Abstract
With the rapid development of Information Technology (IT) industries, data or information security has become one of the critical issues. Nowadays, Blockchain technology is widely using for improving data security. It is a tool for the individual and organization to interchange the digital asset without the intervention of a trusted third party i.e. a central administrator. This technology has given the ability to create digital tokens for representing assets, innovation and likely reshaping the scenery of entrepreneurship. Blockchain has several key properties, such as decentralization, immutability and transparency without using a trusted third party. It can be used in several fields, such as healthcare, digital voting, Internet of Things (IoT) and many more. This study aims to discuss the fundamentals of Blockchain. In this paper, the technology or working procedure of Blockchain including many applications in several fields are discussed. Finally, future work directions and open research challenges in the domain of Blockchain have been also discussed in detail.
Similar content being viewed by others
References
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf. Accessed on 13 April 2018
Disruptive innovation in financial services: a blueprint for digital identity. World Economic Forum, 2016. http://www3.weforum.org/docs/WEFA_BlueprintforDigitalIdentity.pdf. Accessed on 15 April 2018
Swan M (2015) Blockchain: blueprint for a new economy. O’Reilly Media, Boston
Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in Blockchain. IEEE Access 6:20632–20640
Mercer R (2016) Privacy on the blockchain: unique ring signatures. https://arxiv.org/abs/1612.01188. Accessed on 17 April 2018
Dong L, Jinwu W (2016) Block chain technology principle, application field and challenge. Telecommun Sci 32(12)
Higgins S (2016) Hours after launch, OpenBazaar sees first drug listings. http://www.coindesk.com/drugs-contraband-openbazaar/. Accessed on 19 April 2018
Hu Y, Manzoor A, Ekparinya P, Liyanage M, Thilakarathna K, Jourjon G, Seneviratne A, Ylianttila ME (2018) A delay-tolerant payment scheme based on the ethereum Blockchain. arXiv:1801.10295
Miers I, Garman C, Green M, Rubin AD (2013) Zerocoin: anonymous distributed E-cash from Bitcoin. In: Proceedings of the IEEE symposium on security privacy, IEEE, Berkeley, CA, USA, pp 397–411
Sasson EB, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: decentralized anonymous payments from Bitcoin. In: Proceedings of the IEEE symposium on security and privacy, IEEE, Berkeley, CA, USA, pp 459–474
Sidhu J (2017) Syscoin: a peer-to-peer electronic cash system with Blockchain based services for E-business. In: Proceedings of the 26th international conference on computer communication and networks (ICCCN), IEEE, Vancouver, BC, Canada, pp 1–6
Huh S, Cho S, Kim S (2017) Managing IoT devices using Blockchain platform. In: Proceedings of the 19th international conference on advanced communication technology (ICACT), IEEE, Bongpyeong, South Korea, pp 464–467
Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) LSB: a lightweight scalable blockchain for IoT security and privacy. https://arxiv.org/abs/1712.02969?context=cs. Accessed on 01 May 2018
Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. https://arxiv.org/abs/1802.04410. Accessed on 03 May 2018
Kopp H, Mödinger D, Hauck F, Kargl F, Bösch C (2017) Design of a privacy-preserving decentralized file storage with financial incentives. In: Proceedings of the IEEE European symposium on security and privacy workshops, IEEE, Paris, France, pp 14–22
Kopp H, Bösch C, Kargl F (2016) KopperCoin—a distributed file storage with financial incentives. In: Proceedings of the international conference on information security practice and experience, Springer, pp 79–93
Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGRID), Madrid, Spain, pp 468–477
Xia QI, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757–14767
Dunphy P, Petitcolas FAP (2018) A first look at identity management schemes on the Blockchain. https://arxiv.org/abs/1801.03294. Accessed on 21 May 2018
