Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security and privacy on blockchain
Zhang R., Xue R., Liu L. ACM Computing Surveys52 (3):1-34,2019.Type:Article
Date Reviewed: May 27 2020

While still controversial in terms of mainstream use, the study, research, and development of all things blockchain has been moving ahead full steam. Interestingly, while distributed ledger technology (DLT) is intrinsically perceived to be more secure than traditional client-server and n-tiered architectures, the desire to study these aspects in detail have been rising as commercial use cases rise beyond cryptocurrency. This paper, a survey of existing blockchain security and privacy attributes and attacks, while focused on Bitcoin-like systems, is a good reference for other DLT applications.

The authors also propose additional security and privacy properties that developers of new DLT applications may desire. Primarily, due to a lack of non-cryptocurrency blockchain-based applications, the authors stick to comparing Bitcoin-like systems to explain the threats, techniques, and procedures for the security and privacy attributes identified. However, they do add a high-level analysis of proposed attributes for current DLT applications based on cryptographic components like “consensus algorithms, hash chained storage, mixing protocols, anonymous signatures, [and] non-interactive zero-knowledge proof[s].”

What sets this paper apart from many other security and privacy analyses of blockchain systems is its focus on individual properties rather than the application as a whole. In assuming familiarity with cryptocurrency applications based on DLT, the authors succeed in furthering the discussion and research on advanced security and privacy aspirations for semi-private distributed systems. As a supplementary reference, the paper also includes basic descriptions of blockchain concepts, inherent security attributes in blockchain systems, and consensus algorithms.

Reviewer:  Phoram Mehta Review #: CR146979 (2009-0225)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Software Engineering (D.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy