Skip to main content
Log in

The Revolution of Blockchain: State-of-the-Art and Research Challenges

  • Original Paper
  • Published:
Archives of Computational Methods in Engineering Aims and scope Submit manuscript

Abstract

With the rapid development of Information Technology (IT) industries, data or information security has become one of the critical issues. Nowadays, Blockchain technology is widely using for improving data security. It is a tool for the individual and organization to interchange the digital asset without the intervention of a trusted third party i.e. a central administrator. This technology has given the ability to create digital tokens for representing assets, innovation and likely reshaping the scenery of entrepreneurship. Blockchain has several key properties, such as decentralization, immutability and transparency without using a trusted third party. It can be used in several fields, such as healthcare, digital voting, Internet of Things (IoT) and many more. This study aims to discuss the fundamentals of Blockchain. In this paper, the technology or working procedure of Blockchain including many applications in several fields are discussed. Finally, future work directions and open research challenges in the domain of Blockchain have been also discussed in detail.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf. Accessed on 13 April 2018

  2. Disruptive innovation in financial services: a blueprint for digital identity. World Economic Forum, 2016. http://www3.weforum.org/docs/WEFA_BlueprintforDigitalIdentity.pdf. Accessed on 15 April 2018

  3. Swan M (2015) Blockchain: blueprint for a new economy. O’Reilly Media, Boston

    Google Scholar 

  4. Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in Blockchain. IEEE Access 6:20632–20640

    Article  Google Scholar 

  5. Mercer R (2016) Privacy on the blockchain: unique ring signatures. https://arxiv.org/abs/1612.01188. Accessed on 17 April 2018

  6. Dong L, Jinwu W (2016) Block chain technology principle, application field and challenge. Telecommun Sci 32(12)

  7. Higgins S (2016) Hours after launch, OpenBazaar sees first drug listings. http://www.coindesk.com/drugs-contraband-openbazaar/. Accessed on 19 April 2018

  8. Hu Y, Manzoor A, Ekparinya P, Liyanage M, Thilakarathna K, Jourjon G, Seneviratne A, Ylianttila ME (2018) A delay-tolerant payment scheme based on the ethereum Blockchain. arXiv:1801.10295

  9. Miers I, Garman C, Green M, Rubin AD (2013) Zerocoin: anonymous distributed E-cash from Bitcoin. In: Proceedings of the IEEE symposium on security privacy, IEEE, Berkeley, CA, USA, pp 397–411

  10. Sasson EB, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: decentralized anonymous payments from Bitcoin. In: Proceedings of the IEEE symposium on security and privacy, IEEE, Berkeley, CA, USA, pp 459–474

  11. Sidhu J (2017) Syscoin: a peer-to-peer electronic cash system with Blockchain based services for E-business. In: Proceedings of the 26th international conference on computer communication and networks (ICCCN), IEEE, Vancouver, BC, Canada, pp 1–6

  12. Huh S, Cho S, Kim S (2017) Managing IoT devices using Blockchain platform. In: Proceedings of the 19th international conference on advanced communication technology (ICACT), IEEE, Bongpyeong, South Korea, pp 464–467

  13. Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) LSB: a lightweight scalable blockchain for IoT security and privacy. https://arxiv.org/abs/1712.02969?context=cs. Accessed on 01 May 2018

  14. Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. https://arxiv.org/abs/1802.04410. Accessed on 03 May 2018

  15. Kopp H, Mödinger D, Hauck F, Kargl F, Bösch C (2017) Design of a privacy-preserving decentralized file storage with financial incentives. In: Proceedings of the IEEE European symposium on security and privacy workshops, IEEE, Paris, France, pp 14–22

  16. Kopp H, Bösch C, Kargl F (2016) KopperCoin—a distributed file storage with financial incentives. In: Proceedings of the international conference on information security practice and experience, Springer, pp 79–93

  17. Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGRID), Madrid, Spain, pp 468–477

  18. Xia QI, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757–14767

    Article  Google Scholar 

  19. Dunphy P, Petitcolas FAP (2018) A first look at identity management schemes on the Blockchain. https://arxiv.org/abs/1801.03294. Accessed on 21 May 2018

  20. Raju S, Boddepalli S, Gampa S, Yan Q, Deogun JS (2017) Identity management using blockchain for cognitive cellular networks. In: Proceedings of the IEEE international conference on communications, IEEE, Paris, France, pp 1–6

