Design and Implementation of Digital Currency Transaction Security Mechanism Based on Block Chain
Abstract
This paper comprehensively discusses the security mechanism of blockchain-based digital currency transactions, from the application of distributed ledgers, consensus algorithms, smart contracts, to the implementation of multiple signatures and cold storage schemes, to advanced privacy protection technologies, such as zero-knowledge proofs and homomorphic encryption. In particular, we delve into innovative mechanisms for attack prevention, including the fusion of heterogeneous multi-chain architectures with PoW+PoS hybrid consensus models. The article also details the practice of performance evaluation and security testing through a series of carefully designed experiments such as throughput and latency testing under different loads, resource utilization monitoring, and security reviews and comparisons with competitors. Experimental results show that the system exhibits good throughput growth under high load, but with the increase of latency, resource utilization is efficient and tends to saturation, most of the security protection mechanisms meet the standards, but access control problems that need to be optimized and high-risk vulnerabilities to be repaired are also found.References
Meenakshi K, Rekha KS. An enhanced security system using blockchain technology for strong FMC relationship. Intelligent Automation and Soft Computing. 2023; 35(1):111-28.
Chicarino V, Albuquerque C, Jesus E, Rocha A. On the detection of selfish mining and stalker attacks in blockchain networks. Annals of Telecommunications. 2020; 75(3-4):143-52.
Alharby M. Transaction latency within permissionless blockchains: analysis, improvement, and security considerations. Journal of Network and Systems Management. 2023; 31(1).
Khan KM, Arshad J, Khan MM. Empirical analysis of transaction malleability within blockchain-based e-Voting. Computers & Security. 2021; 100.
Xiao K, Li JY, He YH, Wang X, Wang C. A secure multi-party payment channel on-chain and off-chain supervisable scheme. Future Generation Computer Systems-the International Journal of Escience. 2024; 154: 330-43.
Zhang JX, Yan LXM. A quantitative diary study of perceptions of security in mobile payment transactions. Behaviour & Information Technology. 2021; 40(15):1579-602.
Economou EML, Kyriazis NA. Achieving sustainable financial transactions under regimes without a central bank-an intertemporal comparison. Sustainability. 2021; 13(3): 1071.
La HJ, Kim SD. A machine learning framework for adaptive Fintech security provisioning. Journal of Internet Technology. 2018; 19(5):1545-53.
Hong HS, Sun ZX. A secure peer to peer multiparty transaction scheme based on blockchain. Peer-to-Peer Networking and Applications. 2021; 14(3):1106-17.
Pon P, Kavitha V. Blockchain based cloud service security architecture with distributed machine learning for smart device traffic record transaction. Concurrency and Computation-Practice & Experience. 2022; 34(3): e683.
Anagnostakis AG, Giannakeas N, Tsipouras MG, Glavas E, Tzallas AT. IoT Micro-Blockchain fundamentals. Sensors. 2021; 21(8): 2784.
Rehman S, Khan B, Arif J, Ullah Z, Aljohani AJ, Alhindi A, Ali SM. Bi-Directional mutual energy trade between smart grid and energy districts using renewable energy credits. Sensors. 2021; 21(9): 3088.
Su JQ, He L, Ren RT, Liu QL. Reliable blockchain-based ring signature protocol for online financial transactions. Ksii Transactions on Internet and Information Systems. 2023; 17(8):2083-100.
Luo M, Zhou J, Yang P. RATS: A regulatory anonymous transaction system based on blockchain. Journal of Parallel and Distributed Computing. 2023; 182: 104751.
Fan HL. The digital asset value and currency supervision under deep learning and blockchain technology. Journal of Computational and Applied Mathematics. 2022; 407: 114061.
Umar A, Kumar D, Ghose T. Blockchain-based decentralized energy intra-trading with battery storage flexibility in a community microgrid system. Applied Energy. 2022; 322: 119544.
Cheng JR, Zhang Y, Yuan YM, Li H, Tang XY, Sheng VS, Hu GJ. PoEC: a cross-blockchain consensus mechanism for governing blockchain by blockchain. Cmc-Computers Materials & Continua. 2022; 73(1):1385-402.
Yi Y. Application of blockchain technology based on privacy data protection in RMB internationalization path. Mobile Information Systems. 2022.
Sun G, Dai M, Sun J, Yu HF. Voting-Based decentralized consensus design for improving the efficiency and security of consortium blockchain. IEEE Internet of Things Journal. 2021; 8(8):6257-72.
Attarian R, Hashemi S. An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions. Computer Networks. 2021; 190: 107976.
Khan HU, Sohail M, Nazir S, Hussain T, Shah BB, Ali F. Role of authentication factors in Fin-tech mobile transaction security. Journal of Big Data. 2023; 10(1): 138.
Wei Q, Li BZ, Chang WL, Jia ZP, Shen ZY, Shao ZL. A survey of blockchain data management systems. ACM Transactions on Embedded Computing Systems. 2022; 21(3): 1-28.
Geng ZQ, Cao Y, Li J, Han YM. Novel blockchain transaction provenance model with graph attention mechanism. Expert Systems with Applications. 2022; 209: 118411.
Zhang JY, Zhou P, Wang J, Alfarraj O, Singh S, Zhu M. A novel high-efficiency transaction verification scheme for blockchain systems. Computer Modeling in Engineering & Sciences. 2024; 139(2):1613-33.
Li XY, Zheng ZB, Dai HN. When services computing meets blockchain: Challenges and opportunities. Journal of Parallel and Distributed Computing. 2021; 150: 1-14.
Dai WQ, Wang QY, Wang ZL, Lin XB, Zou DQ, Jin H. Trustzone-based secure lightweight wallet for hyperledger fabric. Journal of Parallel and Distributed Computing. 2021; 149: 66-75.
Kotey SD, Tchao ET, Ahmed AR, Agbemenu AS, Nunoo-Mensah H, Sikora A, et al. Blockchain interoperability: the state of heterogenous blockchain-to-blockchain communication. IET Communications. 2023; 17(8): 891-914.
Maldonado-Ruiz D, Pulval-Dady A, Shi YL, Wang Z, El Madhoun N, Torres J. NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype. Annals of Telecommunications. 2024; 1-19.
Shamieh F, Wang XB, Hussein AR. Transaction throughput provisioning technique for blockchain-based industrial IoT networks. IEEE Transactions on Network Science and Engineering. 2020; 7(4):3122-34.
Wang ZQ, Ni AF, Tian ZQ, Wang ZY, Gong YG. Research on blockchain abnormal transaction detection technology combining CNN and transformer structure. Computers & Electrical Engineering. 2024; 116: 108194.
DOI:
https://doi.org/10.31449/inf.v49i5.7101Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







