Blockchain and Bitcoin Security in IT Automation

  IJCTT-book-cover
 
         
 
© 2020 by IJCTT Journal
Volume-68 Issue-3
Year of Publication : 2020
Authors : Sikender Mohsienuddin Mohammad
DOI :  10.14445/22312803/IJCTT-V68I3P121

How to Cite?

Sikender Mohsienuddin Mohammad, "Blockchain and Bitcoin Security in IT Automation," International Journal of Computer Trends and Technology, vol. 68, no. 3, pp. 103-110, 2020. Crossref, 10.14445/22312803/IJCTT-V68I3P121

Abstract
In recent days, the technologies referred to as Blockchain and Bitcoin have gained much interest from society. These activities are increasing relevancy in the era of digitization and which forms a digital economy in the United States and all over the world. Currently, the automation of IT has deployed the use of technology atomization process through robotics hence machine production, the development of the framework of artificial intelligence, the Blockchain, and Bitcoin referred to as the open systems, the concepts of big data, algorithms of software, and the neural networks. In the implementation of enterprise, it is not easy to access the possibilities of assessing adequately and the consequences, which includes the opportunities of a qualitative change. In the last century, the invention of the essential ingredients that are key in the cryptography and its use in the hash functions have been underway and have also included the sensitivities that will enable Blockchain and Bitcoin to be successful. In recent years, technology has become available for the systems of payment, and other applications that revolve around bold issues, and the contracts are smart. The essay will discuss the automation trends and consequences of Blockchain and Bitcoin in the various sectors of the economy, including the industries. The paper will also comment on the analogies associated with the payments that may lead to a deeper understanding of the properties of Blockchain and Bitcoin.

Keywords
Bitcoin, Blockchain, Distributed, Decentralized, Cloud computing, Authentication, Cryptocurrency