  21. Muftic S (2017) Blockchain identity management system based on public identities ledger, U.S. Patent 9635000

  22. Crosby M, Pattanayak P, Verma S, Kalyanaraman V (2016) Blockchain technology: beyond Bitcoin. Appl Innov 2:6–10

    Article  Google Scholar 

  23. Haber S, Stornetta WS (1991) How to time-stamp a digital document. J Cryptol 3(2):99–111

    Article  Google Scholar 

  24. Narayanan V (2018) A brief history in the evolution of blockchain technology platforms. https://hackernoon.com/a-brief-history-in-the-evolution-of-blockchain-technology-platforms-1bb2bad8960a. Accessed on 22 May 2018

  25. Bheemaiah K (2015) Block chain 2.0: the renaissance of money. Wired. https://www.wired.com/insights/2015/01/block-chain-2-0/. Accessed on 07 June 2018

  26. Wagner A (2014) Ensuring network scalibility: how to fight blockchain bloat. https://bitcoinmagazine.com/articles/how-to-ensure-network-scalibility-fighting-blockchain-bloat-1415304056/. Accessed on 29 May 2018

  27. Williams A (2016) IBM to open first blockchain innovation centre in Singapore, to create applications and grow new markets in finance and trade. The Straits Times Singapore Press Holdings Ltsd. Co, Singapore

    Google Scholar 

  28. Chang X, Han F (2016) Block chain: From digital currency to credit society. China Citic Press, Beijing

    Google Scholar 

  29. Namasudra S, Deka GC (2018) Advances of DNA computing in cryptography. Taylor & Francis, New York

    Book  Google Scholar 

  30. Namasudra S (2018) Taxonomy of DNA-based security models. In: Namasudra S, Deka GC (eds) Advances of dna computing in cryptography. Springer, New York, pp 53–68

    Chapter  Google Scholar 

  31. Namasudra S, Deka GC (2018) Introduction of DNA computing in cryptography. In: Namasudra S, Deka DC (eds) Advances of dna computing in cryptography. Springer, New York, pp 27–34

    Chapter  Google Scholar 

  32. Namasudra S, Deka GC, Bali R (2018) Applications and future trends of DNA computing. In: Namasudra S, Deka GC (eds) Advances of DNA computing in cryptography. Taylor & Francis, NewYork, pp 181–192

    Chapter  Google Scholar 

  33. Namasudra S, Devi D, Choudhary S, Patan R, Kallam S (2018) Security, privacy, trust, and anonymity. In: Namasudra S, Deka GC (eds) Advances of DNA computing in cryptography. Taylor & Francis, New York, pp 153–166

    Chapter  Google Scholar 

  34. Ethereum Whitepaper. https://github.com/ethereum/wiki/wiki/WhitePaper. Accessed on 12 June 2018

  35. Kshetri N (2017) Cybersecurity in India: regulations, governance, institutional capacity and market mechanisms. Asian Research Policy 8(1):64–76

    Google Scholar 

  36. Namasudra S (2017) An improved attribute-based encryption technique towards the data security in cloud computing. Concurr Comput Pract Exer. https://doi.org/10.1002/cpe.4364

    Article  Google Scholar 

  37. Namasudra S, Roy R, Balamurugan B (2017) Cloud computing: fundamentals and research issues. In: Proceedings of the 2nd international conference on recent trends and challenges in computational models, IEEE, Tindivanam, India

  38. Namasudra S (2018) Cloud computing: a new era. J Fundam Appl Sci 10(2):113–135

    Google Scholar 

  39. Sarkar M, Saha K, Namasudra S, Roy P (2015) An efficient and time saving web service based android application. SSRG Int J Comput Sci Eng 2(8):18–21

    Google Scholar 

  40. Namasudra S, Roy P, Balamurugan B, Vijayakumar P (2017) Data accessing based on the popularity value for cloud computing. In: Proceedings of the international conference on innovations in information, embedded and communications systems (ICIIECS), IEEE, Coimbatore, India

  41. Namasudra S, Roy P (2018) PpBAC: popularity based access control model for cloud computing. J Organ End User Comput 30(4):14–31

    Article  Google Scholar 

  42. Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper

  43. The-bitcoin-foundation, how does Bitcoin work? (2014) https://bitcoin.org/en/how-it-works. Accessed on 17 June 2018

  44. Antonopoulos AM (2014) Mastering bitcoin: unlocking digital crypto-currencies. O’Reilly Media Inc, Boston

    Google Scholar 

  45. Parizi RM, Dehghantanha A, Choo KKR, Singh A (2018) Empirical vulnerability analysis of automated smart contracts security testing on blockchains. In: Proceedings of the 28th annual international conference on computer science and software engineering, pp 103–113

  46. Parizi RM, Dehghantanha A (2018) Smart contract programming languages on blockchains: an empirical evaluation of usability and security. In: Proceedings of the international conference on blockchain, Springer, pp 75–91

  47. Szabo N (1994) Smart contracts. http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart.contracts.html. Accessed on 18 June 2018

