Abstract
In this paper, we provide a state of-the-art survey over Bitcoin related technologies and sum up various challenges. Bitcoin is the first and most prevalent decentralized crypto-currency to date. It is decentralized peer-to-peer digital currency in which coins are produced by an appropriated set of excavators and exchange are communicated by means of a peer-to-peer organize. While Bitcoin gives some level of secrecy by urging clients to have any number of irregular looking Bitcoin addresses, late research demonstrates that this level of obscurity is fairly low. This urges clients to associate with the Bitcoin arrange through anonymizers like Tor and propels advancement of default Tor usefulness for prevalent versatile customers. A low-asset aggressor can increase full control of data streams between all clients who utilized Bitcoin over Tor. Specifically, the aggressor can connect together client’s exchanges paying little respect to pen names, control which Bitcoin squares and exchanges are handed-off to the client and can defer or dispose of client’s exchanges and pieces. Bitcoins have risen as a conceivable competitor to regular monetary forms, yet other crypto-monetary forms have similarly showed up as competitors to the Bitcoin currency. The extending business sector of crypto-monetary forms now includes capital comparable to 1010 US Dollars, furnishing the scholarly community with a bizarre chance to examine the development of significant worth. Bitcoin is an absolutely online virtual currency, unbaked by either physical wares or sovereign commitment; rather, it depends on a mix of cryptographic security and a peer-to-peer protocol for seeing settlements. Understanding Bitcoin related technologies and challenges would help maximize its usage in community.
Similar content being viewed by others
References
Ateniese, G., Faonio, A., Magri, B., De Medeiros, B.: Certified bitcoins. In: International Conference on Applied Cryptography and Network Security, Springer, Cham, 80–96 (2014)
Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: Have a snack, pay with Bitcoins. In: Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on IEEE, 1–5 (2013)
Bayern, S.: Of Bitcoins, Independently Wealthy Software, and the Zero-Member LLC. Nw. UL Rev. 108, 1485–1492 (2013)
Bergstra, J.A., de Leeuw, K.: Bitcoin and beyond: exclusively informational monies. arXiv preprint arXiv:1304.4758. (2013)
Biryukov, A., Pustogarov, I. (2015). Bitcoin over Tor isn’t a good idea. In: 2015 IEEE Symposium on IEEE Security and Privacy (SP), 122–134
Bitcoin. How Bitcoin mining works? http://www.coindesk.com/information/how-bitcoin-mining-works/. (2013)
Bohr, J., Bashir, M.: Who uses bitcoin? An exploration of the bitcoin community. In: Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on IEEE, 94–101 (2014)
Bornholdt, S., Sneppen, K.: Do Bitcoins make the world go round? On the dynamics of competing crypto-currencies. arXiv preprint arXiv:1403.6378. (2014)
Broumi S., Bakali, A., Talea, M., Smarandache, F., Vladareanu, L.: Applying Dijkstra algorithm for solving neutrosophic shortest path problem. In: Proceedings of the 2016 international conference on advanced mechatronic systems, Melbourne, Australia, 412–416 (2016b)
Broumi S., Bakali A., Talea M., Smarandache F., Vladareanu, L.: Computation of shortest path problem in a network with SV-trapezoidal neutrosophic numbers. In: Proceedings of the 2016 International Conference on Advanced Mechatronic Systems, Melbourne, Australia, 417–422 (2016a)
Broumi S., Bakali A., Talea, M., Smarandache, F.: Shortest path problem under trapezoidal neutrosophic information.In: Computing Conference, 42–148 (2017)
CoinDesk.: What is Bitcoin. http://www.coindesk.com/information/what-is-bitcoin/. (2013)
Cuong, B.C., Son, L.H., Chau, H.T.M.: Some context fuzzy clustering methods for classification problems. In: Proceedings of the 2010 Symposium on Information and Communication Technology. ACM, pp. 34–40 (2010)
Danezis, G., Fournet, C., Kohlweiss, M., Parno, B.: Pinocchio coin: building zerocoin from a succinct pairing-based proof system. In: Proceedings of the First ACM workshop on Language support for privacy-enhancing technologies ACM, 27–30 (2013)
Doria, L., Fantacci, L.: Evaluating complementary currencies: from the assessment of multiple social qualities to the discovery of a unique monetary sociality. Qual. Quant. doi:10.1007/s11135-017-0520-9. (2017)
Eskandari, S., Clark, J., Barrera, D., Stobert, E.: A first look at the usability of bitcoin key management. Workshop on Usable Security (USEC), 54–61 (2015)
Eyal I., SirerE.G.: Majority is not enough: Bitcoin mining is vulnerable. Computer Science: Cryptography and Security (2013)
Eyal, I., Gencer, A.E., Sirer, E.G., & Van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: NSDI, 45–59 (2016)
Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, 281–310 (2015)
Ghassan, O.K., Androulaki, E. Capkun, S.: Two Bitcoins at the price of one? Double-spending attacks on fast payments in Bitcoin. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 1–17 (2012)
Houy, N.: It will cost you nothing to’Kill’a proof-of-stake crypto-currency. Browser Download This Paper, 85–91 (2014)
Hurlburt, G.F., Bojanova, I.: Bitcoin: benefit or Curse? IT Prof. 16(3), 10–15 (2014)
Iavorschi, M.: The bitcoin project and the free market. CES Work. Papers 5(4), 529–534 (2013)
Isaac, M., Shaurya, S., Zhao, A.: Automated Bitcoin trading via machine learning algorithms, Department of Computer Science, Stanford University, 1–5 (2015)
Kieu, T., Vo, B., Le, T., Deng, Z.H., Le, B.: Mining top-k co-occurrence items with sequential pattern. Expert Syst. Appl. 85, 123–133 (2017)
Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 279–296 (2016)
Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS, 27–36 (2013)
Malhotra, Y.: Bitcoin protocol: model of ‘Cryptographic Proof’ Based Global Crypto-Currency & Electronic Payments System”, 4, 1–11 (2013)
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference ACM, 127–140 (2013)
Mostaghel, R., Oghazi, P.: Elderly and technology tools: a fuzzyset qualitative comparative analysis. Qual. Quant. 1–14 (2016)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. http://www.academia.edu/download/32413652/BitCoin_P2P_electronic_cash_system.pdf. (2008)
O’Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint. In: 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014), 280–285 (2014)
Raeesi, R.: The Silk Road, Bitcoins and the global prohibition regime on the international trade in illicit drugs: can this storm be weathered? Glendon J. Int. Stud./Revue d’étudesinternationales de Glendon 8, 1–20 (2015)
Raiborn, C., Sivitanides, M.: Accounting issues related to Bitcoins. J. Corp. Account. Financ. 26(2), 25–34 (2015)
Rotman, S.: Bitcoin versus electronic money. https://openknowledge.worldbank.org/handle/10986/18418. (2014)
Shah, D., Zhang, K.: Bayesian regression and Bitcoin. Institute of Electrical and Electronics Engineers (IEEE), 1–6 (2015)
Son, L.H.: Enhancing clustering quality of geo-demographic analysis using context fuzzy clustering type-2 and particle swarm optimization. Appl. Soft Comput. 22(c), 566–584 (2014)
Son, L.H.: A novel kernel fuzzy clustering algorithm for geo-demographic analysis. Inform. Sci. Int. J. 317(C), 202–223 (2015a)
Son, L.H: HU-FCF++. Eng. Appl. Artif. Intell. 41(C), 207–222 (2015b)
Son, L.H.: Generalized picture distance measure and applications to picture fuzzy clustering. Appl. Soft Comput. 46(C), 284–295 (2016)
Son, L.H., Van Hai, P.: A novel multiple fuzzy clustering method based on internal clustering validation measures with gradient descent. Int. J. Fuzzy Syst. 18(5), 894–903 (2016)
Swanson, T.: Bitcoins: made in China. Bitcoin Mag. 12–21 (2015b)
Thanh, N.D., Ali, M., Son, L.H. A Novel Clustering Algorithm in a Neutrosophic Recommender System for Medical Diagnosis. Cogn. Comput. 9(4), 526–544 (2017)
Thong, P.H., Son, L.H.: A novel automatic picture fuzzy clustering method based on particle swarm optimization and picture composite cardinality. Knowl. Based Syst. 109, 48-60 (2016a)
Thong, P.H., Son, L.H.: Picture fuzzy clustering for complex data. Eng. Appl. Artif. Intell. 56, 121-130 (2016b)
Thong, P.H., Son, L.H.: Picture fuzzy clustering: a new computational intelligence method. Soft comput. 20(9), 3549-3562 (2016c)
Tuan, T.M., Ngan, T.T., Son, L.H.: A novel semi-supervised fuzzy clustering method based on interactive fuzzy satisficing for dental x-ray image segmentation. Appl. Intell. 45(2), 402–428 (2016)
Vo, B., Le, T., Nguyen, G., Hong, T.P.: Efficient algorithms for mining erasable closed patterns from product datasets. IEEE Access 5, 3111–3120 (2017a)
Vo, B., Le, T., Pedrycz, W., Nguyen, G., Baik, S.W.: Mining erasable itemsets with subset and superset itemset constraints. Expert Syst. Appl. 69, 50–61 (2017b)
Zanin, L.: The effects of various motives to save money on the propensity of Italian households to allocate an unexpected inheritance towards consumption. Qual. Quant. 51(4), 1755–1775 (2017)
Ziegeldorf, J.H., Grossmann, F., Henze, M., Inden, N., Wehrle, K.: Coinparty: secure multi-party mixing of bitcoins. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, ACM, 75–86 (2015)
Acknowledgements
Prof. Raghvendra Kumar would like to thank the Center for High Performance Computing, VNU University of Science, Vietnam National University, Hanoi, Vietnam for supporting facilities during his part-time internship.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chatterjee, J.M., Son, L., Ghatak, S. et al. BitCoin exclusively informational money: a valuable review from 2010 to 2017. Qual Quant 52, 2037–2054 (2018). https://doi.org/10.1007/s11135-017-0605-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11135-017-0605-5