Raju S, Boddepalli S, Gampa S, Yan Q, Deogun JS (2017) Identity management using blockchain for cognitive cellular networks. In: Proceedings of the IEEE international conference on communications, IEEE, Paris, France, pp 1–6
Muftic S (2017) Blockchain identity management system based on public identities ledger, U.S. Patent 9635000
Crosby M, Pattanayak P, Verma S, Kalyanaraman V (2016) Blockchain technology: beyond Bitcoin. Appl Innov 2:6–10
Haber S, Stornetta WS (1991) How to time-stamp a digital document. J Cryptol 3(2):99–111
Narayanan V (2018) A brief history in the evolution of blockchain technology platforms. https://hackernoon.com/a-brief-history-in-the-evolution-of-blockchain-technology-platforms-1bb2bad8960a. Accessed on 22 May 2018
Bheemaiah K (2015) Block chain 2.0: the renaissance of money. Wired. https://www.wired.com/insights/2015/01/block-chain-2-0/. Accessed on 07 June 2018
Wagner A (2014) Ensuring network scalibility: how to fight blockchain bloat. https://bitcoinmagazine.com/articles/how-to-ensure-network-scalibility-fighting-blockchain-bloat-1415304056/. Accessed on 29 May 2018
Williams A (2016) IBM to open first blockchain innovation centre in Singapore, to create applications and grow new markets in finance and trade. The Straits Times Singapore Press Holdings Ltsd. Co, Singapore
Chang X, Han F (2016) Block chain: From digital currency to credit society. China Citic Press, Beijing
Namasudra S, Deka GC (2018) Advances of DNA computing in cryptography. Taylor & Francis, New York
Namasudra S (2018) Taxonomy of DNA-based security models. In: Namasudra S, Deka GC (eds) Advances of dna computing in cryptography. Springer, New York, pp 53–68
Namasudra S, Deka GC (2018) Introduction of DNA computing in cryptography. In: Namasudra S, Deka DC (eds) Advances of dna computing in cryptography. Springer, New York, pp 27–34
Namasudra S, Deka GC, Bali R (2018) Applications and future trends of DNA computing. In: Namasudra S, Deka GC (eds) Advances of DNA computing in cryptography. Taylor & Francis, NewYork, pp 181–192
Namasudra S, Devi D, Choudhary S, Patan R, Kallam S (2018) Security, privacy, trust, and anonymity. In: Namasudra S, Deka GC (eds) Advances of DNA computing in cryptography. Taylor & Francis, New York, pp 153–166
Ethereum Whitepaper. https://github.com/ethereum/wiki/wiki/WhitePaper. Accessed on 12 June 2018
Kshetri N (2017) Cybersecurity in India: regulations, governance, institutional capacity and market mechanisms. Asian Research Policy 8(1):64–76
Namasudra S (2017) An improved attribute-based encryption technique towards the data security in cloud computing. Concurr Comput Pract Exer. https://doi.org/10.1002/cpe.4364
Namasudra S, Roy R, Balamurugan B (2017) Cloud computing: fundamentals and research issues. In: Proceedings of the 2nd international conference on recent trends and challenges in computational models, IEEE, Tindivanam, India
Namasudra S (2018) Cloud computing: a new era. J Fundam Appl Sci 10(2):113–135
Sarkar M, Saha K, Namasudra S, Roy P (2015) An efficient and time saving web service based android application. SSRG Int J Comput Sci Eng 2(8):18–21
Namasudra S, Roy P, Balamurugan B, Vijayakumar P (2017) Data accessing based on the popularity value for cloud computing. In: Proceedings of the international conference on innovations in information, embedded and communications systems (ICIIECS), IEEE, Coimbatore, India
Namasudra S, Roy P (2018) PpBAC: popularity based access control model for cloud computing. J Organ End User Comput 30(4):14–31
Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper
The-bitcoin-foundation, how does Bitcoin work? (2014) https://bitcoin.org/en/how-it-works. Accessed on 17 June 2018
Antonopoulos AM (2014) Mastering bitcoin: unlocking digital crypto-currencies. O’Reilly Media Inc, Boston
Parizi RM, Dehghantanha A, Choo KKR, Singh A (2018) Empirical vulnerability analysis of automated smart contracts security testing on blockchains. In: Proceedings of the 28th annual international conference on computer science and software engineering, pp 103–113
Parizi RM, Dehghantanha A (2018) Smart contract programming languages on blockchains: an empirical evaluation of usability and security. In: Proceedings of the international conference on blockchain, Springer, pp 75–91
