{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:30:29Z","timestamp":1770287429889,"version":"3.49.0"},"reference-count":139,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2021,3,14]],"date-time":"2021-03-14T00:00:00Z","timestamp":1615680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004329","name":"Javna Agencija za Raziskovalno Dejavnost RS","doi-asserted-by":"publisher","award":["J2-2504"],"award-info":[{"award-number":["J2-2504"]}],"id":[{"id":"10.13039\/501100004329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["739574"],"award-info":[{"award-number":["739574"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires blockchain data to be secured with mechanisms that allow on-demand (as opposed to full) disclosure. In this paper, we give a comprehensive overview of blockchain privacy and security requirements, and detail how existing mechanisms answer them. We provide a taxonomy of current attacks together with related countermeasures. We present a thorough comparative analysis based on various parameters of state-of the-art privacy and security mechanisms, we provide recommendations to design secure and privacy-aware blockchain, and we suggest guidelines for future research.<\/jats:p>","DOI":"10.3390\/jcp1010009","type":"journal-article","created":{"date-parts":[[2021,3,14]],"date-time":"2021-03-14T22:13:10Z","timestamp":1615759990000},"page":"164-194","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7020-1762","authenticated-orcid":false,"given":"Sidra","family":"Aslam","sequence":"first","affiliation":[{"name":"InnoRenew CoE, Izola 6310, Slovenia"},{"name":"Faculty of Mathematics, Natural Sciences and Information Technologies, University of Primorska, Koper 6000, Slovenia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5627-4420","authenticated-orcid":false,"given":"Aleksandar","family":"To\u0161i\u0107","sequence":"additional","affiliation":[{"name":"InnoRenew CoE, Izola 6310, Slovenia"},{"name":"Faculty of Mathematics, Natural Sciences and Information Technologies, University of Primorska, Koper 6000, Slovenia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2330-1004","authenticated-orcid":false,"given":"Michael","family":"Mrissa","sequence":"additional","affiliation":[{"name":"InnoRenew CoE, Izola 6310, Slovenia"},{"name":"Faculty of Mathematics, Natural Sciences and Information Technologies, University of Primorska, Koper 6000, Slovenia"}]}],"member":"1968","published-online":{"date-parts":[[2021,3,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017, January 25\u201330). An overview of blockchain technology: Architecture, consensus, and future trends. Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA.","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A., and Felten, E.W. (2014, January 3\u20137). Mixcoin: Anonymity for bitcoin with accountable mixes. Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados.","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"ref_3","unstructured":"Lu, L., Han, J., Hu, L., Huai, J., Liu, Y., and Ni, L.M. (2007, January 26\u201330). Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols. Proceedings of the 2007 IEEE International Parallel and Distributed Processing Symposium, Long Beach, CA, USA."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., and Tauman, Y. (2001, January 9\u201313). How to leak a secret. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"164908","DOI":"10.1109\/ACCESS.2019.2950872","article-title":"Privacy-preserving solutions for Blockchain: Review and challenges","volume":"7","author":"Bernabe","year":"2019","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","article-title":"A survey on security and privacy issues of bitcoin","volume":"20","author":"Conti","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","unstructured":"Nakamoto, S. (2021, March 01). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","article-title":"A survey on privacy protection in blockchain system","volume":"126","author":"Feng","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3158369","article-title":"Security and privacy on blockchain","volume":"52","author":"Zhang","year":"2019","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Halpin, H., and Piekarska, M. (2017, January 26\u201328). Introduction to Security and Privacy on the Blockchain. Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Paris, France.","DOI":"10.1109\/EuroSPW.2017.43"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Chen, H., Pendleton, M., Njilla, L., and Xu, S. (2019). A survey on ethereum systems security: Vulnerabilities, attacks and defenses. arXiv.","DOI":"10.1145\/3391195"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"121","DOI":"10.3934\/mfc.2018007","article-title":"A survey on security and privacy issues of blockchain technology","volume":"1","author":"Joshi","year":"2018","journal-title":"Math. Found. Comput."},{"key":"ref_13","unstructured":"Narayanan, A., Bonneau, J., Felten, E., Miller, A., and Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction, Princeton University Press."