Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack
- 1 May 2017
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 458-467
- https://doi.org/10.1109/ccgrid.2017.111
Abstract
The blockchain technology has emerged as an attractive solution to address performance and security issues in distributed systems. Blockchain's public and distributed peer-to-peer ledger capability benefits cloud computing services which require functions such as, assured data provenance, auditing, management of digital assets, and distributed consensus. Blockchain's underlying consensus mechanism allows to build a tamper-proof environment, where transactions on any digital assets are verified by set of authentic participants or miners. With use of strong cryptographic methods, blocks of transactions are chained together to enable immutability on the records. However, achieving consensus demands computational power from the miners in exchange of handsome reward. Therefore, greedy miners always try to exploit the system by augmenting their mining power. In this paper, we first discuss blockchain's capability in providing assured data provenance in cloud and present vulnerabilities in blockchain cloud. We model the block withholding (BWH) attack in a blockchain cloud considering distinct pool reward mechanisms. BWH attack provides rogue miner ample resources in the blockchain cloud for disrupting honest miners' mining efforts, which was verified through simulations.Keywords
This publication has 10 references indexed in Scilit:
- Establishing evolutionary game models for CYBer security information EXchange (CYBEX)Journal of Computer and System Sciences, 2018
- ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and AvailabilityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse AttackPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic ApproachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Cyber-Investment and Cyber-Information Exchange Decision ModelingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- An Analysis of Anonymity in Bitcoin Using P2P Network TrafficPublished by Springer Science and Business Media LLC ,2014
- Majority Is Not Enough: Bitcoin Mining Is VulnerableLecture Notes in Computer Science, 2014
- Deanonymisation of Clients in Bitcoin P2P NetworkPublished by Association for Computing Machinery (ACM) ,2014
- Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-TreesLecture Notes in Computer Science, 2013
- Practical byzantine fault tolerance and proactive recoveryACM Transactions on Computer Systems, 2002