Lohkoketjuteknologian haavoittuvuudet

Lohkoketjut ovat teknologiana uusi ilmiö ja ainakin toistaiseksi useimmille täysin tuntematon termi. Lohkoketjuista puhutaan usein hyvin positiiviseen sävyyn maailmaa mullistavana teknologiana. Käsitteen ympärille on muodostunut erittäin paljon keskustelua, josta seurauksena usein on se, ettei asiaa...

Full description

Bibliographic Details
Main Author: Kaasalainen, Viljami
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2018
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/59608
_version_ 1826225815880204288
author Kaasalainen, Viljami
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Kaasalainen, Viljami Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Kaasalainen, Viljami Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Kaasalainen, Viljami
datasource_str_mv jyx
description Lohkoketjut ovat teknologiana uusi ilmiö ja ainakin toistaiseksi useimmille täysin tuntematon termi. Lohkoketjuista puhutaan usein hyvin positiiviseen sävyyn maailmaa mullistavana teknologiana. Käsitteen ympärille on muodostunut erittäin paljon keskustelua, josta seurauksena usein on se, ettei asiaa muisteta tarkastella tarpeeksi kriittisesti. Siksi tässä kandidaatin tutkielmassa käsitellään lohkoketjuteknologiaan liittyviä haavoittuvuuksia, erityisesti lohkoketjuihin kohdistuvia hyökkäyksiä. Tutkielma on toteutettu kirjallisuuskatsauksena. Ensin tutkielmassa käydään läpi lohkoketjuteknologian ominaisuudet ja toiminta periaatteet, minkä jälkeen siirrytään käsittelemään kolmea erilaista haavoittuvuutta ja mahdollisia ratkaisuja niihin. Kyseisiä haavoittuvuuksia ovat 51 prosentin hyökkäys, tuplakulutus ja hyökkäys kolmannen osapuolen palveluun. Tutkielma avaa erilaiset haavoittuvuudet ja niihin liittyvät hyökkäykset yksityiskohtaisesti, mutta varmasti toimivia ratkaisuja kyseisiin ongelmiin ei löydetty. Lohkoketjuteknologia on vielä uusi asia ja sen merkittävimmät haavoittuvuudet perustuvat niin syvälle sen perimmäisiin toimintaperiaatteisiin, että niihin tarjotut ratkaisut ovat pääasiassa vielä vain ehdotuksia. As a technology, blockchain is a new phenomenon and an unknown term for the most. Discussion about blockchains often has a positive tone and it has been called as a groundbreaking technology. This has caused a vast amount of discussion around the subject, which often leads to a lack of critical examination. That is why this thesis focuses on blockchain technology’s vulnerabilities and especially various attacks concerning it. The thesis was implemented as a systematic literature review. First, it will review the features of blockchain technology comprehensively and after that, three different vulnerabilities and their possible solutions will be addressed. The three vulnerabilities in question are 51 percent attack, doublespending and attack on third-party service. The vulnerabilities are explained in a detailed way, but solutions are lacking practical and working answers. The blockchain technology is still emerging technology and its vulnerabilities are based deep into its core features. That is why the solutions to the vulnerabilities concerned are primarily only suggestions.
first_indexed 2024-09-11T08:50:43Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Halttunen, Veikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kaasalainen, Viljami", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-09-21T05:34:16Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-09-21T05:34:16Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/59608", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Lohkoketjut ovat teknologiana uusi ilmi\u00f6 ja ainakin toistaiseksi useimmille t\u00e4ysin tuntematon termi. Lohkoketjuista puhutaan usein hyvin positiiviseen s\u00e4vyyn maailmaa mullistavana teknologiana. K\u00e4sitteen ymp\u00e4rille on muodostunut eritt\u00e4in paljon keskustelua, josta seurauksena usein on se, ettei asiaa muisteta tarkastella tarpeeksi kriittisesti. Siksi t\u00e4ss\u00e4 kandidaatin tutkielmassa k\u00e4sitell\u00e4\u00e4n lohkoketjuteknologiaan liittyvi\u00e4 haavoittuvuuksia, erityisesti lohkoketjuihin kohdistuvia hy\u00f6kk\u00e4yksi\u00e4. Tutkielma on toteutettu kirjallisuuskatsauksena. Ensin tutkielmassa k\u00e4yd\u00e4\u00e4n l\u00e4pi lohkoketjuteknologian ominaisuudet ja toiminta periaatteet, mink\u00e4 j\u00e4lkeen siirryt\u00e4\u00e4n k\u00e4sittelem\u00e4\u00e4n kolmea erilaista haavoittuvuutta ja mahdollisia ratkaisuja niihin. Kyseisi\u00e4 haavoittuvuuksia