Detection In The Block chain Financial Transaction System Slobodan Jovicic, Dr. Qing Tan Athabasca University, Canada dan.jovicic@gmail.com qingt@athabascau.ca
Published online: 5 March 2018
Abstract—Blockchain technology implements the public- private settlements. The guideline on money laundering prevention that is published by the international Financial Action Task Force key architecture to achieve trust and security as identification of stipulates that money movements that exceed $10,000 as single parties involved in the electronic fund transfer is based on or multiple transactions are to be suspected of money laundering private key encryption; in this sense, privacy is absent in the and should be reported to a Financial Intelligence Unit (FIU) of blockchain paradigm as every node in the peer-to-peer network the country where transactions occurred [3]. Developed is notified of committed electronic fund transfers and is able to countries have adopted guidelines on combating money read the details of the transaction. Financial institutions will need laundering that are published by the Financial Action Task to revise money laundering detection practices to satisfy Force (on Money Laundering) (FATF), an intergovernmental operational changes with the move away from the SWIFT agency that was established to define anti-money laundering network to the blockchain peer-to-peer network. The efficiency of standards. Financial services organizations that are operating in the blockchain model will introduce transactional efficiencies that countries where FATF guidelines were implemented are then speed up the electronic fund transfer process. Financial obligated by law to implement procedures for the detection of institutions will need to implement advanced money laundering suspicious financial transactions, and to have those transactions detection mechanisms that will be facilitated with the use of reported to their respective countries’ FIUs. machine learning. This paper examines techniques for the application of blockchain technology to electronic fund transfers The industry standard for international electronic money and the machine learning approaches to detect money laundering. movement is a set of ISO standards that was introduced by the Society of Worldwide Interbank Financial Transactions I. INTRODUCTION (SWIFT) starting with its establishment in 1973 in Brussels. Financial services organizations sign on to SWIFT membership A. Money laundering, past and present to perform electronic money transfers amongst themselves. The perpetration of financial fraud has been evolving in More concretely, SWIFT is a non-profit operator of a network parallel with the innovation in the field of finance. Whereas for secure exchange of electronic messages that facilitates early types of financial fraud consisted of theft or creation of money settlements among members [4]. The adoption of fake coinage to represent the value of official gold or silver SWIFT as the standard for electronic fund transfer (EFT) in 200 coinage, more recent types have been manifested as countries around the globe has resulted in it being the de facto legitimizations of moneys that originated from income of global platform for money movement. Two issues arise from criminal activity and circumventions of payments for taxes and this state. First is political, where the fact that SWIFT is a duties. The adoption of computing technologies by the financial singular entity residing in the Western political sphere then it services industry caused money laundering practices to follow could be used as a tool to exercise political will on suit. Adoptions of cybersecurity policies by Financial uncooperating countries or organization through forceful Institutions (FI) that focus on malware and phishing scam embargoes on SWIFT membership. The second is operational detection could only partially achieve the prevention of efficiency where transactional fees charged to members by financial fraud [1]. The practice of money laundering is a form SWIFT to cover its operational cost may be considered costly of financial fraud that is considered to be the use (or, the hiding by members and, therefore, create an opportunity for a of the source) of revenue that originates from criminal or illegal replacement EFT method to be sought by those members that activity [2]. An additional layer of money laundering detection are interested in cost reduction. Considering the two concerns is needed to supplement cybersecurity policies to achieve that exist with SWIFT, it is plausible to expect that either financial fraud prevention. Anti-money laundering laws that financial services organizations seeking lower operational cost aim to curb money laundering practices are based on the recording of movement of moneys through electronic money Qing Tan is an associate professor with the School of Computing and Information Systems at Athabasca University, and his e-mail is qingt@athabascau.ca Slobodan Jovicic is a graduate student with the School of Computing and Information Systems at Athabasca University, and his e-mail is: dan.jovicic@gmail.com.
