Computer and Modernization ›› 2023, Vol. 0 ›› Issue (06): 110-117.doi: 10.3969/j.issn.1006-2475.2023.06.018
• INFORMATION SECURITY • Previous Articles Next Articles
ZHA Kai-jin, WANG Zhi-bo, HE Yue-shun, XU Hong-zhen
Received:
2022-11-14
Revised:
2023-04-30
Online:
2023-06-28
Published:
2023-06-28
CLC Number:
ZHA Kai-jin, WANG Zhi-bo, HE Yue-shun, XU Hong-zhen. Survey on Blockchain Security Protection[J]. Computer and Modernization, 2023, 0(06): 110-117.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2023.06.018
[1] NAKAMOTO S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. (2018-10-31)[2022-12-01]. https://bitcoin.org/bitcoin.pdf. [2] Dash Website.Dash is digital Cash[EB/OL]. [2022-12-01].https://www.dash.org/. [3] 林定康,颜嘉麒,巴·楠登,等. 门罗币匿名及追踪技术综述[J]. 计算机应用,2022,42(1):148-156. [4] ZHANG Y C, LONG Y, LIU Zh, et al.Z-channel: Scalable and efficient scheme in Zerocash[J]. Computers & Security, 2019,86:112-131. [5] KHAN S N, LOUKIL F, GHEDIRA-GUEGAN C, et al.Blockchain smart contracts: Applications, challenges, and future trends[J]. Peer-to-Peer Networking and Applications, 2021,14(5):2901-2925. [6] Ethereum Website.Ethereum: A next-generation smart contract and decentralized application platform[EB/OL]. [2022-12-01].https://ethereum.org/en/whitepaper/. [7] ANDROULAKI E, MANEVICH Y, MURALIDHARAN S, et al.Hyperledger fabric: A distributed operating system for permissioned blockchains[J]. arXiv preprint arXiv:1801.10228, 2018. 2018. [8] 刘嘉琪,刘贝丽,彭韬,等. 基于区块链的音频版权存证模型[J]. 计算机科学, 2021,48(S1):428-442. [9] LU Z J, LIU W C, WANG Q, et al.A privacy-preserving trust model based on blockchain for VANETs[J]. IEEE Access, 2018(6):45655-45664. [10] SRINIVASU P N, BHOI A K, NAYAK S R, et al.Blockchain technology for secured healthcare data communication among the non-terminal nodes in IoT architecture in 5G network[J]. Electronics, 2021,10(12):1437. [11] LONGO F, NICOLETTI L, PADOVANO A.Estimating the impact of blockchain adoption in the food processing industry and supply chain[J]. International Journal of Food Engineering,2019,16(5-6). DOI:10.1515/ijfe-2019-0109. [12] DAMIANOU A, ANGELOPOULOS C M, KATOS V.An architecture for blockchain over edge-enabled IoT for smart circular cities[C]// 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS). 2019:465-472. [13] PIAO C H, HAO Y R, YAN J Q, et al.Privacy preserving in blockchain-based government data sharing: A Service-On-Chain (SOC) approach[J]. Information Processing and Management, 2021,58(5). DOI:10.1016/j.ipm.2021.102651. [14] WALPORT M. Distributed ledger technology: Beyond blockchain[EB/OL]. (2016-02-20)[2022-12-01]. http://thelivinglib.org/distributed-ledger-technology-beyond-block-chain/. [15] 中国信息通信研究院. 区块链白皮书(2020年)[EB/OL]. (2020-12-30)[2022-12-01].http://www.caict.ac.cn/kxyj/qwfb/bps/202012/P020201230759713827891.pdf. [16] 中国信息通信研究院. 区块链白皮书(2019年)[EB/OL]. (2019-11-11)[2022-12-01].http://www.cbdio.com/image/site2/20191111/f42853157e261f3346263b.pdf. [17] 王劲松,吕志梅,赵泽宇,等. 面向区块链交易可视分析的地址增量聚类方法[J]. 计算机工程, 2020,46(8):14-20. [18] MARTÍNEZ V G, HERNÁNDEZ-ÁLVAREZ L, ENCIN ASL H. Analysis of the cryptographic tools for blockchain and bitcoin[J]. Mathematics, 2020,8(1). DOI:10.3390/math8010131. [19] KRISHNAPRIYA, SARATH G.Securing land registration using blockchain[J]. Procedia Computer Science, 2020,171:1708-1715. [20] HAJG S. 51% attack bleeds more than $5M from Ethereum classic[EB/OL]. Cointelegraph: Bitcoin,Ethereum, Crypto News & Price Indexes, 2021-07-30. [21] 张奥,白晓颖. 区块链隐私保护研究与实践综述[J]. 软件学报, 2020,31(5):1406-1434. [22] 曹雪莲,张建辉,刘波. 区块链安全、隐私与性能问题研究综述[J]. 计算机集成制造系统, 2021,27(7):2078-2094. [23] 康海燕,邓婕. 区块链数据隐私保护研究综述[J]. 山东大学学报(理学版), 2021,56(5):92-110. [24] SINGH S, RA I, MENG W, et al.SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology[J]. International Journal of Distributed Sensor Networks, 2019,15(4). DOI:10.1177/1550147719844159. [25] 李龚亮,贺东博,郭兵,等. 基于零知识证明的区块链隐私保护算法[J]. 华中科技大学学报(自然科学版), 2020,48(7):112-116. [26] OGUNDOYIN S O, KAMIL I A.An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy[J]. Vehicular Communications, 2021,31. DOI:10.1016/j.vehcom.2021.100384. [27] WANG W, WANG L, ZHANG P, et al.A privacy protection scheme for telemedicine diagnosis based on double blockchain[J]. Journal of Information Security and Applications, 2021,61(2). DOI:10.1016/j.jisa.2021.102845. [28] 刘双印,雷墨鹥兮,王璐,等. 区块链关键技术及存在问题研究综述[J]. 计算机工程与应用, 2022,58(3):66-82. [29] 梁秀波,吴俊涵,赵昱,等. 区块链数据安全管理和隐私保护技术研究综述[J]. 浙江大学学报(工学版), 2022,56(1):1-15. [30] 胡甜媛,李泽成,李必信,等. 智能合约的合约安全和隐私安全研究综述[J]. 计算机学报, 2021,44(12):2485-2514. [31] 王晨旭,程加成,桑新欣,等. 区块链数据隐私保护:研究现状与展望[J]. 计算机研究与发展, 2021,58(10):2099-2119. [32] KRAFT D.Difficulty control for blockchain-based consensus systems[J]. Peer-to-Peer Networking and Applications, 2016,9(2):397-413. [33] KING S, NADAL S. PPcoin:Peer-to-peer cryptoCurrency with proof-of-stake[EB/OL]. (2012-08-19)[2022-12-01]. https://decred.org/research/king2012.pdf. [34] 杨坤桥,王煜翔,郭兵,等. 委托股权证明共识机制的改进研究[J]. 计算机工程与应用, 2021,57(24):107-114. [35] CASTRO M, LISKOV B.Pratical byzantine fault tolerance[C]// Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. 1999:173-186. [36] ZHANG Y M. An analysis on the application of P2P in network[J]. Applied Mechanics and Materials, 2013,347-350:2023-2027. [37] RIVEST R, SHAMIR A, TAUMAN Y.How to leak a secret[C]// Proceeding of the ASIACRYPT 2001. 2001:552-565. [38] POP C D, ANTAL M, CIOARA T, et al.Blockchain and demand response: Zero-knowledge proofs for energy transaction privacy[J]. Sensors, 2020,20(19). DOI: 10.3390/s20195678. [39] 王雷,任南,李保珍. 区块链51%双花攻击的进化博弈及防控策略研究[J]. 计算机工程与应用, 2020,56(3):28-34. [40] 王潮,姚皓南,王宝楠,等. 量子计算密码攻击进展[J]. 计算机学报, 2020,43(9):1691-1707. [41] GROVER L K.Quantum mechanics helps in searching for a needle in a haystack[J]. Physical Review Letters, 1997,79(2) :325. [42] 郑敏,王虹,刘洪,等. 区块链共识算法研究综述[J]. 信息网络安全, 2019(7):8-24. [43] PÉREZ-SOLÀC, DELGADO-SEGURA S, NAVARRO-ARRIBAS G, et al. Double-spending prevention for Bitcoin zero-confirmation transactions[J]. International Journal of Information Security, 2018,18(4): 451-463. [44] EYAL I, SIRER E G.Majority is not enough: Bitcoin mining is vulnerable[C]// International Conference on Financial Cryptography and Data Security. 2018: 95-102. [45] APOSTOLAKI M, ZOHAR A, VANBEVER L.Hijacking bitcoin: Routing attacks on cryptocurrencies[C]// 2017 IEEE Symposium on Security and Privacy. 2017:375-392. [46] SAAD M, THAI M T, MOHAISEN A.POSTER: Deterring DDoS attacks on blockchain-based cryptocurrencies through mempool optimization[C]// Proceedings of the 2018 on Asia Conference on Computer and Communications Security. 2018:809-811. [47] LÓPEZ-FUENTES F D A, EUGUI-DE-ALBA I, ORTÍZ-RUIZ O M. Evaluating P2P networks against eclipse attacks[J]. Procedia Technology, 2012,3:61-68. [48] 刘汉卿,阮娜. 区块链中攻击方式的研究[J]. 计算机学报, 2021,44(4):786-805. [49] 姚前,张大伟. 区块链系统中身份管理技术研究综述[J].软件学报, 2021,32(7):2260-2286. [50] ZHOU F C, LI Y X, ZHOU Q S, et al.The electronic cash system based on non-interactive zero-knowledge proofs[J]. International Journal of Computer Mathematics, 2016,93(2):239-257. [51] SASSON E B, CHIESA A, GARMAN C, et al.Zerocash: Decentralized anonymous payments from bitcoin[C]// 2014 IEEE Symposium on Security and Privacy (SP). 2014:459-474. [52] RIVEST R L, SHAMIR A, TAUMAN Y.How to leak a secret: Theory and applications of ring signature[C]// Theoretical Computer Science, Essays in Memory of Shimon Even. 2006:164-186. [53] SABERHAGEN N.Cryptonote v2.0[EB/OL].[2022-12-01]. https://cryptonote.org/whitepaper.pdf. [54] 王群,李馥娟,倪雪莉,等. 区块链隐私威胁及保护机制研究[J/OL]. 计算机工程:1-28[2022-12-06]. DOI:10.19678/j.issn.1000-3428.0064343. [55] SANGEETHA K, RAVIKUMAR K.Defense against protocol level attack in tor network using deficit round robin queuing process[J]. Egyptian Informatics Journal, 2018,19(3):199-205. [56] 刘奕. 基于混币的区块链隐私保护机制研究[D]. 上海交通大学, 2020. [57] 王劲松,赵述佳,赵泽宁,等. 基于交易网络的公有链用户识别方法[J]. 计算机工程, 2022,48(8):30-36. [58] 毛洪亮,吴震,贺敏,等. 基于启发式的比特币地址聚类方法[J]. 北京邮电大学学报, 2018,41(2):27-31. [59] 张佩君. 抗量子计算攻击的区块链技术研究[D]. 济南:齐鲁工业大学, 2021. [60] APONTE-NOVOA F A, OROZCO A L S, VILLANUEVA-POLANCO R, et al. The 51% attack on blockchains: A mining behavior study[J]. IEEE Access, 2021,9:140549-140564. [61] 韩健,邹静,蒋瀚,等. 比特币挖矿攻击研究[J]. 密码学报, 2018,5(5):470-483. [62] NIU J Y, FENG C .Selfish mining in ethereum[C]// 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). 2019:1306-1316. [63] SAHAY R, GOPALAN G, MITRA B.A novel blockchain based framework to secure IoT-LLNs against routing attacks[J]. Computing,2020,102(11):2445-2470. [64] 卫孜钻,王鑫,于丹,等. 面向POW共识的日蚀攻击动态防御机制[J]. 计算机工程与应用, 2023,59(8):280-287. [65] KOE A S V, AI S, HUANG P, et al. Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough[J]. Information Sciences, 2022,606:60-71. [66] 岳猛,王怀远,吴志军,等. 云计算中DDoS攻防技术研究综述[J]. 计算机学报, 2020,43(12):2315-2336. [67] 钱鹏,刘振广,何钦铭,等. 智能合约安全漏洞检测技术研究综述[J]. 软件学报, 2022,33(8):3059-3085. [68] 张登记,赵相福,陈中育,等. 基于Ethereum智能合约的安全策略分析[J]. 应用科学学报, 2021,39(1):151-163. [69] HE D J, DENG Z, ZHANG Y X, et al.Smart contract vulnerability analysis and security audit[J]. IEEE Network, 2020,34(5):276-282. [70] 李旭东,牛玉坤,魏凌波,等. 比特币隐私保护综述[J]. 密码学报, 2019,6(2):133-149. [71] 李洪明. 区块链中隐私保护技术的研究与实现[D]. 北京:北京工业大学, 2020. [72] 李一聪,周宽久,王梓仲. 基于零知识证明的区块链隐私保护研究[J]. 空间控制技术与应用, 2022,48(1):44-52. [73] WEN X J, CHEN Y Z, FAN X C, et al.Blockchain consensus mechanism based on quantum zero-knowledge proof[J]. Optics and Laser Technology, 2022,147. DOI:10.1016/j.optlastec.2021.107693. [74] 王瑞锦,唐榆程,裴锡凯,等. 基于轻量级同态加密和零知识证明的区块链隐私保护方案[J]. 计算机科学, 2021,48(S2):547-551. [75] FU H, NIE W H, LIU L.A ring signature trust model for project review based on blockchain smart contract[J]. Tehnički Vjesnik, 2021,28(2) :347-356. [76] 程屾,刘国富,任常在,等. 基于区块链的交互实验平台资源远程共享仿真[J]. 计算机仿真, 2022,39(6):233-237. [77] NIU S F, CHEN L X, WANG J F, et al.Electronic health record sharing scheme with searchable attribute-based encryption on blockchain[J]. IEEE Access, 2020,8:7195-7204. [78] XIANG X Y, ZHAO X W.Blockchain-assisted searchable attribute-based encryption for e-health systems[J]. Journal of Systems Architecture, 2022,124(6). DOI:10.1016/j.sysarc.2022.102417. [79] 祝烈煌,袁祥博,张子剑,等. 