Research Article
BibTex RIS Cite

Anonim Kriptoparaların Korelasyon Tabanlı Mahremiyet Analizi

Year 2021, Volume: 7 Issue: 1, 1 - 23, 07.07.2021
https://doi.org/10.18640/ubgmd.868876

Abstract

Satoshi Nakamoto Ocak 2009’da blokzincir teknolojisi ile beraber kriptopara kavramını ortaya atmış ve ilk kriptopara uygulaması olan Bitcoin’i yayınlamıştır [1]. Uzun yıllar boyunca Bitcoin açık anahtarlı adresleri kullandığı için anonimliği tamamıyla sağladığı düşünülmüştür. Ancak bu adresler herkese açık bir kayıt defterinde tutulduğundan dolayı Bitcoin anonim değildir. Herhangi bir Bitcoin adresinden yola çıkılarak o adresin tüm işlem geçmişini tespit etmek mümkündür. Bu nedenle zamanla anonim kriptoparlar yayınlanmıştır. Anonim kriptoparaların teoride matematiksel olarak tamamıyla anonim olduğunı belirtilir, ancak çeşitli sebeplerden dolayı teoride anonimliği yeteri kadar sağlayamazlar. Bu makalede Zcash, Dash ve Monero anonim kriptoparalarının gerçekten de pratikte iddia edildikleri kadar anonim olup olmadığını tespit etmek amacıyla korelasyon tabanlı mahremiyet analizleri yapılmıştır. Bu makaleyle beraber ilk defa Dash ve Monero anonim kriptoparaları için korelasyon tabanlı mahremiyet analizi çalışması yapılmıştır, Zcash için daha önce yapılan bir çalışma bulunmaktadır [2]. Zcash’in korumalı işlemleri %84.4 ve Dash’in ÖzelGönderim ile alakalı işlemleri %49.304 oranında ilişkilendirilebilmiştir. Monero işlemlerinin adres ve miktarları tamamen gizli olduğu için korelasyon tabanlı mahremiyet analizi gerçekleştirilememiştir.

