Movatterモバイル変換


[0]ホーム

URL:


skip to main content
10.1145/2976749.2989059acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
ccs

Export Citations

    • Please download or close your previous search result export first before starting a new bulk export.
      Preview is not available.
      By clicking download,a status dialog will open to start the export process. The process may takea few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress.

    POSTER:I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store

    Published:24 October 2016Publication History
    Metrics
    Total Citations22
    Total Downloads733
    Last 12 Months11
    Last 6 weeks0

    New Citation Alert added!

    This alert has been successfully added and will be sent to:

    You will be notified whenever a record that you have chosen has been cited.

    To manage your alert preferences, click on the button below.

    Manage my Alerts

    New Citation Alert!

    Abstract

    Bitcoin has revolutionized digital currencies and its underlying blockchain has been successfully applied to other domains. To be verifiable by every participating peer, the blockchain maintains every transaction in a persistent, distributed, and tamper-proof log that every participant needs to replicate locally. While this constitutes the central innovation of blockchain technology and is thus a desired property, it can also be abused in ways that are harmful to the overall system. We show for Bitcoin that blockchains potentially provide multiple ways to store (malicious and illegal) content that, once stored, cannot be removed and is replicated by every participating user. We study the evolution of content storage in Bitcoin's blockchain, classify the stored content, and highlight implications of allowing the storage of arbitrary data in globally replicated blockchains.

    References

    [1]
    M. Ali, J. Nelson, R. Shea, and M. J. Freedman. Blockstack: A Global Naming and Storage System Secured by Blockchains. In USENIX ATC, 2016.
    [2]
    Bitcoin Wiki. Illegal content in the block chain. rhttps://en.bitcoin.it/wiki/Weaknesses.
    [3]
    Bitcoin Wiki. Transaction. rhttps://en.bitcoin.it/wiki/Transaction.
    [4]
    Bitnodes. Global Bitcoin Nodes Distribution. rhttps://bitnodes.21.co.
    [5]
    Blockchain.info. Bitcoin Charts. rhttps://blockchain.info/charts.
    [6]
    CoinMarketCap. Crypto-Currency Market Capitalizations. rhttps://coinmarketcap.com.
    [7]
    I. Eyal and E. G. Sirer. Majority is not enough: Bitcoin mining is vulnerable. In FC, 2014.
    [8]
    E. McReynolds, A. Lerner, W. Scott, F. Roesner, and T. Kohno. Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions. In Financial Cryptography and Data Security. 2015.
    [9]
    S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008.
    [10]
    Pseudonymous "Hyena". Bitcointalk Forum.sloppyrhttps://bitcointalk.org/index.php?topic=524877.msg9173767.
    [11]
    K. Shirriff. Hidden surprises in the Bitcoin blockchain and how they are stored: Nelson Mandela, Wikileaks, photos, and Python software. rhttp://www.righto.com/2014/02/ascii-bernanke-wikileaks-photographs.html.
    [12]
    A. Taaki. Bitcoin BIP 1. rhttps://github.com/bitcoin/bips/blob/master/bip-0001.mediawiki, 2011.
    [13]
    G. Wood. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper, 2016.
    [14]
    J. H. Ziegeldorf, F. Grossmann, M. Henze, N. Inden, and K. Wehrle. Coinparty: Secure multi-party mixing of bitcoins. In ACM CODASPY, 2015.
    [15]
    J. H. Ziegeldorf, R. Matzutt, M. Henze, F. Grossmann, and K. Wehrle. Secure and anonymous decentralized Bitcoin mixing. Future Generation Computer Systems, 2016.