Reference
[1] Aste, T., Tasca, P., & Di Matteo, T. (2017). “Blockchain technologies: The foreseeable impact on society and industry”. computer, 50(9), 18-28. https://discovery.ucl.ac.uk/id/eprint/10043048/1/Aste_BlockchainIEEE_600W_v3.3_A.doccceptedVersion.x.pdf
[2] Baur, D. G., Hong, K., & Lee, A. D. (2018). “Bitcoin: Medium of exchange or speculative assets?”. Journal of International Financial Markets, Institutions and Money, 54, 177-189.
[3] Benchoufi, M., & Ravaud, P. (2017). “Blockchain technology for improving clinical research quality”. Trials, 18(1), 335. https://trialsjournal.biomedcentral.com/articles/10.1186/s13063-017-2035-z
[4] Conti, M., Kumar, E. S., Lal, C., & Ruj, S. (2018). “A survey on security and privacy issues of bitcoin”. IEEE Communications Surveys & Tutorials, 20(4), 3416-3452. https://arxiv.org/pdf/1706.00916.pdf?utm_source=securitydailynews.com
[5] Dai, F., Shi, Y., Meng, N., Wei, L., & Ye, Z. (2017, November). “From Bitcoin to cybersecurity: A comparative study of blockchain application and security issues”. In 2017 4th International Conference on Systems and Informatics (ICSAI) (pp. 975-979). IEEE.
[6] Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2017). “Blockchain-based database to ensure data integrity in cloud computing environments”. https://eprints.soton.ac.uk/411996/1/BC_1.pdf
[7] Gandal, N., Hamrick, J. T., Moore, T., & Oberman, T. (2018). “Price manipulation in the Bitcoin ecosystem”. Journal of Monetary Economics, 95, 86-96. https://par.nsf.gov/servlets/purl/10066235
[8] Giechaskiel, I., Cremers, C., & Rasmussen, K. B. (2018). “When the crypto in cryptocurrencies breaks: Bitcoin security under broken primitives”. IEEE Security & Privacy, 16(4), 46-56. https://ora.ox.ac.uk/objects/uuid:37b766d5-c749-41e7-bb24-8d10cde6133f/download_file?safe_filename=SP_SPSI-2017-01-0027.R1_Giechaskiel.pdf&file_format=application%2Fpdf&type_of_work=Journal+article
[9] Halaburda, H. (2018). “Blockchain revolution without the blockchain?”. Communications of the ACM, 61(7), 27-29. https://dl.acm.org/doi/fullHtml/10.1145/3225619
[10] Halpin, H., & Piekarska, M. (2017, April). “Introduction to Security and Privacy on the Blockchain”. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 1-3). IEEE. https://hal.inria.fr/hal-01673293/document
[11] Henk, M. A., & Bell, R. T. (2019). “Blockchain: An insurance focus”. http://jp.milliman.com/uploadedFiles/insight/2016/2340PCP_Blockchain_20161108.pdf
[12] Joshi, A. P., Han, M., & Wang, Y. (2018). “A survey on security and privacy issues of blockchain technology”. Mathematical Foundations of Computing, 1(2), 121-147. http://www.aimsciences.org/article/doi/10.3934/mfc.2018007
[13] Kiayias, A., Russell, A., David, B., & Oliynykov, R. (2017, August). “Ouroboros: A provably secure proof-of-stake blockchain protocol.” In Annual International Cryptology Conference (pp. 357-388). Springer, Cham. https://coinnws.com/wp-content/uploads/2019/08/cardano-whitepaper.pdf
[14] Krueckeberg, S., & Scholz, P. (2019). “Cryptocurrencies as an asset class”. In Cryptofinance and Mechanisms of Exchange (pp. 1-28). Springer, Cham. https://www.researchgate.net/profile/Peter_Scholz7/publication/325057131_Cryptocurrencies_as_an_Asset_Class/links/5d026bef92851c874c6436af/Cryptocurrencies-as-an-Asset-Class.pdf
[15] Lin, I. C., & Liao, T. C. (2017). “A survey of blockchain security issues and challenges”. IJ Network Security, 19(5), 653-659. http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p653-659.pdf
[16] Lu, Y. (2018). “Blockchain and the related issues: a review of current research topics”. Journal of Management Analytics, 5(4), 231-255.
[17] Nakamoto, S. (2019). “Bitcoin: A peer-to-peer electronic cash system”. Manubot. https://git.dhimmel.com/bitcoin-whitepaper/
[18] Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). “Blockchain. Business & Information Systems Engineering”, 59(3), 183-187. http://www.cs.unibo.it/~danilo.montesi/CBD/Articoli/2017Blockchain.pdf
[19] Park, J. H., & Park, J. H. (2017). “Blockchain security in cloud computing: Use cases, challenges, and solutions”. Symmetry, 9(8), 164. https://www.mdpi.com/2073-8994/9/8/164/pdf
[20] Puthal, D., Malik, N., Mohanty, S. P., Kougianos, E., & Yang, C. (2018). “The blockchain as a decentralized security framework [future directions]”. IEEE Consumer Electronics Magazine, 7(2), 18-21. http://www.smohanty.org/Publications_Journals/2018/Mohanty_IEEE-CEM_2018-Mar_The-Blockchain.pdf
[21] Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). “On blockchain and its integration with IoT. Challenges and opportunities”. Future generation computer systems, 88, 173-190. https://www.sciencedirect.com/science/article/pii/S0167739X17329205
[22] Vidal-Tomás, D., & Ibañez, A. (2018). “Semi-strong efficiency of Bitcoin”. Finance Research Letters, 27, 259-265.
[23] Yaga, D., Mell, P., Roby, N., & Scarfone, K. (2019). “Blockchain technology overview”. arXiv preprint arXiv:1906.11078. https://arxiv.org/pdf/1906.11078
[24] Zhang, Y., Deng, R. H., Liu, X., & Zheng, D. (2018). “Blockchain based efficient and robust fair payment for outsourcing services in cloud computing”. Information Sciences, 462, 262-277. https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=5216&context=sis_research
[25] Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017, June). “An overview of blockchain technology: Architecture, consensus, and future trends”. In 2017 IEEE international congress on big data (BigData congress) (pp. 557-564). IEEE. https://www.researchgate.net/profile/Hong-Ning_Dai/publication/318131748_An_Overview_of_Blockchain_Technology_Architecture_Consensus_and_Future_Trends/links/59d71faa458515db19c915a1/An-Overview-of-Blockchain-Technology-Architecture-Consensus-and-Future-Trends.pdf