doi: http://dx.doi.org/10.4314/jfas.v10i4s.123
J Fundam Appl Sci. 2018, 10(4S), 376-381 376
or foreign governments seeking independence in an EFT system II. REVIEW OF RELATED LITERATURE will invest resources into an evolving and competing technology. It has been suggested that blockchain technology A. Electronic Fund Transfer could meet these requirements due to its ability to achieve The foundation of commerce is trust; business entities need transactional transparency over a peer-to-peer network where to establish trust amongst themselves in order to exchange all nodes play equal roles without a need for intermediaries [5]. goods or services for money. To streamline the means of The establishment of the SWIFT infrastructure inhibited the establishing trust in business, human social development had ability of criminals to launder money as the facilitation of EFTs introduced enforceable laws expressed as written contracts [6]. leaves an electronic trail that could be followed to establish a Enforceable laws are a substitute for trust when it is either pattern. In the event that the international financial services impractical or insufficient to establish interpersonal community adopts blockchain as the basis for a new platform relationships to achieve trust. The advent of computing for EFTs then an evaluation of the technology as it relates to technologies has introduced computer automation in everyday anti-money laundering detection practices will be of value to applications. Payment automation allows for execution of EFTs global financial services organizations as means to identify that enable businesses and customers to exchange money for suspicious transactions that are reportable to FIUs. The purpose goods and services. Every payment, or EFT, is a contract of this research is to identify methods for the identification of between two parties; the contract is facilitated as money transactions suspicious of money laundering in the blockchain settlement by one or more FI. Payment automation is made transactional system. possible by computing technologies that are based on enforceable laws that create trust between the entities such as B. Research objectives, methodology and limitations businesses and customers. FIs are dependent on instituting trust This research examines security properties of blockchain and computing technologies to achieve the prevention of technology as it applies to the execution of financial financial fraud in EFTs for clients. Technology brings about transactions in a trusted peer-to-peer network. The results of the efficiency to EFTs as membership to the SWIFT network allows examination will be evaluated to determine practices for the FIs to securely exchange messages that contain instructions on prevention of money laundering that meet legal obligations for money movement to banks’ clearinghouses [7]. FIs delegate the financial services organizations. Large volumes of electronic establishment of trust with partnering FIs by subscribing for money transfers executed by financial services organizations membership to the SWIFT network. With over 8,000 members cause human analysis of such transactions for the purposes of and presence in over 200 countries [4], the SWIFT network identification of suspicious transactions to be impractical. The makes it practical for FIs to utilize the network to meet clients’ automation of the identification of suspicious transactions needs for money movement yet to not be concerned about the through the application of machine learning is essential. legitimacy of money movement instructions that are delivered Therefore, the objective of this research is to assess to what by the SWIFT network. An interdependence on trust in the degree compliance to anti-money laundering laws in a trusted SWIFT network for FIs ensures the legitimacy money peer-to-peer network blockchain architecture for EFTs requires movement instructions. Additional means of achieving usage of machine learning. The research is based on review of trustworthiness are the abilities of FIs’ to maintain proper peer reviewed material published in academic journals with accounting ledgers as the prosperity and creditworthiness of high impact factors, books and related materials published by businesses is directly related to the reliability of its accounts [8]. subject matter experts, dictionaries for word definitions, and What follows is that the execution of EFTs for FIs is contingent related resources published on the internet. Research topics on maintenance of accounting ledgers that exist outside of the relate to blockchain technology as it applies to the execution of bounds of the SWIFT network as it does not manage accounts EFTs for the financial services industry, anti-money laundering on behalf of members [4]. Then, FIs have three dependencies legislation, and machine learning for pattern recognition of for EFT. First, they are required to sign on with SWIFT for transactions suspected of money laundering. Application of membership as it is the de facto financial industry standard for blockchain technology is not limited to the financial services EFTs. Second, FIs must perform due diligence on clients and industry, but this research will be limited to the application of maintain accounting ledgers to maintain trustworthiness with blockchain technology to the financial services industry. the objective to prevent financial fraud. Third, the state of the Executions of EFTs using blockchain technology that may be industry necessitates for the existence of FI clearinghouses to subjected to types of criminal activity not classified