International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 2, February 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Detecting Multi-Block Double Spent Transaction Based On B-Tree Indexing

[Full Text]



A. Murugan, J. Vijayalakshmi



Bitcoin, Blockchain, B-tree index, Cognizant Merkle, Double-spend attack, Peer-to-Peer network, Transactions,



The emergence of cryptocurrency as a new payment method gives rise to various security threats related to transaction malleability like privacy leakage, loss of amount, doing illicit activities, and double-spending of the same money more than once. Double-spending of money is quite easier to implement in cryptocurrency management rather than fiat currency management because data replication can be easily done here. The rise of double-spending may degrade the performance of the Bitcoin network. In Blockchain, there may be lakhs of records and thousands of blocks available, of this detecting double-spending data in multiple blocks takes more time. To address the time management, of detecting double-spent data in multiple blocks of blockchain this paper had proposed Multi-Block Double spent Transaction Detection (MBDTD) architecture using B-tree indexing and Cognizant Merkle. The combination of Cognizant Merkle and B-tree indexing supports the rapid verification of transaction data in multiple blocks. B-tree indexing supports speedy retrieval of Merkle value among multiple blocks and Cognizant Merkle supports quick searching of transactions in each block.



[1] The blockchain or Distributed trust. “https://euagenda.eu/publications/the-blockchain-or distributed-trust”. [online; accessed 25-oct-2019]
[2] A. Murugan and J. Vijayalakshmi. “Discovering the Bitcoin Double-spend using Lost Agreement Amount”, International Journal of Recent Technology and Engineering, Vol. No. 8(3), PP 3764-3770, 2019.
[3] Understanding the basics of blockchain. “https://data-flair.training/blogs/basics-of-blockchain-technology/” [online; accessed 24-oct-2019]
[4] Understanding Blockchains and Bitcoin part 2 Technology, “https://luxsci.com/blog/understanding-blockchains-and-bitcoin-technology.html”.[Online; accessed 24-oct-2019]
[5] Andreas M. Antonopoulos.” Mastering Bitcoin: unlocking digital cryptocurrencies", O'Reilly Media, 2014.
[6] Vijayalakshmi J. and Murugan, A. “Revamp Perception of Bitcoin Using Cognizant Merkle”, In Proceeding of Emerging Research in Computing, Information, Communication and Application, Springer,PP 141-150, 2019
[7] Merkle R.C. "A digital signature based on a conventional encryption function.”, Advances in Cryptology, Springer, Berlin, Heidelberg, PP 369-378, 1987.
[8] Askitis Nikolas, and Ranjan Sinha. “HAT-trie: a cache-conscious trie-based data structure for strings.” In Proceedings of the thirtieth Australasian conference on Computer science, Australian Computer Society, Vol.No.62, PP 97-105, 2007.
[9] A. Murugan and J. Vijayalakshmi. “Preventing the bitcoin Double-spend using Transaction Hash and Unspent Transaction Output.” International Journal of Recent Technology and Engineering, Vol.No.8 (3), PP 3771-3776, 2019.
[10] Satoshi Nakamoto. “Bitcoin: A Peer-to-Peer Electronic Cash System”,“https://bitcoin.org/bitcoin.pdf”, 2008.
[11] Knecht Markus, Willi Meier, and Carlo Nicola. “A space-and time-efficient Implementation of the Merkle Tree Traversal Algorithm”, arXiv, Vol.No. 1409(4081), 2014.
[12] Stackoverflow questions, ”https://stackoverflow.com/questions/4070693/what-is-the-purpose-of-base-64-encoding-and-why-it-used-in-http-basic-authentica” [online;access date: 13- feb-2018]
[13] How database B-tree indexing works,”https://dzone.com/articles/database-btree-indexing-in-sqlite”.[Online; accessed 11-jan-2019]