Skip to main content
Erschienen in: Quality & Quantity 5/2018

16.10.2017

BitCoin exclusively informational money: a valuable review from 2010 to 2017

verfasst von: Jyotir Moy Chatterjee, Le Hoang Son, Srijani Ghatak, Raghvendra Kumar, Manju Khari

Erschienen in: Quality & Quantity | Ausgabe 5/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we provide a state of-the-art survey over Bitcoin related technologies and sum up various challenges. Bitcoin is the first and most prevalent decentralized crypto-currency to date. It is decentralized peer-to-peer digital currency in which coins are produced by an appropriated set of excavators and exchange are communicated by means of a peer-to-peer organize. While Bitcoin gives some level of secrecy by urging clients to have any number of irregular looking Bitcoin addresses, late research demonstrates that this level of obscurity is fairly low. This urges clients to associate with the Bitcoin arrange through anonymizers like Tor and propels advancement of default Tor usefulness for prevalent versatile customers. A low-asset aggressor can increase full control of data streams between all clients who utilized Bitcoin over Tor. Specifically, the aggressor can connect together client’s exchanges paying little respect to pen names, control which Bitcoin squares and exchanges are handed-off to the client and can defer or dispose of client’s exchanges and pieces. Bitcoins have risen as a conceivable competitor to regular monetary forms, yet other crypto-monetary forms have similarly showed up as competitors to the Bitcoin currency. The extending business sector of crypto-monetary forms now includes capital comparable to 1010 US Dollars, furnishing the scholarly community with a bizarre chance to examine the development of significant worth. Bitcoin is an absolutely online virtual currency, unbaked by either physical wares or sovereign commitment; rather, it depends on a mix of cryptographic security and a peer-to-peer protocol for seeing settlements. Understanding Bitcoin related technologies and challenges would help maximize its usage in community.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ateniese, G., Faonio, A., Magri, B., De Medeiros, B.: Certified bitcoins. In: International Conference on Applied Cryptography and Network Security, Springer, Cham, 80–96 (2014) Ateniese, G., Faonio, A., Magri, B., De Medeiros, B.: Certified bitcoins. In: International Conference on Applied Cryptography and Network Security, Springer, Cham, 80–96 (2014)
Zurück zum Zitat Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: Have a snack, pay with Bitcoins. In: Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on IEEE, 1–5 (2013) Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: Have a snack, pay with Bitcoins. In: Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on IEEE, 1–5 (2013)
Zurück zum Zitat Bayern, S.: Of Bitcoins, Independently Wealthy Software, and the Zero-Member LLC. Nw. UL Rev. 108, 1485–1492 (2013) Bayern, S.: Of Bitcoins, Independently Wealthy Software, and the Zero-Member LLC. Nw. UL Rev. 108, 1485–1492 (2013)
Zurück zum Zitat Biryukov, A., Pustogarov, I. (2015). Bitcoin over Tor isn’t a good idea. In: 2015 IEEE Symposium on IEEE Security and Privacy (SP), 122–134 Biryukov, A., Pustogarov, I. (2015). Bitcoin over Tor isn’t a good idea. In: 2015 IEEE Symposium on IEEE Security and Privacy (SP), 122–134
Zurück zum Zitat Bohr, J., Bashir, M.: Who uses bitcoin? An exploration of the bitcoin community. In: Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on IEEE, 94–101 (2014) Bohr, J., Bashir, M.: Who uses bitcoin? An exploration of the bitcoin community. In: Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on IEEE, 94–101 (2014)
Zurück zum Zitat Bornholdt, S., Sneppen, K.: Do Bitcoins make the world go round? On the dynamics of competing crypto-currencies. arXiv preprint arXiv:1403.6378. (2014) Bornholdt, S., Sneppen, K.: Do Bitcoins make the world go round? On the dynamics of competing crypto-currencies. arXiv preprint arXiv:​1403.​6378. (2014)