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain challenges and opportunities: A survey","volume":"14","author":"Zheng","year":"2018","journal-title":"Int. J. Web Grid Serv."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Li, W., Andreina, S., Bohli, J.M., and Karame, G. (2017). Securing proof-of-stake blockchain protocols. Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer.","DOI":"10.1007\/978-3-319-67816-0_17"},{"key":"ref_16","first-page":"1","article-title":"Ppcoin: Peer-to-peer crypto-currency with proof-of-stake","volume":"19","author":"King","year":"2012","journal-title":"Self-Publ. Pap."},{"key":"ref_17","first-page":"461","article-title":"Cryptographic hash functions: A review","volume":"9","author":"Sobti","year":"2012","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Merkle, R.C. (1980, January 14\u201316). Protocols for public key cryptosystems. Proceedings of the 1980 IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.1980.10006"},{"key":"ref_19","unstructured":"Burgess, K., and Colangelo, J. (2015). The Promise of Bitcoin and the Blockchain, Consumers\u2019 Research."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Yang, W., Garg, S., Raza, A., Herbert, D., and Kang, B. (2018). Blockchain: Trends and future. Pacific Rim Knowledge Acquisition Workshop, Springer.","DOI":"10.1007\/978-3-319-97289-3_15"},{"key":"ref_21","first-page":"71","article-title":"Blockchain technology: Beyond bitcoin","volume":"2","author":"Crosby","year":"2016","journal-title":"Appl. Innov."},{"key":"ref_22","unstructured":"Szabo, N. (1997). The Idea of Smart Contracts, Satoshi Nakamoto Institute."},{"key":"ref_23","unstructured":"Brent, L., Jurisevic, A., Kong, M., Liu, E., Gauthier, F., Gramoli, V., Holz, R., and Scholz, B. (2018). Vandal: A scalable security analysis framework for smart contracts. arXiv."},{"key":"ref_24","unstructured":"Ekblaw, A., Azaria, A., Halamka, J.D., and Lippman, A. (2016, January 5\u20138). A Case Study for Blockchain in Healthcare: \u201cMedRec\u201d prototype for electronic health records and medical research data. Proceedings of the IEEE Open & Big Data Conference, Washington, DC, USA."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2994581","article-title":"Blockchain beyond bitcoin","volume":"59","author":"Underwood","year":"2016","journal-title":"Commun. ACM"},{"key":"ref_26","unstructured":"Hanke, T., Movahedi, M., and Williams, D. (2018). Dfinity technology overview series, consensus system. arXiv."},{"key":"ref_27","unstructured":"Eisses, J., Verspeek, L., Dawe, C., and Dijkstra, S. (2021, March 09). Effect Network: Decentralized Network for Artificial Intelligence. Available online: http:\/\/effect.ai\/download\/effectwhitepaper.pdf."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","article-title":"A Review on the Use of Blockchain for the Internet of Things","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Xu, L., Shah, N., Chen, L., Diallo, N., Gao, Z., Lu, Y., and Shi, W. (2017, January 2\u20136). Enabling the sharing economy: Privacy respecting contract based on public blockchain. Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, Abu Dhabi, United Arab Emirates.","DOI":"10.1145\/3055518.3055527"},{"key":"ref_30","unstructured":"Kumari, K.A., Padmashani, R., Varsha, R., and Upadhayay, V. (2020). Securing Internet of Medical Things (IoMT) using private blockchain network. Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm, Springer."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., and Tan, K.L. (2017, January 14\u201319). Blockbench: A framework for analyzing private blockchains. Proceedings of the 2017 ACM International Conference on Management of Data, Chicago, IL, USA.","DOI":"10.1145\/3035918.3064033"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Polge, J., Robert, J., and Le Traon, Y. (2020). Permissioned blockchain frameworks in the industry: A comparison. ICT Express.","DOI":"10.1016\/j.icte.2020.09.002"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSP.2018.3111245","article-title":"Blockchain access privacy: Challenges and directions","volume":"16","author":"Henry","year":"2018","journal-title":"IEEE Secur. Priv."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou, C. (2016, January 22\u201326). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2016.55"},{"key":"ref_35","unstructured":"Barcelo, J. (2016, May 09). User Privacy in the Public Bitcoin Blockchain. Available online: http:\/\/www.dtic.upf.edu\/jbarcelo\/papers\/20140704User.2014PrivacyinthePublicBitcoinBlockchain\/paper.pdf."},{"key":"ref_36","unstructured":"Ammous, S. (2021, March 09). Blockchain Technology: What Is It Good for?. Available online: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2832751."