A Framework for Detecting and Preventing Double Spent Data in Inter and Intra Block of Blockchain
DOI:
https://doi.org/10.61841/tm730b44Keywords:
Cryptocurrency, Bitcoin, Double spending, UTXO, MerkleAbstract
Optimistically, our global economy moves towards the digital eco-system. Everything is going to be paperless communication, from investment to money transfer. The newest and most assured digital payment sector is cryptocurrency. A cryptocurrency is a digital currency that uses cryptography as a medium of exchange like normal currencies. Bitcoin was the first decentralized cryptocurrency, which has properties like supporting privacy, security, fast and cost-effective transactions, transparency, and immutability. Bitcoin is still dominant over 2000 cryptocurrencies. Double spending is the main issue faced by the Bitcoin network. Double spending is the method in which the same digital currency is spent multiple times by creating duplicate transactions. This issue needs to be resolved to make sure that it is not being abused and that it maintains its value and trust. This paper has proposed several techniques for identifying and preventing double-spent transactions in both inter- and intra-block communication of the Bitcoin blockchain network.
Downloads
References
1. Vasek Marie. "The age of cryptocurrency How Bitcoin and Digital Money are Challenging the Global Economic Order”, Science, Vol. No. 348(6241), PP 1308-1309, 2015.
2. Vijayalakshmi, J., and A. Murugan. "Crypto coin overview of basic transactions." International Journal of Applied Research on Information Technology and Computing, Vol. 8(2), pp. 113-120, 2017.
3. Antonopoulos M. Andreas, “Mastering Bitcoin: unlocking digital cryptocurrencies," O'Reilly Media, 2014.
4. Oliveira Samuel, Filipe Soares, Guilherme Flach, Marcelo Johann, and Ricardo Reis. "Building a bitcoin miner on an FPGA." In South Symposium on Microelectronics, 2012.
5. Shahsavari Yahya, Kaiwen Zhang, and Chamseddine Talhi. "Performance modeling and analysis of the bitcoin inventory protocol.” In International Conference on Decentralized Applications and Infrastructures (DAPPCON), IEEE, 2019.
6. Definition of double-spend, “https://bitcoin.org/en/glossary/double-spend”, [online accessed 24-oct-2019]
7. Conti Mauro, E. Sandeep Kumar, Chhagan Lal, and Sushmita Ruj. "A survey on security and privacy issues of bitcoin." IEEE Communications Surveys & Tutorials, Vol. No. 4(20), PP 3416-3452, 2018.
8. Nakamoto, Satoshi, "Bitcoin: A peer-to-peer electronic cash system," “https://bitcoin.org/bitcoin.pdf, 2008.
9. Yu Xingjie, Michael Thang Shiwen, Yingjiu Li, and Robert Deng Huijie. "Fair deposits against doublespending for bitcoin transactions." In IEEE Conference on Dependable and Secure Computing, PP 44-51, 2017.
10. Karame Ghassan O, Elli Androulaki, Marc Roeschlin, Arthur Gervais, and SrdjanČapkun. "Misbehavior in bitcoin: A study of double-spending and accountability." ACM Transactions on Information and System Security, Vol. No. 1(18), 2015.
11. Karame Ghassan, Elli Androulaki, and SrdjanCapkun. "Two Bitcoins at the Price of One? DoubleSpending Attacks on Fast Payments in Bitcoin." IACR Cryptology, Vol. No. 248, 2012.
12. Ouaddah Aafaf, Anas AbouElkalam, and Abdellah Ait Ouahman. "Towards a novel privacy-preserving access control model based on blockchain technology in IoT." In Europe and MENA Cooperation Advances in Information and Communication Technologies, Springer, PP 523-533, 2017.
13. Knecht Markus, Willi Meier, and Carlo U. Nicola. "A space-and time-efficient implementation of the Merkle Tree Traversal Algorithm." arXiv preprint, Vol.No.4081(1409), 2014.
14. Askitis Nikolas, and Ranjan Sinha. "HAT-trie: a cache-conscious trie-based data structure for strings." In Proceedings of the Thirteenth Australasian Conference on Computer Science, Australian Computer Society, Vol. No. 62, PP 97-105, 2007.
15. Stackoverflow questions, “https://stackoverflow.com/questions/4070693/what-is-the-purpose-of-base-64-encoding-and-why-it-used-in-http-basic-authentica” [online access date: 13-feb-2018]
16. A. Murugan and J. Vijayalakshmi. “Discovering the Bitcoin Double Spend using Lost Agreement Amount.” International Journal of Recent Technology and Engineering, Vol. No. 8(3), PP 3764-3770, 2019.
17. Vijayalakshmi, J., and Murugan, A., “Revamp Perception of Bitcoin Using Cognizant Merkle.” In Emerging Research in Computing, Information, Communication, and Applications, Springer, Singapore, pp. 141–150, 2019.
18. A. Murugan and J. Vijayalakshmi. “Preventing the bitcoin Double Spend using Transaction Hash and Unspent Transaction Output.” International Journal of Recent Technology and Engineering, Vol. No. 8(3), PP 3771-3776, 2019.
19. Heinz Steffen, Justin Zobel, and Hugh Williams, "Burst-tries: a fast, efficient data structure for string keys," ACM Transactions on Information Systems, Vol. No. (2), PP 192-223, 2002.
20. Vijayalakshmi, J. and Murugan, A. “Detecting Multi-Block Double Spent Transaction based On B-tree Indexing”, International Journal of Scientific and Technology Research (communicated)
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.