Zurück zum Zitat Broumi S., Bakali, A., Talea, M., Smarandache, F., Vladareanu, L.: Applying Dijkstra algorithm for solving neutrosophic shortest path problem. In: Proceedings of the 2016 international conference on advanced mechatronic systems, Melbourne, Australia, 412–416 (2016b) Broumi S., Bakali, A., Talea, M., Smarandache, F., Vladareanu, L.: Applying Dijkstra algorithm for solving neutrosophic shortest path problem. In: Proceedings of the 2016 international conference on advanced mechatronic systems, Melbourne, Australia, 412–416 (2016b)
Zurück zum Zitat Broumi S., Bakali A., Talea M., Smarandache F., Vladareanu, L.: Computation of shortest path problem in a network with SV-trapezoidal neutrosophic numbers. In: Proceedings of the 2016 International Conference on Advanced Mechatronic Systems, Melbourne, Australia, 417–422 (2016a) Broumi S., Bakali A., Talea M., Smarandache F., Vladareanu, L.: Computation of shortest path problem in a network with SV-trapezoidal neutrosophic numbers. In: Proceedings of the 2016 International Conference on Advanced Mechatronic Systems, Melbourne, Australia, 417–422 (2016a)
Zurück zum Zitat Broumi S., Bakali A., Talea, M., Smarandache, F.: Shortest path problem under trapezoidal neutrosophic information.In: Computing Conference, 42–148 (2017) Broumi S., Bakali A., Talea, M., Smarandache, F.: Shortest path problem under trapezoidal neutrosophic information.In: Computing Conference, 42–148 (2017)
Zurück zum Zitat Cuong, B.C., Son, L.H., Chau, H.T.M.: Some context fuzzy clustering methods for classification problems. In: Proceedings of the 2010 Symposium on Information and Communication Technology. ACM, pp. 34–40 (2010) Cuong, B.C., Son, L.H., Chau, H.T.M.: Some context fuzzy clustering methods for classification problems. In: Proceedings of the 2010 Symposium on Information and Communication Technology. ACM, pp. 34–40 (2010)
Zurück zum Zitat Danezis, G., Fournet, C., Kohlweiss, M., Parno, B.: Pinocchio coin: building zerocoin from a succinct pairing-based proof system. In: Proceedings of the First ACM workshop on Language support for privacy-enhancing technologies ACM, 27–30 (2013) Danezis, G., Fournet, C., Kohlweiss, M., Parno, B.: Pinocchio coin: building zerocoin from a succinct pairing-based proof system. In: Proceedings of the First ACM workshop on Language support for privacy-enhancing technologies ACM, 27–30 (2013)
Zurück zum Zitat Doria, L., Fantacci, L.: Evaluating complementary currencies: from the assessment of multiple social qualities to the discovery of a unique monetary sociality. Qual. Quant. doi:10.1007/s11135-017-0520-9. (2017) Doria, L., Fantacci, L.: Evaluating complementary currencies: from the assessment of multiple social qualities to the discovery of a unique monetary sociality. Qual. Quant. doi:10.​1007/​s11135-017-0520-9. (2017)
Zurück zum Zitat Eskandari, S., Clark, J., Barrera, D., Stobert, E.: A first look at the usability of bitcoin key management. Workshop on Usable Security (USEC), 54–61 (2015) Eskandari, S., Clark, J., Barrera, D., Stobert, E.: A first look at the usability of bitcoin key management. Workshop on Usable Security (USEC), 54–61 (2015)
Zurück zum Zitat Eyal I., SirerE.G.: Majority is not enough: Bitcoin mining is vulnerable. Computer Science: Cryptography and Security (2013) Eyal I., SirerE.G.: Majority is not enough: Bitcoin mining is vulnerable. Computer Science: Cryptography and Security (2013)
Zurück zum Zitat Eyal, I., Gencer, A.E., Sirer, E.G., & Van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: NSDI, 45–59 (2016) Eyal, I., Gencer, A.E., Sirer, E.G., & Van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: NSDI, 45–59 (2016)
Zurück zum Zitat Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, 281–310 (2015) Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, 281–310 (2015)
Zurück zum Zitat Ghassan, O.K., Androulaki, E. Capkun, S.: Two Bitcoins at the price of one? Double-spending attacks on fast payments in Bitcoin. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 1–17 (2012) Ghassan, O.K., Androulaki, E. Capkun, S.: Two Bitcoins at the price of one? Double-spending attacks on fast payments in Bitcoin. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 1–17 (2012)
Zurück zum Zitat Houy, N.: It will cost you nothing to’Kill’a proof-of-stake crypto-currency. Browser Download This Paper, 85–91 (2014) Houy, N.: It will cost you nothing to’Kill’a proof-of-stake crypto-currency. Browser Download This Paper, 85–91 (2014)
