| Literature DB >> 27695049 |
Jesse Yli-Huumo1, Deokyoon Ko2, Sujin Choi3, Sooyong Park2, Kari Smolander4.
Abstract
Blockchain is a decentralized transaction and data management technology developed first for Bitcoin cryptocurrency. The interest in Blockchain technology has been increasing since the idea was coined in 2008. The reason for the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third party organization in control of the transactions, and therefore it creates interesting research areas, especially from the perspective of technical challenges and limitations. In this research, we have conducted a systematic mapping study with the goal of collecting all relevant research on Blockchain technology. Our objective is to understand the current research topics, challenges and future directions regarding Blockchain technology from the technical perspective. We have extracted 41 primary papers from scientific databases. The results show that focus in over 80% of the papers is on Bitcoin system and less than 20% deals with other Blockchain applications including e.g. smart contracts and licensing. The majority of research is focusing on revealing and improving limitations of Blockchain from privacy and security perspectives, but many of the proposed solutions lack concrete evaluation on their effectiveness. Many other Blockchain scalability related challenges including throughput and latency have been left unstudied. On the basis of this study, recommendations on future research directions are provided for researchers.Entities:
Mesh:
Year: 2016 PMID: 27695049 PMCID: PMC5047482 DOI: 10.1371/journal.pone.0163477
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1The systematic mapping process.
Fig 2Building the classification scheme.
Data extraction items.
| # | Data item | Description |
|---|---|---|
| DI0 | Study identifier | Study id (e.g. ID01) |
| DI1 | Title | Title of the paper |
| DI2 | Authors | Name of the author(s) |
| DI3 | Country | Country of authors |
| DI4 | Publication info | Name of the publication place |
| DI5 | Publication type | Type of publication (e.g. conference/workshop/journal) |
| DI6 | Publication source | Academia / Industry |
| DI7 | Abstract | Abstract of the paper |
| DI8 | Study aim | Aim of the paper |
| DI9 | Research question/goal | Research questions/goals defined for the paper |
| DI10 | Study findings | Major findings of study |
Fig 3Search and selection process of the papers.
Fig 4Publication year of the selected primary papers.
Fig 5Source of the selected primary papers.
Fig 6Geographic distribution of the selected primary papers.
Fig 7Publication type.
Publication channels.
| Canadian Conference on Electrical and Computer Engineering (CCECE) | [ |
| International Conference on Information Systems Security (ICISS) | [ |
| International Workshop on Security and Trust Management (STM) | [ |
| International Conference on Applied Cryptography and Network Security (ACNS) | [ |
| International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) | [ |
| International Conference on Passive and Active Measurement (PAM) | [ |
| International Conference on Intelligence in Next Generation Networks (ICIN) | [ |
| International Conference on Financial Cryptography and Data Security (FC) | [ |
| European Symposium on Research in Computer Security (ESORICS) | [ |
| International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) | [ |
| International Cryptology Conference (CRYPTO) | [ |
| International Conference on Trust & Trustworthy Computing (TRUST) | [ |
| International Conference on Network and System Security (NSS) | [ |
| Book: Programming Languages with Applications to Biology and Security | [ |
| ACM Conference on Computer and Communications Security (ACM CCS) | [ |
| ACM Conference on Data and Application Security and Privacy (CODASPY) | [ |
| International Conference on Computational Science and Applications (ICCSA) | [ |
| eCrime Researchers Summit (eCRS) | [ |
| International Conference on Big Data and Cloud Computing (BDCloud) | [ |
| IEEE Symposium on Visualization for Cyber Security (VizSec) | [ |
| International Conference on Peer-to-Peer Computing (P2P) | [ |
| International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS) | [ |
| IEEE Micro Magazine | [ |
| International Workshop on Data Privacy Management (DPM) | [ |
Fig 8Classification of the relevant papers.
Fig 9Bitcoin related research.
Fig 10Paper types by year.
Fig 11Summary of the identified challenges and solutions of Blockchain.