References

  • Satoshi, N., Bitcoin: A peer-to-peer electronic cash system, https://bitcoin.org/, 1–9, 2008
  • Birkuyov A., Daniel, F., Deanonymization of Hidden Transactions in Zcash, University of Luxembourg, 1-15, 2018
  • TÜBİTAK BİLGEM UEKAE, Blokzincir, Blokzincir Araştırma Laboratuvarı, https://blokzincir.bilgem.tubitak.gov.tr/blok-zincir.html, Erişim: 2020-03-27
  • Birkuyov A., Dmitry K., Ivan P., Deanonymisation of Clients in Bitcoin P2P Network, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14), 15-29, 2014
  • Sarah M., Marjori P., Grant J., Kirill L., Damon M., Geoffrey M. V., Stefann, S., A fistful of bitcoins: Characterizing payments among men with no names, Proceedings of the 2013 conference on Internet measurement conference ACM, University of California and San Diego George Mason University New York USA, 127-140, 2013
  • Dorit, R., Adi S., Quantitative Analysis of the Full Bitcoin Transaction Graph, International Conference on Financial Cryptography and Data Security, The Weizmann Institute of Science Department of Computer Science and Applied Mathematics Israel, 6-24, 2013
  • Androulaki1 E., Karame G. O., Roeschlin1 M., Scherer1 T., Capkun1 S., Evaluating User Privacy in Bitcoin, International Conference on Financial Cryptography and Data Security, ETH Zurich 8092 Zuerich Switzerland ve NEC Laboratories Europe 69115 Heidelberg Germany, 34-51, 2013
  • Reid F., Harrigan M., An Analysis of Anonymity in the Bitcoin System 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, IEEE, Clique Research Cluster Complex & Adaptive Systems Laboratory UniversityCollege Dublin Ireland, 1318-1326, 2011
  • Spagnuolo M., Maggi F., Zanero S., BitIodine: Extracting Intelligence from the Bitcoin Network, International Conference on Financial Cryptography and Data Security, Springer Berlin Heidelberg, 457-468. 2014
  • KoshyEmail P., Koshy D., McDaniel P., An Analysis of Anonymity in Bitcoin Using P2P Network Traffic, International Conference on Financial Cryptography and DataSecurity FC 2014: Financial Cryptography and Data Security, Springer Berlin Heidelberg, 469-485, 2014.
  • Birkuyov A., Ivan, P.: Bitcoin over tor isn’t a good idea, IEEE, Symposiumon Security and Privacy SP 2015. 122-134. IEEE, University of Luxembourg, Esch-sur-Alzette, Luxemburg, 2015
  • Harry K., Steven G., Alishah C., Malte M., Arvind N., Blocksci: Design andapplications of a blockchain analysis platform, 29th {USENIX} Security Symposium ({USENIX} Security 20), Princeton University, 2721 – 2738, 2020
  • Atlas, K., An analysis of darkcoin’s blockchain privacy via darksend, 1–25, 2014
  • Abraham H., Bernhard H., An empirical analysis of monero cross-chain traceability, International Conference on Financial Cryptography and Data Security FC 2019: Financial Cryptography and Data Security, Austrian Institute of Technologyand Vienna University of Technology, 150 – 157, 2019
  • Möser M., Soska K., Heilman E., Lee K., Heffan H., Srivastava S., Hogan K., Hennessey J., Miller A., Narayanan A., Christin N., An empirical analysis of traceability in the monero blockchain, Proceedings on Privacy EnhancingTechnologies, Vol 2018, Iss 3, 143-163, 2018
  • Amrit K., Clement F., ToplePrateek S., A traceability analysis of monero’s blockchain, 22nd European Symposiumon Research in Computer Security Proceedings 2017, National University of Singapore, 153-173, 2017
  • Borggren N., Yoon Kim H., Yao L., Koplik G., Simulated blockchains for machinelearning traceability and transaction values in the monero network, Geometric Data Analytics Inc. Durham NC, 1–10, 2020
  • Kappos G., Yousaf H., Maller M., Meiklejohn S., An empirical analysis ofanonymity in zcash, 27th USENIX Security Symposium (USENIX Security’18), Cornell University - University College London, 1 – 15, 2018
  • Quesnelle J., On the linkability of zcash transactions, 27th USENIX SecuritySymposium (USENIX Security ’18), Cornell University Esch-sur-Alzette Luxemburg, 1 – 5, 2017
  • Erik D., Elias R., Florian T., Map-z: Exposing the zcash network in times of transition, IEEE, 44th Conference on Local Computer Networks (LCN), Cornell University Distributed Security Infrastructures Technical University of Berlin, 84 – 92, 2019
  • Kappos G., Piotrowska A. M., Extending the anonymity of zcash, Cornell University - University College London United Kingdom, 1 – 2, 2019
  • Alex B., Daniel F. Privacy and linkability of mining in zcash, IEEE, Conference on Communications and Network Security (CNS), University of Luxembourg Esch-sur-Alzette Luxemburg, 118 – 123, 2019
  • Alex B., Daniel F., Giuseppe V., Privacy aspects and subliminal channelsin zcash, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, University of Luxembourg Esch-sur-Alzette Luxemburg, 1813–1830 2019
  • Alex B., Sergei T., Deanonymization and linkability of cryptocurrency transactionsbased on network analysis, IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, , 172 – 184, 2019
  • Alex B., Sergei T., Transaction clustering using network traffic analysis for bitcoinand derived blockchains, INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019, University of Luxembourg Esch-sur-Alzette Luxemburg, 204 – 209, 2019,
  • Alex B., Sergei T., Security and privacy of mobile wallet users in bitcoin, dash,monero, and zcash. Elsevier University of Luxembourg Esch-sur-Alzette Luxemburg, 1 – 11, 2019
  • Bitcoin, Bitcoin’e başlarken, bitcoin.org, https://bitcoin.org/tr/, Erişim: 2020-03-27
  • Jong-Hyouk L., Rise of anonymous cryptocurrencies: Brief introduction, IEEEConsumer Electronics Magazine IEEE Consumer Electron. Mag. Consumer Elec-tronics Magazine, IEEE, SangmyungUniv. - Cheonan South Korea, 20 – 25, 2019
  • Daira H., Sean B., Taylor H., Nathan W., Zcash protocol specification, Zcash Protocol Specification, Zcash, 1–151, 2020
  • Zcash documentation, Zcash Basics, Zcash, https://zcash.readthedocs.io/en/latest/rtd_pages/basics.html, Erişim: 2020-03-28
  • Dash, Dash documentation, dash.org, https://docs.dash.org/en/stable/, Erişim: 2020-07-01
  • Dash, What is dash cryptocurrency? The most comprehensive guide ever!, dash.org, https://blockgeeks.com/guides/what-is-dash/, Erişim: 2020-05-05
  • Dash, Dash cryptocurrency: Complete dash coin guide, dash.org, https://www.bitdegree.org/tutorials/dash-cryptocurrency/, Erişim: 2020-05-05
  • Dash, Dash features, dash.org, https://docs.dash.org/en/stable/introduction/features.html, Erişim: 2020-07-01
  • Wikipedia, Monero. wikipedia.org, https://en.wikipedia.org/wiki/Monero, Erişim: 2020-07-04
  • Monero, Monero technical specs, Monero Documentation, https://monerodocs.org/technical-specs/, Erişim: 2020-07-04
  • Monero, Ring signature, web.getmonero.org, https://web.getmonero.org/resources/moneropedia/ringsignatures.html, Erişim: 2020-07-04
Year 2021, Volume: 7 Issue: 1, 1 - 23, 07.07.2021
https://doi.org/10.18640/ubgmd.868876

