Volume 5 (1), June 2022, Pages 33-51

Zahra Tayyebi Qasabeh1 , Seyyed Sajjad Mousavi2

1Payame Noor U niversity of Guilan, Guilan, Iran,  This email address is being protected from spambots. You need JavaScript enabled to view it.

2 Pol Talshan Azad University, Gilan, Iran, This email address is being protected from spambots. You need JavaScript enabled to view it.


The blockchain is a revolutionary technology transforming how assets are managed digitally and securely on a distributed network. Blockchain decentralized technology can solve distrust problems of the traditional centralized network and enhance the privacy and security of data. It provides a distinct way of storing and sharing data through blocks chained together. The blockchain is highly appraised and endorsed for its decentralized infrastructure and peer-to-peer nature. However, much research about the blockchain is shielded by Bitcoin. But blockchain could be applied to a variety of fields far beyond Bitcoin. Blockchain has shown its potential for transforming the traditional industry with its essential characteristics: decentralization, persistency, anonymity, and audibility. Undoubtedly, blockchain technology can significantly change the global business environment and lead to a paradigm shift in the functioning of the business world. However, to unlock the tremendous potential, various challenges in the adoption and viability of blockchain technology must be addressed before we can see the legal, economic, and technical viability of this technology in the operation of various business applications. In this study, the fundamental concepts of blockchain are discussed at the beginning, and the way it works and its architecture is mentioned, and since all technologies face challenges, this technology is no exception and has challenges based on the works related to the challenges It is mentioned.


Blockchain Concepts, Architecture, Characteristics, Challenges.





Aghababayi, H., Nikabadi, M. S., Kafaki, S. B., & Rahmanimanesh, M. (2022). Challenges of using blockchain technology in the international markets. Journal of Information Technology Management, 14(Special Issue: The business value of Blockchain, challenges, and perspectives), 171-191.

Barcelo, J. (2014). User privacy in the public bitcoin blockchain. URL: http://www. dtic. upf. edu/jbarcelo/papers/20140704 User Privacy in the Public Bitcoin Blockc hain/paper. pdf (Accessed 09/05/2016).

Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014, November). Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 15-29).

Bonneau, J., Narayanan, A., et al. (2014, March). Mixcoin: Anonymity for bitcoin with accountable mixes. In International Conference on Financial Cryptography and Data Security (pp. 486-504). Springer, Berlin, Heidelberg.

Eyal, I., & Sirer, E. G. (2018). Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM, 61(7), 95-102.

Gamage, H. T. M., Weerasinghe, H. D., & Dias, N. G. J. (2020). A survey on blockchain technology concepts, applications, and issues. SN Computer Science, 1(2), 1-15. 

Guo, H., & Yu, X. (2022). A Survey on Blockchain Technology and its security. Blockchain: Research and Applications, 3(2), 100067.

Heilman, E. (2014, March). One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. In International Conference on Financial Cryptography and Data Security (pp. 161-162). Springer, Berlin, Heidelberg. 

Joshi, S., Pise, A. A., et al. (2022). Adoption of Blockchain Technology for Privacy and Security in the Context of Industry 4.0. Wireless Communications and Mobile Computing, 2022. 4079781

Kaushal, R. K., Kumar, N., & Panda, S. N. (2021, August). Blockchain Technology, Its Applications and Open Research Challenges. In Journal of Physics: Conference Series (Vol. 1950, No. 1, p. 012030). IOP Publishing.

Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016, May). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In 2016 IEEE symposium on security and privacy (SP) (pp. 839-858). IEEE.

Meiklejohn, S., Pomarole, M., et al. (2013, October). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140).

Monrat, A. A., Schelén, O., & Andersson, K. (2019). A survey of blockchain from the perspectives of applications, challenges, and opportunitiesIEEE Access, 7, 117134-117151.

Moser, M. (2013). Anonymity of bitcoin transactions. In Münster Bitcoin Conference (MBC), 10 pages

Pal, A., Tiwari, C. K., & Haldar, N. (2021). Blockchain for business management: Applications, challenges and potentials. The Journal of High Technology Management Research, 32(2), 100414.

Patil, P., Sangeetha, M., & Bhaskar, V. (2021). Blockchain for IoT access control, security and privacy: a review. Wireless Personal Communications, 117(3), 1815-1834.

Sapirshtein, A., Sompolinsky, Y., & Zohar, A. (2016, February). Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 515-532). Springer, Berlin, Heidelberg.

Tasatanattakool, P., & Techapanupreeda, C. (2018, January). Blockchain: Challenges and applications. In 2018 International Conference on Information Networking (ICOIN) (pp. 473-475). IEEE.

Xi, J., Zou, S., et al. (2021). A Comprehensive Survey on Sharding in Blockchains. Mobile Information Systems, 2021. 5483243

Zheng, Z., Xie, S., Dai, H. N., Chen, X., & Wang, H. (2018). Blockchain challenges and opportunities: A survey. International journal of web and grid services, 14(4), 352-375.