You are on page 1of 6

Research Article

Special Issue

Machine Learning For Money Laundering


Detection In The Block chain Financial
Transaction System
Slobodan Jovicic, Dr. Qing Tan
Athabasca University, Canada
dan.jovicic@gmail.com
qingt@athabascau.ca

Published online: 5 March 2018


Abstract—Blockchain technology implements the public- private
settlements. The guideline on money laundering prevention that
is published by the international Financial Action Task Force
key architecture to achieve trust and security as identification of
stipulates that money movements that exceed $10,000 as single
parties involved in the electronic fund transfer is based on or multiple transactions are to be suspected of money laundering
private key encryption; in this sense, privacy is absent in the and should be reported to a Financial Intelligence Unit (FIU) of
blockchain paradigm as every node in the peer-to-peer network the country where transactions occurred [3]. Developed
is notified of committed electronic fund transfers and is able to countries have adopted guidelines on combating money
read the details of the transaction. Financial institutions will need laundering that are published by the Financial Action Task
to revise money laundering detection practices to satisfy Force (on Money Laundering) (FATF), an intergovernmental
operational changes with the move away from the SWIFT agency that was established to define anti-money laundering
network to the blockchain peer-to-peer network. The efficiency of standards. Financial services organizations that are operating in
the blockchain model will introduce transactional efficiencies that countries where FATF guidelines were implemented are then
speed up the electronic fund transfer process. Financial obligated by law to implement procedures for the detection of
institutions will need to implement advanced money laundering suspicious financial transactions, and to have those transactions
detection mechanisms that will be facilitated with the use of reported to their respective countries’ FIUs.
machine learning. This paper examines techniques for the
application of blockchain technology to electronic fund transfers The industry standard for international electronic money
and the machine learning approaches to detect money laundering. movement is a set of ISO standards that was introduced by the
Society of Worldwide Interbank Financial Transactions
I. INTRODUCTION (SWIFT) starting with its establishment in 1973 in Brussels.
Financial services organizations sign on to SWIFT membership
A. Money laundering, past and present to perform electronic money transfers amongst themselves.
The perpetration of financial fraud has been evolving in More concretely, SWIFT is a non-profit operator of a network
parallel with the innovation in the field of finance. Whereas for secure exchange of electronic messages that facilitates
early types of financial fraud consisted of theft or creation of money settlements among members [4]. The adoption of
fake coinage to represent the value of official gold or silver SWIFT as the standard for electronic fund transfer (EFT) in 200
coinage, more recent types have been manifested as countries around the globe has resulted in it being the de facto
legitimizations of moneys that originated from income of global platform for money movement. Two issues arise from
criminal activity and circumventions of payments for taxes and this state. First is political, where the fact that SWIFT is a
duties. The adoption of computing technologies by the financial singular entity residing in the Western political sphere then it
services industry caused money laundering practices to follow could be used as a tool to exercise political will on
suit. Adoptions of cybersecurity policies by Financial uncooperating countries or organization through forceful
Institutions (FI) that focus on malware and phishing scam embargoes on SWIFT membership. The second is operational
detection could only partially achieve the prevention of efficiency where transactional fees charged to members by
financial fraud [1]. The practice of money laundering is a form SWIFT to cover its operational cost may be considered costly
of financial fraud that is considered to be the use (or, the hiding by members and, therefore, create an opportunity for a
of the source) of revenue that originates from criminal or illegal replacement EFT method to be sought by those members that
activity [2]. An additional layer of money laundering detection are interested in cost reduction. Considering the two concerns
is needed to supplement cybersecurity policies to achieve that exist with SWIFT, it is plausible to expect that either
financial fraud prevention. Anti-money laundering laws that financial services organizations seeking lower operational cost
aim to curb money laundering practices are based on the
recording of movement of moneys through electronic money
Qing Tan is an associate professor with the School of Computing and
Information Systems at Athabasca University, and his e-mail is
qingt@athabascau.ca
Slobodan Jovicic is a graduate student with the School of Computing and
Information Systems at Athabasca University, and his e-mail is:
dan.jovicic@gmail.com.

