An Experiment of a Parallel Entry Security Testing Approach using Ethereum Blockchain

An Experiment of a Parallel Entry Security Testing Approach using Ethereum Blockchain

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-11
Year of Publication : 2022
Authors : Mansi Bosamia, Dharmendra Patel
DOI : 10.14445/22315381/IJETT-V70I11P232

How to Cite?

Mansi Bosamia, Dharmendra Patel, "An Experiment of a Parallel Entry Security Testing Approach using Ethereum Blockchain," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 295-304, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I11P232

Abstract
The blockchain has had a greater interest in research and the Technical Industry regarding security testing in recent years. A parallel entry security testing approach uses time and security for security enhancement testing. The first entry tests for a normal wallet with basic security, while the other one uses an Ethereum wallet with a Merkel hash tree and Smart Contract. This approach is tested for 100 users and more than 20,000 transactions which shows that Ethereum transactions are faster and more secure using Merkle Hash Tree, while Normal transactions are slower and less secure. Only secure transactions are recorded in the database others are rejected. Thus, the digital wallet security is enhanced using Merkel Hash Tree with an average running time of 1.39.

Keywords
Bitcoin, Blockchain, Ethereum, Merkle Hash Tree, Smart Contract.

Reference
[1] J. P. M. Cruz, “The Bitcoin Network as Platform for Role-Based Access Control And Electronic Voting Using Blockchain-Based Technology to Create Innovative Systems,” Doctoral Dissertation, Nara Institute of Science and Technology, 2017. Crossref, https://doi.org/10.34413/dr.01404
[2] Decker C, "On the Scalability and Security of Bitcoin,” Doctoral Dissertation, ETH Zurich, 2016. https://doi.org/10.3929/ethz-a-010619000
[3] Daswani N, Boneh D, Garcia-Molina H, Ketchpel S. P and Paepcke A, "SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations," In USENIX Workshop on Electronic Commerce, 1998.
[4] Bosamia M and Patel D, "Comparisons of Blockchain-Based Consensus Algorithms for Security Aspects," International Journal on Emerging Technologies, vol. 11, no. 3, pp. 427-434, 2020.
[5] Wood G, “Ethereum: A Secure Decentralised Generalised Transaction Ledger,” Ethereum Project Yellow Paper, vol. 151, pp. 1-32, 2014.
[6] Hamida E. B, Brousmiche K. L, Levard H and Thea E, “Blockchain for Enterprise: Overview, Opportunities and Challenges,” In the Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), 2017. https://hal.archives-ouvertes.fr/hal-01591859
[7] Bashir I, “Mastering Blockchain: Distributed Ledger Technology, Decentralization, and Smart Contracts Explained,” 2nd Edition, ISBN: 978-1788839044, 2018.
[8] Zheng Z, Xie S, Dai H. N, Chen X, and Wang H, “Blockchain Challenges and Opportunities: A Survey,” International Journal of Web and Grid Services, vol. 14, no. 4, pp. 352-375, 2018. Crossref, https://doi.org/10.1504/IJWGS.2018.10016848
[9] Kulkarni S, "The Beauty of the Blockchain," Open Source for you, the Complete Magazine on Open Source, vol. 6, no. 8, pp. 22-24, 2018.
[10] Mattila J, “The Blockchain Phenomenon,” Berkeley Roundtable of the International Economy, Working Paper, 2016. [Online]. Available: http://brie.berkeley.edu/BRIE/
[11] Yaga D, Mell P, Roby N, and Scarfone K, “Blockchain Technology Overview," 2019. arXiv preprint arXiv:1906.11078.
[12] Aixa D. R, "Analysis and Study of Data Security in the Internet of Things Paradigm from a Blockchain Technology Approach," Blockchain Technologies and Application, 2018. [Online]. Available: http://hdl.handle.net/10609/72949.