    Cited By

    View all
    • Lu XHou YZou JLiu JLu X(2025)Supporting Self-Management Redactable Blockchain With Double-Auditability and Revocability for IoTIEEE Transactions on Network Science and Engineering10.1109/TNSE.2025.352903012:2(1383-1395)Online publication date: Mar-2025
    • Liang QShi NTan YLi CLiang C(2024)A Stealthy Communication Model with Blockchain Smart Contract for Bidding SystemsElectronics10.3390/electronics1313252313:13(2523)Online publication date: 27-Jun-2024
    • Tian YLiu BLi YSzalachowski PZhou J(2024)Accountable Fine-Grained Blockchain Rewriting in the Permissionless SettingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334091719(1756-1766)Online publication date: 2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
    October 2016
    1924 pages
    ISBN:9781450341394
    DOI:10.1145/2976749
    Copyright © 2016 Owner/Author.
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 October 2016

    Check for updates

    Author Tags

    1. arbitrary content
    2. bitcoin
    3. blockchain technology
    4. censorship resistency
    5. measurement
    6. peer-to-peer protocols

    Qualifiers

    • Poster

    Funding Sources

    • German Federal Ministry of Education and Research (BMBF)

    Conference

    CCS'16
    Sponsor:

    Acceptance Rates

    CCS '16 Paper Acceptance Rate 137 of 831 submissions, 16%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 May 2025

    Other Metrics

    Citations

    Cited By

    View all
    • Lu XHou YZou JLiu JLu X(2025)Supporting Self-Management Redactable Blockchain With Double-Auditability and Revocability for IoTIEEE Transactions on Network Science and Engineering10.1109/TNSE.2025.352903012:2(1383-1395)Online publication date: Mar-2025
    • Liang QShi NTan YLi CLiang C(2024)A Stealthy Communication Model with Blockchain Smart Contract for Bidding SystemsElectronics10.3390/electronics1313252313:13(2523)Online publication date: 27-Jun-2024
    • Tian YLiu BLi YSzalachowski PZhou J(2024)Accountable Fine-Grained Blockchain Rewriting in the Permissionless SettingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334091719(1756-1766)Online publication date: 2024
    • Melo DHernandez SRodríguez LPérez-Sansalvador J(2023)Bitcoin Transactions Types and Their Impact on Storage Scalability2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)10.1109/WETICE57085.2023.10477780(1-6)Online publication date: 14-Dec-2023
    • Liu QShen J(2023)K-time Redactable Blockchain with Decentralized History Rewriting2023 International Conference on Data Security and Privacy Protection (DSPP)10.1109/DSPP58763.2023.10404463(41-49)Online publication date: 16-Oct-2023
    • Abdelhamid MSliman LBen Djemaa RAit Salem B(2023)ABISchain: Towards a Secure and Scalable Blockchain Using Swarm-based PruningProceedings of the 2023 Australasian Computer Science Week10.1145/3579375.3579420(28-35)Online publication date: 30-Jan-2023
    • Li JMa HWang JSong ZXu WZhang R(2023)Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless BlockchainIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.324540618(1653-1666)Online publication date: 2023
    • Cheng JLi YYuan YZhang BXu X(2022)A Blockchain-Based Trust Model for Uploading Illegal Data IdentificationApplied Sciences10.3390/app1219965712:19(9657)Online publication date: 26-Sep-2022
    • Akrasi-Mensah NTchao ESikora AAgbemenu ANunoo-Mensah HAhmed AWelte DKeelson E(2022)An Overview of Technologies for Improving Storage Efficiency in Blockchain-Based IIoT ApplicationsElectronics10.3390/electronics1116251311:16(2513)Online publication date: 11-Aug-2022
    • Chen ZZhu LJiang PZhang CGao FHe JXu DZhang Y(2022)Blockchain Meets Covert Communication: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2022.320428124:4(2163-2192)Online publication date: Dec-2023
    • Show More Cited By

    View Options

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Copied!

    Copying failed.

    Share on social media

    Affiliations

    RomanMatzutt
    Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany
    OliverHohlfeld
    Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany
    MartinHenze
    Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany
    RobinRawiel
    Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany
    Jan HenrikZiegeldorf
    Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany
    KlausWehrle
    Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany
    View Table of Conten
    Your Search Results Download Request

    We are preparing your search results for download ...

    We will inform you here when the file is ready.

    Download now!
    Your Search Results Download Request

    Your file of search results citations is now ready.

    Download now!
    Your Search Results Download Request

    Your search export query has expired. Please try again.


    [8]ページ先頭

    ©2009-2025 Movatter.jp