skip to main content
10.1145/3372938.3372970acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdiotConference Proceedingsconference-collections
research-article

Architecture to manage Internet of Things Data using Blockchain and Fog Computing

Authors Info & Claims
Published:07 January 2020Publication History

ABSTRACT

In this paper, we propose a novel architecture that utilizes features of Blockchain, fog computing, and cloud computing to manage IoT data. Blockchain allows to have a distributed peer-to-peer network in which non-trusting participants can interact with each other without a trusted intermediary or third party. We evaluate how this mechanism works to face the challenges of IoT with respect to multiple accessibility to IoT devises. We consider a Blockchain architecture in presence of edge computing layer. With fog or fog computing, the sensitive data can be analyzed locally instead of sending it to the cloud for analysis. Edge nodes can also keep track and control of the IoT devices that collect, analyze and store data. We show that this control can be better executed when Software Defined Network (SDN) and Network Functions Virtualization (NFV) are integrated into our process for optimal resource management. In this paper, we present our system architecture with a detailed description of the different interactions. We remark that the integration of Blockchain, IoT, and edge computing when coupled with SDN and NFV-enabled cloud infrastructure can bring to more superior and efficient platform for accessing, managing, and processing the huge influx of IoT data.

References

  1. V. Chang and M. Ramachandran. 2016. Towards Achieving Data Security with the Cloud Computing Adoption Framework. IEEE Transactions on Services Computing 9, 1 (2016), 138--151.Google ScholarGoogle ScholarCross RefCross Ref
  2. S. El Kafhali and K. Salah. 2017. Efficient and dynamic scaling of fog nodes for IoT devices. Journal of Supercomputing 73, 12 (December 2017), 5261--5284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. El Kafhali and K. Salah. 2018. Modeling and Analysis of Performance and Energy Consumption in Cloud Data Centers. Arabian Journal for Science and Engineering 43, 12 (December 2018), 7789--7802.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. El Kafhali and K. Salah. 2019. Performance Modeling and Analysis of Internet of Things enabled Healthcare Monitoring Systems. IET Networks 8, 1 (January 2019), 48--58.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. El Kafhali, K. Salah, and S. Ben Alla. 2018. Performance Evaluation of IoT-Fag-Cloud Deployment for Healthcare servicies. In Proceedings of the 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech). IEEE, Brussels, Belgium, 1--6.Google ScholarGoogle Scholar
  6. J. Ellul and G.J. Pace. 2018. AlkylVM: A Virtual Machine for Smart Contract Blockchain Connected Internet of Things. In Proceedings of the 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, Paris, France, 1--4.Google ScholarGoogle Scholar
  7. Ye Guo and Chen Liang. 2016. Blockchain application and outlook in the banking industry. Financial Innovation 2, 24 (December 2016), 1--12.Google ScholarGoogle ScholarCross RefCross Ref
  8. S. Haseeb, A. H. A. Hashim, O. O. Khalifa, and A. F. Ismail. 2017. Network Function Virtualization (NFV) based architecture to address connectivity, interoperability and manageability challenges in Internet of Things (IoT). In Proceedings of the 6th International Conference on Mechatronics - ICOM'17. IOP Publishing, Kuala Lumpur, Malaysia.Google ScholarGoogle Scholar
  9. S. Huckle, R. Bhattacharya, M. White, and N. Beloff. 2016. Blockchain application and outlook in the banking industry. Procedia Computer Science 98 (2016), 461--466.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pan J., Wang J., Hester A., Alqerm I., Liu Y., and Zhao Y. 2019. EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts. IEEE Internet of Things Journal 6, 3 (June 2019), 4719 -- 4732.Google ScholarGoogle ScholarCross RefCross Ref
  11. F. Julien, R. Shantanu, E. B. Alejandro, and U. Ersin. 2014. Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing. In Proceedings of the Workshop on Information Sharing & Collaborative Securit. ACM, Scottsdale, Arizona, USA, 21--29.Google ScholarGoogle Scholar
  12. S. Kamble, G. Angappa, and A. Himanshu. 2018. Understanding the Blockchain technology adoption in supply chains-Indian context. International Journal of Production Research 57, 7 (September 2018), 2009--2033.Google ScholarGoogle Scholar
  13. M. A. Khan and K Salah. 2018. IoT security: Review, blockchain solutions, and open challenges. International Journal of Advanced Computer Science and Applications 82 (2018), 395--411.Google ScholarGoogle Scholar
  14. A. Outchakoucht, E. S. Hamza, and J. P. Leory. 2017. Dynamic access control policy based on blockchain and machine learning for the internet of things. International Journal of Advanced Computer Science and Applications 8, 7 (2017), 417--424.Google ScholarGoogle ScholarCross RefCross Ref
  15. J. Pan, Y. Liu, J. Wang, and A. Hester. 2018. Key Enabling Technologies for Secure and Scalable Future Fog-IoT Architecture: A Survey. arXiv preprint (2018), 1--7.Google ScholarGoogle Scholar
  16. A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito. 2018. Blockchain and IoT Integration: A Systematic Survey. Sensors 18, 8 (Aug 2018), 2575.Google ScholarGoogle ScholarCross RefCross Ref
  17. K.M. Shalini, A. Siddiqa, C. Suchitra, M. Veena, and A. Shefali. 2016. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing. IEEE Transactions on Cloud Computing PP, 99 (2016), 1--1.Google ScholarGoogle Scholar
  18. P. K. Sharma, M. Y. Chen, and J. H. Park. 2018. A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT. IEEE Access 6 (September 2018), 115--124.Google ScholarGoogle Scholar
  19. W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu. 2016. Edge computing: Vision and challenges. IEEE Internet of Things Journal 3, 5 (October 2016), 637--646.Google ScholarGoogle ScholarCross RefCross Ref
  20. S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks 76 (2015), 146--164.Google ScholarGoogle Scholar
  21. Melanie Swan. 2015. Blockchain: Blueprint for a New Economy. O'Reilly Media, Sebastopol, Californie, États-Unis.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Tselios, I. Politis, and S. Kotsopoulos. 2017. Enhancing SDN security for IoT-related deployments through blockchain. In Proceedings of the Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE, Berlin, Germany, 303--308.Google ScholarGoogle Scholar
  23. K. L. Wright, M. Martinez, U. Chadha, and B. Krishnamachari. 2018. SmartEdge: A Smart Contract for Edge Computing. In Proceedings of the International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, Halifax, NS, