Browse > Article
http://dx.doi.org/10.7472/jksii.2019.20.4.01

A Study on the Analysis and Solutions of the Blockchain Security Issues  

Noh, Siwan (Interdisciplinary Program of Information Security Graduate School, Pukyong National University)
Rhee, Kyung-Hyune (Department of IT Convergence and Application Engineering, Pukyong National University)
Publication Information
Journal of Internet Computing and Services / v.20, no.4, 2019 , pp. 1-11 More about this Journal
Abstract
A Blockchain-based access control technology is one of the various use cases of blockchain and is used in many areas to transparently transfer and manage ownership of data between users without the trusted third party. The characteristics of transparency, Irreversibility, and decentralization provided by the public blockchain help to offer new benefits that existing access control technologies did not offer. However, various security issues facing the current blockchain are raising the issue of the safety of the technology. Therefore, in this paper, we analyze an overview of the blockchain-based access control technology and solutions of the security challenges faced. Moreover, we further present solutions that are not affected by the blockchain trilemma and models of access control technology based on them.
Keywords
blockchain; access control; security; privacy;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Satoshi Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," 2008. https://bitcoin.org/bitcoin.pdf
2 Heejung Kang, Hye Ri Kim and Seng-phil Hong, "A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering". Journal of Internet Computing and Services (JICS), vol. 19, pp.1-11, 2018. https://doi.org/10.7472/jksii.2018.19.5.1
3 Samsung SDS, "Samsung SDS $Nexledger^{TM}$ A Blockchain Platform and Solution," 2017. https://www.samsungsds.com/global/en/solutions/off/nexledger/Nexledger.html
4 David Galvin, "IBM and Walmart: Blockchain for Food Safety," IBM Corporation, 2017. https://www-01.ibm.com/events/wwe/grp/grp308.nsf/vLookupPDFs/6%20Using%20Blockchain%20for%20Food%20Safe%202/$file/6%20Using%20Blockchain%20for%20Food%20Safe%202.pdf
5 Asaph Azaria, Ariel Ekblaw, Thiago Vieira, and Andrew Lippman, "MedRec: Using Blockchain for Medical Data Access and Permission Management," in 2016 2nd International Conference on Open and Big Data (OBD), pp.25-30, 2016. http://dx.doi.org/10.1109/OBD.2016.11
6 Ariel Ekblaw, Asaph Azaria, John D. Halamka, and Andrew Lippman, "A Case Study for Blockchain in Healthcare:'MedRec' prototype for electronic health records and medical research data," 2016. https://dci.mit.edu/research/blockchain-medical-records
7 Deloitte, "Blockchain: Opportunities for health care," 2016. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/public-sector/us-blockchain-opportunities-for-health-care.pdf
8 Christian Esposito, Alfredo De Santis, Genny Tortora, Henry Chang, and Kim-Kwang Raymond Choo, "Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?," IEEE Cloud Computing, vol.5, no.1, pp.31-37, 2018. http://dx.doi.org/10.1109/MCC.2018.011791712   DOI
9 Kyong-jin Kim and Seng-phil Hong, "Privacy Information Protection Model in e-Healthcare Environment". Journal of Internet Computing and Services (JICS), vol. 10, pp.29-40, 2009. http://search.koreanstudies.net/thesis/thesis-view.asp?key=3505451
10 Chung-Sun Lee, Chang-won Jeong and Su-Chong Joo, "Design and Implementation of Process Management Model applying Agent Technology". Journal of Internet Computing and Services (JICS), vol. 8, pp.57-70, 2007. http://www.koreascience.or.kr/article/JAKO200712242655887.page
11 Karl Wust and Arthur Gervais, "Do you Need a Blockchain?," 2018 Crypto Valley Conference on Blockchain Technology, pp. 45-54, 2018. http://dx.doi.org/10.1109/CVCBT.2018.00011
12 Guy Zyskind and Oz Nathan, "Decentralizing privacy: Using blockchain to protect personal data," in Security and Privacy Workshops (SPW), pp.180-184, 2015. http://dx.doi.org/10.1109/SPW.2015.27
13 Damiano Di Francesco Maesa, Paolo Mori, and Laura Ricci. "Blockchain based access control." International Conference on Distributed Applications and Interoperable Systems, pp.206-220, 2017. https://doi.org/10.1007/978-3-319-59665-5_15