Zurück zum Zitat Hurlburt, G.F., Bojanova, I.: Bitcoin: benefit or Curse? IT Prof. 16(3), 10–15 (2014)CrossRef Hurlburt, G.F., Bojanova, I.: Bitcoin: benefit or Curse? IT Prof. 16(3), 10–15 (2014)CrossRef
Zurück zum Zitat Iavorschi, M.: The bitcoin project and the free market. CES Work. Papers 5(4), 529–534 (2013) Iavorschi, M.: The bitcoin project and the free market. CES Work. Papers 5(4), 529–534 (2013)
Zurück zum Zitat Isaac, M., Shaurya, S., Zhao, A.: Automated Bitcoin trading via machine learning algorithms, Department of Computer Science, Stanford University, 1–5 (2015) Isaac, M., Shaurya, S., Zhao, A.: Automated Bitcoin trading via machine learning algorithms, Department of Computer Science, Stanford University, 1–5 (2015)
Zurück zum Zitat Kieu, T., Vo, B., Le, T., Deng, Z.H., Le, B.: Mining top-k co-occurrence items with sequential pattern. Expert Syst. Appl. 85, 123–133 (2017)CrossRef Kieu, T., Vo, B., Le, T., Deng, Z.H., Le, B.: Mining top-k co-occurrence items with sequential pattern. Expert Syst. Appl. 85, 123–133 (2017)CrossRef
Zurück zum Zitat Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 279–296 (2016) Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 279–296 (2016)
Zurück zum Zitat Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS, 27–36 (2013) Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS, 27–36 (2013)
Zurück zum Zitat Malhotra, Y.: Bitcoin protocol: model of ‘Cryptographic Proof’ Based Global Crypto-Currency & Electronic Payments System”, 4, 1–11 (2013) Malhotra, Y.: Bitcoin protocol: model of ‘Cryptographic Proof’ Based Global Crypto-Currency & Electronic Payments System”, 4, 1–11 (2013)
Zurück zum Zitat Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference ACM, 127–140 (2013) Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference ACM, 127–140 (2013)
Zurück zum Zitat Mostaghel, R., Oghazi, P.: Elderly and technology tools: a fuzzyset qualitative comparative analysis. Qual. Quant. 1–14 (2016) Mostaghel, R., Oghazi, P.: Elderly and technology tools: a fuzzyset qualitative comparative analysis. Qual. Quant. 1–14 (2016)
Zurück zum Zitat O’Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint. In: 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014), 280–285 (2014) O’Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint. In: 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014), 280–285 (2014)
Zurück zum Zitat Raeesi, R.: The Silk Road, Bitcoins and the global prohibition regime on the international trade in illicit drugs: can this storm be weathered? Glendon J. Int. Stud./Revue d’étudesinternationales de Glendon 8, 1–20 (2015) Raeesi, R.: The Silk Road, Bitcoins and the global prohibition regime on the international trade in illicit drugs: can this storm be weathered? Glendon J. Int. Stud./Revue d’étudesinternationales de Glendon 8, 1–20 (2015)
Zurück zum Zitat Raiborn, C., Sivitanides, M.: Accounting issues related to Bitcoins. J. Corp. Account. Financ. 26(2), 25–34 (2015)CrossRef Raiborn, C., Sivitanides, M.: Accounting issues related to Bitcoins. J. Corp. Account. Financ. 26(2), 25–34 (2015)CrossRef
Zurück zum Zitat Shah, D., Zhang, K.: Bayesian regression and Bitcoin. Institute of Electrical and Electronics Engineers (IEEE), 1–6 (2015) Shah, D., Zhang, K.: Bayesian regression and Bitcoin. Institute of Electrical and Electronics Engineers (IEEE), 1–6 (2015)
Zurück zum Zitat Son, L.H.: Enhancing clustering quality of geo-demographic analysis using context fuzzy clustering type-2 and particle swarm optimization. Appl. Soft Comput. 22(c), 566–584 (2014)CrossRef Son, L.H.: Enhancing clustering quality of geo-demographic analysis using context fuzzy clustering type-2 and particle swarm optimization. Appl. Soft Comput. 22(c), 566–584 (2014)CrossRef
Zurück zum Zitat Son, L.H.: A novel kernel fuzzy clustering algorithm for geo-demographic analysis. Inform. Sci. Int. J. 317(C), 202–223 (2015a)CrossRef Son, L.H.: A novel kernel fuzzy clustering algorithm for geo-demographic analysis. Inform. Sci. Int. J. 317(C), 202–223 (2015a)CrossRef
Zurück zum Zitat Son, L.H: HU-FCF++. Eng. Appl. Artif. Intell. 41(C), 207–222 (2015b)CrossRef Son, L.H: HU-FCF++. Eng. Appl. Artif. Intell. 41(C), 207–222 (2015b)CrossRef
Zurück zum Zitat Son, L.H.: Generalized picture distance measure and applications to picture fuzzy clustering. Appl. Soft Comput. 46(C), 284–295 (2016)CrossRef Son, L.H.: Generalized picture distance measure and applications to picture fuzzy clustering. Appl. Soft Comput. 46(C), 284–295 (2016)CrossRef
