Skip to main content

TheCoin: Privacy and security considerations within blockchain transactions.

Ikbal Nacer, M., Prakoonwit, S. and Prakash, E., 2021. TheCoin: Privacy and security considerations within blockchain transactions. In: ASSE '21: 2021 2nd Asia Service Sciences and Software Engineering Conference, 24-26 Feb 2021, Macau, Macao, 10-17.

Full text available as:

[img]
Preview
PDF
TheCoin.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial.

826kB

Official URL: https://dl.acm.org/doi/10.1145/3456126.3456127

DOI: 10.1145/3456126.3456127

Abstract

TheChain is a solution to many problems such as monopoly, heavy state transition, and security vulnerabilities. TheChain solves these problems by introducing the intersection of regions as an incentive before allowing validators to nest a client directory. Intersecting their operating territories forces them to keep a watch over each other. The definition of privacy can take many forms, starting from the right to be forgotten beside being away from public attention. Although the pseudonymity of the user within the network can enhance the user's privacy, several pieces of research have studied the techniques to take advantage of the network structure to identify the users of pseudonyms. Moreover, two models have been used to record the updated exchange of values within the blockchain system, which are the unspent transaction output (UTXO) and the balance model. The UTXO suffers from duplication of information and the balance model suffers from having a single point of entry. This paper introduces TheCoin model that defines the protocol of the exchange of valuable datum within TheChain system. The solution has introduced a novel approach of initiating the transaction from the receiver side by taking advantage of mobile agents empowering a topology hiding to the network. Billing within the platform has been introduced to allow advanced contractual logic to be adopted into the system on the information level. Moreover, traceable fuzziness has been used to eliminate duplication. The paper presents an evaluation of the TheCoin model in terms of system security, block size, and search performance.

Item Type:Conference or Workshop Item (Paper)
Group:Faculty of Science & Technology
ID Code:37633
Deposited By: Symplectic RT2
Deposited On:05 Oct 2022 13:56
Last Modified:05 Oct 2022 13:56

Downloads

Downloads per month over past year

More statistics for this item...
Repository Staff Only -