Issues and Challenges (Privacy, Security, and Trust) in Blockchain-Based Applications

Author(s):  
Siddharth M. Nair ◽  
Varsha Ramesh ◽  
Amit Kumar Tyagi

The major issues and challenges in blockchain over internet of things are security, privacy, and usability. Confidentiality, authentication, and control are the challenges faced in security issue. Hence, this chapter will discuss the challenges and opportunities from the prospective of security and privacy of data in blockchain (with respect to security and privacy community point of view). Furthermore, the authors will provide some future trends that blockchain technology may adapt in the near future (in brief).

Author(s):  
Shreya Joshi ◽  
Ms Bhavyaa ◽  
Suhani Gupta ◽  
Lalita Luthra

Blockchain is considered to be a disruptive core technology. Although many researchers have realized the importance of blockchain, but the research of it is still emerging. It is the record-keeping technology behind bitcoin and is one of the hottest and fastest growing skills in the IT sector today. It serves as an immutable ledger which allows transactions to take place in a decentralized man Blockchain-based applications are rising up, covering numerous fields including finance, healthcare, product management, Internet of Things (IoT), and many more. However, there are still some challenges of blockchain technology such as scalability and security problems which need to be overcome. This paper comprises of a comprehensive study of Blockchain technology. We have included here a deep dive into how blockchains work, its architecture, consensus and various applications. Furthermore, technical challenges are briefly listed.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


Author(s):  
Atiqur Rahman ◽  
Guangfu Wu ◽  
Ali Md Liton

Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that is achieved at or close to the collectors of information in an Internet of Things system. Herein, we are proposing to temporarily evaluation the concepts, features, protection, and privacy applications of Internet of Things authorized mobile edge computing with its data protection view in our data-driven globe. We focus on illuminating one of kind components that need to be taken into consideration whilst creating a scalable, consistent, impenetrable and disseminated mobile edge computing structure. We also sum up the fundamental ideas regarding security threat alleviation strategies. After that, we walk around the existing challenges and opportunities in the area of mobile edge computing. In conclusion, we analyze a case study, in which a security protection mechanism can be hardened to lift out everyday jobs.


Author(s):  
Scott J. Shackelford

The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry and financial analysts have predicted that the number of Internet-enabled devices will increase from 11 billion to upwards of 75 billion by 2020. Regardless of the number, the end result looks to be a mind-boggling explosion in Internet connected stuff. Yet, there has been relatively little attention paid to how we should go about regulating smart devices, and still less about how cybersecurity should be enhanced. Similarly, now that everything from refrigerators to stock exchanges can be connected to a ubiquitous Internet, how can we better safeguard privacy across networks and borders? Will security scale along with this increasingly crowded field? Or, will a combination of perverse incentives, increasing complexity, and new problems derail progress and exacerbate cyber insecurity? For all the press that such questions have received, the Internet of Everything remains a topic little understood or appreciated by the public. This volume demystifies our increasingly “smart” world, and unpacks many of the outstanding security, privacy, ethical, and policy challenges and opportunities represented by the IoE. Scott J. Shackelford provides real-world examples and straightforward discussion about how the IoE is impacting our lives, companies, and nations, and explain how it is increasingly shaping the international community in the twenty-first century. Are there any downsides of your phone being able to unlock your front door, start your car, and control your thermostat? Is your smart speaker always listening? How are other countries dealing with these issues? This book answers these questions, and more, along with offering practical guidance for how you can join the effort to help build an Internet of Everything that is as secure, private, efficient, and fun as possible.


Author(s):  
Syrine Sahmim Ep Guerbouj ◽  
Hamza Gharsellaoui ◽  
Sadok Bouamama

This journal article deals with the most important existing problems of security and privacy of the Cloud Computing (CC), Internet of Things (IoT) and Cloud of Things (CoT) concepts especially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere, therefore these concepts have been widely studied in the literature. However, due to the systems complexity and the difficulty to control each access attempt, intrusions and vulnerabilities will be more recurrent. To tackle this issue, researchers have been focused on various approaches enforcing security and privacy. In the present article, risk factors and solutions regarding these technologies are reviewed then current and future trends are discussed.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 359
Author(s):  
Houshyar Honar Pajooh ◽  
Mohammad Rashid ◽  
Fakhrul Alam ◽  
Serge Demidenko

Providing security and privacy to the Internet of Things (IoT) networks while achieving it with minimum performance requirements is an open research challenge. Blockchain technology, as a distributed and decentralized ledger, is a potential solution to tackle the limitations of the current peer-to-peer IoT networks. This paper presents the development of an integrated IoT system implementing the permissioned blockchain Hyperledger Fabric (HLF) to secure the edge computing devices by employing a local authentication process. In addition, the proposed model provides traceability for the data generated by the IoT devices. The presented solution also addresses the IoT systems’ scalability challenges, the processing power and storage issues of the IoT edge devices in the blockchain network. A set of built-in queries is leveraged by smart-contracts technology to define the rules and conditions. The paper validates the performance of the proposed model with practical implementation by measuring performance metrics such as transaction throughput and latency, resource consumption, and network use. The results show that the proposed platform with the HLF implementation is promising for the security of resource-constrained IoT devices and is scalable for deployment in various IoT scenarios.


