Abstract—
The paper considers blockchain based systems threats caused by uneven distribution of computational power. A model that allows to assess a system’s security against such threats is proposed.
Similar content being viewed by others
REFERENCES
Nakamoto, S., Bitcoin: A peer-to-peer electronic cash system, Bitcoin, 2009. https://bitcoin.org/bitcoin.pdf. Accessed December 1, 2019.
Amendment No. 4 to Form S-3 Registration Statement. Overstock.com, Inc., United States Security and Exchange Commission, 2015. https://www.sec.gov/Archives/edgar/data/1130713/000104746915008523/a2226515zs-3a.htm. Accessed December 1, 2019.
Notary, Bitcoin.com. https://notary.bitcoin.com. Accessed December 1, 2019.
Kempe, M., The land registry in the blockchain - testbed, ChromaWay, 2017. https://chromaway.com/papers/Blockchain_Landregistry_Report_2017.pdf. Accessed December 1, 2019.
Ali, M., et al., Blockstack: A global naming and storage system secured by blockchains, 2016 USENIX Annual Technical Conference, Denver, 2016, pp. 181–194.
Konoplev, A.S., Busygin, A.G., and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021.
How Walmart Brought Unprecedented Transparency to the Food Supply Chain with Hyperledger Fabric, 2018. https://www.hyperledger.org/resources/publications/walmart-case-study. Accessed December 1, 2019.
Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, ACM International Conference Proceeding Series, 2018. https://doi.org/10.1145/3264437.3264463
Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284.
Busygin, A., Kalinin, M., and Konoplev, A., Supporting connectivity of VANET/MANET network nodes and elastic software-configurable security services using blockchain with floating genesis block, The Convergence of Digital and Physical Worlds: Technological, Economic and Social Challenges (CC-TESC2018), SHS Web of Conferences, 2018, vol. 44. https://doi.org/10.1051/shsconf/20184400020
Zegzhda, D.P., Moskvin, D.A., and Myasnikov, A.V., Assurance of cyber resistance of the distributed data storage systems using the blockchain technology, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1111–1116.
Popov, S., The tangle, IOTA: Next Generation Blockchain, 2017. https://www.iotatoken.com/IOTA_Whitepaper.pdf. Accessed December 1, 2019.
Bruce, J.D., The Mini-Blockchain Scheme, Cryptonite, 2017. http://cryptonite.info/files/mbc-scheme-rev3.pdf. Accessed December 1, 2019.
Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080–1083.
Bitcoin 0.3.2 released, Bitcoin Forum, 2010. https://bitcointalk.org/index.php?topic=437. Accessed December 1, 2019.
Sayeed, S. and Marco-Gisbert, H., Assessing blockchain consensus and security mechanisms against the 51% attack, Appl. Sci., 2019, vol. 9, no. 9, p. 1788.
Wang, M., Duan, M., and Zhu, J., Research on the security criteria of hash functions in the blockchain, BCC’18 Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Incheon, 2018, pp. 47–55.
Difficulty, Bitcoin Wiki, 2019. https://en.bitcoin.it/wiki/Difficulty.
Bitcoin Hash Rate, Blockchain.com. https://www.blockchain.com/ru/charts/hash-rate. Accessed December 1, 2019.
Block, Bitcoin Wiki, 2019. https://en.bitcoin.it/wiki/Block. Accessed December 1, 2019.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by S. Kuznetsov
About this article
Cite this article
Busygin, A.G., Konoplev, A.S. Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power. Aut. Control Comp. Sci. 54, 850–853 (2020). https://doi.org/10.3103/S014641162008009X
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S014641162008009X