Verifiable and Auditable Digital Interchange Framework

Total Page:16

File Type:pdf, Size:1020Kb

Verifiable and Auditable Digital Interchange Framework Verifiable and Auditable Digital Interchange Framework# Prabal Banerjee†, Dushyant Behl∗, Palanivel Kodeswaran∗, Chaitanya Kumar∗, Sushmita Ruj‡ and Sayandeep Sen∗ †Indian Statistical Institute Kolkata, ∗IBM Research, ‡ CSIRO Data61 Australia and Indian Statistical Institute Kolkata ABSTRACT We address the problem of fairness and transparency in online marketplaces selling digital content, where all parties are not actively participating in the trade. We present the design, implementation and eval- uation of VADER, a highly scalable solution for multi-party fair digital exchange that combines the trusted execution of blockchains with intelli- gent protocol design and incentivization schemes. We prototype VADER on Hyperledger Fabric and Figure 1: Present day video exchange extensively evaluate our system on a realistic testbed spanning five public cloud datacenters, spread across four continents. Our results demonstrate that VADER adds only minimal overhead of 16% in median case reflected in their success, they suffer from an im- compared to a baseline solution, while significantly portant shortcoming in the inability to guarantee outperforming a naive blockchain based solution honest behavior and vulnerability to fraudulent be- that adds an overhead of 764%. havior by participants. This is due to the fact that present day systems lack the underpinnings to demon- strably guarantee honest behavior; forcing both buyers and owners to trust that a facilitator be- 1 INTRODUCTION haves in a fair manner. Online media consumption is a big business [13], For example in Fig. 1, the owner trusts the fa- with users watching billions of hours of videos per cilitator to honestly report the number of views/- month [90] and media traffic constituting roughly downloads and calculate its royalty payments in a transparent manner. Similarly, the buyer trusts arXiv:2001.03717v2 [cs.DC] 27 Jan 2020 70% of downstream internet traffic [80]. A key reason for this success, lies in the sim- the facilitator to deliver the right content against plicity of present day online media (and money) payment. Finally, the facilitator expects the buyer exchange process as depicted in Fig. 1. As shown, to pay for a successful delivery, without falsely al- a present day content creator can simply upload leging non-delivery. content and get paid based on viewership (or sales). However, lack of baked-in guarantees of hon- Similarly, buyers can pay the right price to access est behavior can lead to disputes, such as a buyer media without worrying about content authentic- fraudulently alleging non-receipt of content and ity, price gouging, non delivery etc. The ease of denying payments thus stealing content from fa- operation is due to presence of facilitators such as cilitator; facilitator mis-reporting sales to cheat owner Youtube, Netlflix, iCloud etc. As shown in Fig. 1, of dues, or even charging buyers without provid- the facilitator provides all the ancillary but criti- ing right content. cal services of content hosting, searching, deliv- In fact, recent events highlight the inadequacy ery, payments etc. to complete the digital ecosys- of this trust based model [17, 19, 86]. Specifically, tem for online media consumption. While the ef- content owners have raised a number of complaints ficacy of present day media delivery systems is against faclitators regarding their royalty earnings and lack of clarity in the calculation [10, 18, 67], # Authors are listed in alphabetical order. highlighting discrepancies in earnings with reported viewership. Similarly, buyers have also raised dis- or in collusion with the buyer [2, 9]. Fig 1, high- putes regarding content received from these plat- lights the specific risks faced by the respective par- forms [2]. ties. We believe that such disputes can only increase Wenotethatwhiletheproblem offair exchange in future to the detriment of the growth of online among active parties is well studied in theory [47, media delivery platforms. This in turn, motivates 71, 78, 89]; to the best of our knowledge, protect- us to address this important problem of guaran- ing rights of passive parties, without significantly teeing successful video exchange amongst mutu- altering the flow of video exchange 1 is a new para- ally untrusting buyers and facilitators. We ensure digm for fair exchange, not yet covered in literature. each party (owner, buyer and facilitator) gets their In VADER we not only protect the buyer and rightful outcome or no one does. We define the facilitators against various active party risks but above as Multi-party fair digital exchange (ab- secure owner’s interest from passive party risks. breviated as fair exchange in the rest of the paper) To the best of our knowledge, VADER is the first among the owners, buyers and facilitators in the real system to demonstrate such capabilities. marketplace model. VADER accomplishes low overhead fair exchange Note that prior work [30, 48, 49] for providing solution by leveraging the