as money facilitate money movement based on instructions obtained from laundering will be excluded from this research. The research messages that originate from SWIFT participants. The will be limited to literature review and an evaluation of a administration overhead that exists may influence FIs to seek conceptual model of an application of blockchain technology in alternative technology solutions that would yield cost reduction. a trusted peer-to-peer network for the purposes of EFT facilitation. B. Blockchain technology Blockchain is a potentially transformational technology for Next sections of this paper will include literature review, an the financial services industry. It has been described so as it evaluation of a conceptual model and a discussion of the addresses trust, fraud and error concerns due to its design for findings. identity check, transaction authentication, transaction accuracy and reliability [9]. Blockchain is a technology that is akin to a database as it represents a sequence of data blocks but exists in a peer-to-peer network so that the data does not need to reside on any single computer. Each block of data is linked together
J Fundam Appl Sci. 2018, 10(4S), 376-381 377
into a distributed ledger system that allows tamper-proof history depend for money movement; this ability, in fact, is the to be recorded such that the distributed ledger acts as a public manifestation of a concept named smart contracts, or notary of historical events [10]. Trust in blockchain technology technology that enables the carrying out of computation on a is achieved by implementing a public key infrastructure such network (i.e. payment that is conditional on the state of some that each data part that comprises a block represents information internal or external variables) [14]. The blockchain metadata could be employed to contain money movement instructions that is encrypted with the private key of the entity that is adding that are equal to those that are communicated over the SWIFT the data part to the block. This design allows blockchain peers network. to decrypt data that is stored in blocks by using that entity’s public key and in the process to authenticate the data that has C. Money laundering and blockchain been added to the blockchain. Trust is inherent in the design of Governments may choose to adopt risk-based blockchain as safekeeping of an entity’s private key is recommendations on combating Anti-Money Laundering fundamental to the verification of that entity’s identity. (AML) and Counter Financing of Terrorism (CFT) that are Cryptography in computing has advanced to a point that defined by FATF [3]. The recommendations are not explicit requires a million years of computing for a supercomputer to instructions on the means of formulating laws, instead countries crack an encryption [11]. Applications of modern encryption are guided to define internal laws for each of the forty algorithms to blockchain architecture cause preventions of recommended concerns. FATF recommends creating FIUs to private key forgeries as the process is deemed to be serve as national centers for the receipt and analysis of computationally prohibitive, consequently ensuring that trust in suspicious transaction reports and related information that is data integrity is maintained across the peer-to-peer network. indicative of money laundering activities [3]. Data that is The architecture of blockchain technology allows for the accumulated by FIUs is composed of transactions that are embedding of metadata to the encrypted block of data. The suspected of money laundering; suspicious transactions are ability to transport metadata with a high degree of confidence is EFTs that exceed $10,000 in value and are executed as single or a potentially good fit for the financial services industry as multiple transactions within a 24-hour period. Then, FIs are replacement technology for clearinghouses. Blockchain required to maintain internal processes and client records that technology does away with the traditional clearinghouse model are necessary to meet local FIU reporting obligations. Identity that requires each FI to maintain its own set of books that must is inherent in the blockchain ledger as each data block is be reconciled with peers’ books through a costly and slow encrypted with an entity’s private key. Blockchain architecture operation that is difficult to automate [12]. The blockchain lacks transactional privacy as changes to the blockchain are design incorporates a broadcast of data block changes across the communicated to all nodes in the peer-to-peer network, and are peer-to-peer network to achieve synchronization of ledgers by default public [19]. Privacy could be partially achieved by among the nodes [13]. The term ledger in the blockchain context providing relationship anonymity with the use of anonymization is used to describe the blockchain itself as it represents the tools that perform block mixing such that resulting transactions chronological database of transactions that is recorded by that are added to the blockchain have anonymized senders of networked computers [14]. The implementation of blockchain those transactions [20]. Full anonymity could be achieved given technology to financial services industry attains clearinghouse that public-private key pairs can be generated by anyone with a automation and ensures reconciliation of books for FIs. The computer and identity associated to those key pairs could be operational efficiency of blockchain within the peer-to-peer falsified. Furthermore, due to the ease with which it is possible