doi: http://dx.doi.org/10.4314/jfas.v10i4s.123

J Fundam Appl Sci. 2018, 10(4S), 376-381 376


or foreign governments seeking independence in an EFT system II. REVIEW OF RELATED LITERATURE
will invest resources into an evolving and competing
technology. It has been suggested that blockchain technology A. Electronic Fund Transfer
could meet these requirements due to its ability to achieve The foundation of commerce is trust; business entities need
transactional transparency over a peer-to-peer network where to establish trust amongst themselves in order to exchange
all nodes play equal roles without a need for intermediaries [5]. goods or services for money. To streamline the means of
The establishment of the SWIFT infrastructure inhibited the establishing trust in business, human social development had
ability of criminals to launder money as the facilitation of EFTs introduced enforceable laws expressed as written contracts [6].
leaves an electronic trail that could be followed to establish a Enforceable laws are a substitute for trust when it is either
pattern. In the event that the international financial services impractical or insufficient to establish interpersonal
community adopts blockchain as the basis for a new platform relationships to achieve trust. The advent of computing
for EFTs then an evaluation of the technology as it relates to technologies has introduced computer automation in everyday
anti-money laundering detection practices will be of value to applications. Payment automation allows for execution of EFTs
global financial services organizations as means to identify that enable businesses and customers to exchange money for
suspicious transactions that are reportable to FIUs. The purpose goods and services. Every payment, or EFT, is a contract
of this research is to identify methods for the identification of between two parties; the contract is facilitated as money
transactions suspicious of money laundering in the blockchain settlement by one or more FI. Payment automation is made
transactional system. possible by computing technologies that are based on
enforceable laws that create trust between the entities such as
B. Research objectives, methodology and limitations businesses and customers. FIs are dependent on instituting trust
This research examines security properties of blockchain and computing technologies to achieve the prevention of
technology as it applies to the execution of financial financial fraud in EFTs for clients. Technology brings about
transactions in a trusted peer-to-peer network. The results of the efficiency to EFTs as membership to the SWIFT network allows
examination will be evaluated to determine practices for the FIs to securely exchange messages that contain instructions on
prevention of money laundering that meet legal obligations for money movement to banks’ clearinghouses [7]. FIs delegate the
financial services organizations. Large volumes of electronic establishment of trust with partnering FIs by subscribing for
money transfers executed by financial services organizations membership to the SWIFT network. With over 8,000 members
cause human analysis of such transactions for the purposes of and presence in over 200 countries [4], the SWIFT network
identification of suspicious transactions to be impractical. The makes it practical for FIs to utilize the network to meet clients’
automation of the identification of suspicious transactions needs for money movement yet to not be concerned about the
through the application of machine learning is essential. legitimacy of money movement instructions that are delivered
Therefore, the objective of this research is to assess to what by the SWIFT network. An interdependence on trust in the
degree compliance to anti-money laundering laws in a trusted SWIFT network for FIs ensures the legitimacy money
peer-to-peer network blockchain architecture for EFTs requires movement instructions. Additional means of achieving
usage of machine learning. The research is based on review of trustworthiness are the abilities of FIs’ to maintain proper
peer reviewed material published in academic journals with accounting ledgers as the prosperity and creditworthiness of
high impact factors, books and related materials published by businesses is directly related to the reliability of its accounts [8].
subject matter experts, dictionaries for word definitions, and What follows is that the execution of EFTs for FIs is contingent
related resources published on the internet. Research topics on maintenance of accounting ledgers that exist outside of the
relate to blockchain technology as it applies to the execution of bounds of the SWIFT network as it does not manage accounts
EFTs for the financial services industry, anti-money laundering on behalf of members [4]. Then, FIs have three dependencies
legislation, and machine learning for pattern recognition of for EFT. First, they are required to sign on with SWIFT for
transactions suspected of money laundering. Application of membership as it is the de facto financial industry standard for
blockchain technology is not limited to the financial services EFTs. Second, FIs must perform due diligence on clients and
industry, but this research will be limited to the application of maintain accounting ledgers to maintain trustworthiness with
blockchain technology to the financial services industry. the objective to prevent financial fraud. Third, the state of the
Executions of EFTs using blockchain technology that may be industry necessitates for the existence of FI clearinghouses to
subjected to types of criminal activity not classified as money facilitate money movement based on instructions obtained from
laundering will be excluded from this research. The research messages that originate from SWIFT participants. The
will be limited to literature review and an evaluation of a administration overhead that exists may influence FIs to seek
conceptual model of an application of blockchain technology in alternative technology solutions that would yield cost reduction.
a trusted peer-to-peer network for the purposes of EFT
facilitation. B. Blockchain technology
Blockchain is a potentially transformational technology for
Next sections of this paper will include literature review, an the financial services industry. It has been described so as it
evaluation of a conceptual model and a discussion of the addresses trust, fraud and error concerns due to its design for
findings. identity check, transaction authentication, transaction accuracy
and reliability [9]. Blockchain is a technology that is akin to a
database as it represents a sequence of data blocks but exists in
a peer-to-peer network so that the data does not need to reside
on any single computer. Each block of data is linked together