following key insights, fairness are not applicable in the above setting as →Insight 1) We can guarantee fair exchange by they trust the facilitator to grant access to inter- sending encrypted video and performing fair ex- nal logs and metrics, an important assumption we change of only the key and money. This enables us intend to avoid. Similarly, decentralized video de- to leverage the existing optimized delivery infras- livery platforms [32, 40, 62, 64, 88] which bypass tructures of facilitators for sending (encrypted) con- centralized facilitators (thus obviating the need tent and making system for fairness incrementally to trust them), while promising are not suitable. deployable. This is due to the fact that decentralized content →Insight 2) By assuming the presence of a trusted delivery platforms suffer from poor content qual- arbitrator that is slow (when compared to direct ity, sporadic availability, rampant illegal content interaction without intermediary) but can deter- etc., ironically due to absence of a facilitator’s ded- ministically detect a malicious party and provide icated resources in maintaining the platform [20]. restitution (right encrypted content, key or money) Motivated by above observations, we set our to the honest party, parties can opportunistically goal to develop a readily usable solution for fair exchange key and money directly between them- exchange, which would be a)compatible and incre- selves without having to interact with the arbitra- mentally deployable with present day facilitator driven tor unless there is a dispute. marketplace systems and b) should be able to pro- →Insight 3) Assuming parties are rational, intro- vide transparency and fairness into existing video duction of bounties (that are large and funded by delivery platforms with minimal overhead in terms penalizing malicious parties) for reporting misbe- of modifications and performance. havior introduces an element of distrust between In this paper we present the system design, im- parties, thus preventing collusion aimed at sub- plementation and evaluation of Verifiable and Au- verting the protocol. Note that, the first two in- ditable Digital Interchange Framework (VADER) sights enable efficient operation, guaranteeing fair- which satisfies the above mentioned criteria. ness for the active parties; while the third insight In process of designing VADER, we study vari- ensures fairness for the passive party under as- ousfraud risksthatarise in the marketplacemodel sumption of rational participants. and note that guaranteeing multi-party fair exchange We select blockchainas the tamper-proof ledger in this model presents a unique challenge. As shown and execution platform for VADER. Our selection in Fig. 1, the owner is a passive party, in the sense of blockchainis motivated by the fact that it offers that after video upload, it is not directly involved decentralization of trust and auditability guaran- in the exchange of video and money between the tees sought by VADER. Furthermore, the native active parties viz. the facilitator and buyer. Being a blockchain cyptocurrency can be used to design passive party, an owner is completely dependent incentivization schemes and programmatically en- on the honesty of facilitator, as it has no way to force desired behavior from the interacting par- learn of exchanges of its content being done. This ties as mandated by our insights above. We also makes the owner vulnerable to being misled about its true earnings, either by the facilitator [10] alone, 1i.e., without making owner also an active party by say asking for its approval on every trade 2 point out the second insight of opportunistic ex- our knowledge, we are the first to formulate and changes on fast path (batching), while reverting present the problem of multi-party fair digital ex- to the slow but guaranteed path is also used in change in third party marketplace scenario where state-channels for scaling transaction throughput. one of the parties is passive and does not directly However, these solutions involve native assets such interact with the buyer (Sec. 1 & 2). 2) We design as cryptocurrencies giving complete control to the the VADER protocol and study its security prop- arbitrator to revert back the state (e.g. ownership) erties. 3) We implement VADER protocol on Hy- of an asset. On the other hand, we deal with non- perledger Fabric, and extensively evaluate its per- native assets such as decryption keys which once formance on a realistic test-bed of upto 91 nodes delivered to the buyer are unaffected by blockchain spread over 4 continents, transferring at least 50TB asset state. We modify the state-channel protocol of data over the network. We find that VADER to account for the above oddity, as described in adds only minimal overhead of 16% in median case Sec. 3.1. compared to the baseline VANILLA solution. As part of this work, we have systematically Outline: The rest of the paper is organized as studied exchange process in present day video de- follows. In Sec. 2, we formally describe the prob- livery platforms and used the insights to design lem and the solution requirements.
Recommended publications
  • Understanding the Motivations, Challenges and Needs of Blockchain Software Developers: a Survey
    Empirical Software Engineering manuscript No. (will be inserted by the editor) Understanding the Motivations, Challenges and Needs of Blockchain Software Developers: A Survey Amiangshu Bosu · Anindya Iqbal · Rifat Shahriyar · Partha Chakroborty Received: November 6, 2018 / Accepted: March 19, 2019 Abstract The blockchain technology has potential applications in various areas such as smart-contracts, Internet of Things (IoT), land registry, supply chain man- agement, storing medical data, and identity management. Although the Github currently hosts more than six thousand active Blockchain software (BCS) projects, few software engineering research has investigated these projects and its' contrib- utors. Although the number of BCS projects is growing rapidly, the motivations, challenges, and needs of BCS developers remain a puzzle. Therefore, the primary objective of this study is to understand the motivations, challenges, and needs of BCS developers and analyze the differences between BCS and non-BCS development. On this goal, we sent an online survey to 1,604 active BCS developers identified via mining the Github repositories of 145 popular BCS projects. The survey received 156 responses that met our criteria for analysis. The results suggest that the majority of the BCS developers are experienced in non-BCS development and are primarily motivated by the ideology of creating a decentralized financial system. Although most of the BCS projects are Open Source Software (OSS) projects by nature, more than 93% of our respondents found BCS development somewhat different from a non-BCS development as BCS projects have higher emphasis on security and reliability than most of the non- BCS projects. Other differences include: higher costs of defects, decentralized and hostile environment, technological complexity, and difficulty in upgrading the soft- ware after release.
    [Show full text]
  • A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets
    Journal of Risk and Financial Management Review A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets Nikolaos A. Kyriazis Department of Economics, University of Thessaly, 38333 Volos, Greece; [email protected] Abstract: This study is an integrated survey of GARCH methodologies applications on 67 empirical papers that focus on cryptocurrencies. More sophisticated GARCH models are found to better explain the fluctuations in the volatility of cryptocurrencies. The main characteristics and the optimal approaches for modeling returns and volatility of cryptocurrencies are under scrutiny. Moreover, emphasis is placed on interconnectedness and hedging and/or diversifying abilities, measurement of profit-making and risk, efficiency and herding behavior. This leads to fruitful results and sheds light on a broad spectrum of aspects. In-depth analysis is provided of the speculative character of digital currencies and the possibility of improvement of the risk–return trade-off in investors’ portfolios. Overall, it is found that the inclusion of Bitcoin in portfolios with conventional assets could significantly improve the risk–return trade-off of investors’ decisions. Results on whether Bitcoin resembles gold are split. The same is true about whether Bitcoins volatility presents larger reactions to positive or negative shocks. Cryptocurrency markets are found not to be efficient. This study provides a roadmap for researchers and investors as well as authorities. Keywords: decentralized cryptocurrency; Bitcoin; survey; volatility modelling Citation: Kyriazis, Nikolaos A. 2021. A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets. Journal of Risk and 1. Introduction Financial Management 14: 293. The continuing evolution of cryptocurrency markets and exchanges during the last few https://doi.org/10.3390/jrfm years has aroused sparkling interest amid academic researchers, monetary policymakers, 14070293 regulators, investors and the financial press.
