Since the inception of bitcoin in 2009, cryptocurrency has expanded into the mainstream, sweeping the market and therefore bitcoin has evolved as the utmost efficient cryptocurrency. A digital currency secured by cryptography is called cryptocurrency. In the world, Bitcoin is the first digital coin to be built on the block chain technology. It is expected to replace the current paper currency as an alternative global currency in the near future. Bitcoins, in contrast to centralized digital currencies, are decentralized digital currencies that may be readily transmitted among each other without any middleman such as banks and monetary institutions. An exhaustive and extensive description of how this type of cryptocurrency is an intriguing area of privacy research communities is provided in this paper along with comprehensive review of various studies related to this research area. The paper also highlights about the merits of cryptocurrencies, such as their security, low transaction costs, and high investment returns.

1.
Mohd Yousuf
Javed
,
Mohammad
Hasan
, and
Ruzaina
Khan
, “
Future of bitcoin in India : Issues and challenges
,”
Journal of Statistics & Management Systems
, vol.
23
, pp.
207
214
,
2020
.
2.
Seongho
Hong
and
Heeyoul
Kim
, “
Analysis of Bitcoin exchange using relationship of transactions and addresses
,”
2019 21st International Conference on Advanced Communication Technology (ICACT
), pp.
67
70
,
2019
.
3.
Herrera-Joancomart
and
Jordi
, “
Research and challenges on bitcoin anonymity
,”
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance
”, pp.
3
16
,
2014
.
4.
Diego
Valdeolmillos
,
Yeray
Mezquita
,
Alfonso
González-Briones
,
Javier
Prieto
and
Juan Manuel
Corchado
, “
Blockchain technology: a review of the current challenges of cryptocurrency
,”
International Congress on Blockchain and Applications
, pp.153-160,
2019
.
5.
Surya Prakash
Gupta
,
Kushagra
Gupta
and
B. R.
Chandavarkar
, “
The Role of Cryptography in Cryptocurrency
,”
2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC
), pp.
273
278
,
2021
.
6.
Ron
Dorit
and
Adi
Shamir
, “Quantitative analysis of the full bitcointransaction graph: In
Ahmad-Reza
Sadeghi
, editor,
Financial Cryptography and Data Security
”,
Berlin
,
Heidelberg
, pp.
6
24
,
2013
.
7.
Suman
Ghimire
and
Henry
Selvaraj
, “
A survey on bitcoin cryptocurrency and its mining
26th International Conference on Systems Engineering (ICSEng
), pp.
1
6
,
2018
.
8.
Manimuthu
,
A.
nmozhi
,
G.
Rejikumar
, and
Drishti
Marwaha
, “
A literature review on Bitcoin: Transformation of crypto currency into a global phenomenon
”,
IEEE Engineering Management Review
47, Vol.
1
, pp.
28
35
,
2019
.
9.
Pavithran
,
Deepa
and
Rajesh
Thomas
, “A Survey on Analyzing Bitcoin Transactions”, In
2018 Fifth HCT Information Technology Trends (ITT)
, pp.
227
231
.
IEEE
,
2018
.
10.
Kaushal
,
Puneet
Kumar
,
Amandeep
Bagga
, and
Rajeev
Sobti
, “
Evolution of bitcoin and security risk in bitcoin wallets
”,
International Conference on Computer, Communications and Electronics (Comptelix
), pp.
172
177
,
2017
.
11.
Hassani
,
Hossein
,
Xu
Huang
, and
Emmanuel
Silva
, “
Big-Crypto: Big data, blockchain and cryptocurrency
”,
Big Data and Cognitive Computing
2
,
2018
.
12.
Sarkintudu
,
Shehu
M.
,
Ibrahim
,
Huda
H.
,
Abd
Wahab
and
Alawiyah
, “
Cryptocurrency platform ecosystem: a systematic literature review from information systems perspective
”,
International Journal of Advanced Computer Research
9
, pp.
308
315
,
2019
.
13.
San
,
Kiu
Mee
,
Chia Fah
Choy
, and
Wong Phui
Fung
The potentials and impacts of blockchain technology in construction industry: A literature review
”,
In IOP Conference Series: Materials Science and Engineering
, vol.
495
,
2019
.
14.
Luther
,
William
J.
, and
Sean Stein
Smith
, “
Is Bitcoin a decentralized payment mechanism
”,
Journal of Institutional Economics
16
, no.
4
, pp.
433
444
,
2020
.
15.
Al-Amri
,
Redhwan
,
Nur Haryani
Zakaria
,
Adib M. Monzer
Habbal
, and
Suhaidi
Hassan
, “
Cryptocurrency adoption: current stage, opportunities, and open challenges
”,
International journal of advanced computer research
9
,pp.
293
307
,
2019
.
16.
Xu
,
Min
,
Xingtong
Chen
, and
Gang
Kou
, “
A systematic review of blockchain
”,
Financial Innovation
5
, no.
1
, pp.
1
14
,
2019
.
18.
V.
Kaur
,
G.
Kaur
,
G.
Dhiman
,
R.
Bindal
,
M.K.
Mishra
, “
Adaptability of Machine Learning in Cryptography
,”
Solid State Technology
, vol.
63
, pp.
2874
2880
,
2020
.
19.
V.
Kaur
,
K.
Gupta
,
V.
Baggan
,
G.
Kaur
,
Amanjyoti
, “
Role of cryptographic algorithms in mobile ad hoc network security: an elucidation
,”
International Journal of Recent Technology and Engineering
,
2020
.
20.
P.
Datta
and
B.
Sharma
, “
A survey on IoT architectures, protocols, security and smart city based applications
,”
8th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2017
,
2017
.
21.
R.
Chhabra
,
S.
Verma
,
C.R.
Krishna
, “
A survey on driver behavior detection techniques for intelligent transportation systems
,”
Proceedings of the 7th International Conference Confluence 2017 on Cloud Computing, Data Science and Engineering
,
2017
.
22.
D.
Koundal
,
S.
Gupta
,
S.
Singh
, “
Computer aided thyroid nodule detection system using medical ultrasound images
,”
Biomedical Signal Processing and Control
,
2018
.
23.
G.
Kaur
and
H.
Kaur
, “
Prediction of the cause of accident and accident prone location on roads using data mining techniques
”,
2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT
), pp.
1
7
,
2019
.
24.
G.
Kaur
and
H.
Kaur
, “
Black Spot and Accidental Attributes Identification on State Highways and Ordinary District Roads Using Data Mining Techniques
”,
International Journal of Advanced Research in Computer Science
, vol.
8
, pp.
5
,
2017
.
25.
G.
Kaur
,
S.
Goyal
and
H.
Kaur
,
“Brief Review Of Various Machine Learning Algorithms
”, SSRN 3747597,
2020
.
26.
R.
Bindal
,
P.K.
Sarangi
,
G.
Kaur
and
G.
Dhiman
, “
An approach for automatic recognition system for Indian vehicles numbers using k-nearest neighbours and decision tree classifier
Science and Engineering Research Support Society
,
2019
.
27.
Gupta
K. P. S.
Exploring Security Mechanism Using Identity Based Encryption & M-RSA Within Cloud Environment.
28.
Gupta
S.
(
2015
, October).
An effective model for anomaly IDS to improve the efficiency
. In
2015 International Conference on Green Computing and Internet of Things (ICGCIoT)
(pp.
190
194
).
IEEE
.
This content is only available via PDF.
You do not currently have access to this content.