14 Aafaf Ouaddah, Anas Abou Elkalam, and Abdellah Ait Ouahman, "Towards a novel privacy-preserving access control model based on blockchain technology in IoT." In Europe and MENA Cooperation Advances in Information and Communic ation Technologies, pp. 523-533, 2017. https://doi.org/10.1007/978-3-319-46568-5_53
15 Meni Rosenfeld, "Overview of Colored Coins," 2012. https://bitcoil.co.il/BitcoinX.pdf
16 Larimer, Daniel. "Delegated proof-of-stake (dpos)." Bitshare whitepaper, 2014. https://steemit.com/dpos/@dantheman/dpos-consensus-algorithm-this-missing-white-paper
17 Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gun Sirer, Dawn Song, and Roger Wattenhofer, "On Scaling Decentralized Blockchains (A Position Paper)." In 3rd Workshop on Bitcoin and Blockchain Research, 2016. https://doi.org/10.1007/978-3-662-53357-4_8
18 Ittay Eyal and Emin Gun Sirer, "Majority is not enough: Bitcoin mining is vulnerable," Communications of the ACM, vol.61, no.7, pp.95-102, 2018. http://dx.doi.org/10.1145/3212998   DOI
19 Yi Liu, Xiayang Chen, Lei Zhang, Chaojing Tang and Hongyan Kang, "An Intelligent Strategy to Gain Profit for Bitcoin Mining Pools", Computational Intelligence and Design (ISCID) 2017 10th International Symposium on, vol.2, pp.427-430, 2017. http://dx.doi.org/10.1109/ISCID.2017.184
20 Mauro Conti, E. Sandeep Kumar, Chhagan Lal and Sushmita Ruj, "A Survey on Security and Privacy Issues of Bitcoin", Communications Surveys & Tutorials IEEE, vol.20, no.4, pp.3416-3452, 2018. http://dx.doi.org/10.1109/COMST.2018.2842460   DOI
21 Kartik Nayak, Srijan Kumar, Andrew Miller and Elaine Shi, "Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack," 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbrucken, pp.305-320, 2016. http://dx.doi.org/10.1109/EuroSP.2016.32
22 Dorit Ron and Adi Shamir. "Quantitative analysis of the full bitcoin transaction graph," International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2013. https://doi.org/10.1007/978-3-642-39884-1_2
23 Ober, Micha, Stefan Katzenbeisser, and Kay Hamacher. "Structure and anonymity of the bitcoin transaction graph," Future internet vo.5, no..2 pp.237-250, 2013. http://dx.doi.org/10.3390/fi5020237   DOI
24 Greg Maxwell. "Coinjoin: Bitcoin privacy for the real world," Bitcoin Forum, https://bitcointalk.org/index.php?topic=279249.0
25 Shi-Feng Sun, Man Ho Au, Joseph K. Liu and Tsz Hon Yuen, "RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero." In European Symposium on Research in Computer Security, pp. 456-474, Springer, Cham. 2017. https://doi.org/10.1007/978-3-319-66399-9_25
26 Shen Noether, "Ring SIgnature Confidential Transactions for Monero," IACR Cryptology ePrint Archive, 2015:1098, 2015. https://eprint.iacr.org/2015/1098.pdf
27 Courtois, Nicolas T., and Rebekah Mercer. "Stealth Address and Key Management Techniques in Blockchain Systems." In Proceedings of the 3rd International Conference on Information Systems Security and Privacy, pp.559-566, 2017. http://dx.doi.org/10.5220/0006270005590566
28 Conrad Burchert, Christian Decker and Roger Wattenhofer, "Scalable Funding of Bitcoin Micropayment Channel Networks," International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2017. http://dx.doi.org/10.1098/rsos.180089
29 Joseph Poon and Thaddeus Dryja, "The bitcoin lightning network.", 2016. https://lightning.network/lightning-network-paper.pdf
30 Christian Decker and Roger Wattenhofer, "A fast and scalable payment network with bitcoin duplex micropayment channels." In Symposium on Self-Stabilizing Systems, pp.3-18. Springer, 2015. https://doi.org/10.1007/978-3-319-21741-3_1
31 Maurice Herlihy, "Atomic cross-chain swaps," Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing. ACM, 2018. http://dx.doi.org/10.1145/3212734.3212736
32 Johnny Dilley, Andrew Poelstra, Jonathan Wilkins, Marta Piekarska, Ben Gorlick, and Mark Friedenbach, "Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks." arXiv preprint arXiv:1612.05491, 2016. https://arxiv.org/pdf/1612.05491.pdf
33 "Cosmos Network - Internet of Blockchains," Cosmos Network. https://cosmos.network/
34 Gavin Wood, "Polkadot: Vision for a heterogeneous multi-chain framework," White Paper, 2016. https://polkadot.network/