  48. Stellar Network Overview (2014) https://www.stellar.org/developers/guides/get-started/. Accessed on 18 June 2018

  49. Ripple Network (2013) https://ripple.com/network. Accessed on 18 June 2018

  50. Introduction to Tendermint (2017) https://tendermint.com/intro. Accessed on 18 June 2018

  51. Parizi RM, Dehghantanha A (2018) On the understanding of gamification in blockchain systems. In: Proceedings of the 6th international conference on future internet of things and cloud workshops, IEEE, Barcelona, Spain, pp 214–219

  52. Zheng Z, Xie S, Dai HN, Wang H (2016) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):314–335

    Google Scholar 

  53. Ghosh M, Richardson M, Ford B, Jansen R (2014) A torpath to torcoin, proof-of-bandwidth altcoins for compensating relays. https://www.smithandcrown.com/open-research/a-torpath-to-torcoin-proof-of-bandwidth-altcoins-for-compensating-relays/. Accessed on 07 August 2018

  54. Proof of Authority Chains (2017) https://github.com/paritytech/parity/wiki/Proof-of-Authority-Chains. Accessed on 23 June 2018

  55. Proof of Elapsed Time (Poet) (2017) http://intelledger.github.io/. Accessed on 10 August 2018

  56. Annual Results (2016) https://www.kudelskisecurity.com/about-us/news/annual-results-2016. Accessed on 22 June 2018

  57. Paul MS (2018) Hyperledger frameworks & modules. https://medium.com/swlh/hyperledger-chapter-2-hyperledger-frameworks-modules-cabf50e12105. Accessed on 29 August 2018

  58. Cui G, Shi K, Qin Y, Liu L, Qi B, Li B (2017) Application of block chain in multi-level demand response reliable mechanism. In: Proceedings of the international conference on information management (ICIM), IEEE, Chengdu, China, pp 337–341

  59. Duffield E, Diaz D (2015) Dash: a privacy-centric crypto-currency. http://zioncoins.co.uk/wp-content/uploads/2015/06/Dash-Whitepaper.pdf. Accessed on 23 June 2018

  60. Kestenbaum R (2017) Why bitcoin is important for your business. https://www.forbes.com/sites/richardkestenbaum/2017/03/14/why-bitcoinis-important-for-your-business/3/#2da6d4c72b3b. Accessed on 27 June 2018

  61. Ho DCK, Au KF, Newton E (2002) Empirical research on supply chain management: a critical review and recommendations. Int J Prod Res 40(17):4415–4430

    Article  Google Scholar 

  62. Huang GQ, Lau JSK, Mak KL (2003) The impacts of sharing production information on supply chain dynamics: a review of the literature. Int J Prod Res 41(7):1483–1517

    Article  Google Scholar 

  63. Bünger M (2017) Blockchain for industrial enterprises: hype, reality, obstacles and outlook. http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Blockchain-for-industrial-enterprises-Hype-reality-obstacles-and-outlook. Accessed on 29 June 2018

  64. Hwang J, Choi M, Lee T, Jeon S, Kim S, Park S, Park S (2017) Energy prosumer business model using blockchain system to ensure transparency and safety. Energy Procedia 141:194–198

    Article  Google Scholar 

  65. Xue T, Hongbin S, Qinglai G (2016) Electricity transactions and congestion management based on blockchain in energy internet. Power Syst Technol 40(12):3630–3638

    Google Scholar 

  66. Ming Z, Jun C, Yuqing W, Yuanfei L, Yongqi Y, Jinyue D (2017) The primarily research for multi module cooperative autonomous mode of energy internet under blockchain framework. Proc Chin Soc Electr Eng 37(13):3672–3681

    Google Scholar 

  67. Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA based data security in the cloud computing environment. Comput Commun 151:539–547

    Article  Google Scholar 

  68. Namasudra S (2020) Data access control in the cloud computing environment for bioinformatics. Int J Appl Res Bioinform (IJARB)

  69. Li S, Wang G, Yang J (2019) Survey on cloud model based similarity measure of uncertain concepts. CAAI Trans Intell Technol 4(4):223–230

    Article  Google Scholar 

  70. Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2020) Securing multimedia by using DNA based encryption in the cloud computing environment. ACM T Multi Comput Commun Appl

  71. Namasudra S, Roy P (2017) Time saving protocol for data accessing in cloud computing. IET Commun 11(10):1558–1565

    Article  Google Scholar 

  72. Alguliyev RM, Aliguliyev RM, Sukhostat LV (2020) Efficient algorithm for big data clustering on single machine. CAAI Trans Intell Technol 5(1):9–14

    Article  Google Scholar 

  73. Namasudra S, Roy P (2016) Secure and efficient data access control in cloud computing environment: a survey. Multiagent Grid Sys Int J 12(2):69–90

