On the Vital Aspects and Characteristics of Cryptocurrency-A Survey

被引:3
作者
Shahen Shah, A. F. M. [1 ]
Karabulut, Muhammet Ali [2 ]
Akhter, A. F. M. Suaib [3 ]
Mustari, Nazifa [1 ]
Pathan, Al-Sakib Khan [4 ]
Rabie, Khaled M. [5 ,6 ]
Shongwe, Thokozani [6 ]
机构
[1] Yildiz Tech Univ, Dept Elect & Commun Engn, TR-34220 Istanbul, Turkiye
[2] Kafkas Univ, Dept Elect & Elect Engn, TR-36000 Kars, Turkiye
[3] Sakarya Univ Appl Sci, Dept Comp Engn, TR-54050 Sakarya, Turkiye
[4] United Int Univ, Dept Comp Sci & Engn, Dhaka 1212, Bangladesh
[5] Manchester Metropolitan Univ, Dept Engn, Manchester M156BH, Lancs, England
[6] Univ Johannesburg, Dept Elect & Elect Engn, ZA-1809 Johannesburg, South Africa
关键词
Bitcoin; Blockchains; Privacy; Cryptocurrency; Peer-to-peer computing; Consumer electronics; Public key; Security; Cryptocurrencies; electronic cash; privacy; security threats; BITCOIN; PRIVACY; BLOCKCHAIN; SECURITY; PREDICTION; NETWORK; ISSUES;
D O I
10.1109/ACCESS.2023.3240103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptocurrencies acquire user confidence by making the whole creation and transaction history transparent to the public. In exchange, the transaction history accurately captures the complete range of user activities related to cryptocurrencies. It is thought to be one of the safest and simplest payment methods that may be employed in the future. The trend of banks and other financial institutions investing in cryptocurrencies has increased rapidly in recent years. Therefore, it is necessary to synthesize the findings of previous studies on cryptocurrencies. In this paper, the use of data mining methods in Bitcoin transactions is analyzed and summarized. Cryptocurrencies, similar to the well-known Bitcoin, were targeted to ensure transaction security and privacy and overcome the drawbacks of traditional banking systems as well as other centralized systems. In addition, a comprehensive analysis of the literature on the challenges and applications of electronic currencies is conducted. The evolution of digital currency from electronic cash to cryptocurrencies is summarized and the methods used to increase user privacy are highlighted. The security threats in existing cryptocurrency systems (that compromise the privacy of Bitcoin users) are also highlighted. Finally, several research gaps and trends are identified that need to be further explored.
引用
收藏
页码:9451 / 9468
页数:18
相关论文
共 150 条
  • [1] Anticipating Cryptocurrency Prices Using Machine Learning
    Alessandretti, Laura
    ElBahrawy, Abeer
    Aiello, Luca Maria
    Baronchelli, Andrea
    [J]. COMPLEXITY, 2018,
  • [2] Energy Efficient Transmission Design for NOMA Backscatter-Aided UAV Networks with Imperfect CSI
    AlJubayrin, Saad
    Al-Wesabi, Fahd N.
    Alsolai, Hadeel
    Al Duhayyim, Mesfer
    Nour, Mohamed K.
    Khan, Wali Ullah
    Mahmood, Asad
    Rabie, Khaled
    Shongwe, Thokozani
    [J]. DRONES, 2022, 6 (08)
  • [3] User perception of Bitcoin usability and security across novice users
    Alshamsi, Abdulla
    Andras, Peter
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 126 : 94 - 110
  • [4] Androulaki E., 2013, Lecture Notes in Computer Science, Volume, V7859, P34, DOI [DOI 10.1007/978-3-642-39884-1, 10.1007/978-3-642-39884-1_4]
  • [5] Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains
    Androulaki, Elli
    Barger, Artem
    Bortnikov, Vita
    Cachin, Christian
    Christidis, Konstantinos
    De Caro, Angelo
    Enyeart, David
    Ferris, Christopher
    Laventman, Gennady
    Manevich, Yacov
    Muralidharan, Srinivasan
    Murthy, Chet
    Binh Nguyen
    Sethi, Manish
    Singh, Gari
    Smith, Keith
    Sorniotti, Alessandro
    Stathakopoulou, Chrysoula
    Vukolic, Marko
    Cocco, Sharon Weed
    Yellick, Jason
    [J]. EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
  • [6] [Anonymous], 2013, Proceedings of WEIS
  • [7] [Anonymous], CRYPTO MARKET CAPITA
  • [8] [Anonymous], 2018, INV AL PUBL CO MAK I
  • [9] [Anonymous], 2017, Financial Cryptography and Data Security, DOI DOI 10.1007/978-3-319-70278-0_8
  • [10] [Anonymous], 2018, P PRIV ENHANCING TEC