Thwarting Unwanted Blockchain Content Insertion

被引:43
作者
Matzutt, Roman [1 ]
Henze, Martin [1 ]
Ziegeldorf, Jan Henrik [1 ]
Hiller, Jens [1 ]
Wehrle, Klaus [1 ]
机构
[1] Rhein Westfal TH Aachen, Commun & Distributed Syst, Aachen, Germany
来源
2018 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2018) | 2018年
关键词
Bitcoin; blockchain; security; objectionable content; countermeasure;
D O I
10.1109/IC2E.2018.00070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the introduction of Bitcoin in 2008, blockchain systems have seen an enormous increase in adoption. By providing a persistent, distributed, and append-only ledger, blockchains enable numerous applications such as distributed consensus, robustness against equivocation, and smart contracts. However, recent studies show that blockchain systems such as Bitcoin can be (mis)used to store arbitrary content. This has already been used to store arguably objectionable content on Bitcoin's blockchain. Already single instances of clearly objectionable or even illegal content can put the whole system at risk by making its node operators culpable. To overcome this imminent risk, we survey and discuss the design space of countermeasures against the insertion of such objectionable content. Our analysis shows a wide spectrum of potential countermeasures, which are often combinable for increased efficiency. First, we investigate special-purpose content detectors as an ad hoc mitigation. As they turn out to be easily evadable, we also investigate content-agnostic countermeasures. We find that mandatory minimum fees as well as mitigation of transaction manipulability via identifier commitments significantly raise the bar for inserting harmful content into a blockchain.
引用
收藏
页码:364 / 370
页数:7
相关论文
共 27 条
[1]  
[Anonymous], 2016, EIP-150 revision
[2]  
[Anonymous], 2012, LNCS, DOI DOI 10.1007/978-3-642-32946-3
[3]  
[Anonymous], 2016, BITCOIN TRANSACTION
[4]   Redactable Blockchain - or - Rewriting History in Bitcoin and Friends [J].
Ateniese, Giuseppe ;
Magri, Bernardo ;
Venturi, Daniele ;
Andrade, Ewerton R. .
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, :111-126
[5]  
Bartoletti M., 2017, P 4 WORKSH BITC BLOC
[6]  
Blockchain.info, 2011, BITC CHARTS GRAPHS
[7]   SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies [J].
Bonneau, Joseph ;
Miller, Andrew ;
Clark, Jeremy ;
Narayanan, Arvind ;
Kroll, Joshua A. ;
Felten, Edward W. .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :104-121
[8]  
Bruce J., 2014, White paper, V1, P1
[9]   Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures [J].
Camenisch, Jan ;
Derler, David ;
Krenn, Stephan ;
Pohls, Henrich C. ;
Samelin, Kai ;
Slamanig, Daniel .
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 :152-182
[10]  
Chepurnoy A., 2016, CISC VIS NETW IND GL