Journal of Computer Science and Technology ›› 2020, Vol. 35 ›› Issue (4): 843-862.doi: 10.1007/s11390-020-9638-7

Special Issue: Surveys; Computer Networks and Distributed Computing

• Computer Networks and Distributed Computing • Previous Articles     Next Articles

Data Security and Privacy in Bitcoin System: A Survey

Lie-Huang Zhu1, Member, CCF, IEEE, Bao-Kun Zheng1,2, Meng Shen1,3,*, Member, CCF, IEEE, Feng Gao1, Hong-Yu Li1, Ke-Xin Shi1        

  1. 1 School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China;
    2 School of Information Management for Law, China University of Political Science and Law, Beijing 102249, China;
    3 Key Laboratory of Information Network Security, Ministry of Public Security, Shanghai 201204, China
  • Received:2019-04-16 Revised:2020-04-08 Online:2020-07-20 Published:2020-07-20
  • Contact: Meng Shen E-mail:shenmeng@bit.edu.cn
  • About author:Lie-Huang Zhu received his Ph.D. degree in computer science from Beijing Institute of Technology, Beijing, in 2004. He is currently a professor at the School of Computer Science and Technology, Beijing Institute of Technology, Beijing. His research interests include security protocol analysis and design, group key exchange protocols, wireless sensor networks, and cloud computing.
  • Supported by:
    This work was supported by the Key-Area Research and Development Program of Guangdong Province of China under Grant No. 2019B010137003, the National Natural Science Foundation of China under Grant Nos. U1836212, 61972039, 61872041, 61602039 and 61871037, the Beijing Natural Science Foundation of China under Grant No. 4192050, the Key Laboratory of Information Network Security, Ministry of Public Security, and the Pre-Study Foundation of Weapons and Equipment under Grant No. 31511020401.

To date, bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and academia. Bitcoin is an electronic payment system based on cryptography rather than on credit. Regardless of whether people are in the same city or country, bitcoin can be sent by any one person to any other person when they reach an agreement. The market value of bitcoin has been rising since its advent in 2009, and its current market value is US160 billion. Since its development, bitcoin itself has exposed many problems and is facing challenges from all the sectors of society; therefore, adversaries may use bitcoin's weakness to make considerable profits. This survey presents an overview and detailed investigation of data security and privacy in bitcoin system. We examine the studies in the literature/Web in two categories:1) analyses of the attacks to the privacy, availability, and consistency of bitcoin data and 2) summaries of the countermeasures for bitcoin data security. Based on the literature/Web, we list and describe the research methods and results for the two categories. We compare the performance of these methods and illustrate the relationship between the performance and the methods. Moreover, we present several important open research directions to identify the follow-up studies in this area.

Key words: security; privacy; bitcoin; availability; consistency;

[1] Antonopoulos A M. Mastering Bitcoin:Unlocking Digital Crypto-Currencies (1st edition). O'Reilly Media, 2014.
[2] Pilkington M. Blockchain technology:Principles and applications. In Research Handbook on Digital Transformations, Olleros F X, Zhegu M (eds.), Edward Elgar Publishing, 2016, pp.225-253.
[3] Shen M, Tang X, Zhu L, Du X, Guizani M. Privacypreserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet of Things Journal, 2019, 6(5):7702-7712.
[4] Patel D, Bothra J, Patel V. Blockchain exhumed. In Proc. the 2017 Asia Security and Privacy, January 2017, Article No. 15.
[5] Shen M, Ma B, Zhu L, Mijumbi R, Du X, Hu J. Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Information Forensics and Security, 2018, 13(4):940-953.
[6] Shen M, Deng Y, Zhu L, Du X, Guizani N. Privacypreserving image retrieval for medical IoT systems:A blockchain-based approach. IEEE Network, 2019, 33(5):27-33.
[7] Shen M, Wei M, Zhu L, Wang M. Classification of encrypted traffic with second-order Markov chains and application attribute bigrams. IEEE Trans. Information Forensics and Security, 2017, 12(8):1830-1843.
[8] Zhao H, Li X F, Zhan L K, Wu Z H. Data integrity protection method for microorganism sampling robots based on blockchain technology. Journal of Huazhong University of Science and Technology, 2015, 43(S1):216-219. (in Chinese)
[9] Zheng B, Zhu L, Shen M, Gao F, Zhang C, Li Y, Yang J. Scalable and privacy-preserving data sharing based on blockchain. J. Comput. Sci. Technol., 2018, 33(3):557-567.
