Where Is Current Research on Blockchain Technology?-A Systematic Review.

Published on Oct 3, 2016in PLOS ONE2.776
· DOI :10.1371/journal.pone.0163477
Jesse Yli-Huumo5
Estimated H-index: 5
(Lappeenranta University of Technology),
Deokyoon Ko3
Estimated H-index: 3
(Sogang University)
+ 2 AuthorsKari Smolander20
Estimated H-index: 20
(Aalto University)
Blockchain is a decentralized transaction and data management technology developed first for Bitcoin cryptocurrency. The interest in Blockchain technology has been increasing since the idea was coined in 2008. The reason for the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third party organization in control of the transactions, and therefore it creates interesting research areas, especially from the perspective of technical challenges and limitations. In this research, we have conducted a systematic mapping study with the goal of collecting all relevant research on Blockchain technology. Our objective is to understand the current research topics, challenges and future directions regarding Blockchain technology from the technical perspective. We have extracted 41 primary papers from scientific databases. The results show that focus in over 80% of the papers is on Bitcoin system and less than 20% deals with other Blockchain applications including e.g. smart contracts and licensing. The majority of research is focusing on revealing and improving limitations of Blockchain from privacy and security perspectives, but many of the proposed solutions lack concrete evaluation on their effectiveness. Many other Blockchain scalability related challenges including throughput and latency have been left unstudied. On the basis of this study, recommendations on future research directions are provided for researchers.
Figures & Tables
  • References (49)
  • Citations (289)
📖 Papers frequently viewed together
1 Author (Melanie Swan)
550 Citations
2017BigData Congress: International Congress on Big Data
5 Authors (Zibin Zheng, ..., Huaimin Wang)
275 Citations
740 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
#1Mohammad Shojafar (Sapienza University of Rome)H-Index: 21
#2Nicola Cordeschi (Sapienza University of Rome)H-Index: 15
Last. Enzo Baccarelli (Sapienza University of Rome)H-Index: 26
view all 3 authors...
Providing real-time cloud services to Vehicular Clients (VCs) must cope with delay and delay-jitter issues. Fog computing is an emerging paradigm that aims at distributing small-size self-powered data centers (e.g., Fog nodes) between remote Clouds and VCs, in order to deliver data-dissemination real-time services to the connected VCs. Motivated by these considerations, in this paper, we propose and test an energy-efficient adaptive resource scheduler for Networked Fog Centers (NetFCs). They ope...
164 CitationsSource
#1Ismail Butun (Bursa Technical University)H-Index: 10
#2Melike Erol-Kantarci (Clarkson University)H-Index: 24
Last. Houbing Song (WVU: West Virginia University)H-Index: 33
view all 4 authors...
With the advances in IoT, future public safety responders will be well armed with devices that pump data between on-site responders and command centers, carrying useful information about the event scene, the status of a mission, and helping critical decisions to be made in real time. In addition, wearable and on-body sensors will monitor the vital signals and well being of the responders. These connected devices or the so-called IoT surrounding public safety responders generate highly vulnerable...
56 CitationsSource
Nov 3, 2015 in NSS (Network and System Security)
#1Duane Wilson (Johns Hopkins University)H-Index: 2
#2Giuseppe Ateniese (Sapienza University of Rome)H-Index: 42
PGP is built upon a Distributed Web of Trust in which a user’s trustworthiness is established by others who can vouch through a digital signature for that user’s identity. Preventing its wholesale adoption are a number of inherent weaknesses to include (but not limited to) the following: 1) Trust Relationships are built on a subjective honor system, 2) Only first degree relationships can be fully trusted, 3) Levels of trust are difficult to quantify with actual values, and 4) Issues with the Web...
27 CitationsSource
Nov 3, 2015 in NSS (Network and System Security)
#1Zhiguo Wan (Singapore Management University)H-Index: 1
#2Robert H. Deng (Singapore Management University)H-Index: 50
Last. David Kuo Chuen Lee (Singapore Management University)H-Index: 6
view all 3 authors...
Electronic contract signing allows two potentially dis-trustful parties to digitally sign an electronic document “simultaneously” across a network. Existing solutions for electronic contract signing either require the involvement of a trusted third party (TTP), or are complex and expensive in communication and computation. In this paper we propose an electronic contract signing protocol between two parties with the following advantages over existing solutions: 1) it is practical and scalable due...
