On the Vital Aspects and Characteristics of Cryptocurrency-A Survey

被引:3
|
作者
Shahen Shah, A. F. M. [1 ]
Karabulut, Muhammet Ali [2 ]
Akhter, A. F. M. Suaib [3 ]
Mustari, Nazifa [1 ]
Pathan, Al-Sakib Khan [4 ]
Rabie, Khaled M. [5 ,6 ]
Shongwe, Thokozani [6 ]
机构
[1] Yildiz Tech Univ, Dept Elect & Commun Engn, TR-34220 Istanbul, Turkiye
[2] Kafkas Univ, Dept Elect & Elect Engn, TR-36000 Kars, Turkiye
[3] Sakarya Univ Appl Sci, Dept Comp Engn, TR-54050 Sakarya, Turkiye
[4] United Int Univ, Dept Comp Sci & Engn, Dhaka 1212, Bangladesh
[5] Manchester Metropolitan Univ, Dept Engn, Manchester M156BH, Lancs, England
[6] Univ Johannesburg, Dept Elect & Elect Engn, ZA-1809 Johannesburg, South Africa
关键词
Bitcoin; Blockchains; Privacy; Cryptocurrency; Peer-to-peer computing; Consumer electronics; Public key; Security; Cryptocurrencies; electronic cash; privacy; security threats; BITCOIN; PRIVACY; BLOCKCHAIN; SECURITY; PREDICTION; NETWORK; ISSUES;
D O I
10.1109/ACCESS.2023.3240103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptocurrencies acquire user confidence by making the whole creation and transaction history transparent to the public. In exchange, the transaction history accurately captures the complete range of user activities related to cryptocurrencies. It is thought to be one of the safest and simplest payment methods that may be employed in the future. The trend of banks and other financial institutions investing in cryptocurrencies has increased rapidly in recent years. Therefore, it is necessary to synthesize the findings of previous studies on cryptocurrencies. In this paper, the use of data mining methods in Bitcoin transactions is analyzed and summarized. Cryptocurrencies, similar to the well-known Bitcoin, were targeted to ensure transaction security and privacy and overcome the drawbacks of traditional banking systems as well as other centralized systems. In addition, a comprehensive analysis of the literature on the challenges and applications of electronic currencies is conducted. The evolution of digital currency from electronic cash to cryptocurrencies is summarized and the methods used to increase user privacy are highlighted. The security threats in existing cryptocurrency systems (that compromise the privacy of Bitcoin users) are also highlighted. Finally, several research gaps and trends are identified that need to be further explored.
引用
收藏
页码:9451 / 9468
页数:18
相关论文
共 50 条