[10] White G, Brown K. Future applications of blockchain:Toward a value-based society. In Proc. INCITE Conference, October 2016, pp.290-301.
[11] Shen M, Ma B, Zhu L, Du X, Xu K. Secure phrase search for intelligent processing of encrypted data in cloud-based IoT. IEEE Internet of Things Journal, 2019, 6(2):1998-2008.
[12] Reid F, Harrigan M. An analysis of anonymity in the Bitcoin system. In Proc. the 3rd Int. IEEE International Conference on Social Computing, October 2011, pp.1318-1326.
[13] Koshy D, Koshy P, Mcdaniel P. An analysis of anonymity in Bitcoin using P2P network traffic. In Proc. the 18th Int. Financial Cryptography and Data Security, March 2014, pp.469-485.
[14] Biryukov A, Khovratovich D, Pustogarov I. Deanonymisation of clients in Bitcoin P2P network. In Proc. the 21st Int. Conference on Computer and Communications Security, November 2014, pp.15-29.
[15] Lear B. Theoretical Bitcoin attacks with less than half of the computational power (draft). arXiv:1312.7013, 2013. http://arxiv.org/abs/1312.7013, Apr. 2019.
[16] Bag S, Ruj S, Sakurai K. Bitcoin block withholding attack:Analysis and mitigation. IEEE Transactions on Information Forensics & Security, 2017, 12(8):1967-1978.
[17] Eyal I, Sirer E G. Majority is not enough:Bitcoin mining is vulnerable. In Proc. the 18th International Conference on Financial Cryptography & Data Security, March 2014, pp.436-454.
[18] Rosenfeld M. Analysis of Bitcoin pooled mining reward systems. arXiv:1112.4980, 2011. https://arxiv.org/pdf/1112.4980, Oct. 2019.
[19] Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen A. Exploring the attack surface of Blockchain:A systematic overview. arXiv:1904.03487, 2019. http://arxiv.org/abs/1904.03487, Oct. 2019.
[20] Conti M, Kumar E S, Lal C, Ruj S. A survey on security and privacy issues of Bitcoin. IEEE Communications Surveys & Tutorials, 2018, 20(4):3416-3452.
[21] Li X, Jiang P, Chen T, Luo H, Wen Q. A survey on the security of blockchain systems. arXiv:1802.06993, 2018. http://arxiv.org/abs/1802.06993, Oct. 2019.
[22] Gervais A, Karame G O, Karl Wüst, Glykantzis V, Ritzdorf H, Capkun S. On the security and performance of proof of work blockchains. In Proc. the 2016 ACM SIGSAC Conference, October 2016, pp.3-16.
[23] Yuan Y, Wang F. Blockchain:The state of the art and future trends. Acta Automatica Sinica, 2016, 42(4):481-494. (in Chinese)
[24] Liao K, Zhao Z, Doupé A, Ahn G. Behind closed doors:Measurement and analysis of CryptoLocker ransoms in Bitcoin. In Proc. the 2016 APWG Symposium on Electronic Crime Research, June 2016, pp.1-13.
[25] Ron D, Shamir A. Quantitative analysis of the full Bitcoin transaction graph. In Proc. the 17th Int. Financial Cryptography and Data Security, April 2013, pp.6-24.
[26] Androulaki E, Karame G O, Roeschlin M, Scherer T, Capkun S. Evaluating user privacy in Bitcoin. In Proc. the 17th International Conference on Financial Cryptography and Data Security, April 2013, pp.34-51.
[27] Monaco J V. Identifying Bitcoin users by transaction behavior. In Proc. SPIE Biometric and Surveillance Technology for Human and Activity Identification XII, May 2015, Article No. 945704.
[28] Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker G M, Savage S. A fistful of Bitcoins:Characterizing payments among men with no names. In Proc. the 2013 Internet Measurement Conference, October 2013, pp.127-140.
[29] Zhao C, Guan Y. A graph-based investigation of Bitcoin transactions. In Proc. the 11th Int. IFIP WG 11.9 International Conference on Digital Forensics, January 2015, pp.79-95.
[30] Zheng B, Zhu L, Shen M, Du X, Guizani M. Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering. SCIENCE CHINA Information Sciences, 2020, 63(3):Article No. 132101.
[31] Garay J, Kiayias A, Leonardos N. The Bitcoin backbone protocol with chains of variable difficulty. In Proc. the 37th Annual International Cryptology Conference, August 2017, pp.291-323.