    [Show full text]
  • Cuba: Issues for the 111Th Congress
    Cuba: Issues for the 111th Congress Mark P. Sullivan Specialist in Latin American Affairs September 3, 2010 Congressional Research Service 7-5700 www.crs.gov R40193 CRS Report for Congress Prepared for Members and Committees of Congress Cuba: Issues for the 111th Congress Summary Cuba remains a hard-line communist state with a poor record on human rights. The country’s political succession in 2006 from the long-ruling Fidel Castro to his brother Raúl was characterized by a remarkable degree of stability. The government of Raúl Castro has implemented limited economic policy changes, but there has been disappointment that further reforms have not been forthcoming. The economy was hard hit by storms in 2008, and the global financial crisis has caused further strains. Few observers expect the government to ease its tight control over the political system, although it did agree in July 2010 to release 52 political prisoners after talks with the Cuban Catholic Church. Since the early 1960s, U.S. policy has consisted largely of isolating Cuba through economic sanctions. A second policy component has consisted of support measures for the Cuban people, including U.S.-sponsored broadcasting and support for human rights activists. In light of Fidel Castro’s departure as head of government, many observers have called for a re-examination of policy with two broad approaches advanced: an approach that would maintain the dual-track policy of isolating the Cuban government while providing support to the Cuban people; and an approach aimed at changing attitudes in the Cuban government and society through increased engagement.
    [Show full text]
  • Blockchain and The
    NOTES ACKNOWLEDGMENTS INDEX Notes Introduction 1. The manifesto dates back to 1988. See Timothy May, “The Crypto Anarchist Manifesto” (1992), https:// www . activism . net / cypherpunk / crypto - anarchy . html. 2. Ibid. 3. Ibid. 4. Ibid. 5. Ibid. 6. Timothy May, “Crypto Anarchy and Virtual Communities” (1994), http:// groups . csail . mit . edu / mac / classes / 6 . 805 / articles / crypto / cypherpunks / may - virtual - comm . html. 7. Ibid. 8. For example, as we wi ll describe in more detail in Chapter 1, the Bitcoin blockchain is currently stored on over 6,000 computers in eighty- nine jurisdictions. See “Global Bitcoin Node Distribution,” Bitnodes, 21 . co, https:// bitnodes . 21 . co / . Another large blockchain- based network, Ethereum, has over 12,000 nodes, also scattered across the globe. See Ethernodes, https:// www . ethernodes . org / network / 1. 9. See note 8. 10. Some blockchains are not publicly accessible (for more on this, see Chapter 1). These blockchains are referred to as “private blockchains” and are not the focus of this book. 11. See Chapter 1. 12. The Eu ro pean Securities and Market Authority, “Discussion Paper: The Dis- tributed Ledger Technology Applied to Securities Markets,” ESMA / 2016 / 773, June 2, 2016: at 17, https:// www . esma . europa . eu / sites / default / files / library / 2016 - 773 _ dp _ dlt . pdf. 213 214 NOTES TO PAGES 5–13 13. The phenomena of order without law also has been described in other con- texts, most notably by Robert Ellickson in his seminal work Order without Law (Cambridge, MA: Harvard University Press, 1994). 14. Joel Reidenberg has used the term “lex informatica” to describe rules imple- mented by centralized operators online.
    [Show full text]
  • List of Cryptoassets That Can Be Legally Traded in Indonesia
    List of Cryptoassets That Can Be Legally Traded in Indonesia Approved cryptoassets under Bappebti Regulation No. 7 of 2020 regarding the Stipulation of the List of Cryptoassets that Are Allowed to Be Traded in the Cryptoasset Physical Market. 1. Bitcoin 81. Verge 161. Storm 2. Ethereum 82. Pax gold 162. Vertcoin 3. Tether 83. Matic network 163. Ttc 4. Xrp/ripple 84. Kava 164. Metadium 5. Bitcoin cash 85. Komodo 165. Pumapay 6. Binance coin 86. Steem 166. Nav coin 7. Polkadot 87. Aelf 167. Dmarket 8. Chainlink 88. Fantom 168. Spendcoin 9. Lightcoin 89. Horizen 169. Tael 10. Bitcoin sv 90. Ardor 170. Burst 11. Litecoin 91. Hive 171. Gifto 12. Crypto.com coin 92. Enigma 172. Sentinel protocol 13. Usd coin 93. V. Systems 173. Quantum resistant ledger 14. Eos 94. Z coin 174. Digix gold token 15. Tron 95. Wax 175. Blocknet 16. Cardano 96. Stratis 176. District0x 17. Tezos 97. Ankr 177. Propy 18. Stellar 98. Ark 178. Eminer 19. Neo 99. Syscoin 179. Ost 20. Nem 100. Power ledger 180. Steamdollar 21. Cosmos 101. Stasis euro 181. Particl 22. Wrapped bitcoin 102. Harmony 182. Data 23. Iota 103. Pundi x 183. Sirinlabs 24. Vechain 104. Solve.care 184. Tokenomy 25. Dash 105. Gxchain 185. Digitalnote 26. Ehtereum classic 106. Coti 186. Abyss token 27. Yearn.finance 107. Origin protokol 187. Cake 28. Theta 108. Xinfin network 188. Veriblock 29. Binance usd 109. Btu protocol 189. Hydro 30. Omg network 110. Dad 190. Viberate 31. Maker 111. Orion protocol 191. Rupiahtoken 32. Ontology 112. Cortex 192.
