Ikbal Nacer, M., Prakoonwit, S. and Prakash, E., 2021. TheCoin: Privacy and security considerations within blockchain transactions. In: ASSE '21: 2021 2nd Asia Service Sciences and Software Engineering Conference, 24-26 Feb 2021, Macau, Macao, 10-17.
Full text available as:
|
PDF
TheCoin.pdf - Published Version Available under License Creative Commons Attribution Non-commercial. 826kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
Official URL: https://dl.acm.org/doi/10.1145/3456126.3456127
Abstract
TheChain is a solution to many problems such as monopoly, heavy state transition, and security vulnerabilities. TheChain solves these problems by introducing the intersection of regions as an incentive before allowing validators to nest a client directory. Intersecting their operating territories forces them to keep a watch over each other. The definition of privacy can take many forms, starting from the right to be forgotten beside being away from public attention. Although the pseudonymity of the user within the network can enhance the user's privacy, several pieces of research have studied the techniques to take advantage of the network structure to identify the users of pseudonyms. Moreover, two models have been used to record the updated exchange of values within the blockchain system, which are the unspent transaction output (UTXO) and the balance model. The UTXO suffers from duplication of information and the balance model suffers from having a single point of entry. This paper introduces TheCoin model that defines the protocol of the exchange of valuable datum within TheChain system. The solution has introduced a novel approach of initiating the transaction from the receiver side by taking advantage of mobile agents empowering a topology hiding to the network. Billing within the platform has been introduced to allow advanced contractual logic to be adopted into the system on the information level. Moreover, traceable fuzziness has been used to eliminate duplication. The paper presents an evaluation of the TheCoin model in terms of system security, block size, and search performance.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Group: | Faculty of Science & Technology |
ID Code: | 37633 |
Deposited By: | Symplectic RT2 |
Deposited On: | 05 Oct 2022 13:56 |
Last Modified: | 05 Oct 2022 13:56 |
Downloads
Downloads per month over past year
Repository Staff Only - |