ijct
  • Home
  • Topics
  • Call For Paper
  • Publication Charges
  • Archives
    • Current Issue
    • Past Issues
    • conference
  • Submission
  • IRG Journals
  • Contact Us

ijct Submit Your Article : editorijctjournal@gmail.com

international journal of computer techniques(ijct)

Paper Title : A Review of Usability and Security Evaluation Model ofBlockchain Technologies

ISSN : 2394-2231
Year of Publication : 2020

10.29126/23942231/IJCT-v7i2p14
Authors: PallabBanerjee ,Biresh kumar , Amarnath Singh ,Harsh Prasad , Bittu Raj

         



MLA Style: PallabBanerjee ,Biresh kumar , Amarnath Singh ,Harsh Prasad , Bittu Raj "A Review of Usability and Security Evaluation Model ofBlockchain Technologies" Volume 7 - Issue 2 March - April,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

APA Style: PallabBanerjee ,Biresh kumar , Amarnath Singh ,Harsh Prasad , Bittu Raj "A Review of Usability and Security Evaluation Model ofBlockchain Technologies" Volume 7 - Issue 2 March - April,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

Abstract
In the modern trends of evolution Blockchain has received extensive attention recently. In the race of digitalization, the world is looking on the technology that can fuel financial transaction significantly, Thus Blockchain provide such types of facilities. As we know, Blockchain is a decentralized peer-to-peer network which was designed in order to remove involvement of third party in transaction. But due to its extensive use on a large scale there is huge problem of security and scalability.This paper aims to provide a review of Usability and Security of some of blockchain Technology on different categories: Public, Consortium and Private on different application Model such as Smart contract, Internet of Things and Crypto- currency considering different parameters. This paper basically provide a comparative study and coordination between them. We also expand to provide a typical consensus algorithm comparison which governs the blockchain.

Reference
1]M.Knecht and B. Stiller, “Smartdemap: A smart contract deployment and management platform,” in IFIP International Conference onAutonomous Infrastructure, Management and Security, pp. 159–164,Springer, 2017. [2]V. Buterin, “A next-generation smart contract and de-centralized application platform 19/07/2018. [3]M. Alharby and A. van Moorsel, “Blockchain-based smart contracts: A systematic mapping study,” arXiv preprint arXiv:1710.06372, 2017. [4]S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security,privacy and trust in internet of things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015. [5] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279,2013. [6]Kitchenham B, Charters S. Guidelines for performing Systematic Literature Reviews in Software Engineering;2007. [7]Coinmarketcap, Crypto-Currency Market Capitalizations; 2016.Accessed:24/3/2016. [8]Nakamoto, Satoshi. “Bitcoin: A peer-to-peer electroniccash system.” Consulted1.2012(2008):28. [9] M. Vukolić, “The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication,” in International Workshop on Open Problems in Network Security, Springer, 2016, pp. 112–125. [10] I.-C. Lin and T.-C.Liao, “A Survey of Blockchain Security Issues and Challenges,” Int. J. Netw.Secur., vol. 1919, no. 55, pp. 653–65901, 2017. [11] J. Barcelo, “User privacy in the public bitcoinblockchain,” 2014. [12] M. M¨oser, “Anonymity of bitcoin transactions: An analysis of mixing services,” in Proceedings of M¨unsterBitcoin Conference, M¨unster, Germany, 2013, pp. 17–18. [13] G. Maxwell, “Coinjoin: Bitcoin privacy for the real world,” in Post onBitcoin Forum, 2013. [14] T. Ruffing, P. Moreno-Sanchez, and A. Kate, “Coinshuffle: Practical decentralized coin mixing for bitcoin,” in Proceedings of European Symposium on Research in Computer Security, Cham, 2014, pp. 345–364. [15] I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin: Anonymous distributed e-cash from bitcoin,” in Proceedings of IEEE SymposiumSecurity and Privacy (SP), Berkeley, CA, USA, 2013, pp. 397–411. [16] E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from bitcoin,”in Proceedings of 2014 IEEE Symposium on Security and Privacy (SP),San Jose, CA, USA, 2014, pp. 459–474. [17] “Crypto-currency market capitalizations,” 2017. [Online].Available:https://coinmarketcap.com [18] N. Szabo, “The idea of smart contracts,” 1997. [19] S. King and S. Nadal, “Ppcoin: Peer-to-peer crypto-currency with proofof-stake,” Self-Published Paper, August, vol. 19, 2012. [20] “Bitshares - your share in the decentralized exchange.” [Online]. Available: https://bitshares.org/ [21] D. Schwartz, N. Youngs, and A. Britto, “The ripple protocol consensus algorithm,” Ripple Labs Inc White Paper, vol. 5, 2014. [22] F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: A technicalsurvey on decentralized digital currencies,” IEEE Communications SurveysTutorials, vol. 18, no. 3, pp. 2084–2123, 2016. [23] NRI, “Survey on blockchain technologies and related services,” Tech.Rep.,2015.[Online].Available:http://www.meti.go.jp/english/press/2016/pdf/0531 01f.pdf [24] D. Lee KuoChuen, Ed., Handbook of Digital Currency, 1st ed.Elsevier, 2015.[Online].Available:http://EconPapers.repec.org/RePEc:eee:monogr:9780128021170 [25] G. Foroglou and A.-L.Tsilidou, “Further applications of the blockchain,”2015. [26] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smartcontracts,” in Proceedings of IEEE Symposium on Security and Privacy(SP), San Jose, CA, USA, 2016, pp. 839–858.

Keywords
Blockchain, Decentralized, Scalability, Usability

IJCT Management

  • Home
  • Aim & Scope
  • Indexing
  • Author instruction
  • Call for paper IJCT JOURNAL
  • Current Issues
  • special issue
  • Review process
  • Impact factor
  • Board members
  • Publication ethics
  • Copyright Infringement
  • Join as a Reviewer
  • FAQ
  • Downloads

  • CopyrightForm
  • Paper Template
  • IJCT Policy

  • Terms & Conditions
  • Cancellation & Refund
  • Privacy Policy
  • Shipping &Delivery
  • Publication Rights
  • Plagiarism Policy
Copyright ©2015 IJCT- International Journal of Computer Techniques Published By International Research Group , All rights reserved

This work is licensed under a Creative Commons Attribution 4.0 (International) Licence. (CC BY-NC 4.0)