Current Trends in Integrating the Blockchain With Cloud-Based Internet of Things

Author(s):  
Anchitaalagammai J. V. ◽  
Kavitha S. ◽  
Murali S. ◽  
Hemalatha P. R. ◽  
Subanachiar T.

Blockchains are shared, immutable ledgers for recording the history of transactions. They substitute a new generation of transactional applications that establish trust, accountability, and transparency. It enables contract partners to secure a deal without involving a trusted third party. The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. The stable growth of the internet of things (IoT) and the blockchain technology popularized by cryptocurrencies has led to efforts to change the centralized nature of the IoT. Adapting the blockchain technology for use in the IoT is one such efforts. This chapter focuses on blockchain-IoT research directions and to provide an overview of the importance of blockchain-based solutions for cloud data manipulation in IoT.

2020 ◽  
Author(s):  
Yanhui Liu ◽  
Jianbiao Zhang ◽  
Jing Zhan

Abstract With the development of the Internet of Things (IoT) field, more and more data are generated by IoT devices and transferred over the network. However, a large amount of IoT data is sensitive, and the leakage of such data is a privacy breach. The security of sensitive IoT data is a big issue, as the data is shared over an insecure network channel. Current solutions include symmetric encryption and access controls to secure the data transfer, but they have some drawbacks such as a single point of failure. Blockchain is a promising distributed ledger technology that can prevent the malicious tampering of data, offering reliable data storage. This paper proposes a distributed access control system based on blockchain technology to secure IoT data. The proposed mechanism is based on fog computing and the concept of the alliance chain. This method uses mixed linear and nonlinear spatiotemporal chaotic systems (MLNCML) and the least significant bit (LSB) to encrypt the IoT data on an edge node and then upload the encrypted data to the cloud. The proposed mechanism can solve the problem of a single point of failure of access control by providing the dynamic and fine-grained access control for IoT data. The experimental results of this method demonstrated that it can protect the privacy of IoT data efficiently.


2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

2018 ◽  
Vol 35 (2) ◽  
pp. 40-47
Author(s):  
S. M. Doguchaeva

The era of digital transformation provides the opportunity for leading companies to change priorities - to begin to take care of the support environment using innovative technologies and become a leading creative platform open for innovation. The successful development of the digital world, the blockchain technology, the Internet of things – the mechanism which will change the financial world. 


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


Author(s):  
Ali Osman Serdar Citak

The history of the development of the Internet of Things (IoT) covers the last twenty years. Despite the short of time, the concept and implementation of the Internet of Things have widely spread all over the world. The impetus of the dissemination of the concept has exponential speed. In the near future, billions of smart sensors and devices will interact with one another without human intervention. The early impact of the Internet of Things has been observed and discussed in the areas of technology, transportation, production, and marketing. The prospective effect of the Internet of Things on the finance sector has been discussed recently. In this study, the development of the concept of the Internet of Things and it is effect on the finance sector and specifically the insurance and banking sectors and future expectations have been evaluated.


Sign in / Sign up

Export Citation Format

Share Document