network is not dependent on any particular technology or scale to create public-private key pairs it has been suggested as good of participation. The transactional efficiency has been practice to create new sets of keys for every transaction to demonstrated with the rise of the Bitcoin cryptocurrency whose achieve anonymity [21]. However, public-private key pairs that low transaction fees make it appealing as an alternative to fiat are embedded in X.509 certificates and generated by trusted currency [15]. The Bitcoin cryptocurrency operates in a public Certificate Authorities (CA) represent authentic identities as peer-to-peer network where any node on the network could CAs must apply rigor to due diligence on clients by collecting apply changes to the ledger. The public network makes Bitcoin and verifying personal information to issue certificates [22]. susceptible to operational disruption and damage to reputation Thus, achieving anti-money laundering objectives for FIs is as malicious persons have equal access to the blockchain as made easier using blockchain provided that public-private key legitimate persons; indeed, eighteen out of forty public Bitcoin pairs used to encrypt blocks of data are issued by CAs and that exchanges where shut down due to attacks by hackers [16]. The the blockchain network operates as a trusted peer-to-peer blocking of public access to a peer-to-peer network that is network where only those blocks that meet the strict encryption dedicated to FIs would considerably reduce the risk of hacking. rules are permitted. Operational cost could be reduced further in a private peer-to- peer network as fewer transactions would need to be broadcast D. Money laundering detection with machine learning across the network to fewer nodes on the network thus making Analysis of blockchain transactions for money laundering the operation faster [17]. A private peer-to-peer network has an detection requires the use of computing technologies to added benefit of enabling participating nodes to agree on a facilitate data block decryptions and to process large volumes unique set of rules for the governing of applications, service of decrypted transactions that make human analysis impractical. providers, data and users to achieve an additional layer of trust Data blocks contain metadata that represent financial contracts [18]. Blockchain design characteristics that maintain privacy for the execution of money movement; senders are and deliver metadata in a trusted peer-to-peer network enable it authenticated with the use of senders’ public keys to decrypt to represent contracts on which financial instructions could data blocks while receivers’ information and money movement
J Fundam Appl Sci. 2018, 10(4S), 376-381 378
details are extracted from metadata. In the traditional bank as senders’ account numbers indicating where money would clearinghouse realm, algorithmic analysis based on structural originate, receivers’ account numbers where money movement similarity can be used to detect money laundering when would terminate, supporting details of transactions such as intermediary accounts are used to transfer large sums of money amounts, currency types, exchange rates and transaction fees, from the sender to the receiver [23]. Historical financial and one nonce per contract to ensure that each financial transaction is executed only once. transaction obfuscation that could be achieved with blockchain architecture may make algorithmic analysis based on structural Contracts contained in blocks are encrypted with the FIs’ similarity not applicable to money laundering detection as the clients’ private keys in lieu of clients’ signatures for the relationship between senders and receivers gets obscured when authorization of money movement and for authentication of financial transactions are mixed [20]. Partial deanonymization money movement instructions by partner FIs (that is achieved of blockchain transactions in a public peer-to-peer network with decryption of data blocks using clients’ public keys). could be attained with a technique that analyses IP addresses of Public key certificates that have been issued by FIs as trusted transactions sources that update the blockchain [24]. signers would accompany each contract to endorse financial Anonymization that could be achieved with the hiding of source transactions. The establishment of a private peer-to-peer IPs using Tor (the onion network that hides users’ IP addresses) network for the operation of blockchain technology would has been described as not secure due to the potential man-in-the allow FIs to apply rules that enable it to be a trusted peer-to-peer middle attack [25]. However, deanonymization would not be network; standardized governance over FIs’ internal controls achieved by this technique in a trusted peer-to-peer network as and comprehensive cybersecurity policies would be fitting for a source IP addresses would be traced to FIs rather than third FI to be classified as trusted. Each node, or FI, on the network parties. Illegitimate FIs, malicious individuals, or FIs that reside would apply rigor to client due diligence as laid out in law and in countries with strict privacy laws may perform transaction outlined in the FATF guideline. Consequently, every node mixing to contribute to acts indicative of money laundering by would play the role of a CA to issue their clients sets of public- achieving historical transaction obfuscation prior to adding private keys to get applied when executing financial transactions to the blockchain. An unsupervised learning transactions on the trusted