Where Is Current Research on Blockchain Technology?—A Systematic Review

Blockchain is a decentralized transaction and data management technology developed first for Bitcoin cryptocurrency. The interest in Blockchain technology has been increasing since the idea was coined in 2008. The reason for the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third party organization in control of the transactions, and therefore it creates interesting research areas, especially from the perspective of technical challenges and limitations. In this research, we have conducted a systematic mapping study with the goal of collecting all relevant research on Blockchain technology. Our objective is to understand the current research topics, challenges and future directions regarding Blockchain technology from the technical perspective. We have extracted 41 primary papers from scientific databases. The results show that focus in over 80% of the papers is on Bitcoin system and less than 20% deals with other Blockchain applications including e.g. smart contracts and licensing. The majority of research is focusing on revealing and improving limitations of Blockchain from privacy and security perspectives, but many of the proposed solutions lack concrete evaluation on their effectiveness. Many other Blockchain scalability related challenges including throughput and latency have been left unstudied. On the basis of this study, recommendations on future research directions are provided for researchers.

[1]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[2]  Goutam Paul,et al.  Towards a More Democratic Mining in Bitcoins , 2014, ICISS.

[3]  Roberto Tamassia,et al.  Bitconeview: visualization of flows in the bitcoin transaction graph , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[4]  Yu Zhang,et al.  An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[5]  Burak Kantarci,et al.  Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.

[6]  JooSeok Song,et al.  Trend of centralization in Bitcoin's distributed network , 2015, 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[7]  Ghassan Karame,et al.  Hiding Transaction Amounts and Balances in Bitcoin , 2014, TRUST.

[8]  István Csabai,et al.  Do the Rich Get Richer? An Empirical Analysis of the Bitcoin Transaction Network , 2013, PloS one.

[9]  Tyler Moore,et al.  There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams , 2015, Financial Cryptography.

[10]  Pedro Moreno-Sanchez,et al.  CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.

[11]  Janardan Misra,et al.  Increasing Anonymity in Bitcoin , 2014, Financial Cryptography Workshops.

[12]  Enzo Baccarelli,et al.  Distributed and adaptive resource management in Cloud-assisted Cognitive Radio Vehicular Networks with hard reliability guarantees , 2015, Veh. Commun..

[13]  Luke Valenta,et al.  Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.

[14]  Christian Decker,et al.  BlueWallet: The Secure Bitcoin Wallet , 2014, STM.

[15]  Feng Hao,et al.  ZombieCoin: Powering Next-Generation Botnets with Bitcoin , 2015, Financial Cryptography Workshops.

[16]  Jega Anish Dev Bitcoin mining acceleration and performance quantification , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[17]  Jason Teutsch,et al.  Demystifying Incentives in the Consensus Computer , 2015, CCS.

[18]  Tore Dybå,et al.  Empirical studies of agile software development: A systematic review , 2008, Inf. Softw. Technol..

[19]  Marcin Andrychowicz,et al.  PoW-Based Distributed Cryptography with No Trusted Setup , 2015, CRYPTO.

[20]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[21]  Hiroki Watanabe,et al.  The Blockchain-Based Digital Content Distribution System , 2015, 2015 IEEE Fifth International Conference on Big Data and Cloud Computing.

[22]  Sebastian Feld,et al.  Analyzing the Deployment of Bitcoin's P2P Network under an AS-level Perspective , 2014, ANT/SEIT.

[23]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[24]  Giuseppe Ateniese,et al.  From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain , 2015, NSS.

[25]  Christian Decker,et al.  Making Bitcoin Exchanges Transparent , 2015, ESORICS.

[26]  Stefano Zanero,et al.  BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.

[27]  Christian Decker,et al.  Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.

[28]  Emilio Tuosto,et al.  Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods , 2015, Programming Languages with Applications to Biology and Security.

[29]  Sarah Meiklejohn,et al.  Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.

[30]  Patrick D. McDaniel,et al.  An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.

[31]  Kai Petersen,et al.  Systematic Mapping Studies in Software Engineering , 2008, EASE.

[32]  Silvia Mara Abrahão,et al.  Usability evaluation methods for the web: A systematic mapping study , 2011, Inf. Softw. Technol..

[33]  Jae-Kwang Lee,et al.  The Analysis and Countermeasures on Security Breach of Bitcoin , 2014, ICCSA.

[34]  A. Ashtekar Overview and Outlook , 1994, gr-qc/9403038.

[35]  Yong Liu,et al.  Exploring Miner Evolution in Bitcoin Network , 2015, PAM.

[36]  Jordi Herrera-Joancomartí,et al.  Research and Challenges on Bitcoin Anonymity , 2014, DPM/SETOP/QASA.

[37]  Klaus Wehrle,et al.  CoinParty: Secure Multi-Party Mixing of Bitcoins , 2015, CODASPY.

[38]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[39]  David Vandervort,et al.  Issues in Designing a Bitcoin-like Community Currency , 2015, Financial Cryptography Workshops.

[40]  Malte Möser,et al.  An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.

[41]  Ghassan O. Karame,et al.  Ripple: Overview and Outlook , 2015, TRUST.

[42]  Christopher Mann,et al.  Two-factor authentication for the Bitcoin protocol , 2016, International Journal of Information Security.

[43]  Javed Barkatullah,et al.  Goldstrike 1: CoinTerra's First-Generation Cryptocurrency Mining Processor for Bitcoin , 2015, IEEE Micro.

[44]  Russell Housley,et al.  Public Key Infrastructure (PKI) , 2004 .

[45]  Tyler Moore,et al.  Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.

[46]  David Vandervort,et al.  Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System , 2014, Financial Cryptography Workshops.

[47]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[48]  Robert H. Deng,et al.  Electronic Contract Signing Without Using Trusted Third Party , 2015, NSS.

[49]  Michael Naehrig,et al.  Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.

[50]  Marcin Andrychowicz,et al.  On the Malleability of Bitcoin Transactions , 2015, Financial Cryptography Workshops.