ovat 51 prosentin hy\u00f6kk\u00e4ys, tuplakulutus ja hy\u00f6kk\u00e4ys kolmannen osapuolen palveluun. Tutkielma avaa erilaiset haavoittuvuudet ja niihin liittyv\u00e4t hy\u00f6kk\u00e4ykset yksityiskohtaisesti, mutta varmasti toimivia ratkaisuja kyseisiin ongelmiin ei l\u00f6ydetty. Lohkoketjuteknologia on viel\u00e4 uusi asia ja sen merkitt\u00e4vimm\u00e4t haavoittuvuudet perustuvat niin syv\u00e4lle sen perimm\u00e4isiin toimintaperiaatteisiin, ett\u00e4 niihin tarjotut ratkaisut ovat p\u00e4\u00e4asiassa viel\u00e4 vain ehdotuksia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "As a technology, blockchain is a new phenomenon and an unknown term for the most. Discussion about blockchains often has a positive tone and it has been called as a groundbreaking technology. This has caused a vast amount of discussion around the subject, which often leads to a lack of critical examination. That is why this thesis focuses on blockchain technology\u2019s vulnerabilities and especially various attacks concerning it. The thesis was implemented as a systematic literature review. First, it will review the features of blockchain technology comprehensively and after that, three different vulnerabilities and their possible solutions will be addressed. The three vulnerabilities in question are 51 percent attack, doublespending and attack on third-party service. The vulnerabilities are explained in a detailed way, but solutions are lacking practical and working answers. The blockchain technology is still emerging technology and its vulnerabilities are based deep into its core features. That is why the solutions to the vulnerabilities concerned are primarily only suggestions.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Riitta Pitk\u00e4nen (rpitkane@jyu.fi) on 2018-09-21T05:34:16Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-09-21T05:34:16Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "32", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "lohkoketjuteknologia", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "bitcoin", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kryptovaluutta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "blockchain", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "vulnerability", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cryptocurrency", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Lohkoketjuteknologian haavoittuvuudet", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201809214198", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "virtuaalivaluutta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haavoittuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "maksuv\u00e4lineet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "s\u00e4hk\u00f6inen raha", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_59608
language fin
last_indexed 2025-02-18T10:56:31Z
main_date 2018-01-01T00:00:00Z
main_date_str 2018
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/eb3688d9-1d85-4f36-b47f-d55c129cc3e6\/download","text":"URN:NBN:fi:jyu-201809214198.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2018
record_format qdc
source_str_mv jyx
spellingShingle Kaasalainen, Viljami Lohkoketjuteknologian haavoittuvuudet lohkoketjuteknologia bitcoin kryptovaluutta blockchain vulnerability cryptocurrency Tietojärjestelmätiede Information Systems Science 601 virtuaalivaluutta haavoittuvuus hakkerointi maksuvälineet sähköinen raha
title Lohkoketjuteknologian haavoittuvuudet
title_full Lohkoketjuteknologian haavoittuvuudet
title_fullStr Lohkoketjuteknologian haavoittuvuudet Lohkoketjuteknologian haavoittuvuudet
title_full_unstemmed Lohkoketjuteknologian haavoittuvuudet Lohkoketjuteknologian haavoittuvuudet
title_short Lohkoketjuteknologian haavoittuvuudet
title_sort lohkoketjuteknologian haavoittuvuudet
title_txtP Lohkoketjuteknologian haavoittuvuudet
topic lohkoketjuteknologia bitcoin kryptovaluutta blockchain vulnerability cryptocurrency Tietojärjestelmätiede Information Systems Science 601 virtuaalivaluutta haavoittuvuus hakkerointi maksuvälineet sähköinen raha
topic_facet 601 Information Systems Science Tietojärjestelmätiede bitcoin blockchain cryptocurrency haavoittuvuus hakkerointi kryptovaluutta lohkoketjuteknologia maksuvälineet sähköinen raha virtuaalivaluutta vulnerability
url https://jyx.jyu.fi/handle/123456789/59608 http://www.urn.fi/URN:NBN:fi:jyu-201809214198
work_keys_str_mv AT kaasalainenviljami lohkoketjuteknologianhaavoittuvuudet