scholarly journals The Green Blockchains of Circular Economy

Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 2008
Author(s):  
George Hatzivasilis ◽  
Sotiris Ioannidis ◽  
Konstantinos Fysarakis ◽  
George Spanoudakis ◽  
Nikos Papadakis

Eco-friendly systems are necessitated nowadays, as the global consumption is increasing. A data-driven aspect is prominent, involving the Internet of Things (IoT) as the main enabler of a Circular Economy (CE). Henceforth, IoT equipment records the system’s functionality, with machine learning (ML) optimizing green computing operations. Entities exchange and reuse CE assets. Transparency is vital as the beneficiaries must track the assets’ history. This article proposes a framework where blockchaining administrates the cooperative vision of CE-IoT. For the core operation, the blockchain ledger records the changes in the assets’ states via smart contracts that implement the CE business logic and are lightweight, complying with the IoT requirements. Moreover, a federated learning approach is proposed, where computationally intensive ML tasks are distributed via a second contract type. Thus, “green-miners” devote their resources not only for making money, but also for optimizing operations of real-systems, which results in actual resource savings.

Author(s):  
Nipun R. Navadia ◽  
Gurleen Kaur ◽  
Harshit Bhardwaj ◽  
Taranjeet Singh ◽  
Aditi Sakalle ◽  
...  

Cloud storage is a great way for companies to fulfill more of their data-driven needs and excellent technology that allows the company to evolve and grow at a faster pace, accelerating growth and providing a flexible forum for developers to build useful apps for better devices to be developed over the internet. The integration of cloud computing and the internet of things creates a scalable, maintainable, end-to-end internet of things solution on the cloud network. By applying the infrastructure to the real universe, it generates sources of insight. Cloud computing and IoT are separate technology but are closely associated and are termed as ‘cloud-based IoT' as IoT has the ability to create intelligent goods and services, gather data that can affect business decisions and probably change the business model to boost success and expansion, and cloud infrastructure can be at the heart of all IoT has to deliver.


2013 ◽  
Vol 765-767 ◽  
pp. 1726-1729
Author(s):  
Yan Bing Liu ◽  
Wen Jing Ren

Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.


2020 ◽  
Vol 64 (1) ◽  
pp. 19-31 ◽  
Author(s):  
Gustavo Cattelan Nobre ◽  
Elaine Tavares

The debate about circular economy (CE) is increasingly present in the strategic agenda of organisations around the world, being driven by government agencies and general population pressures, or by organisations’ own vision for a sustainable future. This is due in part to the increasing possibility of turning original theoretical CE proposals into real economically viable initiatives, now possible with modern technology applications such as big data and the internet of things (IoT). Information technology (IT) professionals have been called upon to incorporate technology projects into their strategic plans to support their organisations’ transition to CE, but a structured framework with the necessary IT capabilities still lacks. This study focuses on taking the first step towards this path, by extending the technology attributes present on the existing Ellen MacArthur Foundation (EMF) Regenerate, Share, Optimise, Loop, Virtualise and Exchange (ReSOLVE) framework. The research was conducted based on an extensive literature review through 226 articles retrieved from Scopus® and Web of ScienceTM databases, which were triangulated, validated and complemented with content analysis using the ‘R’ statistical tool, grey literature research and inputs from specialists. Part I describes the introduction and methods used in this study.


2015 ◽  
Vol 87 (1) ◽  
pp. 269-292 ◽  
Author(s):  
Xiaoyong Yan ◽  
Zhong Yang ◽  
Aiguo Song ◽  
Wankou Yang ◽  
Yu Liu ◽  
...  

Author(s):  
Grace Lamudur Arta Sihombing ◽  
Lamhot Martua Situmeang ◽  
Rosmey Meriaty Br. Sormin

Various efforts to prevent the spread of Covid-19 have been carried out, which resulted in the formation of a new normal life order for the community. Some of the adjustments include doing all activities from home, always washing hands, wearing a mask, and keeping a distance. New normal is also closely related to Information Technology (IT), where some activities are carried out through information technology assistance. Work From Home (WFH), online learning, online health consultations, and wedding receptions are conducted through a virtual room. However, in fact, there are still many who have not mastered and understood this, so this research explains the role of information technology, which is so important and quite influential in the fields of economy and business, education, health, religion, and the Internet of Things which is the core of current information technology.


2021 ◽  
Author(s):  
Sarah Asiri

The Internet of Things (IoT) is a heterogeneous network of interconnected objects or ‘things’ that are typically connected via the Internet. Trust in most IoT networks is presumed implicitly. This implicit trust assumption can be abused by adversaries to disrupt the network and manipulate reputations of trusted devices. To tackle IoT trust issues, we use permissioned blockchains that utilize Smart Contracts (executable policies) to evaluate and refine IoT devices’ trust. Blockchains replicate a permanent append-only record of all transactions occurring on a network on multiple devices. This prevents adversaries from modifying previous transactions to influence trust evaluations. In this thesis, we propose an IoT trust model that uses Blockchains to record and validate IoT devices’ identities and dynamically evaluates the trustworthiness of devices in the IoT network. Moreover, our model allows for different levels of security based on the sensitivity of data being transmitted across the IoT network.


2020 ◽  
Vol 174 ◽  
pp. 231-242
Author(s):  
Lihua Song ◽  
Mengchen Li ◽  
Zongke Zhu ◽  
Peng Yuan ◽  
Yunhua He

Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5319
Author(s):  
Dao Yin ◽  
Xinguo Ming ◽  
Xianyu Zhang

The trend towards socialization, personalization and servitization in smart manufacturing has attracted the attention of researchers, practitioners and governments. Social manufacturing is a novel manufacturing paradigm responding to this trend. However, the current cyber–physical system (CPS) merges only cyber and physical space; social space is missing. A cyber–physical–social system (CPSS)-based smart manufacturing is in demand, which incorporates cyber space, physical space and social space. With the development of the Internet of Things and social networks, a large volume of data is generated. A data-driven view is necessary to link tri-space. However, there is a lack of systematical investigation on the integration of CPSS and the data-driven view in the context of social manufacturing. This article proposes a seven-layered framework for a data-driven CPSS (D-CPSS) along the data–information–knowledge–wisdom (DIKW) pyramid under a social manufacturing environment. The evolution, components, general model and framework of D-CPSS are illustrated. An illustrative example is provided to explain the proposed framework. Detailed discussion and future perspectives on implementation are also presented.


Sign in / Sign up

Export Citation Format

Share Document