J Fundam Appl Sci. 2018, 10(4S), 376-381 377


into a distributed ledger system that allows tamper-proof history depend for money movement; this ability, in fact, is the
to be recorded such that the distributed ledger acts as a public manifestation of a concept named smart contracts, or
notary of historical events [10]. Trust in blockchain technology technology that enables the carrying out of computation on a
is achieved by implementing a public key infrastructure such network (i.e. payment that is conditional on the state of some
that each data part that comprises a block represents information internal or external variables) [14]. The blockchain metadata
could be employed to contain money movement instructions
that is encrypted with the private key of the entity that is adding that are equal to those that are communicated over the SWIFT
the data part to the block. This design allows blockchain peers network.
to decrypt data that is stored in blocks by using that entity’s
public key and in the process to authenticate the data that has C. Money laundering and blockchain
been added to the blockchain. Trust is inherent in the design of Governments may choose to adopt risk-based
blockchain as safekeeping of an entity’s private key is recommendations on combating Anti-Money Laundering
fundamental to the verification of that entity’s identity. (AML) and Counter Financing of Terrorism (CFT) that are
Cryptography in computing has advanced to a point that defined by FATF [3]. The recommendations are not explicit
requires a million years of computing for a supercomputer to instructions on the means of formulating laws, instead countries
crack an encryption [11]. Applications of modern encryption are guided to define internal laws for each of the forty
algorithms to blockchain architecture cause preventions of recommended concerns. FATF recommends creating FIUs to
private key forgeries as the process is deemed to be serve as national centers for the receipt and analysis of
computationally prohibitive, consequently ensuring that trust in suspicious transaction reports and related information that is
data integrity is maintained across the peer-to-peer network. indicative of money laundering activities [3]. Data that is
The architecture of blockchain technology allows for the accumulated by FIUs is composed of transactions that are
embedding of metadata to the encrypted block of data. The suspected of money laundering; suspicious transactions are
ability to transport metadata with a high degree of confidence is EFTs that exceed $10,000 in value and are executed as single or
a potentially good fit for the financial services industry as multiple transactions within a 24-hour period. Then, FIs are
replacement technology for clearinghouses. Blockchain required to maintain internal processes and client records that
technology does away with the traditional clearinghouse model are necessary to meet local FIU reporting obligations. Identity
that requires each FI to maintain its own set of books that must is inherent in the blockchain ledger as each data block is
be reconciled with peers’ books through a costly and slow encrypted with an entity’s private key. Blockchain architecture
operation that is difficult to automate [12]. The blockchain lacks transactional privacy as changes to the blockchain are
design incorporates a broadcast of data block changes across the communicated to all nodes in the peer-to-peer network, and are
peer-to-peer network to achieve synchronization of ledgers by default public [19]. Privacy could be partially achieved by
