Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/5074
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahamed Sabani, Mohamed Jamaldeen | |
dc.contributor.author | Shafana, Muhammed Shareef | |
dc.contributor.author | Kariapper, R.K.A.R | |
dc.date.accessioned | 2020-11-26T07:10:07Z | |
dc.date.available | 2020-11-26T07:10:07Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | International Journal of Advanced Science and Technology, 29(08); 5371-5376 | en_US |
dc.identifier.issn | 2005-4238 | |
dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/5074 | |
dc.description.abstract | Blockchain technology is for distributing reports of all transaction or digital events, and it is the most trending topic nowadays. Blockchain technology is integrated with some other technologies like cryptography, mathematics, peer to peer networks uses distributed consensus algorithm and economic model etc. Blocks are coupled together to assemble as a linked list. Generally, the blocks of blockchain incorporate main data, a hash of previous and current blocks, timestamp, Nonce and Merkle tree root. It offers great advantages to the application of Information Technology. Blockchain provides more reliable and desirable services. It involves public and social services in more different ways such as financial, healthcare, automobile, risk management, Internet of Things (IoT). However, before using this technology, better to get knowledge and be aware of security and privacy level of the related applications with blockchain. This study focuses on great features of blockchain, common types of security attacks, and existing solutions to overcome the shortcomings of the security problems on the blockchain. According to the study, there are six critical elements assembled to create blockchain technology such as decentralized, transparent, open-source, autonomy, immutable and anonymity. Blockchain technology guarantees some properties such as integrity, availability, privacy, authentication and non-repudiation. But there is a possibility for security and privacy attacks such Double-spending attack, Majority attack, denial of service attack, Eclipse attack, Selfish mining attack, Reentrancy Attack, and Liveness attack and some unidentified attacks. In this technology, it offers and complies important security aspects needed for the secure transaction and handling. There is room to invent appropriate more security features to overcome these risk and attacks even though blockchain integrated with existing security technologies. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Science and Engineering Research Support Society | en_US |
dc.subject | Blockchain, Security, Privacy, Attacks on the Blockchain | en_US |
dc.title | Security Issues By Allied Attacks In Blockchain Technology | en_US |
dc.type | Article | en_US |
Appears in Collections: | Research Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Security Issues By Allied Attacks In Blockchain Technology_32398-Article Text-50413-1-10-20200928.pdf | 333.16 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.