scholarly journals Integration of Blockchain and IoT: An Enhanced Security Perspective

2020 ◽  
Vol 4 (4) ◽  
pp. 52-63
Author(s):  
Mahdi H. Miraz ◽  
Maaruf Ali

Blockchain (BC), a by-product of Bitcoin cryptocurrency, has gained immense and wide scale popularity for its applicability in various diverse domains – especially in multifaceted non-monetary systems. By adopting cryptographic techniques such as hashing and asymmetric encryption - along with distributed consensus approach, a Blockchain based distributed ledger not only becomes highly secure but also immutable and thus eliminates the need for any third-party intermediators. On the contrary, innumerable IoT (Internet of Things) devices are increasingly being added to the network. This phenomenon poses higher risk in terms of security and privacy. It is thus extremely important to address the security aspects of the growing IoT ecosystem. This paper explores the applicability of BC for ensuring enhanced security and privacy in the IoT ecosystem. Recent research articles and projects/applications were surveyed to assess the implementation of BC for IoT Security and identify associated challenges and propose solutions for BC enabled enhanced security for the IoT ecosystem.

2021 ◽  
Vol 235 ◽  
pp. 03020
Author(s):  
Qian Liao ◽  
Mimi Shao

Features like the distributed ledger, consensus mechanism, asymmetric encryption technology, smart contract and Token of blockchain can lower transaction cost, enhance trust between customers and merchants, as well as eliminate false payment and consumer information leakage, problems which are common in current payment of cross-border E-Commerce platform. Based on the analysis of existing scholars, this paper studied two payment models: digital cash payment based on blockchain technology and the application of blockchain in third-party payment platform. Then the paper discussed the mechanism of blockchain in cross-border e-commerce payment platform, and creatively proposed a blockchain cross-border e-commerce payment platform, serving as reference and guidance for further development of blockchain technology in cross-border payment.1


2017 ◽  
Author(s):  
Anil Lamba ◽  
Satinderjeet Singh ◽  
Balvinder Singh ◽  
Natasha Dutta ◽  
Sivakumar Sai Rela Muni

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2021 ◽  
Vol 13 (8) ◽  
pp. 4206
Author(s):  
Jamilya Nurgazina ◽  
Udsanee Pakdeetrakulwong ◽  
Thomas Moser ◽  
Gerald Reiner

The lack of transparency and traceability in food supply chains (FSCs) is raising concerns among consumers and stakeholders about food information credibility, food quality, and safety. Insufficient records, a lack of digitalization and standardization of processes, and information exchange are some of the most critical challenges, which can be tackled with disruptive technologies, such as the Internet of Things (IoT), blockchain, and distributed ledger technologies (DLTs). Studies provide evidence that novel technological and sustainable practices in FSCs are necessary. This paper aims to describe current practical applications of DLTs and IoT in FSCs, investigating the challenges of implementation, and potentials for future research directions, thus contributing to achievement of the United Nations’ Sustainable Development Goals (SDGs). Within a systematic literature review, the content of 69 academic publications was analyzed, describing aspects of implementation and measures to address the challenges of scalability, security, and privacy of DLT, and IoT solutions. The challenges of high costs, standardization, regulation, interoperability, and energy consumption of DLT solutions were also classified as highly relevant, but were not widely addressed in literature. The application of DLTs in FSCs can potentially contribute to 6 strategic SDGs, providing synergies and possibilities for more sustainable, traceable, and transparent FSCs.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-26
Author(s):  
Georgios Fragkos ◽  
Cyrus Minwalla ◽  
Eirini Eleni Tsiropoulou ◽  
Jim Plusquellic

Electronic cash ( e-Cash ) is a digital alternative to physical currency such as coins and bank notes. Suitably constructed, e-Cash has the ability to offer an anonymous offline experience much akin to cash, and in direct contrast to traditional forms of payment such as credit and debit cards. Implementing security and privacy within e-Cash, i.e., preserving user anonymity while preventing counterfeiting, fraud, and double spending, is a non-trivial challenge. In this article, we propose major improvements to an e-Cash protocol, termed PUF-Cash, based on physical unclonable functions ( PUFs ). PUF-Cash was created as an offline-first, secure e-Cash scheme that preserved user anonymity in payments. In addition, PUF-Cash supports remote payments; an improvement over traditional currency. In this work, a novel multi-trusted-third-party exchange scheme is introduced, which is responsible for “blinding” Alice’s e-Cash tokens; a feature at the heart of preserving her anonymity. The exchange operations are governed by machine learning techniques which are uniquely applied to optimize user privacy, while remaining resistant to identity-revealing attacks by adversaries and trusted authorities. Federation of the single trusted third party into multiple entities distributes the workload, thereby improving performance and resiliency within the e-Cash system architecture. Experimental results indicate that improvements to PUF-Cash enhance user privacy and scalability.


2018 ◽  
Vol 10 (1) ◽  
pp. 54-76
Author(s):  
Sinsu Anna Mathew ◽  
Abdul Quadir Md

This article describes the “Blockchain” which is an upcoming technology in the current leading world and which serves as a capital market use-cases for many of the global Fintech industries across the world, is a distributed ledger of economic transactions which not only used for recording financial transactions but mostly everything of value in this world. In the current world, mostly all the transactions are done through online which mainly includes the bank as a “middle man,” which could be untrustworthy at times. Blockchain comes into the picture which eliminates the need of a middle man or third party between the users who are involved in the transactions. Represents a financial ledger entry of data structure which consists of record of transactions which is digitally signed and cannot be tampered as authenticity is ensured in which the ledger is considered to be of high integrity. One of the leading and highly valued platform of blockchain is “Hyperledger Fabric” which is meant for securing transactions and serves a powerful container technology for smart contract development in the global capital firms. The potential of Blockchain and DLT in capital markets in this upcoming world could remove many of the inefficiencies and costs inherent in the global capital markets across the world and could be considered as a viable technology which enable to settlement.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Qinlong Huang ◽  
Yue He ◽  
Wei Yue ◽  
Yixian Yang

Data collaboration in cloud computing is more and more popular nowadays, and proxy deployment schemes are employed to realize cross-cloud data collaboration. However, data security and privacy are the most serious issues that would raise great concerns from users when they adopt cloud systems to handle data collaboration. Different cryptographic techniques are deployed in different cloud service providers, which makes cross-cloud data collaboration to be a deeper challenge. In this paper, we propose an adaptive secure cross-cloud data collaboration scheme with identity-based cryptography (IBC) and proxy re-encryption (PRE) techniques. We first present a secure cross-cloud data collaboration framework, which protects data confidentiality with IBC technique and transfers the collaborated data in an encrypted form by deploying a proxy close to the clouds. We then provide an adaptive conditional PRE protocol with the designed full identity-based broadcast conditional PRE algorithm, which can achieve flexible and conditional data re-encryption among ciphertexts encrypted in identity-based encryption manner and ciphertexts encrypted in identity-based broadcast encryption manner. The extensive analysis and experimental evaluations demonstrate the well security and performance of our scheme, which meets the secure data collaboration requirements in cross-cloud scenarios.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


Sign in / Sign up

Export Citation Format

Share Document