Page 52 - ITUJournal Future and evolving technologies Volume 2 (2021), Issue 1
P. 52

ITU Journal on Future and Evolving Technologies, Volume 2 (2021), Issue 1




          blockchain types. We then de ine user and business pri‑  in the network. After the other nodes validate that block,
          vacy within the context of PCNs and discuss possible at‑  the next block calculation starts.
          tacks on the privacy of the participants. Speci ically, we  Therefore, the cohort of independent participants turns
          came up with novel privacy risks speci ic to PCNs. Utiliz‑  blockchain into a liberated data/asset management tech‑
          ing these attack scenarios, we later survey and evaluate  nology free of trusted third parties.
          thoroughly the existing PCNs in terms of their privacy ca‑
          pabilities based on certain metrics. This is a novel quali‑      Block-(X+1) Header  Block-(X+2) Header
          tative evaluation to be able to compare what each PCN is         Previous  Nonce  Previous  Nonce
                                                                           Hash
                                                                                            Hash
          offering in terms of its privacy features. Finally, we offer  Block-(X)  Merkle  Timestamp  Merkle  Timestamp  Block-(X+3)
          potential future research issues that can be further inves‑      Root             Root
          tigated in the context of PCN privacy. Our work not only         List of Transactions  List of Transactions
          is the  irst to increase awareness regarding privacy issues         (X+1)           (X+2)
          in the emerging realm of PCNs but also will help practi‑
          tioners on selecting the best PCN for their needs.               Fig. 1 – Blocks connected with hash.
          The paper is organized as follows: Section 2 gives an
          introductory background. Next, Section 3 categorizes  2.2 Cryptocurrency
          the PCNs in light of common network architectures and
          blockchain types. In Section 4 we de ine user and busi‑  Although it  inds many areas, the most commonly used
          ness privacy, discuss possible attacks on the privacy of  application of blockchain technology is cryptocurrencies.
          the participants in the PCNs, and present an evaluation  A cryptocurrency is a cryptographically secure and veri‑
          of state‑of‑the‑art solutions for what they offer in terms   iable currency that can be used to purchase goods and
          of privacy. Section 5 offers directions about the future re‑  services. In this paper, we will use cryptocurrency and
          search on privacy in PCNs and Section 6 concludes the pa‑  money interchangeably.
          per.                                                 Blockchain technology undoubtedly changed the way
                                                               data can be transferred, stored, and represented.
          2.  BACKGROUND                                       Nonetheless, making a consensus on the  inal state of a
                                                               distributed ledger has drawbacks. The  irst drawback
          2.1 Blockchain                                       is long transaction con irmation times. For example, in
                                                               Bitcoin, a block is generated about every 10 minutes. As a
          Blockchain is the underlying technology in cryptocur‑  heuristic Bitcoin users wait for 6 blocks for the  inality of
          rency, that brings a new distributed database which is a  a transaction which yields around 60 minutes of waiting
          public, transparent, persistent, and append‑only ledger  time for  inalizing a transaction. In Ethereum, the time
          co‑hosted by the participants. With various cryptographi‑  between blocks is shorter but users wait 30 consecutive
          cally veri iable methods, called Proof‑of‑X (PoX), each par‑  blocks which yield 10‑15 minutes of waiting time. Note
          ticipant in the network holds the power of moderation  that, as a block is limited in size, not only the throughput
          of the blockchain [6]. As an example, being the  irst in‑  will be limited, but also the total waiting time for the
          vented and largest cryptocurrency, Bitcoin and the sec‑  users will be longer during the congested times of the
          ond largest one, Ethereum, which jointly hold 75% of to‑  transfer requests. Nevertheless, if a user is in a hurry
          tal market capitalization in the cryptocurrency world, uti‑  for approval of a transaction, it will need to pay larger
          lize a proof‑of‑work (PoW) mechanism where a partici‑  fees to the miners than what its competitors do. This
          pant has to  ind a “block‑hash‑value” smaller than a jointly  brings us the second drawback of using blockchain for
          agreed number. A block is an element with a limited size  cryptocurrency. The miner nodes, which generate and
          that stores the transaction information. Each block holds  approve blocks, get fees from the users to include their
          the hash of the preceding block which in the long run  transactions in blocks. The fee amount is independent of
          forms a chain of blocks, called, the blockchain. A block
                                                               the amount being transacted. During highly congested
          is simply comprised of transactions (data), timestamp,
                                                               times, to make a larger pro it, miners will be extremely
          nonce, the hash of the block and the hash of the previous
                                                               selective in picking the requests from the transaction
          block[1] as shown in Fig. 1. The hash of the transaction is  request pool (mempool). So when there is congestion, a
          inserted into a Merkle tree which enables users to easily  payer either has to offer more fees or she/he has to wait
          verify whether a transaction is in the block or not. “Who‑  more so that a miner picks her/his transaction request.
          owns‑what” information is embedded in the blockchain
          as transaction information.
                                                               2.3 Smart contracts
          In order for a block to be accepted as valid, the hash
          of the block should be smaller than a number which is  The ability to employ smart contracts is another feature
          decided by considering the total accumulated computa‑  that makes blockchain an unorthodox asset management
          tional powerin theentire network. Bychanging the nonce  technology. Smart contracts are scripts or bytecodes,
          value in the block, the miner aims to  ind a suitable hash  which de ine how transactions will take place based on
          result. Soon after a valid block is found, it gets distributed  the future events de ined within the contract. The join‑





          36                                 © International Telecommunication Union, 2021
   47   48   49   50   51   52   53   54   55   56   57