Blockchain Security Threats, Attacks and Countermeasures

  • Shams Tabrez Siddiqui
  • Riaz Ahmad
  • Mohammed Shuaib
  • Shadab Alam
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1097)


This paper is about the information security and solution to it by the use of blockchain implementation in data security. Blockchain security implementations mostly witnessed in sensitive information systems, like the financial database. Furthermore, in this research paper, threats to computers and information systems are highlighted and analyzed as well as solutions to them are elaborated. The paper majorly based on the step-by-step solution to the threats to the information systems by blockchain technology. This paper systematically covers various risks aspects, demonstrates different attacks and discusses the challenges faced while incorporating blockchain technology for securing the system.


Blockchain Threats Attacks Security 


  1. 1.
    Latifa, E.R., and A. Omar. 2017. Blockchain: Bitcoin wallet cryptography security, challenges and countermeasures. Journal of Internet Banking and Commerce 22 (3): 1–29.Google Scholar
  2. 2.
    Karame, G. 2016. On the security and scalability of bitcoin’s blockchain. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, 1861–1862. ACM.Google Scholar
  3. 3.
    Zyskind, G., and O. Nathan. 2015. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE, 180–184.Google Scholar
  4. 4.
    Karame, G.O., and E. Androulaki. Bitcoin and blockchain security. Artech House.Google Scholar
  5. 5.
    Pilkington, M. 2016. 11 Blockchain technology: principles and applications. Research Handbook on Digital Transformations 225.Google Scholar
  6. 6.
    Shrier, D., W. Wu, and A. Pentland. 2016. Blockchain & infrastructure (identity, data security). MIT Connection Science 1–18.Google Scholar
  7. 7.
    Weimer, J., an R. Fox. 2017. U.S. Patent Application No. 15/626,054.Google Scholar
  8. 8.
    Cachin, C. 2017. Blockchain and consensus protocols: Snake oil warning. In 2017 IEEE 13th European Dependable Computing Conference (EDCC), 1–2. IEEE.Google Scholar
  9. 9.
    Idelberger, F., G. Governatori, R. Riveret, and G. Sartor. 2016. Evaluation of logic-based smart contracts for blockchain systems. In International symposium on rules and rule markup languages for the semantic web, 167–183. Springer, Cham.Google Scholar
  10. 10.
    Heilman, E., A. Kendler, A. Zohar, and S. Goldberg. 2015. Eclipse attacks on bitcoin’s peer-to-peer network. In USENIX security symposium, 129–144.Google Scholar
  11. 11.
    Alam, S., S.T. Siddiqui, F. Masoodi, & M. Shuaib. 2018. Threats to information security on cloud: Implementing blockchain. In 3rd International conference on SMART computing and Informatics (SCI), Kalinga Institute of Industrial Technology, Odisha. Springer.Google Scholar
  12. 12.
    Tosh, D.K., S. Shetty, X. Liang, C.A. Kamhoua, K.A. Kwiat, and L. Njilla. 2017. Security implications of blockchain cloud with analysis of block withholding attack. In Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing, 458–467. IEEE Press.Google Scholar
  13. 13.
    Crosby, M., P. Pattanayak, S. Verma, and V. Kalyanaraman. 2016. Blockchain technology: Beyond bitcoin. Applied Innovation 2: 6–10.CrossRefGoogle Scholar
  14. 14.
    Eyal, I., and E.G. Sirer. 2018. Majority is not enough: bitcoin mining is vulnerable. Communications of the ACM, 61 (7): 95–102.Google Scholar
  15. 15.
    Wright, A., and P. De Filippi. 2015. Decentralized blockchain technology and the rise of lex cryptography.Google Scholar
  16. 16.
    Aitzhan, N.Z., and D. Svetinovic. 2016. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Transactions on Dependable and Secure Computing.Google Scholar
  17. 17.
    Kiayias, A., and G. Panagiotakos. 2015. Speed-security tradeoffs in blockchain protocols. IACR Cryptology ePrint Archive.Google Scholar
  18. 18.
    Lim, I.K., Y.H. Kim, J.G. Lee, J.P. Lee, H. Nam-Gung, and J.K. Lee. The analysis and countermeasures on security breach of bitcoin. In International conference on computational science and its applications, 20–732. Springer, Cham.Google Scholar
  19. 19.
    Biswas, K., and V. Muthukkumarasamy. 2016. Securing smart cities using blockchain technology. In 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 1392–1393. IEEE.Google Scholar
  20. 20.
    Yli-Huumo, J., D. Ko, S. Choi, S. Park, and K. Smolander. 2016. Where is current research on blockchain technology? A systematic review. PLoS One 11 (10): e0163477.CrossRefGoogle Scholar
  21. 21.
    Gupta, A.K., S.T. Siddiqui, S. Alam, and M. Shuaib. 2019. Cloud computing security using blockchain. Journal of Emerging Technologies and Innovative Research.Google Scholar
  22. 22.
    Lin, I.C., and T.C. Liao. 2017. A survey of blockchain security issues and challenges. IJ Network Security 19 (5): 653–659.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Shams Tabrez Siddiqui
    • 1
  • Riaz Ahmad
    • 2
  • Mohammed Shuaib
    • 1
  • Shadab Alam
    • 1
  1. 1.Department of Computer ScienceJazan UniversityJizanSaudi Arabia
  2. 2.Department of Computer ScienceAligarh Muslim UniversityAligarhIndia

Personalised recommendations