peer-to-peer network. The proposed technique using k-means cluster analysis appeared to have architecture would, therefore, impart authenticity to contracts identified individuals that were suspected of conducting money that are embedded into blocks on the blockchain and would laundering using the transaction mixing technique [26]. This assure network peers that execution of payment instructions that unsupervised learning technique identified strange behavior are embedded into blocks is binding. Transactions that are where money transferred from one account to another was added to the blockchain are imprinted permanently as historical accomplished using intermediary accounts. Link analysis, records of transactions that are shared by peers on the network. another type of machine learning, was used to identify The operational efficiency of the blockchain technology comes similarities in group behaviors of financial transactions in a at a cost of privacy as access to the blockchain by third parties traditional interbank money movement system and was based would allow them the ability to learn about historical money on guilt-by-association grouping that led researchers to money movements of FIs’ clients. The trusted peer-to-peer network laundering detection [27]. The ability for third parties to hold model, however, safeguards against such exposure by limiting inventories of public-private keys for employment in money access to the network only to verifiable FIs. laundering may make supervised link analysis a better fit for money laundering detection than unsupervised cluster analysis. B. Anonymization in trusted peer-to-peer networks The unsupervised cluster analysis technique for money FIs are obligated to perform money laundering detection on laundering detection is a good fit if rules exist that constrain the financial transactions and report suspicious transactions to ability of third parties to hold large inventories of public-private FIUs. As blockchain is a record of historical transactions then it keys. makes for streamlined tracing of money movements as interbank reconciliation of ledgers is not required. Financial transaction details that are embedded in the metadata of data III. MACHINE LEARNING FOR MONEY LAUNDERING blocks contain information that can be analyzed by FIs to DETECTION IN THE BLOCKCHAIN F INANCIAL TRANSACTION identify suspicious transactions. The trusted peer-to-peer SYSTEM network assures that anonymity is not present in the execution of financial transactions. This is because deanonymization A. Trusted peer-to-peer network conceptual model techniques based on IP hiding would not be applicable since The application of blockchain technology to the financial trusted peer-to-peer network rules would be crafted so as to services industry addresses concerns of trust, financial fraud and permit only specific IP ranges to change the blockchain. The errors, while at the same time achieves cost reduction for FIs by technique of creating multiples of fake public-private keys for introducing efficiencies to interbank EFT operations. The use as intermediaries in money movement would not be allowed inherent ability of blockchain technology to contain metadata as such key pairs would not have been issued by CAs. enables it for application to the execution of EFTs. The conceptual model of the application of blockchain technology C. Computer assisted money laundering detection in a trusted peer-to-peer network is rooted in the idea that each The large volume of financial transactions necessitates use block in the blockchain represents a collection of money of computing technologies for the purposes of identification of movement contracts. The metadata that would be embedded in financial transactions that are suspected of money laundering. a data block would contain money movement instructions such Basic querying of data and algorithmic analysis based on
J Fundam Appl Sci. 2018, 10(4S), 376-381 379
structural similarity of blocks in the blockchain would produce computationally difficult to crack the private key thus making it sets of financial transactions that have been identified to have a good fit for implementation to the encryption of blockchain transacted amounts that are above the $10,000 threshold and transactions. Quantum computing research may produce that would be reportable to FIUs. However, criminals that are machines capable of cracking transistor based cryptography in intent on money laundering may resort to tactics that require FIs short amount of time thus requiring rapid transition quantum to apply more comprehensive analysis to financial transactions. Machine learning assisted analysis would contribute to further based cryptography [28]. There may be a period of transition in identification of financial transactions that are suspected of cryptography when blockchain transactions may be susceptible money laundering. Money laundering performed using the to fraud as imitation of public-private key pairs could cause transaction mixing technique would be identifiable with an criminals to submit fraudulent transactions to the blockchain. unsupervised machine learning method using k-means cluster Money laundering could be achieved by hijacking legitimate analysis. This method may yield greater accuracy over its private keys from FIs’ unsuspecting clients, and using those application in a traditional financial transaction system as private keys to conduct money movement. This is a potential identification parameters in the blockchain transaction system area of research into machine learning assisted analysis of are not limited