7 CitationsSource
Oct 25, 2015 in VizSEC (Visualization for Computer Security)
#1Giuseppe Di Battista (Roma Tre University)H-Index: 38
#2Valentino Di Donato (Roma Tre University)H-Index: 3
Last. Roberto Tamassia (Brown University)H-Index: 54
view all 6 authors...
Bitcoin is a digital currency whose transactions are stored into a public ledger, called blockchain, that can be viewed as a directed graph with more than 70 million nodes, where each node represents a transaction and each edge represents Bitcoins flowing from one transaction to another one. We describe a system for the visual analysis of how and when a flow of Bitcoins mixes with other flows in the transaction graph. Such a system relies on high-level metaphors for the representation of the gra...
21 CitationsSource
Oct 12, 2015 in CCS (Computer and Communications Security)
#1Loi Luu (NUS: National University of Singapore)H-Index: 9
#2Jason Teutsch (NUS: National University of Singapore)H-Index: 9
Last. Prateek Saxena (NUS: National University of Singapore)H-Index: 30
view all 4 authors...
Cryptocurrencies like Bitcoin and the more recent Ethereum system allow users to specify scripts in transactions and contracts to support applications beyond simple cash transactions. In this work, we analyze the extent to which these systems can enforce the correct semantics of scripts. We show that when a script execution requires nontrivial computation effort, practical attacks exist which either waste miners' computational resources or lead miners to accept incorrect script results. These at...
84 CitationsSource
Sep 21, 2015 in IWSEC (International Workshop on Security)
#1Christopher Mann (University of Bonn)H-Index: 2
#2Daniel Loebenberger (University of Bonn)H-Index: 4
We show how to realize two-factor authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter 2004 in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification over a separate channel. Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and ...
9 CitationsSource
Sep 21, 2015 in ESORICS (European Symposium on Research in Computer Security)
#1Christian Decker (ETH Zurich)H-Index: 9
#2James Guthrie (ETH Zurich)H-Index: 2
Last. Roger Wattenhofer (ETH Zurich)H-Index: 70
view all 4 authors...
Bitcoin exchanges are a vital component of the Bitcoin ecosystem. They are a gateway from the classical economy to the cryptocurrency economy, facilitating the exchange between fiat currency and bitcoins. However, exchanges are also single points of failure, operating outside the Bitcoin blockchain, requiring users to entrust them with their funds in order to operate. In this work we present a solution, and a proof-of-concept implementation, that allows exchanges to prove their solvency, without...
9 CitationsSource
Aug 1, 2015 in BDCloud (International Conference on Big Data and Cloud Computing)
#1Junichi Kishigami (MuIT: Muroran Institute of Technology)H-Index: 1
#2Shigeru Fujimura (NTT: Nippon Telegraph and Telephone)H-Index: 6
Last. Akihiko Akutsu (NTT: Nippon Telegraph and Telephone)H-Index: 1
view all 5 authors...
The blockchain-based digital content distribution system was developed. Decentralized and pear-to-pear authentication mechanism can be considered as the ideal rights management mechanism. The blockchain has the potential to realize this ideal content distribution system. This is the successful model of the Superdistribution concept which was announced almost 30 years ago. The proposed system was demonstrated and got a lot of feedback for the future practical system.
43 CitationsSource
Aug 24, 2015 in TRUST (Trust and Trustworthy Computing)
#1Frederik Armknecht (UMA: University of Mannheim)H-Index: 24
#2Ghassan O. KarameH-Index: 21
Last. Erik Zenner (University of Applied Sciences Offenburg)H-Index: 12
view all 5 authors...
Ripple is a payment system and a digital currency which evolved completely independently of Bitcoin. Although Ripple holds the second highest market cap after Bitcoin, there are surprisingly no studies which analyze the provisions of Ripple.
36 CitationsSource
Cited By289
Abstract Blockchain's ability to increase the level of disintermediation in tourism represents this technology's most effective influence on the industry. The advent of online travel agencies has changed tourism's market structure by transferring power from suppliers to consumers. This paper aims to develop a blockchain-based framework for the tourism industry by employing a qualitative method that uses the semi-structured interview to determine how domain experts conceive the future of intermed...