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Chow, S.S., Yiu, S.M., and Hui, L.C. (2005). Efficient identity based ring signature. International Conference on Applied Cryptography and Network Security, Springer.","DOI":"10.1007\/11496137_34"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Tsang, P.P., Au, M.H., Liu, J.K., Susilo, W., and Wong, D.S. (2010). A suite of non-pairing id-based threshold ring signature schemes with different levels of anonymity. International Conference on Provable Security, Springer.","DOI":"10.1007\/978-3-642-16280-0_11"},{"key":"ref_39","first-page":"1098","article-title":"Ring SIgnature Confidential Transactions for Monero","volume":"2015","author":"Noether","year":"2015","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_40","first-page":"46","article-title":"Scalable, transparent, and post-quantum secure computational integrity","volume":"2018","author":"Bentov","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., and Juels, A. (2001, January 26\u201329). An optimally robust hybrid mix network. Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, Newport, RI, USA.","DOI":"10.1145\/383962.384046"},{"key":"ref_42","unstructured":"Jefferys, K., Shishmarev, M., and Harman, S. (2020). Session: A Model for End-To-End Encrypted Conversations with Minimal Metadata Leakage. arXiv."},{"key":"ref_43","first-page":"110","article-title":"Onion Routing and Tor","volume":"1","author":"Swan","year":"2016","journal-title":"Geo. Law Tech. Rev."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., and Syverson, P. (2004). Tor: The Second-Generation Onion Router, Naval Research Lab.. Technical Report.","DOI":"10.21236\/ADA465464"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Sharma, K., Jayashankar, A., Banu, K.S., and Tripathy, B. (2016). Data Anonymization Through Slicing Based on Graph-Based Vertical Partitioning. Proceedings of the 3rd International Conference on Advanced Computing, Networking and Informatics, Springer.","DOI":"10.1007\/978-81-322-2529-4_59"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J., and Torra, V. (2008, January 4\u20137). A critique of k-anonymity and some of its enhancements. Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, Barcelona, Spain.","DOI":"10.1109\/ARES.2008.97"},{"key":"ref_47","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., and Zhu, A. (2005, January 5\u20137). Approximation algorithms for k-anonymity. Proceedings of the International Conference on Database Theory (ICDT 2005), Edinburgh, UK."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Yao, L., Chen, Z., Hu, H., Wu, G., and Wu, B. (2020). Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity. Distrib. Parallel Databases, 1\u201327.","DOI":"10.1007\/s10619-020-07318-7"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., and Venkatasubramanian, S. (2007, January 15\u201320). t-closeness: Privacy beyond k-anonymity and l-diversity. Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"3-es","DOI":"10.1145\/1217299.1217302","article-title":"l-diversity: Privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"ref_51","unstructured":"Kern, M. (2013, January 13). Anonymity: A formalization of privacy-l-diversity. Proceedings of the Zum Seminar Future Internet (FI), Innovative Internet Technologien und Mobilkommunikation (IITM) und Autonomous Communication Networks (ACN), Munich, Germany."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1287\/ijoc.2017.0791","article-title":"T-closeness slicing: A new privacy-preserving approach for transactional data publishing","volume":"30","author":"Wang","year":"2018","journal-title":"INFORMS J. Comput."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Boyen, X., Mei, Q., and Waters, B. (2005, January 7\u201311). Direct chosen ciphertext security from identity-based techniques. Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA.","DOI":"10.1145\/1102120.1102162"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Waters, B. (2005). Efficient identity-based encryption without random oracles. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/11426639_7"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Fotiou, N., and Polyzos, G.C. (2016, January 10\u201314). Decentralized name-based security for content distribution using blockchains. Proceedings of the 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA.","DOI":"10.1109\/INFCOMW.2016.7562112"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"11676","DOI":"10.1109\/ACCESS.2018.2801266","article-title":"Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems","volume":"6","author":"Guo","year":"2018","journal-title":"IEEE Access"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Rahulamathavan, Y., Phan, R.C.W., Rajarajan, M., Misra, S., and Kondoz, A. (2017, January 17\u201320). Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bhubaneswar, India.","DOI":"10.1109\/ANTS.2017.8384164"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Panwar, G., Misra, S., and Vishwanathan, R. (2019, January 25\u201327). Blanc: Blockchain-based anonymous and decentralized credit networks. Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, Richardson, TX, USA.","DOI":"10.1145\/3292006.3300034"},{"key":"ref_59","first-page":"456","article-title":"Secured email data based on blowfish with blockchain technology","volume":"8","author":"Vasantha","year":"2019","journal-title":"Sci. Technol. Dev."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"3477","DOI":"10.1007\/s11042-014-1885-6","article-title":"A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography","volume":"74","author":"Zhang","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_61","unstructured":"Shah, S. (2017). Use of Blockchain as a Software Component to Send Messages Anonymously for a Data Trading Platform, Archemy."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1016\/j.future.2017.08.026","article-title":"Preserving transaction privacy in bitcoin","volume":"107","author":"Wang","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_63","first-page":"3826","article-title":"A survey of homomorphic encryption for outsourced big data computation","volume":"10","author":"Fun","year":"2016","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"AlTawy, R., ElSheikh, M., Youssef, A.M., and Gong, G. (2017, January 28\u201330). Lelantos: A blockchain-based anonymous physical delivery system. Proceedings of the 2017 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, Canada.","DOI":"10.1109\/PST.2017.00013"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Gamage, C., Gras, B., Crispo, B., and Tanenbaum, A.S. (September, January 28). An identity-based ring signature scheme with enhanced privacy. Proceedings of the 2006 Securecomm and Workshops, Baltimore, MD, USA.","DOI":"10.1109\/SECCOMW.2006.359554"},{"key":"ref_66","unstructured":"Maxwell, G. (2021, March 09). CoinJoin: Bitcoin Privacy for the Real World. Bitcoin Forum. Available online: https:\/\/bitcointalk.org\/index."},{"key":"ref_67","first-page":"20","article-title":"A survey on methods, attacks and metric for privacy preserving data publishing","volume":"53","author":"Kiran","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"ref_68","first-page":"64","article-title":"Analysis and Comparison of Anonymous Techniques for Privacy Preserving in Big Data","volume":"6","author":"Sriramoju","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Franklin, M. (2001). Identity-based encryption from the Weil pairing. Annual International Cryptology Conference, Springer.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref_70","unstructured":"Shamir, A. (1984, January 9\u201311). Identity-based cryptosystems and signature schemes. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Paris, France."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Nie, T., Song, C., and Zhi, X. (2010, January 23\u201325). Performance evaluation of DES and Blowfish algorithms. Proceedings of the 2010 International Conference on Biomedical Engineering and Computer Science, Wuhan, China.","DOI":"10.1109\/ICBECS.2010.5462398"},{"key":"ref_72","first-page":"3033","article-title":"Comparative analysis of performance efficiency and security measures of some encryption algorithms","volume":"2","author":"Jeeva","year":"2012","journal-title":"Int. J. Eng. Res. Appl."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Yakoubov, S., Gadepally, V., Schear, N., Shen, E., and Yerukhimovich, A. (2014, January 9\u201311). A survey of cryptographic approaches to securing big-data analytics in the cloud. Proceedings of the 2014 IEEE High Performance Extreme Computing Conference (HPEC), Waltham, MA, USA.","DOI":"10.1109\/HPEC.2014.7040943"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MSP.2005.153","article-title":"Network security basics","volume":"3","author":"Marin","year":"2005","journal-title":"IEEE Secur. Priv."},{"key":"ref_75","first-page":"4063","article-title":"A survey of mobile ad hoc network attacks","volume":"2","author":"Jawandhiya","year":"2010","journal-title":"Int. J. Eng. Sci. Technol."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1516539.1516541","article-title":"On the state of IP spoofing defense","volume":"9","author":"Ehrenkranz","year":"2009","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/141809.141812","article-title":"Message Authentication with One-Way Hash Functions","volume":"22","author":"Tsudik","year":"1992","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Chandra, S., Paira, S., Alam, S.S., and Sanyal, G. (2014, January 17\u201318). A comparative survey of symmetric and asymmetric key cryptography. Proceedings of the 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), Hosur, India.","DOI":"10.1109\/ICECCE.2014.7086640"},{"key":"ref_79","unstructured":"Yar\u0131mtepe, O., Dalk\u0131l\u0131\u00e7, G., and \u00d6zcanhan, M.H. (2015, January 11\u201312). Distributed Denial of Service Prevention Techniques. Proceedings of the 3rd International Symposium on Digital Forensics and Security, Ankara, Turkey."