Skip to content
2000
Volume 18, Issue 2
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

Blockchain technology is increasingly attracting young people because it is so well adapted to the digital age. A decentralised data management system is necessary for the blockchain idea in order to store and share data and transactions throughout the network. This study investigates various types of risks associated with blockchain technology. The research covers different aspects of blockchain, including the architecture, consensus mechanism, smart contracts, and underlying cryptographic algorithms. It also examines the risks associated with the adoption and implementation of blockchain in various industries, such as finance, healthcare, and supply chain management.

Moreover, this study identifies several types of risks, including technical risks, such as scalability, interoperability, and security, as well as non-technical risks, such as regulatory compliance, legal liability, and governance issues. This study also discusses the potential impact of these risks on blockchain-based systems and the strategies that can be used to mitigate them.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/0123520965252489231002071659
2023-10-12
2025-05-11
Loading full text...

Full text loading...

References

  1. ZhengZ. XieS. DaiH.N. ChenX. WangH. Blockchain challenges and opportunities: A survey.Int. J. Web Grid Serv.201814435237510.1504/IJWGS.2018.095647
    [Google Scholar]
  2. SinghS. RaI.H. MengW. KaurM. ChoG.H. SH-BlockCC: A secure and efficient Internet of Things smart home architecture basedon cloud computing and blockchain technology.Int. J. Distrib. Sensor. Netw.2019154117
    [Google Scholar]
  3. JiangX. LiuM. YangC. LiuY. WangR. A blockchain-basedauthentication protocol for WLAN mesh security access.Comput. Mater. Continua2019581455910.32604/cmc.2019.03863
    [Google Scholar]
  4. DengZ. RenY. LiuY. YinX. ShenZ. KimH.J. Blockchain-basedtrusted electronic records preservation in cloud storage.Comput. Mater. Continua201958113515110.32604/cmc.2019.02967
    [Google Scholar]
  5. SongR. SongY. LiuZ. TanM. ZhouK. GaiaWorld:A novel blockchain system based on competitive PoS consensusmechanism.Comput. Mater. Continua201960397398710.32604/cmc.2019.06035
    [Google Scholar]
  6. SunG. BinS. JiangM. CaoN. ZhengZ. ZhaoH. WangD. XuL. Research on public opinion propagation model in social network basedon blockchain.Comput. Mater. Continua20196031015102710.32604/cmc.2019.05644
    [Google Scholar]
  7. LiC. XuG. ChenY. AhmadH. LiJ. A new anti-quantum proxyblind signature for blockchain-enabled Internet of Things.Comput. Mater. Continua201961271172610.32604/cmc.2019.06279
    [Google Scholar]
  8. WangW. SuC. CCBRSN: A system with high embedding capacityfor covert communication in Bitcoin.IFIP International Conference on ICT Systems Security and Privacy Protection202010.1007/978‑3‑030‑58201‑2_22
    [Google Scholar]
  9. LejunZ. ZhijieZ. WeizhengW. RasheedW. ChunhuiZ. SeokhoonK. HuilingC. A covert communication method using special bitcoinaddresses generated by vanitygen.Comput. Mater. Continua202065159761610.32604/cmc.2020.011554
    [Google Scholar]
  10. LiS. LiuF. LiangJ. CaiZ. LiangZ. Optimization of facerecognition system based on azure IoTedg.Comput. Mater. Continua20196131377138910.32604/cmc.2019.06402
    [Google Scholar]
  11. KimD.Y. Dong MinS. KimS. A DPN (delegated proof of node)mechanism for secure data transmission in IoT services.Comput. Mater. Continua201960111410.32604/cmc.2019.06102
    [Google Scholar]
  12. XuL. XuC. LiuZ. WangY. WangJ. Enabling comparable searchover encrypted data for IoT with privacy-preserving.Comput. Mater. Continua201960267569010.32604/cmc.2019.05276
    [Google Scholar]