2020 ◽  
Author(s):  
Pedro Elkind Velmovitsky ◽  
Frederico Moreira Bublitz ◽  
Plinio Pelegrini Morita

BACKGROUND While Big Data and smart technologies allow for the development of precision medicine and predictive models in healthcare, there are still several challenges that need to be addressed before the full potential of this data can be unleashed (e.g., data sharing and interoperability issues, lack of massive genomic datasets, data ownership, and security and privacy of health data). Health companies are exploring the use of Blockchain, a tamperproof and distributed digital ledger, to address some of these challenges. OBJECTIVE Obtain an overview of Blockchain solutions that aim to solve challenges in healthcare from an industry point of view, focusing on solutions being developed by health and technology companies. METHODS We conducted a literature review, following the protocol defined by Levac et al. to analyze the findings in a systematic manner. In addition to traditional databases such as IEEE, PubMed and Google Scholar, we included search and news outlets such as CoinDesk, CoinTelegraph, and Medium. RESULTS Healthcare companies are using Blockchain to improve challenges in 5 key areas: (i) electronic health records - Blockchain can address interoperability issues by creating an overarching mechanism to link disparate personal records, as well as stimulate data sharing by connecting owners and buyers directly; (ii) Drug (and Food) supply chain - Blockchain can provide an auditable log of a product’s provenance and transportation (including information on the conditions in which the product was transported), increasing transparency and eliminating counterfeit products in the supply chain; (iii) health insurance - Blockchain can facilitate the claims management process as well as help users to calculate medical and pharmaceutical benefits; (iv) genomics - by connecting data buyers and owners directly, Blockchain can increase sharing of genomic data, increasing its availability; and (v) consent management - since all participants in a Blockchain network view an immutable version of the truth, Blockchain can provide an immutable and timestamped log of consent, increasing transparency in the consent management process. CONCLUSIONS Blockchain technology can improve on several challenges faced by the healthcare industry today. However, companies must evaluate how Blockchain’s features can affect their systems (e.g., Blockchain being append-only limits the deletion of data stored in the network and distributed systems, although more secure, are less efficient). While these trade-offs need to be taken into account when considering Blockchain solutions, the technology has potential to optimize processes, minimize inefficiencies, and increase trust in all contexts covered in this review.


2018 ◽  
Vol 70 (1) ◽  
Author(s):  
Satyandra K. Gupta

Flying insects exhibit truly remarkable capabilities. There has been significant interest in developing small-scale flying robots by taking inspiration from flying insects. The paper by Helbling and Wood reports remarkable progress made by the research community in realizing insect-scale flapping wing vehicles and identifies research challenges and opportunities. This discussion builds upon their paper and examines the potential of insect-scale flapping wing flight from an application point of view. It summarizes requirements and mention implications of these requirements on propulsion, power, and control architecture.


PEDIATRICS ◽  
1960 ◽  
Vol 25 (1) ◽  
pp. 119-126
Author(s):  
Frederick C. Robbins

THE GROUP of acute and extremely common communicable virus infections has been greatly enlarged in recent years since the recognition of the Coxsackie and ECHO viruses. The clinical manifestations of infections with this large group of agents are gradually being sorted out, and include aseptic meningitis, pleurodynia, herpangina, diarrhea, various minor illnesses and a variety of exanthems. The observation that several of them produce diseases with rash has greatly complicated the diagnostic problems of the pediatrician. This group of illnesses is of great interest and importance, but will not be discussed here. Rather, the scope of this presentation will be limited to three infections, namely, measles (rubeola), rubella, and those due to the viruses of varicella and herpes zoster. The purpose is to review briefly the present status of our knowledge concerning them and to point out some of the problems yet to be solved. No attempt will be made at exhaustive coverage. MEASLES Experimental Considerations As the result of the work of Enders and his associates, it is now possible to study the virus of measles in the laboratory, and control of this disease by active immunization would appear to be a real possibility within the near future. From the historic point of view measles has been the subject of a great deal of attention from the clinician, epidemiologist and virologist. The early workers, such as Anderson and Goldberger in 1911, Blake and Trask in 1921, and others at about the same time, were able to produce measles in monkeys by inoculating them with blood and other materials from patients.


Sign in / Sign up

Export Citation Format

Share Document