    [Show full text]
  • A Decentralized Digital Content Marketplace
    LBRY: A Decentralized Digital Content Marketplace Alex Grintsvayg ([email protected]), Jeremy Kauman ([email protected]) Introduction LBRY is a protocol for accessing and publishing digital content in a global, decentralized marketplace. LBRY uses a public blockchain to provide a single shared index of published content, as well as content discovery and payment. Clients can use LBRY to publish, host, find, download, and pay for content — books, movies, music, or anything else that can be represented as a stream of bits. The protocol is permissionless and censorship-resistant, which means that participation is open to everyone and no one can unilaterally block or remove content. Before LBRY, publishers had to choose between a centralized host such as Amazon or Youtube, or a protocol like Bittorrent. Centralized platforms suer from several problems because their incentives are not aligned with the incentives of their users. Hosts engage in rent-seeking behavior, oen extracting 30-55% of creator profits. They enforce opaque and arbitrary rules on creators, and change those rules without warning or community input. They choose to censor content at the behest of repressive regimes around the world, in exchange for access to more users and higher profits for themselves. Bittorrent does not have these faults, but it has problems of its own. It is only useful if one already knows the infohash of the content they seek, and there is no way to discover these hashes within the protocol. Even using an external search engine does not provide a comprehensive list of what is available on the network. There are no incentives for users to seed content, and Bittorrent largely works because users earn status through private communities, are nice, or simply fail to understand what their client is doing.
    [Show full text]
  • June 21, 2014 (Pages 3739-3914)
    Pennsylvania Bulletin Volume 44 (2014) Repository 6-21-2014 June 21, 2014 (Pages 3739-3914) Pennsylvania Legislative Reference Bureau Follow this and additional works at: https://digitalcommons.law.villanova.edu/pabulletin_2014 Recommended Citation Pennsylvania Legislative Reference Bureau, "June 21, 2014 (Pages 3739-3914)" (2014). Volume 44 (2014). 25. https://digitalcommons.law.villanova.edu/pabulletin_2014/25 This June is brought to you for free and open access by the Pennsylvania Bulletin Repository at Villanova University Charles Widger School of Law Digital Repository. It has been accepted for inclusion in Volume 44 (2014) by an authorized administrator of Villanova University Charles Widger School of Law Digital Repository. Volume 44 Number 25 Saturday, June 21, 2014 • Harrisburg, PA Pages 3739—3914 Agencies in this issue The Courts Department of Banking and Securities Department of Community and Economic Development Department of Education Department of Environmental Protection Department of Health Department of Public Welfare Independent Regulatory Review Commission Insurance Department Legislative Reference Bureau Pennsylvania Public Utility Commission Philadelphia Parking Authority State Charter School Appeal Board State Employees’ Retirement Board State Ethics Commission State Real Estate Commission Detailed list of contents appears inside. Latest Pennsylvania Code Reporter (Master Transmittal Sheet): Pennsylvania Bulletin Pennsylvania No. 475, June 2014 TYPE OR PRINT LEGIBLY Attn: 800 Church Rd. W. 17055-3198 PA Mechanicsburg,
    [Show full text]
  • The Rise and Fall of Cryptocurrencies
    The Rise and Fall of Cryptocurrencies Amir Feder∗ Neil Gandal Berglas School of Economics Berglas School of Economics Tel Aviv University, Israel Tel Aviv University, Israel [email protected] [email protected] JT Hamrick Tyler Moore Tandy School of Computer Science Tandy School of Computer Science The University of Tulsa, USA The University of Tulsa, USA [email protected] [email protected] Marie Vasek Department of Computer Science University of New Mexico, USA [email protected] July 30, 2018 Abstract Since Bitcoin's introduction in 2009, interest in cryptocurrencies has soared. One manifestation of this interest has been the explosion of newly created coins. This paper examines the dynamics of coin creation, competition and destruction in the cryptocurrency industry. In order to conduct the analysis, we develop a methodology to identify peaks in prices and trade volume, as well as when coins are abandoned and subsequently \resurrected". We study trading activity associated with 1 082 coins over a nearly five-year period. We present evidence that the more frequently traded coins experience the biggest price rises. They are also much less likely to be abandoned, that is, to experience a drop in average trading volume to below 1% of a prior peak value. Overall, we find that 44% of publicly-traded coins are abandoned, at least temporarily. 71% of abandoned coins are later resurrected, leaving 18% of coins to fail permanently. We then examine the association between entry and exit and other key variables such as price, volume, and market capitalization in order to analyze and provide intuition underpinning the fundamentals in this market.
