A Framework for Detecting and Preventing Double Spent Data in Inter and Intra Block of Blockchain

Authors

  • Vijayalakshmi J. Research Scholar, PG & Research Department of Computer Science,Dr. Ambedkar Government Arts College (Autonomous) Affiliated to University of Madras, Chennai, India Author
  • Murugan A. Associate Professor & Head, PG & Research Department of Computer Science,Dr. Ambedkar Government Arts College (Autonomous) Affiliated to University of Madras, Chennai, India Author

DOI:

https://doi.org/10.61841/tm730b44

Keywords:

Cryptocurrency, Bitcoin, Double spending, UTXO, Merkle

Abstract

Optimistically, our global economy moves towards the digital eco-system. Everything is going to be paperless communication, from investment to money transfer. The newest and most assured digital payment sector is cryptocurrency. A cryptocurrency is a digital currency that uses cryptography as a medium of exchange like normal currencies. Bitcoin was the first decentralized cryptocurrency, which has properties like supporting privacy, security, fast and cost-effective transactions, transparency, and immutability. Bitcoin is still dominant over 2000 cryptocurrencies. Double spending is the main issue faced by the Bitcoin network. Double spending is the method in which the same digital currency is spent multiple times by creating duplicate transactions. This issue needs to be resolved to make sure that it is not being abused and that it maintains its value and trust. This paper has proposed several techniques for identifying and preventing double-spent transactions in both inter- and intra-block communication of the Bitcoin blockchain network. 

Downloads

Download data is not yet available.

References

1. Vasek Marie. "The age of cryptocurrency How Bitcoin and Digital Money are Challenging the Global Economic Order”, Science, Vol. No. 348(6241), PP 1308-1309, 2015.

2. Vijayalakshmi, J., and A. Murugan. "Crypto coin overview of basic transactions." International Journal of Applied Research on Information Technology and Computing, Vol. 8(2), pp. 113-120, 2017.

3. Antonopoulos M. Andreas, “Mastering Bitcoin: unlocking digital cryptocurrencies," O'Reilly Media, 2014.

4. Oliveira Samuel, Filipe Soares, Guilherme Flach, Marcelo Johann, and Ricardo Reis. "Building a bitcoin miner on an FPGA." In South Symposium on Microelectronics, 2012.

5. Shahsavari Yahya, Kaiwen Zhang, and Chamseddine Talhi. "Performance modeling and analysis of the bitcoin inventory protocol.” In International Conference on Decentralized Applications and Infrastructures (DAPPCON), IEEE, 2019.

6. Definition of double-spend, “https://bitcoin.org/en/glossary/double-spend”, [online accessed 24-oct-2019]

7. Conti Mauro, E. Sandeep Kumar, Chhagan Lal, and Sushmita Ruj. "A survey on security and privacy issues of bitcoin." IEEE Communications Surveys & Tutorials, Vol. No. 4(20), PP 3416-3452, 2018.

8. Nakamoto, Satoshi, "Bitcoin: A peer-to-peer electronic cash system," “https://bitcoin.org/bitcoin.pdf, 2008.

9. Yu Xingjie, Michael Thang Shiwen, Yingjiu Li, and Robert Deng Huijie. "Fair deposits against doublespending for bitcoin transactions." In IEEE Conference on Dependable and Secure Computing, PP 44-51, 2017.

10. Karame Ghassan O, Elli Androulaki, Marc Roeschlin, Arthur Gervais, and SrdjanČapkun. "Misbehavior in bitcoin: A study of double-spending and accountability." ACM Transactions on Information and System Security, Vol. No. 1(18), 2015.

11. Karame Ghassan, Elli Androulaki, and SrdjanCapkun. "Two Bitcoins at the Price of One? DoubleSpending Attacks on Fast Payments in Bitcoin." IACR Cryptology, Vol. No. 248, 2012.

12. Ouaddah Aafaf, Anas AbouElkalam, and Abdellah Ait Ouahman. "Towards a novel privacy-preserving access control model based on blockchain technology in IoT." In Europe and MENA Cooperation Advances in Information and Communication Technologies, Springer, PP 523-533, 2017.

13. Knecht Markus, Willi Meier, and Carlo U. Nicola. "A space-and time-efficient implementation of the Merkle Tree Traversal Algorithm." arXiv preprint, Vol.No.4081(1409), 2014.

14. Askitis Nikolas, and Ranjan Sinha. "HAT-trie: a cache-conscious trie-based data structure for strings." In Proceedings of the Thirteenth Australasian Conference on Computer Science, Australian Computer Society, Vol. No. 62, PP 97-105, 2007.

15. Stackoverflow questions, “https://stackoverflow.com/questions/4070693/what-is-the-purpose-of-base-64-encoding-and-why-it-used-in-http-basic-authentica” [online access date: 13-feb-2018]

16. A. Murugan and J. Vijayalakshmi. “Discovering the Bitcoin Double Spend using Lost Agreement Amount.” International Journal of Recent Technology and Engineering, Vol. No. 8(3), PP 3764-3770, 2019.

17. Vijayalakshmi, J., and Murugan, A., “Revamp Perception of Bitcoin Using Cognizant Merkle.” In Emerging Research in Computing, Information, Communication, and Applications, Springer, Singapore, pp. 141–150, 2019.

18. A. Murugan and J. Vijayalakshmi. “Preventing the bitcoin Double Spend using Transaction Hash and Unspent Transaction Output.” International Journal of Recent Technology and Engineering, Vol. No. 8(3), PP 3771-3776, 2019.

19. Heinz Steffen, Justin Zobel, and Hugh Williams, "Burst-tries: a fast, efficient data structure for string keys," ACM Transactions on Information Systems, Vol. No. (2), PP 192-223, 2002.

20. Vijayalakshmi, J. and Murugan, A. “Detecting Multi-Block Double Spent Transaction based On B-tree Indexing”, International Journal of Scientific and Technology Research (communicated)

Downloads

Published

30.04.2020

How to Cite

J. , V., & A., M. (2020). A Framework for Detecting and Preventing Double Spent Data in Inter and Intra Block of Blockchain. International Journal of Psychosocial Rehabilitation, 24(2), 4786-4800. https://doi.org/10.61841/tm730b44