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Ekparinya, P., Gramoli, V., and Jourjon, G. (2018, January 2\u20135). Impact of man-in-the-middle attacks on ethereum. Proceedings of the 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), Salvador, Brazil.","DOI":"10.1109\/SRDS.2018.00012"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.procs.2018.10.125","article-title":"A detection and prevention technique for man in the middle attack in fog computing","volume":"141","author":"Aliyu","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Lou, X., Huu, C.T., Tan, R., Yau, D.K., and Kalbarczyk, Z.T. (2020, September 14). Assessing and Mitigating Impact of Time Delay Attack against Cyber-Physical Systems. Available online: http:\/\/publish.illinois.edu\/cps-security\/files\/2018\/05\/delay.pdf.","DOI":"10.1145\/3302509.3311042"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"205","DOI":"10.4236\/ica.2015.64020","article-title":"A novel technique for detection of time delay switch attack on load frequency control","volume":"6","author":"Sargolzaei","year":"2015","journal-title":"Intell. Control. Autom."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., and Vanbever, L. (2017, January 22\u201326). Hijacking bitcoin: Routing attacks on cryptocurrencies. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.29"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Xing, Q., Wang, B., and Wang, X. (2018). Bgpcoin: Blockchain-based internet number resource authority and bgp security solution. Symmetry, 10.","DOI":"10.3390\/sym10090408"},{"key":"ref_86","unstructured":"Kiayias, A., and Panagiotakos, G. (2017). On trees, chains and fast transactions in the blockchain. International Conference on Cryptology and Information Security in Latin America, Springer."},{"key":"ref_87","unstructured":"Li, C., Li, P., Zhou, D., Yang, Z., Wu, M., Yang, G., Xu, W., Long, F., and Yao, A.C.C. (2020, January 15\u201317). A Decentralized Blockchain with High Throughput and Fast Confirmation. Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC 20), Boston, MA, USA."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Serjantov, A., and Sewell, P. (2003). Passive attack analysis for connection-based anonymity systems. European Symposium on Research in Computer Security, Springer.","DOI":"10.1007\/978-3-540-39650-5_7"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., and Wehrle, K. (2019, January 8\u201310). Tailoring onion routing to the Internet of Things: Security and privacy in untrusted environments. Proceedings of the 2019 IEEE 27th International Conference on Network Protocols (ICNP), Chicago, IL, USA.","DOI":"10.1109\/ICNP.2019.8888033"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.procs.2015.04.126","article-title":"Network security and types of attacks in network","volume":"48","author":"Pawar","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Sinha, P., Jha, V., Rai, A.K., and Bhushan, B. (2017, January 28\u201329). Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. Proceedings of the 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, India.","DOI":"10.1109\/CSPC.2017.8305855"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Decker, C., and Wattenhofer, R. (2014). Bitcoin transaction malleability and MtGox. European Symposium on Research in Computer Security, Springer.","DOI":"10.1007\/978-3-319-11212-1_18"},{"key":"ref_93","first-page":"837","article-title":"A solution towards eliminating transaction malleability in bitcoin","volume":"14","author":"Rajput","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref_94","unstructured":"Buterin, V., and Griffith, V. (2017). Casper the friendly finality gadget. arXiv."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Sompolinsky, Y., and Zohar, A. (2015). Secure high-rate transaction processing in bitcoin. Conference on Financial Cryptography and Data Security, Springer.","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"ref_96","unstructured":"Buterin, V., Hernandez, D., Kamphefner, T., Pham, K., Qiao, Z., Ryan, D., Sin, J., Wang, Y., and Zhang, Y.X. (2020). Combining GHOST and Casper. arXiv."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Sayeed, S., and Marco-Gisbert, H. (2019). Assessing blockchain consensus and security mechanisms against the 51% attack. Appl. Sci., 9.","DOI":"10.3390\/app9091788"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Eyal, I., and Sirer, E.G. (2014). Majority is not enough: Bitcoin mining is vulnerable. Conference on Financial Cryptography and Data Security, Springer.","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Solat, S., and Potop-Butucaru, M. (2017). Brief announcement: Zeroblock: Timestamp-free prevention of block-withholding attack in bitcoin. International Symposium on Stabilization, Safety, and Security of Distributed Systems, Springer.","DOI":"10.1007\/978-3-319-69084-1_25"},{"key":"ref_100","unstructured":"Heilman, E., Kendler, A., Zohar, A., and Goldberg, S. (2015, January 12\u201314). Eclipse attacks on bitcoin\u2019s peer-to-peer network. Proceedings of the 24th {USENIX} Security Symposium ({USENIX} Security 15), Washington, DC, USA."