to account numbers but contain certificates that money laundering detection. FIs should be cognizant of the can be used to authenticate transactions across the blockchain. developing quantum computing technology and prepare a Criminals intent on laundering money may need to resort to tactics where multiple sets of accounts are employed to transfer transition plan for adoption of quantum based cryptography. money without intermixing transfers across those account sets; B. Blockchain transaction malleability this practice would be indicative of a criminal group that is attempting to launder money in smaller amounts across larger The Bitcoin implementation of the blockchain architecture sets of accounts to achieve a greater success rate (i.e. some but contains a technical flaw known as transaction malleability. The not all money laundering attempts get identified and funds standard operating procedure of the Bitcoin environment is for seized). The supervised machine learning method utilizing link transactions that are submitted to the blockchain to get adopted analysis would be able identify guilt-by-association groupings after a certain period when multiple transactions get bulked of account sets to achieve money laundering detection. The together into a new block that gets added to the blockchain. It is inability for criminals to create own public-private key pairs during this delayed period of processing that can be exploited as increases the chances of money laundering detection of account a weakness. To facilitate the fraud a malicious person begins by groups as criminals would have at their disposal few authentic submitting a legitimate transaction to transfer funds from their public-private key pairs with which to conduct illegitimate Bitcoin exchange owned account to another owned account but operation. Likewise, any public-private key pair that is owned by criminals and is authentic, in that it was issued by CAs and then submits a replica of the transaction with a different has not yet been associated with criminal behavior, would be signature knowing that only one transaction will get added to valuable to criminals. The conflating of the supervised and the blockchain, and should the replica get added the person can unsupervised machine learning methods for money laundering claim a refund from the Bitcoin exchange and in effect defraud detection in a trusted peer-to-peer blockchain financial the exchange [29]. The funds obtained through the practice are transaction system would enable FIs to identify suspicious laundered moneys. The trusted peer-to-peer network is transactions with a high degree of confidence. Furthermore, the protected from this attack in two ways. The first is that only historical record of financial transactions available in the authorized nodes are permitted to change the blockchain thus blockchain and shared across the peer-to-peer network would preventing third parties to add changes to the blockchain enable FIUs to either supplement or completely replace money laundering detection that is performed by FIs; since FIUs and (although compromised nodes on the network could be FIs would have access to same sets of historical records of commandeered for malicious purpose). The second is that the financial transactions and identities. This change would Bitcoin model where public peer-to-peer nodes vote on represent a fundamental shift in the role of FIUs in the financial adoption of transactions to blocks is absent in a proposed model sector, but it would nonetheless be positive as it would achieve as trusted nodes contain cybersecurity measures to validate cost reduction for FIs and likely achieve greater success rate at client requests, similar to the model that presently exist for the money laundering detection as FIs are not required to meet traditional SWIFT financial transaction system. certain money laundering detection benchmarks and their money laundering detection practices vary as a result. C. Absence of privacy Trusted and public peer-to-peer networks for blockchain architecture hold shared properties such that both achieve trust IV. ISSUES, CHALLENGES AND TRENDS at the expense of privacy. These properties are both benefits and A. Confidence in cryptography barriers for adoption of blockchain technology in the financial services industry as no uniformity on privacy exists among The foundation of blockchain architecture is cryptography as various jurisdictions around the world [30]. The adoption of a it assures confidence in the integrity of transactions and the trusted peer-to-peer network for the blockchain financial metadata that is embedded into every transaction that contains transaction system by global FIs would expose their clients’ money movement instructions. The asymmetric cryptography EFT activity to all nodes as all changes are broadcast across the of the public-private key architecture is such that it is
J Fundam Appl Sci. 2018, 10(4S), 376-381 380