Zurück zum Zitat Son, L.H., Van Hai, P.: A novel multiple fuzzy clustering method based on internal clustering validation measures with gradient descent. Int. J. Fuzzy Syst. 18(5), 894–903 (2016)CrossRef Son, L.H., Van Hai, P.: A novel multiple fuzzy clustering method based on internal clustering validation measures with gradient descent. Int. J. Fuzzy Syst. 18(5), 894–903 (2016)CrossRef
Zurück zum Zitat Swanson, T.: Bitcoins: made in China. Bitcoin Mag. 12–21 (2015b) Swanson, T.: Bitcoins: made in China. Bitcoin Mag. 12–21 (2015b)
Zurück zum Zitat Thanh, N.D., Ali, M., Son, L.H. A Novel Clustering Algorithm in a Neutrosophic Recommender System for Medical Diagnosis. Cogn. Comput. 9(4), 526–544 (2017)CrossRef Thanh, N.D., Ali, M., Son, L.H. A Novel Clustering Algorithm in a Neutrosophic Recommender System for Medical Diagnosis. Cogn. Comput. 9(4), 526–544 (2017)CrossRef
Zurück zum Zitat Thong, P.H., Son, L.H.: A novel automatic picture fuzzy clustering method based on particle swarm optimization and picture composite cardinality. Knowl. Based Syst. 109, 48-60 (2016a)CrossRef Thong, P.H., Son, L.H.: A novel automatic picture fuzzy clustering method based on particle swarm optimization and picture composite cardinality. Knowl. Based Syst. 109, 48-60 (2016a)CrossRef
Zurück zum Zitat Thong, P.H., Son, L.H.: Picture fuzzy clustering for complex data. Eng. Appl. Artif. Intell. 56, 121-130 (2016b)CrossRef Thong, P.H., Son, L.H.: Picture fuzzy clustering for complex data. Eng. Appl. Artif. Intell. 56, 121-130 (2016b)CrossRef
Zurück zum Zitat Thong, P.H., Son, L.H.: Picture fuzzy clustering: a new computational intelligence method. Soft comput. 20(9), 3549-3562 (2016c)CrossRef Thong, P.H., Son, L.H.: Picture fuzzy clustering: a new computational intelligence method. Soft comput. 20(9), 3549-3562 (2016c)CrossRef
Zurück zum Zitat Tuan, T.M., Ngan, T.T., Son, L.H.: A novel semi-supervised fuzzy clustering method based on interactive fuzzy satisficing for dental x-ray image segmentation. Appl. Intell. 45(2), 402–428 (2016)CrossRef Tuan, T.M., Ngan, T.T., Son, L.H.: A novel semi-supervised fuzzy clustering method based on interactive fuzzy satisficing for dental x-ray image segmentation. Appl. Intell. 45(2), 402–428 (2016)CrossRef
Zurück zum Zitat Vo, B., Le, T., Nguyen, G., Hong, T.P.: Efficient algorithms for mining erasable closed patterns from product datasets. IEEE Access 5, 3111–3120 (2017a)CrossRef Vo, B., Le, T., Nguyen, G., Hong, T.P.: Efficient algorithms for mining erasable closed patterns from product datasets. IEEE Access 5, 3111–3120 (2017a)CrossRef
Zurück zum Zitat Vo, B., Le, T., Pedrycz, W., Nguyen, G., Baik, S.W.: Mining erasable itemsets with subset and superset itemset constraints. Expert Syst. Appl. 69, 50–61 (2017b)CrossRef Vo, B., Le, T., Pedrycz, W., Nguyen, G., Baik, S.W.: Mining erasable itemsets with subset and superset itemset constraints. Expert Syst. Appl. 69, 50–61 (2017b)CrossRef
Zurück zum Zitat Zanin, L.: The effects of various motives to save money on the propensity of Italian households to allocate an unexpected inheritance towards consumption. Qual. Quant. 51(4), 1755–1775 (2017)CrossRef Zanin, L.: The effects of various motives to save money on the propensity of Italian households to allocate an unexpected inheritance towards consumption. Qual. Quant. 51(4), 1755–1775 (2017)CrossRef
Zurück zum Zitat Ziegeldorf, J.H., Grossmann, F., Henze, M., Inden, N., Wehrle, K.: Coinparty: secure multi-party mixing of bitcoins. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, ACM, 75–86 (2015) Ziegeldorf, J.H., Grossmann, F., Henze, M., Inden, N., Wehrle, K.: Coinparty: secure multi-party mixing of bitcoins. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, ACM, 75–86 (2015)
Metadaten
Titel
BitCoin exclusively informational money: a valuable review from 2010 to 2017
verfasst von
Jyotir Moy Chatterjee
Le Hoang Son
Srijani Ghatak
Raghvendra Kumar
Manju Khari
Publikationsdatum
16.10.2017
Verlag
Springer Netherlands
Erschienen in
Quality & Quantity / Ausgabe 5/2018
Print ISSN: 0033-5177
Elektronische ISSN: 1573-7845
DOI
https://doi.org/10.1007/s11135-017-0605-5

Weitere Artikel der Ausgabe 5/2018

Quality & Quantity 5/2018 Zur Ausgabe