[32] Bonneau J, Miller A, Clark J, Narayanan A, Kroll J A, Felten E W. SoK:Research perspectives and challenges for bitcoin and cryptocurrencies. In Proc. the 2015 IEEE Symposium on Security and Privacy, May 2015, pp.104-121.
[33] Zohar A. Bitcoin:Under the hood. Communications of the ACM, 2015, 58(9):104-113.
[34] Heilman E, Kendler A, Zohar A, Goldberg S. Eclipse attacks on Bitcoin's peer-to-peer network. In Proc. the 24th USENIX Security Symposium, August 2015, pp.129-144.
[35] Singh A, Ngan T, Druschel P, Wallach D S. Eclipse attacks on overlay networks:Threats and defenses. In Proc. the 25th IEEE International Conference on Computer Communications, April 2006.
[36] Vasek M, Thornton M, Moore T. Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In Proc. the 14th International Conference on Financial Cryptography & Data Security, March 2014, pp.57-71.
[37] Asokan N, Janson P A, Steiner M, Waidner M. The state of the art in electronic payment systems. Advances in Computers, 2000, 53:425-449.
[38] Everaere P, Simplot-Ryl I, Traoré I. Double spending protection for e-cash based on risk management. In Proc. the 13th Int. Conference on Information Security, October 2010, pp.394-408.
[39] Karame G O, Androulaki E, Capkun S. Double-spending fast payments in Bitcoin. In Proc. ACM Conference on Computer and Communications Security, October 2012, pp.906-917.
[40] Pinzón C, Rocha C. Double-spend attack models with time advantange for Bitcoin. Electronic Notes in Theoretical Computer Science, 2016, 329:79-103.
[41] Courtois N T, Bahack L. On subversive miner strategies and block withholding attack in Bitcoin digital currency. arXiv:1402.1718, 2014. https://arxiv.org/abs/1402.1718, Apr. 2019.
[42] Sapirshtein A, Sompolinsky Y, Zohar A. Optimal selfish mining strategies in Bitcoin. In Proc. the 20th Int. Conference on Financial Cryptography and Data Security, February 2016, pp.515-532.
[43] Nayak K, Kumar S, Miller A, Shi E. Stubborn mining:Generalizing selfish mining and combining with an eclipse attack. In Proc. the 2016 IEEE European Symposium on Security and Privacy, March 2016, pp.305-320.
[44] Carlsten M, Kalodner H, Weinberg S M, Narayanan A. On the instability of Bitcoin without the block reward. In Proc. the 2016 ACM SIGSAC Conference on Computer & Communications Security, October 2016, pp.154-167.
[45] Eyal I. The miner's dilemma. In Proc. the 2015 IEEE Symposium on Security and Privacy, May 2015, pp.89-103.
[46] Kwon Y, Kim D, Son Y, Vasserman E Y, Kim Y. Be selfish and avoid dilemmas:Fork after withholding (FAW) attacks on Bitcoin. In Proc. the 24th ACM SIGSAC Conference on Computer and Communications Security, October 2017, pp.195-209.
[47] Biryukov A, Pustogarov I. Bitcoin over Tor isn't a good idea. In Proc. the 2015 IEEE Symposium on Security and Privacy, May 2015, pp.122-134.
[48] Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 1981, 24(2):84-88.
[49] Bonneau J, Narayanan A, Miller A, Clark J, Kroll J A, Felten E W. Mixcoin:Anonymity for Bitcoin with accountable mixes. In Proc. the 18th International Conference on Financial Cryptography and Data Security, March 2014, pp.486-504.
[50] Valenta L, Rowan B. Blindcoin:Blinded, accountable mixes for Bitcoin. In Proc. the 2015 Financial Cryptography and Data Security, January 2015, pp.112-126.
[51] Chun Q, Tu S, Yu J. A blind-mixing scheme for Bitcoin based on an elliptic curve cryptography blind digital signature algorithm. arXiv:abs/1510.05833, 2015. http://arxiv.org/abs/1510.05833, Apr. 2019.
[52] Ruffing T, Moreno-Sanchez P, Kate A. CoinShuffle:Practical decentralized coin mixing for Bitcoin. In Proc. the 19th European Symposium on Research in Computer Security, September 2014, pp.345-364.
