Review on security, privacy, and performance issues of blockchain

被引:0
|
作者
Cao X. [1 ]
Zhang J. [1 ]
Liu B. [1 ]
机构
[1] RISE in School of Computer and Information Science, Southwest University, Chongqing
基金
中国国家自然科学基金;
关键词
Blockchain techniques; Performance; Privacy; Security;
D O I
10.13196/j.cims.2021.07.022
中图分类号
学科分类号
摘要
As a cornerstone to build a low-cost trusted channel so as to achieve value interconnection, blockchain has been especially highlighted and intensive research has been conducted in recent years. Among other issues within blockchain, challenges on security, privacy, and performance have attracted most eyes. To pave the way to deal with the above challenges, a review of research particularly on blockchain security, privacy and performance issues was presented from the perspectives of technical principle, progress and mechanism. With understanding of blockchain hierarchy and operation principles, the security issues within the layers of peer-to-peer network, consensus mechanism and smart contract were analyzed, and the effectiveness of respective defence measures was evaluated. By analysing the threats to blockchain privacy, the various privacy-protection solutions were evaluated for different protection targets. By identifying the performance related factors, the state-of-the-art solutions on the on-chain and off-chain scaling techniques were discussed. To tackle the existing problems in security, privacy and performance, the possible solutions and directions of future research were proposed respectively. © 2021, Editorial Department of CIMS. All right reserved.
引用
收藏
页码:2078 / 2094
页数:16
相关论文
共 126 条
  • [51] SHEN Muyao, Crypto investors have ignored three straight 51% attacks on ETC
  • [52] DOUCEUR J R., The Sybil attack, Proceedings of the 1st International Workshop on Peer-to-Peer Systems, (2002)
  • [53] EKPARINYA P, GRAMOLI V, JOURJON G., The attack of the clones against proof-of-authority
  • [54] APOSTOLAKI M, ZOHAR A, VANBEVER L., Hijacking bitcoin:Routing attacks on cryptocurrencies, Proceedings of IEEE Symposium on Security and Privacy, pp. 375-392, (2017)
  • [55] MARCUS Y, HEILMAN E, GOLDBERG S., Low-resource eclipse attacks on Ethereum's peer-to-peer network
  • [56] ALANGOT B, REIJSBERGEN D, VENUGOPALAN S, Et al., Decentralized lightweight detection of eclipse attacks on bitcoin clients, Proceedings of IEEE International Conference on Blockchain, (2020)
  • [57] CHEN H, PENDLETON M, NJILLA L, Et al., A survey on Ethereum systems security:Vulnerabilities, attacks, and defenses[J], ACM Computing Surveys, 53, 3, pp. 61-67, (2020)
  • [58] What is FIBRE
  • [59] OTSUKI K, AOKI Y, BANNO R, Et al., Effects of a simple relay network on the Bitcoin network, Proceedings of the Asian Internet Engineering Conference, pp. 41-46, (2019)
  • [60] APOSTOLAKI M, MARTI G, MULLER J, Et al., SABRE:Protecting bitcoin against routing attacks