一种结合区块链与洋葱网络的数据隐蔽传输系统及方法:CN202110930811.1[P].2021-11-23. [80] ALOTAIBI LS, ALSHAMRANI S S. Smart contract: Security and privacy[J]. Computer Systems Science and Engineering, 2021,3 8(1):93-101. [81] 倪远东,张超,殷婷婷. 智能合约安全漏洞研究综述[J]. 信息安全学报, 2020,5(3):78-99. [82] VIVAR A L, CASTEDO A T, OROZCO A L Sa, et al. An analysis of smart contracts security threats alongside existing solutions[J]. Entropy, 2020,22(2). DOI: 10.3390/e22020203. |
[1] | LI Junxiao1, ZHANG Xiaolin1, SHI Jing2. Blockchain-enhanced Vehicle Edge Computing Networks Security Data Storage and Share [J]. Computer and Modernization, 2024, 0(07): 69-75. |
[2] | ZHU Ke1, XUAN Jiaxing2, XUE Wenhao2. An Electronic License Access Control Method Based on Aggregation and Association of Smart Contracts [J]. Computer and Modernization, 2024, 0(06): 103-108. |
[3] | CHAI Li, WANG Xiao, GONG Jia-hao, WANG Yang, JI Shun-hui, ZHANG Peng-cheng. Survey of Supply Chain Oriented Consensus Algorithms [J]. Computer and Modernization, 2023, 0(11): 22-27. |
[4] | YANG Bo, XU Sheng-chao. Security Protection Method of Cloud Network Special Line Scenarios Based on SRv6#br# Service Chain [J]. Computer and Modernization, 2023, 0(08): 107-111. |
[5] | LYU Zhi-xing, YU Hui, KANG Kai, LI Teng-chang, DU Guo-li. A Feature Modeling Based Bidding Trading Mechanism in Power Blockchain [J]. Computer and Modernization, 2023, 0(08): 112-118. |
[6] | ZHONG Lin-feng, LI Yan-feng, ZHANG Gui-peng, LIU Wen-yin. Decentralized Online Shopping Data Sharing Scheme Based on Blockchain [J]. Computer and Modernization, 2023, 0(07): 61-68. |
[7] | JIANG Yu-hang, ZHANG Xin-you. Ethereum-based Medical Healthy Data Sharing System [J]. Computer and Modernization, 2023, 0(02): 110-115. |
[8] | FENG Yun-xia, CHEN Hong-da, NIU Yun-he. A Relay-based Consortium Chain Cross-chain Communication System [J]. Computer and Modernization, 2023, 0(02): 121-126. |
[9] | ZHANG Bin, LI Da-peng, JIANG Rui, WANG Xiao-ming. An Off-chain Extended Storage Scheme for Blockchain Traceability [J]. Computer and Modernization, 2022, 0(10): 106-112. |
[10] | FENG Li-gang, ZHU You-wen, . Utility-optimized Local Differential Privacy Mechanism for Protecting Location Privacy [J]. Computer and Modernization, 2022, 0(09): 99-105. |
[11] | ZHANG Tian-xi, WANG Li-peng, ZHOU Chun-tian, YANG Yan-yan, LI Xiao-chong. Secret Content Auditing Scheme in Internet of Things Scenes Based on Blockchain [J]. Computer and Modernization, 2022, 0(03): 30-36. |
[12] | ZHANG Tian-xi, WANG Li-peng, FU Jun-jun, CUI Ci, JIN Meng-lu. Certificateless Signcryption Scheme Based on Blockchain [J]. Computer and Modernization, 2022, 0(01): 120-126. |
[13] | DUAN Peng-fei, LAN Ru. Design of Network-level Moving Target Defense System Based on Blockchain [J]. Computer and Modernization, 2021, 0(08): 121-126. |
[14] | SUN Guang-cheng, LI Hong-zhe, LI Sai-fei, ZHANG Xiao-wei. Internet of Things Access Control System Based on Blockchain [J]. Computer and Modernization, 2020, 0(11): 100-108. |
[15] | LU Ge-hao, YANG Dan-ni. Development Status and Prospect of Blockchain as a Service [J]. Computer and Modernization, 2020, 0(10): 31-35. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||