among the nodes [13]. The term ledger in the blockchain context providing relationship anonymity with the use of anonymization
is used to describe the blockchain itself as it represents the tools that perform block mixing such that resulting transactions
chronological database of transactions that is recorded by that are added to the blockchain have anonymized senders of
networked computers [14]. The implementation of blockchain those transactions [20]. Full anonymity could be achieved given
technology to financial services industry attains clearinghouse that public-private key pairs can be generated by anyone with a
automation and ensures reconciliation of books for FIs. The computer and identity associated to those key pairs could be
operational efficiency of blockchain within the peer-to-peer falsified. Furthermore, due to the ease with which it is possible
network is not dependent on any particular technology or scale to create public-private key pairs it has been suggested as good
of participation. The transactional efficiency has been practice to create new sets of keys for every transaction to
demonstrated with the rise of the Bitcoin cryptocurrency whose achieve anonymity [21]. However, public-private key pairs that
low transaction fees make it appealing as an alternative to fiat are embedded in X.509 certificates and generated by trusted
currency [15]. The Bitcoin cryptocurrency operates in a public Certificate Authorities (CA) represent authentic identities as
peer-to-peer network where any node on the network could CAs must apply rigor to due diligence on clients by collecting
apply changes to the ledger. The public network makes Bitcoin and verifying personal information to issue certificates [22].
susceptible to operational disruption and damage to reputation Thus, achieving anti-money laundering objectives for FIs is
as malicious persons have equal access to the blockchain as made easier using blockchain provided that public-private key
legitimate persons; indeed, eighteen out of forty public Bitcoin pairs used to encrypt blocks of data are issued by CAs and that
exchanges where shut down due to attacks by hackers [16]. The the blockchain network operates as a trusted peer-to-peer
blocking of public access to a peer-to-peer network that is network where only those blocks that meet the strict encryption
dedicated to FIs would considerably reduce the risk of hacking. rules are permitted.
Operational cost could be reduced further in a private peer-to-
peer network as fewer transactions would need to be broadcast D. Money laundering detection with machine learning
across the network to fewer nodes on the network thus making Analysis of blockchain transactions for money laundering
the operation faster [17]. A private peer-to-peer network has an detection requires the use of computing technologies to
added benefit of enabling participating nodes to agree on a facilitate data block decryptions and to process large volumes
unique set of rules for the governing of applications, service of decrypted transactions that make human analysis impractical.
providers, data and users to achieve an additional layer of trust Data blocks contain metadata that represent financial contracts
[18]. Blockchain design characteristics that maintain privacy for the execution of money movement; senders are
and deliver metadata in a trusted peer-to-peer network enable it authenticated with the use of senders’ public keys to decrypt
to represent contracts on which financial instructions could data blocks while receivers’ information and money movement

