ,an understanding of the attendant risks and dangers is necessary.Blockchain technology enables decentralized, trustless, encrypted transactions and events to be recorded and stored publicly, optimists believe it can prevent online fraud and attacks . To assess these capabilities of blockchain technology, first check existingtechniques for battling malicious attacks in cyberspace.
The complexity of the miningprocess.RecordHacking Records in the ledger are modified or fraudulentTransactions are inserted into the ledger. Distributed consensus51%Attack A single miner node with more computational resources(51%) than the rest of the network nodes dominates theverification and approval of transactions. Detection techniques; wide adoption of the blockchain technologyIdentityTheft The private key of an individual is stolen. Identify and reputation blockchainsIllegalActivities Parties transact illegal goods or commit money laundering. Detection techniques; laws and regulationsSystemHacking The programming codes and systems that implement ablockchain are compromised. Robust systems and advanced intrusion detection methods. Table 1: Malicious attacks to blockchain and defensive measures
Personal data, and sensitive data in general, should not be trusted in the hands of third-parties,data, since it is computationally tamper-proof.Although blockchain technology prevents fraudulent behaviors, it cannot detect fraud by itself. For this existing system monitored and detected by supervised machine learning and data mining algorithm which is based on patterns. Todetect outliers by using deep-learning neural networks, support vector machines, and Bayesian belief networks for fighting various malicious attacks to which blockchain may be become at risk. Government understand mechanisms and impacts of blockchain technology and improve government laws, polices and regulations to govern the use of blockchain technology.
 Sandi Rahmadika1, Diena Rauda Ramdania2, Maisevli Harika3 Security Analysis on the Decentralized Energy Trading System Using Blockchain Technology JOIN (Jurnal Online Informatika) Volume 3 No. 1 June 2018 : 44-47 DOI: 10.15575/join.v3i1.207 Yinxin Yan, Bin Duan, Member, IEEE, Ying Zhong, Xiangshuai Qu Blockchain technology in the Internet Plus: The collaborative development of power electronic devices IEEE 2017 WEIZHI MENG 1, (Member, IEEE), ELMAR WOLFGANG TISCHHAUSER1, QINGJU WANG1,YU WANG 2, AND JINGUANG HAN3, (Member, IEEE) When Intrusion Detection Meets Blockchain Technology: A Review SPECIAL SECTION ON RESEARCH CHALLENGES AND OPPORTUNITIES IN SECURITYAND PRIVACY OF BLOCKCHAIN TECHNOLOGIES Christopher G. Harris, Risk and danger on relying on Blockchain Technology in Underdeveloped countries @ IEEE  Thomas F Heston A BLOCKCHAIN SOLUTION TO GUN CONTROL INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH Volume-7 | Issue-3 | March-2018 | ISSN No 2277 – 8179 | IF : 4.758 | IC Value : 93.98 BlockChain Technology Beyond Bitcoin Sutardja Center for Entrepreneurship & Technology Technical Report Tom Redshaw Bitcoin beyond ambivalence: Popular rationalization and Feenberg’s technical politics Thesis Eleven 2017, Vol. 138(1) 46″64 Є The Author(s) 2017 Jennifer J. Xu Are blockchains immune to all malicious attacks? Xu Financial Innovation (2016) 2:25 DOI 10.1186/s40854-016-0046-5 Emmanuelle Anceaume, Romaric Ludinard, Bruno Sericola Relying on Consensus does not Make Bitcoin Safer 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2016, Toulouse, France Roman Beck1, Christian Becker2, Juho Lindman3, and Matti Rossi4 Opportunities and Risks of Blockchain TechnologiesReport from Dagstuhl Seminar 17132 Albert Molina Pascal Coin: Crypto currency without need of historical operations Pascal Coin White Paper v1.0 ” July/2016 S Cheng1, B Zeng1 and Y Z Huang1 Corrigendum: Research on application model of blockchain technology in distributed electricity market NEFES 2017 IOP Publishing IOP Conf. Series: Earth and Environmental Science 93 (2017) 012065 doi:10.1088/1755-1315/93/1/012065 Filippo Valsorda Exploiting ECDSA Failures in the Bitcoin Blockchain Guy Zyskind, Oz Nathan, Alex ‘Sandy’ Pentland Decentralizing Privacy: Using Blockchain to Protect Personal Data 2015 IEEE CS Security and Privacy Workshops Tomer Golomb, Yisroel Mirsky and Yuval Elovic CIoTA: Collaborative IoT Anomaly Detection via Blockchain
👋 Hi! I’m your smart assistant Amy!
Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.get help with your assignment