Preventing the bitcoin Double Spend using Transaction Hash and Unspent Transaction Output
A. Murugan1, J. Vijayalakshmi2

1Dr. A. Murugan, Associate Professor and Head of the Department of PG and Research in Computer Science.
2J. Vijayalakshmi, research scholar of PG & Research Department of Computer Science in Dr. Ambedkar Govt. Arts College. She obtained her Master of Philosophy(M.Phil) degree in Computer Science at Bharathidasan college, Tiruchirappalli.

Manuscript received on 01 August 2019. | Revised Manuscript received on 09 August 2019. | Manuscript published on 30 September 2019. | PP: 3771-3776 | Volume-8 Issue-3 September 2019 | Retrieval Number: C5352098319/2019©BEIESP | DOI: 10.35940/ijrte.C5352.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The red-hot crypto currency is a bitcoin which occupies first position in the capital investment of financial world which is assaulted by various factors like wallet attacks, network attacks, mining attacks and double spending attacks. Double spending is the major attack in which the attacker tries to cheat the network nodes and use the same coin for more than one set of transactions. Of this the original transaction identification from the set of transactions is a challenging one. In this paper we propose a solution for identifying the primary transaction from the set of double spended or multi spended transactions. The proposed approach finds the authentic transaction from the list of double spended transactions using transaction hash value, which is primarily used for every transaction in the Bitcoin network. Transaction hash value is used as transaction identifier for each bitcoin transaction. By comparing the transaction hash value with the existing pool of unconfirmed input pool, transhash pool and utxopool one can identify the genuine transaction from the flawed transaction list. The firsthand transaction is then added to the Confirmed input pool which is then entered into the newly added block of the blockchain. This architecture will prevent the double spend of bitcoin further in the network which facilitates the network nodes as well as minimize the miners task for verification and validation of transaction.
Keywords: Blockchain, Double Spending, UTXOpool, Inputpool, Transactionhash

Scope of the Article:
Block Chain-Enabled IoT Device and Data Security and Privacy