Szabo N (1994) Smart contracts. http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart.contracts.html. Accessed on 18 June 2018
Stellar Network Overview (2014) https://www.stellar.org/developers/guides/get-started/. Accessed on 18 June 2018
Ripple Network (2013) https://ripple.com/network. Accessed on 18 June 2018
Introduction to Tendermint (2017) https://tendermint.com/intro. Accessed on 18 June 2018
Parizi RM, Dehghantanha A (2018) On the understanding of gamification in blockchain systems. In: Proceedings of the 6th international conference on future internet of things and cloud workshops, IEEE, Barcelona, Spain, pp 214–219
Zheng Z, Xie S, Dai HN, Wang H (2016) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):314–335
Ghosh M, Richardson M, Ford B, Jansen R (2014) A torpath to torcoin, proof-of-bandwidth altcoins for compensating relays. https://www.smithandcrown.com/open-research/a-torpath-to-torcoin-proof-of-bandwidth-altcoins-for-compensating-relays/. Accessed on 07 August 2018
Proof of Authority Chains (2017) https://github.com/paritytech/parity/wiki/Proof-of-Authority-Chains. Accessed on 23 June 2018
Proof of Elapsed Time (Poet) (2017) http://intelledger.github.io/. Accessed on 10 August 2018
Annual Results (2016) https://www.kudelskisecurity.com/about-us/news/annual-results-2016. Accessed on 22 June 2018
Paul MS (2018) Hyperledger frameworks & modules. https://medium.com/swlh/hyperledger-chapter-2-hyperledger-frameworks-modules-cabf50e12105. Accessed on 29 August 2018
Cui G, Shi K, Qin Y, Liu L, Qi B, Li B (2017) Application of block chain in multi-level demand response reliable mechanism. In: Proceedings of the international conference on information management (ICIM), IEEE, Chengdu, China, pp 337–341
Duffield E, Diaz D (2015) Dash: a privacy-centric crypto-currency. http://zioncoins.co.uk/wp-content/uploads/2015/06/Dash-Whitepaper.pdf. Accessed on 23 June 2018
Kestenbaum R (2017) Why bitcoin is important for your business. https://www.forbes.com/sites/richardkestenbaum/2017/03/14/why-bitcoinis-important-for-your-business/3/#2da6d4c72b3b. Accessed on 27 June 2018
Ho DCK, Au KF, Newton E (2002) Empirical research on supply chain management: a critical review and recommendations. Int J Prod Res 40(17):4415–4430
Huang GQ, Lau JSK, Mak KL (2003) The impacts of sharing production information on supply chain dynamics: a review of the literature. Int J Prod Res 41(7):1483–1517
Bünger M (2017) Blockchain for industrial enterprises: hype, reality, obstacles and outlook. http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Blockchain-for-industrial-enterprises-Hype-reality-obstacles-and-outlook. Accessed on 29 June 2018
Hwang J, Choi M, Lee T, Jeon S, Kim S, Park S, Park S (2017) Energy prosumer business model using blockchain system to ensure transparency and safety. Energy Procedia 141:194–198
Xue T, Hongbin S, Qinglai G (2016) Electricity transactions and congestion management based on blockchain in energy internet. Power Syst Technol 40(12):3630–3638
Ming Z, Jun C, Yuqing W, Yuanfei L, Yongqi Y, Jinyue D (2017) The primarily research for multi module cooperative autonomous mode of energy internet under blockchain framework. Proc Chin Soc Electr Eng 37(13):3672–3681
Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA based data security in the cloud computing environment. Comput Commun 151:539–547
Namasudra S (2020) Data access control in the cloud computing environment for bioinformatics. Int J Appl Res Bioinform (IJARB)
Li S, Wang G, Yang J (2019) Survey on cloud model based similarity measure of uncertain concepts. CAAI Trans Intell Technol 4(4):223–230
Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2020) Securing multimedia by using DNA based encryption in the cloud computing environment. ACM T Multi Comput Commun Appl
Namasudra S, Roy P (2017) Time saving protocol for data accessing in cloud computing. IET Commun 11(10):1558–1565
Alguliyev RM, Aliguliyev RM, Sukhostat LV (2020) Efficient algorithm for big data clustering on single machine. CAAI Trans Intell Technol 5(1):9–14
Namasudra S, Roy P (2016) Secure and efficient data access control in cloud computing environment: a survey. Multiagent Grid Sys Int J 12(2):69–90
