چیکده
1. مقدمه
2. مروری اجمالی بر تاریخچه بلاک چین
3. فناوری بلاک چین
4. کاربرد های بلاک چین
5. خطرات امنیتی و حملات با بلاک چین
6. اقدامات امنیتی برای بلاک چین
7. چالش ها و روند تحقیق
8. مطالعات مرتبط
9. نتیجه گیری
منابع
Abstract
1. Introduction
2. Overview of blockchain history
3. Blockchain Technology
4. Blockchain Applications
5. Security risks and attacks with blockchain
6. Security measures for blockchain
7. Challenges and research trends
8. Related work
9. Conclusion
Conflict of interest
References
چکیده
بلاک چین یک فناوری است که دارای ویژگی های مطلوبی مانند عدم تمرکز، استقلال، یکپارچگی، تغییر ناپذیری، تأیید، تحمل خطا، ناشناس بودن، قابلیت حسابرسی و شفافیت است. در این مقاله، ابتدا یک بررسی عمیق تر در مورد فناوری بلاک چین، به ویژه تاریخچه آن، مقایسه های کمی الگوریتم های اجماع، جزئیات رمزنگاری از نظر رمزنگاری کلید عمومی، اثبات های دانش صفر، و توابع هش مورد استفاده در بلاک چین و لیست جامعی از برنامه های بلاک چین علاوه بر این، امنیت خود بلاک چین در این مقاله مورد توجه قرار گرفته است. به طور خاص، ما امنیت بلاک چین را از تجزیه و تحلیل ریسک ارزیابی می کنیم تا دسته بندی های ریسک امنیت بلاک چین جامع را استخراج کنیم، حملات و اشکالات واقعی علیه بلاک چین را تجزیه و تحلیل کنیم، و اقدامات امنیتی اخیراً توسعه یافته در بلاک چین را خلاصه کنیم. در نهایت، چالشها و روندهای تحقیقاتی برای دستیابی به سیستمهای بلاک چین مقیاسپذیرتر و ایمنتر برای استقرار گسترده ارائه شدهاند.
توجه! این متن ترجمه ماشینی بوده و توسط مترجمین ای ترجمه، ترجمه نشده است.
Abstract
Blockchain is a technology that has desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency. In this paper, we first carry out a deeper survey about blockchain technology, especially its history, consensus algorithms' quantitative comparisons, details of cryptography in terms of public key cryptography, Zero-Knowledge Proofs, and hash functions used in the blockchain, and the comprehensive list of blockchain applications. Further, the security of blockchain itself is a focus in this paper. In particular, we assess the blockchain security from risk analysis to derive comprehensive blockchain security risk categories, analyze the real attacks and bugs against blockchain, and summarize the recently developed security measures on blockchain. Finally, the challenges and research trends are presented to achieve more scalable and securer blockchain systems for the massive deployments.
Introduction
In blockchain, data are kept in a distributed ledger. It is the blockchain technology to provide integrity and availability that allows participants in the blockchain network to write, read, and verify transactions recorded in a distributed ledger. However, it does not allow the deletion and modification operations on the transactions and other information stored on its ledger. The blockchain system is supported and secured by cryptographic primitives and protocols, e.g., digital signatures, hash functions, etc. These primitives guarantee the transactions that are recorded into the ledger are integrity-protected, authenticity-verified, and non-repudiated. Further, as a distributed network, to allow the entire set of participants to agree on a unified record, the blockchain technology also needs a consensus protocol, which is essentially a set of rules to be followed by every participant, in order to achieve a globally unified view.
In a trustless environment, blockchain provides users with desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, attracted great academic and industrial attention in the recent few years, anonymity, auditability, and transparency [[1], [2], [3]]. With these advanced features, blockchain technology has attracted great academic and industrial attention in the recent few years.
Conclusion
This paper has first conducted a deeper survey on blockchain technology in terms of overview, consensus algorithms, smart contracts, and cryptography for blockchain. It presented the history of blockchain, and compared the five most common consensus algorithms and one most different consensus algorithm in as much detail and quantitative as possible. Public key cryptography, Zero-Knowledge Proof, and hash functions used in blockchain have been described in detail for integrity, authentication, nonrepudiation, and payment address required in blockchain systems. This paper has then listed the comprehensive applications of blockchain. It has further presented the rich information and comparisons of eight cryptocurrencies as the first blockchain application, supply chain as a widely used case, and Smart Dubai Office as the first whole government service application. Further, the security of blockchain itself is a focus in this paper. It has described the comprehensive security risks categories based on the Top 10 Web Application Security Risks, low level risks, and high level risks. It has surveyed many real attacks and bugs on blockchain systems and listed out their root causes. The paper has then presented the security measures in the areas of security analysis, detecting malicious codes & bugs, software codes security, privacy preserving, and so on. Specially, it has presented and compared eleven smart contract bytecode vulnerability analysis tools. Finally, the challenges and research trends have been presented to build more scalable and securer blockchain systems for massive deployments.