[53] Bissias G, Ozisik A P, Levine B N, Liberatore M. Sybilresistant mixing for Bitcoin. In Proc. the 13th Int. Workshop on Privacy in the Electronic Society, November 2014, pp.149-158.
[54] Ziegeldorf J H, Grossmann F, Henze M, Inden N, Wehrle K. CoinParty:Secure multi-party mixing of Bitcoins. In Proc. the 5th ACM Conference on Data and Application Security and Privacy, March 2015, pp.75-86.
[55] Ben-Sasson E, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M. Zerocash:Decentralized anonymous payments from Bitcoin. In Proc. the 2014 IEEE Symposium on Security and Privacy, May 2014, pp.459-474.
[56] Miers I, Garman C, Green M, Rubin A D. Zerocoin:Anonymous distributed e-cash from Bitcoin. In Proc. the 2013 IEEE Symposium on Security and Privacy, May 2013, pp.397-411.
[57] Ben-Sasson E, Chiesa A, Genkin D, Tromer E, Virza M. SNARKs for C:Verifying program executions succinctly and in zero knowledge. In Proc. the 33rd Annual Cryptology Conference, August 2013, pp.90-108.
[58] Poon J, Dryja T. The Bitcoin lightning network:Scalable off-chain instant payments. http://lightning.network/lightning-network-paper.pdf, Oct. 2019.
[59] Dingledine R, Hopper N, Kadianakis G, Mathewson N. One fast guard for life (or 9 months). In Proc. the 7th Int. Workshop on Hot Topics in Privacy Enhancing Technologies, July 2014.
[60] Ruffing T, Kate A, Schröder D. Liar, liar, coins on fire!:Penalizing equivocation by loss of Bitcoins. In Proc. the 22nd ACM SIGSAC Conference on Computer & Communications Security, October 2015, pp.219-230.
[61] Danezis G, Meiklejohn S. Centrally banked cryptocurrencies. In Proc. the 23rd Int. Annual Network and Distributed System Security Symposium, February 2016.
[62] Yang Z, Miao Y, Chen Z Y, Tang C B, Chen X. Zero-determinant Strategy for the Algorithm optimize of Blockchain PoW Consensus. In Proc. the 37th Int. Chinese Control Conference, July 2017, pp.1441-1446.
[63] Miller A, Kosba A, Katz J, Shi E. Nonoutsourceable scratch-off puzzles to discourage Bitcoin mining coalitions. In Proc. the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 2015, pp.680-691.
[64] Shi N. A new proof-of-work mechanism for Bitcoin. Financial Innovation, 2016, 2(1):Article No. 31.
[65] Fujisaki E, Suzuki K. Traceable ring signature. In Proc. the 10th Int. Conf. Practice and Theory in Public-Key Cryptography., April 2007, pp.181-200.
[66] Chaum D, Heyst E V. Group Signatures. In Proc. Workshop on the Theory and Application of Cryptographic Techniques, April 1991, pp.257-265.
[67] Xu H L, Lu Y. Hierarchical certificate-based encryption:Definition and an efficient construction. Applied Mechanics & Materials, 2014, (513-517):1971-1974.
[68] Badertscher C, Gazi P, Kiayias A, Russell A, Zikas V. Ouroboros genesis:Composable proof-of-stake blockchains with dynamic availability. In Proc. the 25th ACM SIGSAC Conference on Computer and Communications Security, October 2018, pp.913-930.
[69] Ford B, Strauss J. An offline foundation for online accountable pseudonyms. In Proc. the 1st Workshop on Social Network Systems, April 2008, pp.31-36.
[70] Ateniese G, Bonacina I, Faonio A, Galesi N. Proofs of space:When space is of the essence. In Proc. the 9th Int. Conf. on Security and Cryptography for Networks, September 2014, pp.538-557.
[71] Yu H, Gibbons P B, Kaminsky M, Xiao F. SybilLimit:A near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Netw., 2010, 18(3):885-898.
[72] Kiffer L, Rajaraman R, Shelat A. A better method to analyze blockchain consistency. In Proc. the 25th ACM SIGSAC Conference on Computer and Communications Security, October 2018, pp.729-744.
[1] William Croft, Jörg-Rüdiger Sack, and Wei Shi. Differential Privacy via a Truncated and Normalized Laplace Mechanism [J]. Journal of Computer Science and Technology, 2022, 37(2): 369-388.
[2] Geun Yong Kim, Joon-Young Paik, Yeongcheol Kim, and Eun-Sun Cho. Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis [J]. Journal of Computer Science and Technology, 2022, 37(2): 423-442.