Abstract

References

  • Satoshi, N., Bitcoin: A peer-to-peer electronic cash system, https://bitcoin.org/, 1–9, 2008
  • Birkuyov A., Daniel, F., Deanonymization of Hidden Transactions in Zcash, University of Luxembourg, 1-15, 2018
  • TÜBİTAK BİLGEM UEKAE, Blokzincir, Blokzincir Araştırma Laboratuvarı, https://blokzincir.bilgem.tubitak.gov.tr/blok-zincir.html, Erişim: 2020-03-27
  • Birkuyov A., Dmitry K., Ivan P., Deanonymisation of Clients in Bitcoin P2P Network, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14), 15-29, 2014
  • Sarah M., Marjori P., Grant J., Kirill L., Damon M., Geoffrey M. V., Stefann, S., A fistful of bitcoins: Characterizing payments among men with no names, Proceedings of the 2013 conference on Internet measurement conference ACM, University of California and San Diego George Mason University New York USA, 127-140, 2013
  • Dorit, R., Adi S., Quantitative Analysis of the Full Bitcoin Transaction Graph, International Conference on Financial Cryptography and Data Security, The Weizmann Institute of Science Department of Computer Science and Applied Mathematics Israel, 6-24, 2013
  • Androulaki1 E., Karame G. O., Roeschlin1 M., Scherer1 T., Capkun1 S., Evaluating User Privacy in Bitcoin, International Conference on Financial Cryptography and Data Security, ETH Zurich 8092 Zuerich Switzerland ve NEC Laboratories Europe 69115 Heidelberg Germany, 34-51, 2013
  • Reid F., Harrigan M., An Analysis of Anonymity in the Bitcoin System 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, IEEE, Clique Research Cluster Complex & Adaptive Systems Laboratory UniversityCollege Dublin Ireland, 1318-1326, 2011
  • Spagnuolo M., Maggi F., Zanero S., BitIodine: Extracting Intelligence from the Bitcoin Network, International Conference on Financial Cryptography and Data Security, Springer Berlin Heidelberg, 457-468. 2014
  • KoshyEmail P., Koshy D., McDaniel P., An Analysis of Anonymity in Bitcoin Using P2P Network Traffic, International Conference on Financial Cryptography and DataSecurity FC 2014: Financial Cryptography and Data Security, Springer Berlin Heidelberg, 469-485, 2014.
  • Birkuyov A., Ivan, P.: Bitcoin over tor isn’t a good idea, IEEE, Symposiumon Security and Privacy SP 2015. 122-134. IEEE, University of Luxembourg, Esch-sur-Alzette, Luxemburg, 2015
  • Harry K., Steven G., Alishah C., Malte M., Arvind N., Blocksci: Design andapplications of a blockchain analysis platform, 29th {USENIX} Security Symposium ({USENIX} Security 20), Princeton University, 2721 – 2738, 2020
  • Atlas, K., An analysis of darkcoin’s blockchain privacy via darksend, 1–25, 2014
  • Abraham H., Bernhard H., An empirical analysis of monero cross-chain traceability, International Conference on Financial Cryptography and Data Security FC 2019: Financial Cryptography and Data Security, Austrian Institute of Technologyand Vienna University of Technology, 150 – 157, 2019
  • Möser M., Soska K., Heilman E., Lee K., Heffan H., Srivastava S., Hogan K., Hennessey J., Miller A., Narayanan A., Christin N., An empirical analysis of traceability in the monero blockchain, Proceedings on Privacy EnhancingTechnologies, Vol 2018, Iss 3, 143-163, 2018
  • Amrit K., Clement F., ToplePrateek S., A traceability analysis of monero’s blockchain, 22nd European Symposiumon Research in Computer Security Proceedings 2017, National University of Singapore, 153-173, 2017
  • Borggren N., Yoon Kim H., Yao L., Koplik G., Simulated blockchains for machinelearning traceability and transaction values in the monero network, Geometric Data Analytics Inc. Durham NC, 1–10, 2020