Namasudra S, Roy P, Vijayakumar P, Audithan S, Balusamy B (2017) Time efficient secure DNA based access control model for cloud computing environment. Future Generation Computer Systems 73:90–105
Zhao X, Li R, Zuo X (2019) Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Trans Intell Technol 4(3):159–174
Devi D, Namasudra S, Kadry S (2020) A boosting-aided adaptive cluster-based undersampling approach for treatment of class imbalance problem. Int J Data Warehous Min (IJDWM) 16(3)
Zyskind G, Nathan O, Pentland A (2015) Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of the IEEE security and privacy workshops, IEEE, San Jose, CA, USA, pp 180–184
Ash JS, Berg M, Coiera E (2004) Some unintended consequences of information technology in health care: the nature of patient care information system-related errors. J Am Med Inform Assoc 11(2):104–112
Liu W (2010) Digital Health Care (DHC) network and IT infrastructure solutions. In: Proceedings of the 7th IEEE consumer communications and networking conference, IEEE, Las Vegas
Liu W, Park EK, Zhu SS (2014) e-Health PST (privacy, security and trust) mobile networking infrastructure. In: Proceedings of the 23rd international conference on computer communication and networks (ICCCN), IEEE, Shanghai, China
Nakamoto S (2008) Bitcoin P2P e-cash paper. https://www.mail-archive.com/cryptography@metzdowd.com/msg09959.html. Accessed on 15 July 2018
Stewart T (2018) Blockchain and electronic health records: hype or problem solver?. https://www.himssinsights.eu/blockchain-and-electronic-health-records-hype-or-problem-solver. Accessed on 27 July 2018
Nath I (2016) Data exchange platform to fight insurance fraud on Blockchain. In: Proceedings of the international conference on data mining workshops (ICDMW), IEEE, Barcelona, Spain, pp 821–825
Internet of things installed base will grow to 26 Bn units by 2020, 2017. https://www.firstpost.com/biztech/internet-of-things-installed-base-will-grow-to-26-bn-units-by-2020-1895781.html. Accessed on 18 July 2018
Conoscenti M, Vetr A, Martin JCD (2016) Blockchain for the internet of things: a systematic literature review. In: Proceedings of the IEEE/ACS 13th international conference of computer systems and applications (AICCSA), IEEE, Agadir, Morocco
Dickson B (2016) Blockchain could help fix IoT security after DDoS attack. http://venturebeat.com/2016/10/29/blockchain-could-help-fix-iot-securityafter-ddos-attack/. Accessed on 24 July 2018
Prisco G (2015) Slock. It to introduce smart locks linked to smart ethereum contracts, decentralize the sharing economy. https://bitcoinmagazine.com/articles/slock-it-to-introduce-smart-locks-linked-to-smart-ethereum-contracts-decentralize-the-sharing-economy-1446746719/. Accessed on 04 July 2018
Mayer H (2016) ECDSA security in Bitcoin and Ethereum: a research survey. https://blog.coinfabrik.com/wp-content/uploads/2016/06/ECDSA-Security-in-Bitcoin-and-Ethereum-a-Research-Survey.pdf
Miller A, Möser M, Lee K, Narayanan A (2017) An empirical analysis of linkability in the monero blockchain. ArXiv preprint: arXiv:1704.04299
Juels A, Kosba A, Shi E (2016) The ring of gyges: investigating the future of criminal smart contracts. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, New York, NY, USA, pp 283–295
Solat S, Potop-Butucaru M (2016) ZeroBlock: preventing selfish mining in Bitcoin, Univ. of Paris (Ph.D. thesis)
Eyal I, Sirer EG (2014) Majority is not enough: Bitcoin mining is vulnerable. In: Lecture Notes in Computer Science, vol. 8437, pp 436–454
Schatsky D, Arora A, Dongre A (2018) Blockchain and the five vectors of progress. https://www2.deloitte.com/insights/us/en/focus/signals-for-strategists/value-of-blockchain-applications-interoperability.html. Accessed on 15 December 2018
Funding
The authors confirm that there is no source of funding for this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Namasudra, S., Deka, G.C., Johri, P. et al. The Revolution of Blockchain: State-of-the-Art and Research Challenges. Arch Computat Methods Eng 28, 1497–1515 (2021). https://doi.org/10.1007/s11831-020-09426-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11831-020-09426-0