Open Access
Preventing the bitcoin Double Spend using Transaction Hash and Unspent Transaction Output
Author(s) -
A. Murugan*,
J. Vijayalakshmi
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.c5352.098319
Subject(s) - database transaction , hash function , computer science , online transaction processing , computer security , distributed transaction , cryptocurrency , compensating transaction , transaction processing , transaction processing system , database
The red-hot crypto currency is a bitcoin which occupies first position in the capital investment of financial world which is assaulted by various factors like wallet attacks, network attacks, mining attacks and double spending attacks. Double spending is the major attack in which the attacker tries to cheat the network nodes and use the same coin for more than one set of transactions. Of this the original transaction identification from the set of transactions is a challenging one. In this paper we propose a solution for identifying the primary transaction from the set of double spended or multi spended transactions. The proposed approach finds the authentic transaction from the list of double spended transactions using transaction hash value, which is primarily used for every transaction in the Bitcoin network. Transaction hash value is used as transaction identifier for each bitcoin transaction. By comparing the transaction hash value with the existing pool of unconfirmed input pool, transhash pool and utxopool one can identify the genuine transaction from the flawed transaction list. The firsthand transaction is then added to the Confirmed input pool which is then entered into the newly added block of the blockchain. This architecture will prevent the double spend of bitcoin further in the network which facilitates the network nodes as well as minimize the miners task for verification and validation of transaction.