},{"key":"ref_101","unstructured":"Simmons, S. (2021, February 26). A Brief Breakdown of Monero\u2019s Ongoing Network Attacks. Available online: https:\/\/sethsimmons.me\/posts\/moneros-ongoing-network-attack\/."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Singh, A., Castro, M., Druschel, P., and Rowstron, A. (2004, January 19\u201322). Defending against eclipse attacks on overlay networks. Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, Leuven, Belgium.","DOI":"10.1145\/1133572.1133613"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Bissias, G., Ozisik, A.P., Levine, B.N., and Liberatore, M. (2014, January 3). Sybil-resistant mixing for bitcoin. Proceedings of the 13th Workshop on Privacy in the Electronic Society, Scottsdale, AZ, USA.","DOI":"10.1145\/2665943.2665955"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Lee, H., Shin, M., Kim, K.S., Kang, Y., and Kim, J. (2018, January 11\u201313). Recipient-oriented transaction for preventing double spending attacks in private blockchain. Proceedings of the 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Hong Kong, China.","DOI":"10.1109\/SAHCN.2018.8397151"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","article-title":"A survey on the security of blockchain systems","volume":"107","author":"Li","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Juels, A., Kosba, A., and Shi, E. (2016, January 24\u201328). The ring of gyges: Investigating the future of criminal smart contracts. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978362"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., and Groce, A. (2019, January 27). Slither: A static analysis framework for smart contracts. Proceedings of the 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), Montreal, QC, Canada.","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref_108","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., and Alexandrov, Y. (June, January 27). Smartcheck: Static analysis of ethereum smart contracts. Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, Gothenburg, Sweden."},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Atzei, N., Bartoletti, M., and Cimoli, T. (2017). A survey of attacks on ethereum smart contracts (sok). International Conference on Principles of Security and Trust, Springer.","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"24416","DOI":"10.1109\/ACCESS.2020.2970495","article-title":"Smart contract: Attacks and protections","volume":"8","author":"Sayeed","year":"2020","journal-title":"IEEE Access"},{"key":"ref_111","first-page":"126","article-title":"ECDSA security in bitcoin and ethereum: A research survey","volume":"28","author":"Mayer","year":"2016","journal-title":"CoinFaabrik"},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"40638","DOI":"10.1109\/ACCESS.2018.2856864","article-title":"SBLWT: A secure blockchain lightweight wallet based on trustzone","volume":"6","author":"Dai","year":"2018","journal-title":"IEEE Access"},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Laurent, M., and Giannetsos, T. (2020). Information Security Theory and Practice, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-030-41702-4"},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Xu, J., and Meng, X. (2008, January 27\u201330). p-sensitivity: A semantic privacy-protection model for location-based services. Proceedings of the 2008 Ninth International Conference on Mobile Data Management Workshops (MDMW), Beijing, China.","DOI":"10.1109\/MDMW.2008.20"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Sowmyarani, C., Srinivasan, G., and Sukanya, K. (2013). A New Privacy Preserving Measure: p-Sensitive, t-Closeness. International Conference on Advances in Computing, Springer.","DOI":"10.1007\/978-81-322-0740-5_7"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Kumar, A., Fischer, C., Tople, S., and Saxena, P. (2017, January 11\u201315). A traceability analysis of monero\u2019s blockchain. Proceedings of the European Symposium on Research in Computer Security, Oslo, Norway.","DOI":"10.1007\/978-3-319-66399-9_9"},{"key":"ref_117","first-page":"143","article-title":"An empirical analysis of traceability in the monero blockchain","volume":"2018","author":"Soska","year":"2018","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"ref_118","unstructured":"Prabhakaran, M., and Sahai, A. (2021, March 09). Concurrent Zero Knowledge Proofs with Logarithmic Roundcomplexity. Available online: http:\/\/eprint.iacr.org\/2002\/055.pdf."},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1109\/TPDS.2008.15","article-title":"Pseudo trust: Zero-knowledge authentication in anonymous P2Ps","volume":"19","author":"Lu","year":"2008","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Byun, J.W., Kamra, A., Bertino, E., and Li, N. (2007). Efficient k-anonymization using clustering techniques. International Conference on Database Systems for Advanced Applications, Springer.","DOI":"10.1007\/978-3-540-71703-4_18"},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Meyerson, A., and Williams, R. (2004, January 14\u201316). On the complexity of optimal k-anonymity. Proceedings of the Twenty-Third ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Paris, France.","DOI":"10.1145\/1055558.1055591"},{"key":"ref_122","unstructured":"Ghinita, G., Karras, P., Kalnis, P., and Mamoulis, N. (2007, January 23\u201327). Fast data anonymization with low information loss. Proceedings of the 33rd International Conference on Very Large Data Bases, Vienna, Austria."},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Mehta, B.B., and Rao, U.P. (2019). Improved l-Diversity: Scalable Anonymization Approach for Privacy Preserving Big Data Publishing. J. King Saud Univ. Comput. Inf. Sci.","DOI":"10.1109\/ICCCNT45670.2019.8944778"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Chase, M., and Chow, S.S. (2009, January 9\u201313). Improving privacy and security in multi-authority attribute-based encryption. Proceedings of the 16th ACM conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1653662.1653678"},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"89614","DOI":"10.1109\/ACCESS.2019.2925390","article-title":"Privacy Provision in Collaborative Ehealth With Attribute-Based Encryption: Survey, Challenges and Future Directions","volume":"7","author":"Edemacu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_126","unstructured":"Farah, S., Javed, Y., Shamim, A., and Nawaz, T. (2012, January 2\u20134). An experimental study on performance evaluation of asymmetric encryption algorithms. Proceedings of the 3rd European Conference of Computer Science on Recent Advances in Information Science (EECS-12), Paris, France."},{"key":"ref_127","unstructured":"Levi, A., and Savas, E. (2003, January 3). Performance evaluation of public-key cryptosystem operations in WTLS protocol. Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), Kemer-Antalya, Turkey."},{"key":"ref_128","first-page":"442","article-title":"Cryptography: A comparative analysis for modern techniques","volume":"8","author":"Maqsood","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_129","unstructured":"Awasthi, A.K., and Lal, S. (2005). ID-based ring signature and proxy ring signature schemes from bilinear pairings. arXiv."},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., and Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Jurczyk, P., and Xiong, L. (2009). Distributed anonymization: Achieving privacy for both data subjects and data providers. IFIP Annual Conference on Data and Applications Security and Privacy, Springer.","DOI":"10.1007\/978-3-642-03007-9_13"},{"key":"ref_132","first-page":"21","article-title":"Modified advanced encryption standard","volume":"4","author":"Kawle","year":"2014","journal-title":"Int. J. Soft Comput. Eng."},{"key":"ref_133","unstructured":"Padmavathi, B., and Kumari, S.R. (2013). A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution. Int. J. Sci. Res., 170\u2013174."},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Mansour, A., Malik, K.M., and Kaso, N. (2020). AMOUN: Asymmetric lightweight cryptographic scheme for wireless group communication. arXiv.","DOI":"10.1016\/j.comcom.2021.01.019"},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1016\/j.chaos.2009.02.001","article-title":"Chaos-based hash function (CBHF) for cryptographic applications","volume":"42","author":"Amin","year":"2009","journal-title":"Chaos Solitons Fractals"},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Nakajima, J., and Matsui, M. (2002). Performance analysis and parallel implementation of dedicated hash functions. Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/3-540-46035-7_11"},{"key":"ref_137","unstructured":"Gahi, Y., Guennoun, M., and El-Khatib, K. (2015). A secure database system using homomorphic encryption schemes. arXiv."},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Micciancio, D., and Rabin, T. (1998, January 3\u20135). An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products. Proceedings of the 5th ACM Conference on Computer and Communication Security (CCS\u201998), San Francisco, CA, USA.","DOI":"10.1145\/288090.288108"},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Brown-Cohen, J., Narayanan, A., Psomas, A., and Weinberg, S.M. (2019, January 24\u201328). Formal barriers to longest-chain proof-of-stake protocols. Proceedings of the 2019 ACM Conference on Economics and Computation, Phoenix, AZ, USA.","DOI":"10.1145\/3328526.3329567"}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/1\/9\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:35:26Z","timestamp":1760160926000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/1\/9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,14]]},"references-count":139,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,3]]}},"alternative-id":["jcp1010009"],"URL":"https:\/\/doi.org\/10.3390\/jcp1010009","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,14]]}}}