  • Kappos G., Yousaf H., Maller M., Meiklejohn S., An empirical analysis ofanonymity in zcash, 27th USENIX Security Symposium (USENIX Security’18), Cornell University - University College London, 1 – 15, 2018
  • Quesnelle J., On the linkability of zcash transactions, 27th USENIX SecuritySymposium (USENIX Security ’18), Cornell University Esch-sur-Alzette Luxemburg, 1 – 5, 2017
  • Erik D., Elias R., Florian T., Map-z: Exposing the zcash network in times of transition, IEEE, 44th Conference on Local Computer Networks (LCN), Cornell University Distributed Security Infrastructures Technical University of Berlin, 84 – 92, 2019
  • Kappos G., Piotrowska A. M., Extending the anonymity of zcash, Cornell University - University College London United Kingdom, 1 – 2, 2019
  • Alex B., Daniel F. Privacy and linkability of mining in zcash, IEEE, Conference on Communications and Network Security (CNS), University of Luxembourg Esch-sur-Alzette Luxemburg, 118 – 123, 2019
  • Alex B., Daniel F., Giuseppe V., Privacy aspects and subliminal channelsin zcash, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, University of Luxembourg Esch-sur-Alzette Luxemburg, 1813–1830 2019
  • Alex B., Sergei T., Deanonymization and linkability of cryptocurrency transactionsbased on network analysis, IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, , 172 – 184, 2019
  • Alex B., Sergei T., Transaction clustering using network traffic analysis for bitcoinand derived blockchains, INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019, University of Luxembourg Esch-sur-Alzette Luxemburg, 204 – 209, 2019,
  • Alex B., Sergei T., Security and privacy of mobile wallet users in bitcoin, dash,monero, and zcash. Elsevier University of Luxembourg Esch-sur-Alzette Luxemburg, 1 – 11, 2019
  • Bitcoin, Bitcoin’e başlarken, bitcoin.org, https://bitcoin.org/tr/, Erişim: 2020-03-27
  • Jong-Hyouk L., Rise of anonymous cryptocurrencies: Brief introduction, IEEEConsumer Electronics Magazine IEEE Consumer Electron. Mag. Consumer Elec-tronics Magazine, IEEE, SangmyungUniv. - Cheonan South Korea, 20 – 25, 2019
  • Daira H., Sean B., Taylor H., Nathan W., Zcash protocol specification, Zcash Protocol Specification, Zcash, 1–151, 2020
  • Zcash documentation, Zcash Basics, Zcash, https://zcash.readthedocs.io/en/latest/rtd_pages/basics.html, Erişim: 2020-03-28
  • Dash, Dash documentation, dash.org, https://docs.dash.org/en/stable/, Erişim: 2020-07-01
  • Dash, What is dash cryptocurrency? The most comprehensive guide ever!, dash.org, https://blockgeeks.com/guides/what-is-dash/, Erişim: 2020-05-05
  • Dash, Dash cryptocurrency: Complete dash coin guide, dash.org, https://www.bitdegree.org/tutorials/dash-cryptocurrency/, Erişim: 2020-05-05
  • Dash, Dash features, dash.org, https://docs.dash.org/en/stable/introduction/features.html, Erişim: 2020-07-01
  • Wikipedia, Monero. wikipedia.org, https://en.wikipedia.org/wiki/Monero, Erişim: 2020-07-04
  • Monero, Monero technical specs, Monero Documentation, https://monerodocs.org/technical-specs/, Erişim: 2020-07-04
  • Monero, Ring signature, web.getmonero.org, https://web.getmonero.org/resources/moneropedia/ringsignatures.html, Erişim: 2020-07-04
There are 37 citations in total.

Details

Primary Language Turkish
Subjects Computer Software
Journal Section Makaleler
Authors

Muhammet Ali Öztürk 0000-0002-8974-772X

İsa Sertkaya 0000-0002-4739-0515

Hüseyin Yüce 0000-0001-5525-7733

Publication Date July 7, 2021
Submission Date January 26, 2021
Published in Issue Year 2021 Volume: 7 Issue: 1

Cite

IEEE M. A. Öztürk, İ. Sertkaya, and H. Yüce, “Anonim Kriptoparaların Korelasyon Tabanlı Mahremiyet Analizi”, UBGMD, vol. 7, no. 1, pp. 1–23, 2021, doi: 10.18640/ubgmd.868876.