    Article  Google Scholar 

  74. Namasudra S, Roy P, Vijayakumar P, Audithan S, Balusamy B (2017) Time efficient secure DNA based access control model for cloud computing environment. Future Generation Computer Systems 73:90–105

    Article  Google Scholar 

  75. Zhao X, Li R, Zuo X (2019) Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Trans Intell Technol 4(3):159–174

    Article  Google Scholar 

  76. Devi D, Namasudra S, Kadry S (2020) A boosting-aided adaptive cluster-based undersampling approach for treatment of class imbalance problem. Int J Data Warehous Min (IJDWM) 16(3)

  77. Zyskind G, Nathan O, Pentland A (2015) Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of the IEEE security and privacy workshops, IEEE, San Jose, CA, USA, pp 180–184

  78. Ash JS, Berg M, Coiera E (2004) Some unintended consequences of information technology in health care: the nature of patient care information system-related errors. J Am Med Inform Assoc 11(2):104–112

    Article  Google Scholar 

  79. Liu W (2010) Digital Health Care (DHC) network and IT infrastructure solutions. In: Proceedings of the 7th IEEE consumer communications and networking conference, IEEE, Las Vegas

  80. Liu W, Park EK, Zhu SS (2014) e-Health PST (privacy, security and trust) mobile networking infrastructure. In: Proceedings of the 23rd international conference on computer communication and networks (ICCCN), IEEE, Shanghai, China

  81. Nakamoto S (2008) Bitcoin P2P e-cash paper. https://www.mail-archive.com/cryptography@metzdowd.com/msg09959.html. Accessed on 15 July 2018

  82. Stewart T (2018) Blockchain and electronic health records: hype or problem solver?. https://www.himssinsights.eu/blockchain-and-electronic-health-records-hype-or-problem-solver. Accessed on 27 July 2018

  83. Nath I (2016) Data exchange platform to fight insurance fraud on Blockchain. In: Proceedings of the international conference on data mining workshops (ICDMW), IEEE, Barcelona, Spain, pp 821–825

  84. Internet of things installed base will grow to 26 Bn units by 2020, 2017. https://www.firstpost.com/biztech/internet-of-things-installed-base-will-grow-to-26-bn-units-by-2020-1895781.html. Accessed on 18 July 2018

  85. Conoscenti M, Vetr A, Martin JCD (2016) Blockchain for the internet of things: a systematic literature review. In: Proceedings of the IEEE/ACS 13th international conference of computer systems and applications (AICCSA), IEEE, Agadir, Morocco

  86. Dickson B (2016) Blockchain could help fix IoT security after DDoS attack. http://venturebeat.com/2016/10/29/blockchain-could-help-fix-iot-securityafter-ddos-attack/. Accessed on 24 July 2018

  87. Prisco G (2015) Slock. It to introduce smart locks linked to smart ethereum contracts, decentralize the sharing economy. https://bitcoinmagazine.com/articles/slock-it-to-introduce-smart-locks-linked-to-smart-ethereum-contracts-decentralize-the-sharing-economy-1446746719/. Accessed on 04 July 2018

  88. Mayer H (2016) ECDSA security in Bitcoin and Ethereum: a research survey. https://blog.coinfabrik.com/wp-content/uploads/2016/06/ECDSA-Security-in-Bitcoin-and-Ethereum-a-Research-Survey.pdf

  89. Miller A, Möser M, Lee K, Narayanan A (2017) An empirical analysis of linkability in the monero blockchain. ArXiv preprint: arXiv:1704.04299

  90. Juels A, Kosba A, Shi E (2016) The ring of gyges: investigating the future of criminal smart contracts. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, New York, NY, USA, pp 283–295

  91. Solat S, Potop-Butucaru M (2016) ZeroBlock: preventing selfish mining in Bitcoin, Univ. of Paris (Ph.D. thesis)

  92. Eyal I, Sirer EG (2014) Majority is not enough: Bitcoin mining is vulnerable. In: Lecture Notes in Computer Science, vol. 8437, pp 436–454

  93. Schatsky D, Arora A, Dongre A (2018) Blockchain and the five vectors of progress. https://www2.deloitte.com/insights/us/en/focus/signals-for-strategists/value-of-blockchain-applications-interoperability.html. Accessed on 15 December 2018

Download references

Funding

The authors confirm that there is no source of funding for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir H. Gandomi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Namasudra, S., Deka, G.C., Johri, P. et al. The Revolution of Blockchain: State-of-the-Art and Research Challenges. Arch Computat Methods Eng 28, 1497–1515 (2021). https://doi.org/10.1007/s11831-020-09426-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11831-020-09426-0

Keywords

Navigation