    [Show full text]
  • Cuba: Issues for the 110Th Congress
    Order Code RL33819 Cuba: Issues for the 110th Congress Updated September 24, 2008 Mark P. Sullivan Specialist in Latin American Affairs Foreign Affairs, Defense, and Trade Division Cuba: Issues for the 110th Congress Summary Since the early 1960s, U.S. policy toward Cuba has consisted largely of isolating the communist nation through economic sanctions, which the Bush Administration has tightened significantly. A second policy component has consisted of support measures for the Cuban people, including private humanitarian donations and U.S.-sponsored radio and television broadcasting to Cuba. As in past years, the main issue for U.S. policy toward Cuba in the 110th Congress has been how to best support political and economic change in one of the world’s remaining communist nations. Unlike past years, however, Congress is examining policy toward Cuba in the context of Fidel Castro’s departure from heading the government because of poor health. Raúl Castro, who had served as provision head of government since July 2006, was selected on February 24, 2008 by Cuba’s legislature to continue in that role officially. In the 110th Congress, Congress fully funded the Administration’s FY2008 request for $45.7 million for Cuba democracy programs in the Consolidated Appropriations Act for FY2008 (P.L. 110-161). In other action, on July 27, 2007, the House rejected H.Amdt. 707 to H.R. 2419, the 2007 farm bill, that would have facilitated the export of U.S. agricultural exports to Cuba. On May 21, 2008, the Senate approved S.Res. 573, recognizing the struggle of the Cuban people.
    [Show full text]
  • Building Resilience & Confronting Risk
    BUILDING RESILIENCE & CONFRONTING RISK A PARENTS & CAREGIVERS GUIDE TO ONLINE RADICALIZATION POLARIZATION AND EXTREMISM RESEARCH AND INNOVATION LAB (PERIL) PERIL brings the resources and expertise of the university sector to bear on the problem of growing youth polarization and extremist radicalization, through scalable research, intervention, and public education ideas to reduce rising polarization and hate. SOUTHERN POVERTY LAW CENTER The SPLC seeks to be a catalyst for racial justice in the South and beyond, working in partnership with communities to dismantle white supremacy, strengthen intersectional movements, and advance the human rights of all people. CONTENTS PARENTS & CAREGIVERS GUIDE 3 WHAT IS ONLINE RADICALIZATION? WHY SHOULD YOU CARE? 4 RECOGNIZING WARNING SIGNS 5 UNDERSTANDING THE DRIVERS 6 ENGAGE & EMPOWER 8 RESPONDING TO HATE 10 HOW TO GET HELP 11 APPENDIX: STAYING ALERT TO SITES, PLATFORMS, & APPS FREQUENTLY EXPLOITED BY EXTREMISTS 15 ENDNOTES 16 CREDITS 17 ILLUSTRATIONS BY CLAUDIA WHITAKER Whether you live with a young person, or now work virtually with youth, radicalization to extremism is something we all should be concerned about. Extremists looking to recruit and convert children are predatory. Like all forms of child exploitation, extremist recruitment drives a wedge between young people and the adults they would typically trust. Radicalization is a problem for our entire society, from the innocent people it victimizes to the family bonds it breaks apart. 2 A PARENTS AND CAREGIVERS GUIDE TO ONLINE RADICALIZATION PARENTS & CAREGIVERS GUIDE Who is this guide for? We wrote this guide with a wide range Whether you live with a young person or work with youth of caregivers in mind.