J Fundam Appl Sci. 2018, 10(4S), 376-381 378


details are extracted from metadata. In the traditional bank as senders’ account numbers indicating where money would
clearinghouse realm, algorithmic analysis based on structural originate, receivers’ account numbers where money movement
similarity can be used to detect money laundering when would terminate, supporting details of transactions such as
intermediary accounts are used to transfer large sums of money amounts, currency types, exchange rates and transaction fees,
from the sender to the receiver [23]. Historical financial and one nonce per contract to ensure that each financial
transaction is executed only once.
transaction obfuscation that could be achieved with blockchain
architecture may make algorithmic analysis based on structural Contracts contained in blocks are encrypted with the FIs’
similarity not applicable to money laundering detection as the clients’ private keys in lieu of clients’ signatures for the
relationship between senders and receivers gets obscured when authorization of money movement and for authentication of
financial transactions are mixed [20]. Partial deanonymization money movement instructions by partner FIs (that is achieved
of blockchain transactions in a public peer-to-peer network with decryption of data blocks using clients’ public keys).
could be attained with a technique that analyses IP addresses of Public key certificates that have been issued by FIs as trusted
transactions sources that update the blockchain [24]. signers would accompany each contract to endorse financial
Anonymization that could be achieved with the hiding of source transactions. The establishment of a private peer-to-peer
IPs using Tor (the onion network that hides users’ IP addresses) network for the operation of blockchain technology would
has been described as not secure due to the potential man-in-the allow FIs to apply rules that enable it to be a trusted peer-to-peer
middle attack [25]. However, deanonymization would not be network; standardized governance over FIs’ internal controls
achieved by this technique in a trusted peer-to-peer network as and comprehensive cybersecurity policies would be fitting for a
source IP addresses would be traced to FIs rather than third FI to be classified as trusted. Each node, or FI, on the network
parties. Illegitimate FIs, malicious individuals, or FIs that reside would apply rigor to client due diligence as laid out in law and
in countries with strict privacy laws may perform transaction outlined in the FATF guideline. Consequently, every node
mixing to contribute to acts indicative of money laundering by would play the role of a CA to issue their clients sets of public-
achieving historical transaction obfuscation prior to adding private keys to get applied when executing financial
transactions to the blockchain. An unsupervised learning transactions on the trusted peer-to-peer network. The proposed
technique using k-means cluster analysis appeared to have architecture would, therefore, impart authenticity to contracts
identified individuals that were suspected of conducting money that are embedded into blocks on the blockchain and would
laundering using the transaction mixing technique [26]. This assure network peers that execution of payment instructions that
unsupervised learning technique identified strange behavior are embedded into blocks is binding. Transactions that are
where money transferred from one account to another was added to the blockchain are imprinted permanently as historical
accomplished using intermediary accounts. Link analysis, records of transactions that are shared by peers on the network.
another type of machine learning, was used to identify The operational efficiency of the blockchain technology comes
similarities in group behaviors of financial transactions in a at a cost of privacy as access to the blockchain by third parties
traditional interbank money movement system and was based would allow them the ability to learn about historical money
on guilt-by-association grouping that led researchers to money movements of FIs’ clients. The trusted peer-to-peer network
laundering detection [27]. The ability for third parties to hold model, however, safeguards against such exposure by limiting
inventories of public-private keys for employment in money access to the network only to verifiable FIs.
laundering may make supervised link analysis a better fit for
money laundering detection than unsupervised cluster analysis. B. Anonymization in trusted peer-to-peer networks
The unsupervised cluster analysis technique for money FIs are obligated to perform money laundering detection on
laundering detection is a good fit if rules exist that constrain the financial transactions and report suspicious transactions to
ability of third parties to hold large inventories of public-private FIUs. As blockchain is a record of historical transactions then it
keys. makes for streamlined tracing of money movements as
interbank reconciliation of ledgers is not required. Financial
transaction details that are embedded in the metadata of data
III. MACHINE LEARNING FOR MONEY LAUNDERING blocks contain information that can be analyzed by FIs to
DETECTION IN THE BLOCKCHAIN F INANCIAL TRANSACTION identify suspicious transactions. The trusted peer-to-peer
SYSTEM network assures that anonymity is not present in the execution
of financial transactions. This is because deanonymization
A. Trusted peer-to-peer network conceptual model techniques based on IP hiding would not be applicable since
The application of blockchain technology to the financial trusted peer-to-peer network rules would be crafted so as to
services industry addresses concerns of trust, financial fraud and permit only specific IP ranges to change the blockchain. The
errors, while at the same time achieves cost reduction for FIs by technique of creating multiples of fake public-private keys for
introducing efficiencies to interbank EFT operations. The use as intermediaries in money movement would not be allowed
inherent ability of blockchain technology to contain metadata as such key pairs would not have been issued by CAs.
enables it for application to the execution of EFTs. The
conceptual model of the application of blockchain technology C. Computer assisted money laundering detection
in a trusted peer-to-peer network is rooted in the idea that each The large volume of financial transactions necessitates use
block in the blockchain represents a collection of money of computing technologies for the purposes of identification of
movement contracts. The metadata that would be embedded in financial transactions that are suspected of money laundering.
a data block would contain money movement instructions such
Basic querying of data and algorithmic analysis based on