  13. VujičićD. JagodićD. RanđićS. Blockchain technology, bitcoin, and Ethereum: A brief overview.2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH)21-23 March 2018, East Sarajevo, Bosnia and Herzegovina201810.1109/INFOTEH.2018.8345547
    [Google Scholar]
  14. ZyskindG. NathanO. Decentralizing privacy: Using blockchain to protect personal data.2015 IEEE Security and Privacy Workshops 2015 May 212015180184
    [Google Scholar]
  15. KotobiK BilenSG Secure blockchains for dynamic spectrum access: A decentralized database in moving cognitive radio networks enhances security and user access.IEEE Veh. Technol. Mag.20181313239
    [Google Scholar]
  16. JyotiA. ChauhanR.K. A blockchain and smart contract-based data provenance collection and storing in cloud environment.Wirel. Netw.20222841541156210.1007/s11276‑022‑02924‑y
    [Google Scholar]
  17. LiX. JiangP. ChenT. LuoX. WenQ. A survey on the security of blockchain systems.Future Gener. Comput. Syst.20169604106125
    [Google Scholar]
  18. KiayiasA. PanagiotakosG. On trees, chains and fast transactionsin the blockchain.International Conference on Cryptology and Information Security in Latin America201932735110.1007/978‑3‑030‑25283‑0_18
    [Google Scholar]
  19. KimS.W. Safety and liveness—blockchain in thepoint of view of FLP impossibility.Available from: https://medium.com/codechain/safety-and-liveness-blockchain-inthe-point-of-view-of-flp-impossibility-182e33927ce6 [Accessed: 2020. (May 24, 2018)].2018
  20. KarameG.O. AndroulakiE. CapkunS. Two bitcoins at the priceof one? double-spending attacks on fast payments in bitcoin.Proceeding of Conference Computing Communication Security2012117
    [Google Scholar]
  21. RosenfeldM. Analysis of hashrate-based double spending2014OnlineAvailable from: http://arxiv.org/abs/1402.2009
  22. HajdarbegovicN. Bitcoin Miners Ditch Ghash.io Pool Over Fears of 51%Attack.New York, NY, USACoinDesk2014
    [Google Scholar]
  23. ZhaoJ.L. FanS. YanJ. Overview of business innovations and research opportunities in blockchain and introduction to the special issue.Financial Innov2016212810.1186/s40854‑016‑0049‑2
    [Google Scholar]
  24. FrankenfieldJ. 51% Attack.New York, NY, USAInvestopedia2019
    [Google Scholar]
  25. MayerH. ECDSA security in bitcoin and ethereum: A research survey.CoinFaabrik2016Jun110
    [Google Scholar]
  26. BrykA. Blockchain Attack Vectors: Vulnerabilities of the Most SecureTechnology.Dnipro, UkraineApriorit2018
    [Google Scholar]
  27. BordelB. AlcarriaR. MartinM. Sanchez-PicotA. Trust provisionin the Internet of Things using transversal blockchain networks.Intell. Automat. Soft Comput.2019251155170
    [Google Scholar]
  28. BadshahA. GhaniA. AhsanQ.M. ShamshirbandS. Smartsecurity framework for educational institutions using Internet of Things(IoT).Comput. Mater. Continua20196118110110.32604/cmc.2019.06288
    [Google Scholar]
  29. What is Selfish Mining. Tokens.Available from: https://www.tokens24.com/cryptopedia/mining/what-isselfish-mining 2018
  30. Understanding the DAO Attack. CoinDesk.Available from: https://www.coindesk.com/understanding-dao-hack-journalists/ 2016
  31. The lack of blockchain talent is becoming an industry concern.Available from: https://www.coindesk. com/Blockchain-hiring-difficulties-becoming-industry-concern
  32. WalchA. The path of the blockchain lexicon (and the law).Rev. Banking Financial Law7137652017
    [Google Scholar]
  33. SWIFT on distributed ledger technologies.Available from: http://www.ameda.org.eg/files/SWIFT_DLTs_position_paper_ FINAL1804.pdf 2020
  34. ISITC Europe and Oasis to Define Technical Standards for Blockchain.Available from: https://www.bankingtech.com/ 2016/10/isitc-europe-and-oasis-to-define-technical-standards-forBlockchain/
  35. CrosbyM. PattanayakP. VermaS. KalyanaramanV. Blockchaintechnology: Beyond bitcoin.Appl. Innov. Rev.20162116
    [Google Scholar]