network to synchronize transaction ledgers. This concern could [14] G.W. Peters and E. Panayi, Understanding Modern Banking Ledgers be addressed with an implementation of interconnected regional through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money, Banking Beyond Banks and trusted peer-to-peer networks where cross border money Money, Springer International Publishing, 2016, pp239-278. movements would be accomplished using FI omnibus accounts; [15] S. Barber, X. Boyen, E. Shi and E. Uzun, Bitter to better – how to make this presents an opportunity for research into regional trusted bitcoin a better currency, International Conference on Financial Cryptography and Data Security, 2012, pp399-414. peer-to-peer networks and money laundering detection [16] S.T. Ali, D. Clarke and P. McCorry, Bitcoin: Perils of an unregulated practices related to transfers of funds between omnibus global p2p currency, Cambridge International Workshop on Security accounts. Another solution that may address privacy concerns Protocols, 2015, pp283-293. is the emerging blockchain framework Corda whose [17] M. Pilkington, Blockchain Technology: Principles and application, Research Handbook on Digital Transformation, 2016. development is supported by a consortium of global financial [18] D. Shrier, W. Wu and A. Pentland, Blockchain & Infrastructure services organizations [31]. Research and publications on the (Identity, Data Security), Massachusetts Institute of Technology, 2016. Corda framework is non-existent aside from self-published [19] A. Kosba, A. Miller, E. Shi, Z. Wen and C. Papamanthou, Hawk: The whitepapers, thus presenting an opportunity for research into blockchain model of cryptography and privacy-preserving smart contracts, IEEE Symposium on Security and Privacy (SP), 2016, pp839- this evolving blockchain technology. 858. [20] M. Moser, R. Bohme and D. Breuker, An inquiry into money V. CONCLUSION laundering tools in the Bitcoin ecosystem, eCrime Researchers Summit (eCRS), 2013, pp1-14. This research presented a conceptual model of a trusted peer- [21] F. Reid and M. Harrigan, An analysis of anonymity in the bitcoin to-peer network that implements blockchain technology to system, Security and privacy in social networks, 2013, pp197-223. [22] S. Fatima, S. Ahmad and S. Siddiqui, X.509 and PGP Public Key reduce the risk of money laundering. The employing of Infrastructure methods: A critical review, International Journal of machine learning to money laundering detection in a trusted Computer Science and Network Security (IJCSNS), 2015, 15(5), 55. peer-to-peer network could minimize money laundering [23] R. Soltani, U.T. Nguyen, Y. Yang, M. Faghani, A. Yagoub and A. An, practices by criminals. Further research is required to evaluate A new algorithm for money laundering detection based on structural similarity, IEEE Annual conference on Ubiquitous Computing, the feasibility of the application of the model as an international Electronics & Mobile Communication (UEMCON), 2016, pp1-7. standard for money movement. [24] A. Biryukov, D. Khovratovich and I. Pustogarov, Deanonymisation of clients in Bitcoin P2P network, In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014, REFERENCES pp15-29. [1] T. Moore, The economics of cybersecurity: Principles and policy [25] A. Birykov and I. Pustogarov, Bitcoin over Tor isn’t a good idea, IEEE options, International Journal of Critical Infrastructure Protection, Symposium on Security and Privacy (SP), 2015, pp122-134. 2010, 3(3), 103-117. [26] J. Hirshman, Y. Huang and S. Macke, Unsupervised approaches to [2] D. Masciandaro, Money laundering: the economics of regulation, detecting anomalous behavior in the bitcoin transaction network, Technical report, Stanford University, 2013. European Journal of Law and Economics, 1999, 7(3), 225-240. [3] Financial Action Task Force (FATF), International Standard on [27] S.A. Macskassy and F. Provost, Suspicion Scoring Based on Guilt by Association, Collective Inference, and Focused Data Access, In Combating Money Laundering and the Financing of Terrorism & Proceedings of the International Conference on Intelligence Analysis, Proliferation, FATF, 2012. 2005. [4] S.V. Scott and M. Zachariadis, Origins and development of SWIFT, London School of Economics, Business History, 2012, 54(3), 462-482. [28] P. Techateerawat, A Review on Quantum Cryptography Technology, International Transaction Journal of Engineering, Management & [5] Cash & Treasury Management file. (2016, April 5). Will blockchain Applied Sciences & Technologies, 2010, 1, pp35-41. undermine SWIFT’s monopoly? Retrieved January 08, 2017, from https://ctmfile.com/story/will-blockchain-undermine-swifts-monopoly [29] M. Andrychowicz, S. Dziembowski, D. Malinowski and L. Mazurek, On the malleability of bitcoin transactions, International Conference on [6] “Contract”, Oxford English Dictionary, 2017. Financial Cryptography and Data Security, 2015, pp1-15. [7] N. Ivannikov, R. Cvetkovic and V. Lilic, Innovations in International [30] M. Buitenhek, Understanding and applying Blockchain technology in Payments, International Journal of Economics & Law, 2014, (11), 45- banking: Evolution or revolution?, Journal of Digital Banking, 2016, 50. 1(2), pp111-119. [8] B. Rosen, Best Practices for Accounting Procedures for Micro, Small [31] R.G. Brown, J. Carlyle, I. Grigg and M. Hearn, Corda: An Introduction, and Medium-Sized Businesses, Arizona Journal of International and R3 CEV, 2016. Comparative Law, 2016, 33, 317. [9] D. Shrier, D. Sharma and A. Pentland, Blockhain & Financial Services: The Fifth Horizon of Networked Innovation, Massachusetts Institute of Technology, 2016. [10] T. Hardjono, Preserving Data Privacy in the IoT World, Massachusetts Institute of Technology, 2016. [11] V.R.R. Atukuri, C. Mathe, R. Mathe and P. Venubabu, Implementing Secure Channel for Data Transmission, International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 2012, 1(6), pp-139. [12] R. Sams, Bitcoin Blockchain for Distributed Clearing: A Critical Assessment, The Capco Institute Journal of Financial Transformation, 2015, 42, 10. [13] C. Decker and R. Wattenhofer, Information propagation in the bitcoin network, IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P), 2013, pp1-10.