J Fundam Appl Sci. 2018, 10(4S), 376-381 379


structural similarity of blocks in the blockchain would produce computationally difficult to crack the private key thus making it
sets of financial transactions that have been identified to have a good fit for implementation to the encryption of blockchain
transacted amounts that are above the $10,000 threshold and transactions. Quantum computing research may produce
that would be reportable to FIUs. However, criminals that are machines capable of cracking transistor based cryptography in
intent on money laundering may resort to tactics that require FIs short amount of time thus requiring rapid transition quantum
to apply more comprehensive analysis to financial transactions.
Machine learning assisted analysis would contribute to further based cryptography [28]. There may be a period of transition in
identification of financial transactions that are suspected of cryptography when blockchain transactions may be susceptible
money laundering. Money laundering performed using the to fraud as imitation of public-private key pairs could cause
transaction mixing technique would be identifiable with an criminals to submit fraudulent transactions to the blockchain.
unsupervised machine learning method using k-means cluster Money laundering could be achieved by hijacking legitimate
analysis. This method may yield greater accuracy over its private keys from FIs’ unsuspecting clients, and using those
application in a traditional financial transaction system as private keys to conduct money movement. This is a potential
identification parameters in the blockchain transaction system area of research into machine learning assisted analysis of
are not limited to account numbers but contain certificates that money laundering detection. FIs should be cognizant of the
can be used to authenticate transactions across the blockchain.
developing quantum computing technology and prepare a
Criminals intent on laundering money may need to resort to
tactics where multiple sets of accounts are employed to transfer transition plan for adoption of quantum based cryptography.
money without intermixing transfers across those account sets; B. Blockchain transaction malleability
this practice would be indicative of a criminal group that is
attempting to launder money in smaller amounts across larger The Bitcoin implementation of the blockchain architecture
sets of accounts to achieve a greater success rate (i.e. some but contains a technical flaw known as transaction malleability. The
not all money laundering attempts get identified and funds standard operating procedure of the Bitcoin environment is for
seized). The supervised machine learning method utilizing link transactions that are submitted to the blockchain to get adopted
analysis would be able identify guilt-by-association groupings after a certain period when multiple transactions get bulked
of account sets to achieve money laundering detection. The together into a new block that gets added to the blockchain. It is
inability for criminals to create own public-private key pairs during this delayed period of processing that can be exploited as
increases the chances of money laundering detection of account a weakness. To facilitate the fraud a malicious person begins by
groups as criminals would have at their disposal few authentic submitting a legitimate transaction to transfer funds from their
public-private key pairs with which to conduct illegitimate
Bitcoin exchange owned account to another owned account but
operation. Likewise, any public-private key pair that is owned
by criminals and is authentic, in that it was issued by CAs and then submits a replica of the transaction with a different
has not yet been associated with criminal behavior, would be signature knowing that only one transaction will get added to
valuable to criminals. The conflating of the supervised and the blockchain, and should the replica get added the person can
unsupervised machine learning methods for money laundering claim a refund from the Bitcoin exchange and in effect defraud
detection in a trusted peer-to-peer blockchain financial the exchange [29]. The funds obtained through the practice are
transaction system would enable FIs to identify suspicious laundered moneys. The trusted peer-to-peer network is
transactions with a high degree of confidence. Furthermore, the protected from this attack in two ways. The first is that only
historical record of financial transactions available in the authorized nodes are permitted to change the blockchain thus
blockchain and shared across the peer-to-peer network would
preventing third parties to add changes to the blockchain
enable FIUs to either supplement or completely replace money
laundering detection that is performed by FIs; since FIUs and (although compromised nodes on the network could be
FIs would have access to same sets of historical records of commandeered for malicious purpose). The second is that the
financial transactions and identities. This change would Bitcoin model where public peer-to-peer nodes vote on
represent a fundamental shift in the role of FIUs in the financial adoption of transactions to blocks is absent in a proposed model
sector, but it would nonetheless be positive as it would achieve as trusted nodes contain cybersecurity measures to validate
cost reduction for FIs and likely achieve greater success rate at client requests, similar to the model that presently exist for the
money laundering detection as FIs are not required to meet traditional SWIFT financial transaction system.
certain money laundering detection benchmarks and their
money laundering detection practices vary as a result. C. Absence of privacy
Trusted and public peer-to-peer networks for blockchain
architecture hold shared properties such that both achieve trust
IV. ISSUES, CHALLENGES AND TRENDS at the expense of privacy. These properties are both benefits and
A. Confidence in cryptography barriers for adoption of blockchain technology in the financial
services industry as no uniformity on privacy exists among
The foundation of blockchain architecture is cryptography as
various jurisdictions around the world [30]. The adoption of a
it assures confidence in the integrity of transactions and the
trusted peer-to-peer network for the blockchain financial
metadata that is embedded into every transaction that contains
transaction system by global FIs would expose their clients’
money movement instructions. The asymmetric cryptography
EFT activity to all nodes as all changes are broadcast across the
of the public-private key architecture is such that it is