[13] Jiang H, Liu D, Ren Z, & Zhang T, "Blockchain in the Eyes of Developers,” ArXiv preprint arXiv:1806.07080, 2018. Crossref, https://doi.org/10.6028/NIST.IR.8202
[14] Satish Chandra Gullena, “Iot Architectures Based on Blockchain Technologies,” International Journal of Computer Sciences and Engineering, vol. 6, no. 7, pp. 874-878, 2018.
[15] Baliga A, "Understanding Blockchain Consensus Models," Persistent 4, pp. 1-14, 2017. [Online]. Available: https://www.linkedin.com/pulse/understanding-blockchain-consensus-models-arati-baliga
[16] Zheng Z, Xie S, Dai H, Chen X, Wang H, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” In 2017 IEEE international congress on big data, BigData Congress, IEEE, 2017. Crossref, https://doi.org/10.1109/BigDataCongress.2017.85
[17] Sankar L. S, Sindhu M, and Sethumadhavan M, “Survey of Consensus Protocols on Blockchain Applications,” In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, pp. 1-5, 2017. Crossref, https://doi.org/10.1109/ICACCS.2017.8014672
[18] Shah T, and Jani S, "Applications of Blockchain Technology in Banking & Finance," Parul University, 2018. Crossref, https://doi.org/10.13140/RG.2.2.35237.96489
[19] Sajana P, Sindhu M and Sethumadhavan M, "On Blockchain Applications Hyperledger Fabric and Ethereum," International Journal of Pure and Applied Mathematics, vol. 118, no. 18, pp. 2965-2970, 2018.
[20] Chan W and Olmsted A, “Ethereum Transaction Graph Analysis,” 12th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 498-500, 2017. Crossref, https://doi.org/10.23919/ICITST.2017.8356459
[21] Gencer A. E, Basu S, Eyal I, Renesse R. V, and Sirer E. G, “Decentralization in Bitcoin and Ethereum Networks,” In International Conference on Financial Cryptography and Data Security, Springer, pp. 439-457, 2018.
[22] Vujičić D, Jagodić D and Ranđić S, "Blockchain Technology, Bitcoin, and Ethereum: A Brief Overview," In 2018 17th International Symposium Infoteh-Jahorina (Infoteh), IEEE, pp. 1-6, 2018. Crossref, https://doi.org/10.1109/INFOTEH.2018.8345547
[23] Dannen C, "Introducing Ethereum and Solidity," Berkeley Apress, 1st Edition, ISBN: 978-1-4842-2535-6, 2017.
[24] Blockchain and Payment. [Online]. Available: https://in.linkedin.com/in/ramalingom-sundaram-pillai-343a13120
[25] Understanding the DAO Attack. [Online]. Available: http://www.coindesk.com/understanding-dao-hack-journalists/
[26] Christidis K and Devetsikiotis M, "Blockchains and Smart Contracts for the Internet of Things," IEEE Access, vol. 4, pp. 2292-2303, 2016. Crossref, https://doi.org/10.1109/ACCESS.2016.2566339
[27] Buterin V, “A Next-Generation Smart Contract and Decentralized Application Platform,” Ethereum White Paper, vol. 3, no. 37, pp. 1-2, 2014.
[28] Young A, Chapman P and Berardy R, U.S. Patent Application No. 09/728,471, "System and Method for Performing an Electronic Transaction Using a Transaction Proxy with an Electronic Wallet," 2002. [Online]. Available: https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2001041419
[29] Bhite N and Sharma M. A, "The Algorithm Analysis of Electronic Payment Systems,” International Journal of Scientific Engineering and Research, vol. 4, no. 9, pp. 4-6, 2016.
[30] R. Sujeetha and C. A. S. Deiva Preetha, “Analysis on Mutation Testing Tools for Smart Contracts,” International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 280-289, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I9P228
[31] P. Thirugnanam, M. Pavithra and B.Akoramurthy, “Decentralized Server Using Bitcoin Cryptography and Bittorret Network,” International Journal of Engineering Trends and Technology, vol. 45, no. 1, pp. 10-13, 2017. Crossref, https://doi.org/10.14445/22315381/IJETT-V45P203