[3] Ze-Lin Zhao, Di Huang, and Xiao-Xing Ma. TOAST: Automated Testing of Object Transformers in Dynamic Software Updates [J]. Journal of Computer Science and Technology, 2022, 37(1): 50-66.
[4] Hong-Rong Ouyang, Heng-Feng Wei, Hai-Xiang Li, An-Qun Pan, and Yu Huang. Checking Causal Consistency of MongoDB [J]. Journal of Computer Science and Technology, 2022, 37(1): 128-146.
[5] Jian-Zhe Zhao, Xing-Wei Wang, Ke-Ming Mao, Chen-Xi Huang, Yu-Kai Su, and Yu-Chen Li. Correlated Differential Privacy of Multiparty Data Release in Machine Learning [J]. Journal of Computer Science and Technology, 2022, 37(1): 231-251.
[6] Gen Zhang, Peng-Fei Wang, Tai Yue, Xu Zhou, Kai Lu. MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels [J]. Journal of Computer Science and Technology, 2021, 36(6): 1248-1268.
[7] Ying-Jie Wang, Liang-Ze Yin, Wei Dong. AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel [J]. Journal of Computer Science and Technology, 2021, 36(6): 1325-1341.
[8] Yi Zhong, Jian-Hua Feng, Xiao-Xin Cui, Xiao-Le Cui. Machine Learning Aided Key-Guessing Attack Paradigm Against Logic Block Encryption [J]. Journal of Computer Science and Technology, 2021, 36(5): 1102-1117.
[9] Rui-Xiang Ma, Fei Wu, Bu-Rong Dong, Meng Zhang, Wei-Jun Li, Chang-Sheng Xie. Write-Optimized B+ Tree Index Technology for Persistent Memory [J]. Journal of Computer Science and Technology, 2021, 36(5): 1037-1050.
[10] Yuan Li, Xing-Chen Wang, Lin Huang, Yun-Lei Zhao. Order-Revealing Encryption: File-Injection Attack and Forward Security [J]. Journal of Computer Science and Technology, 2021, 36(4): 877-895.
[11] Paul Marillonnet, Maryline Laurent, Mikaël Ates. Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services [J]. Journal of Computer Science and Technology, 2021, 36(3): 664-692.
[12] Maryam Zarezadeh, Hamid Mala, Homa Khajeh. Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation [J]. Journal of Computer Science and Technology, 2020, 35(4): 863-874.
[13] Yubin Duan, Guo-Ju Gao, Ming-Jun Xiao, Jie Wu. Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems [J]. Journal of Computer Science and Technology, 2020, 35(3): 629-646.
[14] Ge Wu, Jian-Chang Lai, Fu-Chun Guo, Willy Susilo, Fu-Tai Zhang. Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions [J]. Journal of Computer Science and Technology, 2019, 34(6): 1366-1379.
[15] Chong Wang, Nasro Min-Allah, Bei Guan, Yu-Qi Lin, Jing-Zheng Wu, Yong-Ji Wang. An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion [J]. Journal of Computer Science and Technology, 2019, 34(6): 1351-1365.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Zhou Di;. A Recovery Technique for Distributed Communicating Process Systems[J]. , 1986, 1(2): 34 -43 .
[2] Chen Shihua;. On the Structure of Finite Automata of Which M Is an(Weak)Inverse with Delay τ[J]. , 1986, 1(2): 54 -59 .
[3] Li Wanxue;. Almost Optimal Dynamic 2-3 Trees[J]. , 1986, 1(2): 60 -71 .
[4] Liu Mingye; Hong Enyu;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[5] Wang Xuan; Lü Zhimin; Tang Yuhai; Xiang Yang;. A High Resolution Chinese Character Generator[J]. , 1986, 1(2): 1 -14 .
[6] Sun Zhongxiu; Shang Lujun;. DMODULA:A Distributed Programming Language[J]. , 1986, 1(2): 25 -31 .
[7] Wang Jianchao; Wei Daozheng;. An Effective Test Generation Algorithm for Combinational Circuits[J]. , 1986, 1(4): 1 -16 .
[8] Chen Zhaoxiong; Gao Qingshi;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[9] Huang Heyan;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[10] Zheng Guoliang; Li Hui;. The Design and Implementation of the Syntax-Directed Editor Generator(SEG)[J]. , 1986, 1(4): 39 -48 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved