Skip to main content

Advertisement

Log in

BitCoin exclusively informational money: a valuable review from 2010 to 2017

  • Published:
Quality & Quantity Aims and scope Submit manuscript

Abstract

In this paper, we provide a state of-the-art survey over Bitcoin related technologies and sum up various challenges. Bitcoin is the first and most prevalent decentralized crypto-currency to date. It is decentralized peer-to-peer digital currency in which coins are produced by an appropriated set of excavators and exchange are communicated by means of a peer-to-peer organize. While Bitcoin gives some level of secrecy by urging clients to have any number of irregular looking Bitcoin addresses, late research demonstrates that this level of obscurity is fairly low. This urges clients to associate with the Bitcoin arrange through anonymizers like Tor and propels advancement of default Tor usefulness for prevalent versatile customers. A low-asset aggressor can increase full control of data streams between all clients who utilized Bitcoin over Tor. Specifically, the aggressor can connect together client’s exchanges paying little respect to pen names, control which Bitcoin squares and exchanges are handed-off to the client and can defer or dispose of client’s exchanges and pieces. Bitcoins have risen as a conceivable competitor to regular monetary forms, yet other crypto-monetary forms have similarly showed up as competitors to the Bitcoin currency. The extending business sector of crypto-monetary forms now includes capital comparable to 1010 US Dollars, furnishing the scholarly community with a bizarre chance to examine the development of significant worth. Bitcoin is an absolutely online virtual currency, unbaked by either physical wares or sovereign commitment; rather, it depends on a mix of cryptographic security and a peer-to-peer protocol for seeing settlements. Understanding Bitcoin related technologies and challenges would help maximize its usage in community.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Ateniese, G., Faonio, A., Magri, B., De Medeiros, B.: Certified bitcoins. In: International Conference on Applied Cryptography and Network Security, Springer, Cham, 80–96 (2014)

  • Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: Have a snack, pay with Bitcoins. In: Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on IEEE, 1–5 (2013)

  • Bayern, S.: Of Bitcoins, Independently Wealthy Software, and the Zero-Member LLC. Nw. UL Rev. 108, 1485–1492 (2013)

    Google Scholar 

  • Bergstra, J.A., de Leeuw, K.: Bitcoin and beyond: exclusively informational monies. arXiv preprint arXiv:1304.4758. (2013)

  • Biryukov, A., Pustogarov, I. (2015). Bitcoin over Tor isn’t a good idea. In: 2015 IEEE Symposium on IEEE Security and Privacy (SP), 122–134

  • Bitcoin. How Bitcoin mining works? http://www.coindesk.com/information/how-bitcoin-mining-works/. (2013)

  • Bohr, J., Bashir, M.: Who uses bitcoin? An exploration of the bitcoin community. In: Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on IEEE, 94–101 (2014)

  • Bornholdt, S., Sneppen, K.: Do Bitcoins make the world go round? On the dynamics of competing crypto-currencies. arXiv preprint arXiv:1403.6378. (2014)

  • Broumi S., Bakali, A., Talea, M., Smarandache, F., Vladareanu, L.: Applying Dijkstra algorithm for solving neutrosophic shortest path problem. In: Proceedings of the 2016 international conference on advanced mechatronic systems, Melbourne, Australia, 412–416 (2016b)

  • Broumi S., Bakali A., Talea M., Smarandache F., Vladareanu, L.: Computation of shortest path problem in a network with SV-trapezoidal neutrosophic numbers. In: Proceedings of the 2016 International Conference on Advanced Mechatronic Systems, Melbourne, Australia, 417–422 (2016a)

  • Broumi S., Bakali A., Talea, M., Smarandache, F.: Shortest path problem under trapezoidal neutrosophic information.In: Computing Conference, 42–148 (2017)

  • CoinDesk.: What is Bitcoin. http://www.coindesk.com/information/what-is-bitcoin/. (2013)

  • Cuong, B.C., Son, L.H., Chau, H.T.M.: Some context fuzzy clustering methods for classification problems. In: Proceedings of the 2010 Symposium on Information and Communication Technology. ACM, pp. 34–40 (2010)

  • Danezis, G., Fournet, C., Kohlweiss, M., Parno, B.: Pinocchio coin: building zerocoin from a succinct pairing-based proof system. In: Proceedings of the First ACM workshop on Language support for privacy-enhancing technologies ACM, 27–30 (2013)

  • Doria, L., Fantacci, L.: Evaluating complementary currencies: from the assessment of multiple social qualities to the discovery of a unique monetary sociality. Qual. Quant. doi:10.1007/s11135-017-0520-9. (2017)

    Google Scholar 

  • Eskandari, S., Clark, J., Barrera, D., Stobert, E.: A first look at the usability of bitcoin key management. Workshop on Usable Security (USEC), 54–61 (2015)

  • Eyal I., SirerE.G.: Majority is not enough: Bitcoin mining is vulnerable. Computer Science: Cryptography and Security (2013)

  • Eyal, I., Gencer, A.E., Sirer, E.G., & Van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: NSDI, 45–59 (2016)

  • Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, 281–310 (2015)

  • Ghassan, O.K., Androulaki, E. Capkun, S.: Two Bitcoins at the price of one? Double-spending attacks on fast payments in Bitcoin. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 1–17 (2012)

  • Houy, N.: It will cost you nothing to’Kill’a proof-of-stake crypto-currency. Browser Download This Paper, 85–91 (2014)

  • Hurlburt, G.F., Bojanova, I.: Bitcoin: benefit or Curse? IT Prof. 16(3), 10–15 (2014)

    Article  Google Scholar 

  • Iavorschi, M.: The bitcoin project and the free market. CES Work. Papers 5(4), 529–534 (2013)

    Google Scholar 

  • Isaac, M., Shaurya, S., Zhao, A.: Automated Bitcoin trading via machine learning algorithms, Department of Computer Science, Stanford University, 1–5 (2015)

  • Kieu, T., Vo, B., Le, T., Deng, Z.H., Le, B.: Mining top-k co-occurrence items with sequential pattern. Expert Syst. Appl. 85, 123–133 (2017)

    Article  Google Scholar 

  • Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 279–296 (2016)

  • Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS, 27–36 (2013)

  • Malhotra, Y.: Bitcoin protocol: model of ‘Cryptographic Proof’ Based Global Crypto-Currency & Electronic Payments System”, 4, 1–11 (2013)

  • Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference ACM, 127–140 (2013)

  • Mostaghel, R., Oghazi, P.: Elderly and technology tools: a fuzzyset qualitative comparative analysis. Qual. Quant. 1–14 (2016)

  • Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. http://www.academia.edu/download/32413652/BitCoin_P2P_electronic_cash_system.pdf. (2008)

  • O’Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint. In: 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014), 280–285 (2014)

  • Raeesi, R.: The Silk Road, Bitcoins and the global prohibition regime on the international trade in illicit drugs: can this storm be weathered? Glendon J. Int. Stud./Revue d’étudesinternationales de Glendon 8, 1–20 (2015)

    Google Scholar 

  • Raiborn, C., Sivitanides, M.: Accounting issues related to Bitcoins. J. Corp. Account. Financ. 26(2), 25–34 (2015)

    Article  Google Scholar 

  • Rotman, S.: Bitcoin versus electronic money. https://openknowledge.worldbank.org/handle/10986/18418. (2014)

  • Shah, D., Zhang, K.: Bayesian regression and Bitcoin. Institute of Electrical and Electronics Engineers (IEEE), 1–6 (2015)

  • Son, L.H.: Enhancing clustering quality of geo-demographic analysis using context fuzzy clustering type-2 and particle swarm optimization. Appl. Soft Comput. 22(c), 566–584 (2014)

    Article  Google Scholar 

  • Son, L.H.: A novel kernel fuzzy clustering algorithm for geo-demographic analysis. Inform. Sci. Int. J. 317(C), 202–223 (2015a)

    Article  Google Scholar 

  • Son, L.H: HU-FCF++. Eng. Appl. Artif. Intell. 41(C), 207–222 (2015b)

    Article  Google Scholar 

  • Son, L.H.: Generalized picture distance measure and applications to picture fuzzy clustering. Appl. Soft Comput. 46(C), 284–295 (2016)

    Article  Google Scholar 

  • Son, L.H., Van Hai, P.: A novel multiple fuzzy clustering method based on internal clustering validation measures with gradient descent. Int. J. Fuzzy Syst. 18(5), 894–903 (2016)

    Article  Google Scholar 

  • Swanson, T.: Bitcoins: made in China. Bitcoin Mag. 12–21 (2015b)

  • Thanh, N.D., Ali, M., Son, L.H. A Novel Clustering Algorithm in a Neutrosophic Recommender System for Medical Diagnosis. Cogn. Comput. 9(4), 526–544 (2017)

    Article  Google Scholar 

  • Thong, P.H., Son, L.H.: A novel automatic picture fuzzy clustering method based on particle swarm optimization and picture composite cardinality. Knowl. Based Syst. 109, 48-60 (2016a)

    Article  Google Scholar 

  • Thong, P.H., Son, L.H.: Picture fuzzy clustering for complex data. Eng. Appl. Artif. Intell. 56, 121-130 (2016b)

    Article  Google Scholar 

  • Thong, P.H., Son, L.H.: Picture fuzzy clustering: a new computational intelligence method. Soft comput. 20(9), 3549-3562 (2016c)

    Article  Google Scholar 

  • Tuan, T.M., Ngan, T.T., Son, L.H.: A novel semi-supervised fuzzy clustering method based on interactive fuzzy satisficing for dental x-ray image segmentation. Appl. Intell. 45(2), 402–428 (2016)

    Article  Google Scholar 

  • Vo, B., Le, T., Nguyen, G., Hong, T.P.: Efficient algorithms for mining erasable closed patterns from product datasets. IEEE Access 5, 3111–3120 (2017a)

    Article  Google Scholar 

  • Vo, B., Le, T., Pedrycz, W., Nguyen, G., Baik, S.W.: Mining erasable itemsets with subset and superset itemset constraints. Expert Syst. Appl. 69, 50–61 (2017b)

    Article  Google Scholar 

  • Zanin, L.: The effects of various motives to save money on the propensity of Italian households to allocate an unexpected inheritance towards consumption. Qual. Quant. 51(4), 1755–1775 (2017)

    Article  Google Scholar 

  • Ziegeldorf, J.H., Grossmann, F., Henze, M., Inden, N., Wehrle, K.: Coinparty: secure multi-party mixing of bitcoins. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, ACM, 75–86 (2015)

Download references

Acknowledgements

Prof. Raghvendra Kumar would like to thank the Center for High Performance Computing, VNU University of Science, Vietnam National University, Hanoi, Vietnam for supporting facilities during his part-time internship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Le Hoang Son.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chatterjee, J.M., Son, L., Ghatak, S. et al. BitCoin exclusively informational money: a valuable review from 2010 to 2017. Qual Quant 52, 2037–2054 (2018). https://doi.org/10.1007/s11135-017-0605-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11135-017-0605-5

Keywords

Navigation