    [Show full text]
  • Alternative Assets and Cryptocurrencies
    Journal of Alternative Assets and Cryptocurrencies Edited by Christian Hafner Printed Edition of the Special Issue Published in Journal of Risk and Financial Management www.mdpi.com/journal/jrfm Alternative Assets and Cryptocurrencies Alternative Assets and Cryptocurrencies Special Issue Editor Christian Hafner MDPI • Basel • Beijing • Wuhan • Barcelona • Belgrade Special Issue Editor Christian Hafner Universite´ catholique de Louvain Belgium Editorial Office MDPI St. Alban-Anlage 66 4052 Basel, Switzerland This is a reprint of articles from the Special Issue published online in the open access journal Journal of Risk and Financial Management (ISSN 1911-8074) from 2017 to 2018 (available at: https:// www.mdpi.com/journal/jrfm/special issues/alternative assets and cryptocurrencies) For citation purposes, cite each article independently as indicated on the article page online and as indicated below: LastName, A.A.; LastName, B.B.; LastName, C.C. Article Title. Journal Name Year, Article Number, Page Range. ISBN 978-3-03897-978-4 (Pbk) ISBN 978-3-03897-979-1 (PDF) c 2019 by the authors. Articles in this book are Open Access and distributed under the Creative Commons Attribution (CC BY) license, which allows users to download, copy and build upon published articles, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications. The book as a whole is distributed by MDPI under the terms and conditions of the Creative Commons license CC BY-NC-ND. Contents About the Special Issue Editor ...................................... vii Preface to ”Alternative Assets and Cryptocurrencies” ........................ ix Christian Conrad, Anessa Custovic and Eric Ghysels Long- and Short-Term Cryptocurrency Volatility Components: A GARCH-MIDAS Analysis Reprinted from: J.
    [Show full text]
  • The University of Tulsa the Graduate School Price
    THEUNIVERSITYOFTULSA THE GRADUATE SCHOOL PRICE MANIPULATION IN THE CRYPTOCURRENCY ECOSYSTEM by JT Hamrick A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Discipline of Computer Science The Graduate School The University of Tulsa 2020 THEUNIVERSITYOFTULSA THE GRADUATE SCHOOL PRICE MANIPULATION IN THE CRYPTOCURRENCY ECOSYSTEM by JT Hamrick A DISSERTATION APPROVED FOR THE DISCIPLINE OF COMPUTER SCIENCE By Dissertation Committee Tyler Moore, Chair Mauricio Papa John Hale Neil Gandal Nicolas Christin ii ABSTRACT JT Hamrick (Doctor of Philosophy in Computer Science) PRICE MANIPULATION IN THE CRYPTOCURRENCY ECOSYSTEM Directed by Tyler Moore 164 pp., Chapter 10: Conclusions (355 words) In the recent past the cryptocurrency ecosystem has seen explosive growth. What was once a small market, made popular with the introduction of Bitcoin in 2009, has now grown to a pseudo-financial system with a market capitalization of over 230 billion USD. Many of the cryptocurrencies available have been built with security in mind, utilizing a public ledger as well as safe-guards against counterfeiting. One might be led to believe that the public nature of cryptocurrencies would make them an infrequent target for criminal activity. However, that is not entirely the case. Many of the services utilized by the cryptocurrency ecosystem are centralized utilities that store transactions in databases that, while partially made public through data endpoints, are not attached to the blockchain. This dissertation leverages public data, typically through off-chain utilities, to study cybercriminal activities. First, the impact that distributed denial-of-services attacks have on the Bitcoin ecosystem was investigated by examining trading activity on the Mt.
    [Show full text]