J Fundam Appl Sci. 2018, 10(4S), 376-381 380


network to synchronize transaction ledgers. This concern could [14] G.W. Peters and E. Panayi, Understanding Modern Banking Ledgers
be addressed with an implementation of interconnected regional through Blockchain Technologies: Future of Transaction Processing and
Smart Contracts on the Internet of Money, Banking Beyond Banks and
trusted peer-to-peer networks where cross border money Money, Springer International Publishing, 2016, pp239-278.
movements would be accomplished using FI omnibus accounts; [15] S. Barber, X. Boyen, E. Shi and E. Uzun, Bitter to better – how to make
this presents an opportunity for research into regional trusted bitcoin a better currency, International Conference on Financial
Cryptography and Data Security, 2012, pp399-414.
peer-to-peer networks and money laundering detection
[16] S.T. Ali, D. Clarke and P. McCorry, Bitcoin: Perils of an unregulated
practices related to transfers of funds between omnibus global p2p currency, Cambridge International Workshop on Security
accounts. Another solution that may address privacy concerns Protocols, 2015, pp283-293.
is the emerging blockchain framework Corda whose [17] M. Pilkington, Blockchain Technology: Principles and application,
Research Handbook on Digital Transformation, 2016.
development is supported by a consortium of global financial [18] D. Shrier, W. Wu and A. Pentland, Blockchain & Infrastructure
services organizations [31]. Research and publications on the (Identity, Data Security), Massachusetts Institute of Technology, 2016.
Corda framework is non-existent aside from self-published [19] A. Kosba, A. Miller, E. Shi, Z. Wen and C. Papamanthou, Hawk: The
whitepapers, thus presenting an opportunity for research into blockchain model of cryptography and privacy-preserving smart
contracts, IEEE Symposium on Security and Privacy (SP), 2016, pp839-
this evolving blockchain technology. 858.
[20] M. Moser, R. Bohme and D. Breuker, An inquiry into money
V. CONCLUSION laundering tools in the Bitcoin ecosystem, eCrime Researchers Summit
(eCRS), 2013, pp1-14.
This research presented a conceptual model of a trusted peer- [21] F. Reid and M. Harrigan, An analysis of anonymity in the bitcoin
to-peer network that implements blockchain technology to system, Security and privacy in social networks, 2013, pp197-223.
[22] S. Fatima, S. Ahmad and S. Siddiqui, X.509 and PGP Public Key
reduce the risk of money laundering. The employing of Infrastructure methods: A critical review, International Journal of
machine learning to money laundering detection in a trusted Computer Science and Network Security (IJCSNS), 2015, 15(5), 55.
peer-to-peer network could minimize money laundering [23] R. Soltani, U.T. Nguyen, Y. Yang, M. Faghani, A. Yagoub and A. An,
practices by criminals. Further research is required to evaluate A new algorithm for money laundering detection based on structural
similarity, IEEE Annual conference on Ubiquitous Computing,
the feasibility of the application of the model as an international Electronics & Mobile Communication (UEMCON), 2016, pp1-7.
standard for money movement. [24] A. Biryukov, D. Khovratovich and I. Pustogarov, Deanonymisation of
clients in Bitcoin P2P network, In Proceedings of the 2014 ACM
