A survey on blockchain systems: Attacks, defenses, and privacy preservation

被引:45
|
作者
Chen, Yourong [1 ,4 ]
Chen, Hao [2 ]
Zhang, Yang [2 ]
Han, Meng [3 ,4 ]
Siddula, Madhuri [5 ]
Cai, Zhipeng [6 ]
机构
[1] Zhejiang Shuren Univ, Hangzhou, Peoples R China
[2] Changzhou Univ, Changzhou, Peoples R China
[3] Zhejiang Univ, Binjiang Inst, Hangzhou, Peoples R China
[4] Zhejiang Univ, Hangzhou, Peoples R China
[5] North Carolina A&T State Univ, Greensboro, NC USA
[6] Georgia State Univ, Atlanta, GA 30302 USA
来源
HIGH-CONFIDENCE COMPUTING | 2022年 / 2卷 / 02期
关键词
Blockchain; System; Defense; Attack; Privacy; REPUTATION; NETWORKS; SECURITY; SYBIL;
D O I
10.1016/j.hcc.2021.100048
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to the incremental and diverse applications of cryptocurrencies and the continuous development of distributed system technology, blockchain has been broadly used in fintech, smart homes, public health, and intelligent transportation due to its properties of decentralization, collective maintenance, and immutability. Although the dynamism of blockchain abounds in various fields, concerns in terms of network communication interference and privacy leakage are gradually increasing. Because of the lack of reliable attack analysis systems, fully understanding some attacks on the blockchain, such as mining, network communication, smart contract, and privacy theft attacks, has remained challenging. Therefore, in this study, we examine the security and privacy of the blockchain and analyze possible solutions. We systematical classify the blockchain attack techniques into three categories, then discuss the corresponding attack and defense methods based on these categories. We focus on (1) the attack and defense methods of mining pool attacks for blockchain security issues, such as block withholding, 51%, pool hopping, selfish mining, and fork after withholding attacks, in the attack type of consensus excitation; (2) the attack and defense methods of network communication and smart contracts for blockchain security issues, such as distributed denial-of-service, Sybil, eclipse, and reentrancy attacks, in the attack type of middle protocol; and (3) the attack and defense methods of privacy thefts for blockchain privacy issues, such as identity privacy and transaction information attacks, in the attack type of application service. Finally, we discuss future research directions for blockchain security.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Privacy Attacks and Defenses in Machine Learning: A Survey
    Liu, Wei
    Han, Xun
    He, Meiling
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 413 - 422
  • [2] Survey on Privacy Attacks and Defenses in Machine Learning
    Liu R.-X.
    Chen H.
    Guo R.-Y.
    Zhao D.
    Liang W.-J.
    Li C.-P.
    Chen, Hong (chong@ruc.edu.cn), 1600, Chinese Academy of Sciences (31): : 866 - 892
  • [3] Privacy preservation in permissionless blockchain: A survey
    Peng, Li
    Feng, Wei
    Yan, Zheng
    Li, Yafeng
    Zhou, Xiaokang
    Shimizu, Shohei
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (03) : 295 - 307
  • [4] Privacy preservation in permissionless blockchain:A survey
    Li Peng
    Wei Feng
    Zheng Yan
    Yafeng Li
    Xiaokang Zhou
    Shohei Shimizu
    Digital Communications and Networks, 2021, 7 (03) : 295 - 307
  • [5] Visual privacy attacks and defenses in deep learning: a survey
    Zhang, Guangsheng
    Liu, Bo
    Zhu, Tianqing
    Zhou, Andi
    Zhou, Wanlei
    ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (06) : 4347 - 4401
  • [6] A Survey on Privacy Attacks and Defenses in Graph Neural Networks
    Luo, Lanhua
    Ren, Wang
    Huang, Huasheng
    Wang, Fengling
    INFORMATION TECHNOLOGY AND CONTROL, 2024, 53 (04):
  • [7] Visual privacy attacks and defenses in deep learning: a survey
    Guangsheng Zhang
    Bo Liu
    Tianqing Zhu
    Andi Zhou
    Wanlei Zhou
    Artificial Intelligence Review, 2022, 55 : 4347 - 4401
  • [8] A survey on privacy preservation techniques for blockchain interoperability
    Yin, Ruoyu
    Yan, Zheng
    Liang, Xueqin
    Xie, Haomeng
    Wan, Zhiguo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 140
  • [9] Attacks and defenses in user authentication systems: A survey
    Wang, Xuerui
    Yan, Zheng
    Zhang, Rui
    Zhang, Peng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 188
  • [10] Online privacy: Attacks and defenses
    Herrmann, Dominik
    IT-INFORMATION TECHNOLOGY, 2015, 57 (02): : 133 - 137