Security Issues in Blockchain based Applications
Neha Jain
Neha Jain, Assistant Professor, SLRTCE Mumbai (Maharashtra), India.
Manuscript received on 28 September 2019 | Revised Manuscript received on 10 November 2019 | Manuscript Published on 22 November 2019 | PP: 890-896 | Volume-8 Issue-6S3 September 2019 | Retrieval Number: F11570986S319/19©BEIESP | DOI: 10.35940/ijeat.F1157.0986S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Data security is the key to the development of modern internet technology. By allowing digital information to be distributed but not copied, blockchain technology created the backbone of a new type of internet. It allows storage of all transactions into immutable records and every record distributed across many participant’s nodes. As there is huge increase in the use cases for blockchain technology, nowadays, the primary issue is to enable secure data sharing, data integrity and authentication. The goal of this study paper is to provide a systematic literature survey exploring the use of blockchain as a base technology for securing financial as well as non-financial applications. The purpose is to identify the whether blockchain technology is capable to provide the desired security solutions in various application. The advantages, challenges and the solution provided by previous research is discussed. The survey was focused on various security issues like Confidentiality, Integrity, Availability, Authenticity, Accountability, and Reliability. The study shows that the Blockchain technology is prospective for financial and non-financial services since it can provide solutions for majority of security issues. Future research needs to provide the implementations of desired solutions discussed in security challenges of Blockchain technology.
Keywords: Blockchain, Confidentiality, Integrity, Availability.
Scope of the Article: Image Security