SIGSAC Conference on Computer and Communications Security, 2014,
REFERENCES pp15-29.
[1] T. Moore, The economics of cybersecurity: Principles and policy [25] A. Birykov and I. Pustogarov, Bitcoin over Tor isn’t a good idea, IEEE
options, International Journal of Critical Infrastructure Protection, Symposium on Security and Privacy (SP), 2015, pp122-134.
2010, 3(3), 103-117. [26] J. Hirshman, Y. Huang and S. Macke, Unsupervised approaches to
[2] D. Masciandaro, Money laundering: the economics of regulation, detecting anomalous behavior in the bitcoin transaction network,
Technical report, Stanford University, 2013.
European Journal of Law and Economics, 1999, 7(3), 225-240.
[3] Financial Action Task Force (FATF), International Standard on
[27] S.A. Macskassy and F. Provost, Suspicion Scoring Based on Guilt by
Association, Collective Inference, and Focused Data Access, In
Combating Money Laundering and the Financing of Terrorism &
Proceedings of the International Conference on Intelligence Analysis,
Proliferation, FATF, 2012.
2005.
[4] S.V. Scott and M. Zachariadis, Origins and development of SWIFT,
London School of Economics, Business History, 2012, 54(3), 462-482.
[28] P. Techateerawat, A Review on Quantum Cryptography Technology,
International Transaction Journal of Engineering, Management &
[5] Cash & Treasury Management file. (2016, April 5). Will blockchain Applied Sciences & Technologies, 2010, 1, pp35-41.
undermine SWIFT’s monopoly? Retrieved January 08, 2017, from
https://ctmfile.com/story/will-blockchain-undermine-swifts-monopoly
[29] M. Andrychowicz, S. Dziembowski, D. Malinowski and L. Mazurek,
On the malleability of bitcoin transactions, International Conference on
[6] “Contract”, Oxford English Dictionary, 2017. Financial Cryptography and Data Security, 2015, pp1-15.
[7] N. Ivannikov, R. Cvetkovic and V. Lilic, Innovations in International [30] M. Buitenhek, Understanding and applying Blockchain technology in
Payments, International Journal of Economics & Law, 2014, (11), 45- banking: Evolution or revolution?, Journal of Digital Banking, 2016,
50. 1(2), pp111-119.
[8] B. Rosen, Best Practices for Accounting Procedures for Micro, Small [31] R.G. Brown, J. Carlyle, I. Grigg and M. Hearn, Corda: An Introduction,
and Medium-Sized Businesses, Arizona Journal of International and R3 CEV, 2016.
Comparative Law, 2016, 33, 317.
[9] D. Shrier, D. Sharma and A. Pentland, Blockhain & Financial Services:
The Fifth Horizon of Networked Innovation, Massachusetts Institute of
Technology, 2016.
[10] T. Hardjono, Preserving Data Privacy in the IoT World, Massachusetts
Institute of Technology, 2016.
[11] V.R.R. Atukuri, C. Mathe, R. Mathe and P. Venubabu, Implementing
Secure Channel for Data Transmission, International Journal of
Advanced Research in Computer Science and Electronics Engineering
(IJARCSEE), 2012, 1(6), pp-139.
[12] R. Sams, Bitcoin Blockchain for Distributed Clearing: A Critical
Assessment, The Capco Institute Journal of Financial Transformation,
2015, 42, 10.
[13] C. Decker and R. Wattenhofer, Information propagation in the bitcoin
network, IEEE Thirteenth International Conference on Peer-to-Peer
Computing (P2P), 2013, pp1-10.

J Fundam Appl Sci. 2018, 10(4S), 376-381 381

You might also like