  36. KakavandH. De SevresN.K. ChiltonB. Theblockchain revolution: An analysis of regulation and technology related to distributedledger technologiesSSRN1272017
    [Google Scholar]
  37. BuehlerK. ChiarellaD. HeideggerH. LemerleM. LalA. MoonJ. Beyond the hype: Blockchains in capital markets.in Processing McKinsey Working Papers Corporate Investment Banking201512132
    [Google Scholar]
  38. Grewal-CarV. MarshallS. Blockchain: Enigma. Paradox. Opportunity.London, U.K.Deloitte LLP2016127
    [Google Scholar]
  39. Understanding Blockchain Risks, Controls and Validation. PWC.Available from: http://usblogs.pwc.com/emerging-technology/ Blockchain-validation-infographic/ 2018
  40. BogartS. RicheK. Blockchain Report: Welcome to the Internet ofValue.New York, NY, USANeedham Company LLC2015157
    [Google Scholar]
  41. HeW. GuoS. LiangY. MaR. QiuX. ShiL. QoS-aware andresource-efficient dynamic slicing mechanism for Internet of Things.Comput. Mater. Continua20196131345136410.32604/cmc.2019.06669
    [Google Scholar]
  42. TechnologyB. How Banks are Building a Real-Time GlobalPayment Network.Dublin, IrelandAccenture Digital2016112
    [Google Scholar]
  43. LamarqueM. The Blockchain revolution: New opportunities in equitymarketsDoctoral dissertation, Sloan School Management Massachusetts Institution Technology Cambridge, MA, USA2016
    [Google Scholar]
  44. BrobyD. KarkkainenT. FINTECH in Scotland: Building a digitalfuture for the financial sector.Center for Financial Regulation and Innovation2016131
    [Google Scholar]
  45. MorrisonA. Blockchain and Smart Contract Automation: Introductionand Forecast.London, U.K.PWC2016
    [Google Scholar]
  46. MeijerD. CarloR.W. Blockchain and Standards: First Things First.London, U.K.FinExtra2016
    [Google Scholar]
  47. MainelliM. MilneA. The impact and potential of Blockchain onthe securities transaction lifecycle.SWIFT Institute Working Paper No. 2015-0072015
    [Google Scholar]
  48. ChristidisK. DevetsikiotisM. Blockchains and smart contracts forthe Internet of Things.IEEE Access201642292230310.1109/ACCESS.2016.2566339
    [Google Scholar]
  49. Cryptotechnologies, a major IT innovationand catalyst for change: 4 categories, 4 applications and 4 scenarios: Anexploration for transaction banking and payments professionalsEuro Banking Association2015
    [Google Scholar]
  50. How Blockchains Could Change the World.New York, NY, USAMcKinsey & Company2016110
    [Google Scholar]
  51. DeetmanS. Bitcoin could consume as much electricity as Denmarkby 2020.Leiden, The NetherlandsTech. Rep2016
    [Google Scholar]
  52. MainelliM. MansonB. Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance.London, U.K.Z/Yen Group
    [Google Scholar]
  53. BrennanC. LunnW. Blockchain: The Trust Disrupter.London, U.K.Credit Suisse20161135
    [Google Scholar]
  54. ShafiqM. TianZ. BashirA.K. JolfaeiA. YuX. Data mining and machine learning methods for sustainable smart cities traffic classification: A survey.Sustain. Cities Soc.20206010217710.1016/j.scs.2020.102177
    [Google Scholar]
  55. ShafiqM. TianZ. BashirA. K. DuX. GuizaniM. CorrAUC: A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques.IEEE Internet Things J.2021853242325410.1109/JIOT.2020.3002255
    [Google Scholar]
  56. ShafiqM. TianZ. BashirA.K. DuX. GuizaniM. IoT malicious traffic identification using wrapper-based feature selection mechanisms.Comput Secur.20209410186310.1016/j.cose.2020.101863
    [Google Scholar]
  57. ShafiqM. TianZ. SunY. DuX. GuizaniM. Recent advances in electrocatalytic oxygen reduction for on-site hydrogen peroxide synthesis in acidic media.J. Energy Chem.20206743245010.1016/j.future.2020.02.017
    [Google Scholar]
/content/journals/raeeng/10.2174/0123520965252489231002071659
Loading
/content/journals/raeeng/10.2174/0123520965252489231002071659
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test