#1Suhyeon Kim (UNIST: Ulsan National Institute of Science and Technology)
#2Haecheong Park (UNIST: Ulsan National Institute of Science and Technology)
Last. Junghye Lee (UNIST: Ulsan National Institute of Science and Technology)H-Index: 4
view all 3 authors...
Abstract Blockchain has become one of the core technologies in Industry 4.0. To help decision-makers establish action plans based on blockchain, it is an urgent task to analyze trends in blockchain technology. However, most of existing studies on blockchain trend analysis are based on effort demanding full-text investigation or traditional bibliometric methods whose study scope is limited to a frequency-based statistical analysis. Therefore, in this paper, we propose a new topic modeling method ...
Abstract Traceability plays a vital role in food quality and safety management. Traditional Internet of Things (IoT) traceability systems provide the feasible solutions for the quality monitoring and traceability of food supply chains. However, most of the IoT solutions rely on the centralized server-client paradigm that makes it difficult for consumers to acquire all transaction information and to track the origins of products. Blockchain is a cutting-edge technology that has great potential fo...
Abstract With the development of financial market and various demands of customers, the traditional financial industry begins to change the business process, risk controlling and business models. FinTech appears and develops rapidly in various business models to solve problems in the financial markets. This paper analyzes 629 FinTech business model papers in the Web of Science database. First, we analyze the overall growth trend, research area, research institutions and core authors in the Finte...
#1Assunta Di Vaio (University of Naples Federico II)H-Index: 4
#2Luisa Varriale (University of Naples Federico II)H-Index: 4
Abstract This paper investigates the major implications of blockchain technology for operations management (OM) with a focus on the decision-making processes in supply chain management (SCM) from the perspective of sustainable performance. The links between blockchain technology, OM, and sustainability issues within SCM are analysed. This two-step research study includes a broad review of the main contributions in the literature that have focused on blockchain technology and OM in SCM. It covers...
2 CitationsSource
#1Kay Behnke (FrieslandCampina)H-Index: 1
#2Marijn Janssen (TU Delft: Delft University of Technology)H-Index: 43
Abstract Traceability of ingredients in food supply chains has become paramount in a world in which markets become global, heterogeneous, and complex and in which consumers expect a high level of quality. The food supply chain consists of many organizations having different interests and are often reluctant to share traceability information with each other. Blockchain has been advocated for improving traceability by providing trust. Yet, practice proved to be more stubborn. The goal of this pape...
3 CitationsSource
#1Shangrong Jiang (CAS: Chinese Academy of Sciences)
#2Xuerong Li (CAS: Chinese Academy of Sciences)
Last. Shouyang Wang (CAS: Chinese Academy of Sciences)H-Index: 1
view all 3 authors...
Abstract This paper examines the research hotspots and evolution trends of cryptocurrency-related papers published between 2009 and 2019, and identify the important journals, scholars and research findings by bibliometric analysis. The empirical results show that research priorities of cryptocurrency shift from underlying technology to economic applications currently. In addition, research institutions of cryptocurrency are mainly distributed in Europe and China with complementary research field...
#1Asem Abuelhija (JUST: Jordan University of Science and Technology)
#2Aiah Abudouleh (JUST: Jordan University of Science and Technology)
Last. Fahed Awad (JUST: Jordan University of Science and Technology)
view all 4 authors...
Blockchain and distributed ledger technologies have increasingly been gaining interest over the last few years. The promise of a completely secure environment for data to be stored has caught the attention of everyone, including individuals and institutions, who, in their turn, have started to invest generously in related research and development of such systems, especially those concerned with finance and crypto-currency. In this research, we focus on the applications beyond these topics, aimin...
#2Amit Kumar Tyagi (VIT University)H-Index: 1
Privacy and Trust are critical issues in automation systems/ transportation systems. Today’s Vehicle is need of everyone for moving one place to another. Together this, data security plays an important role in automation systems as critical user’s (vehicle’s user) data is moved to another user though internet with the help of wireless devices and routes which includes optical fiber, radio channels, etc. In fact, each and every device is connected to the internet and is linked to each other, thus...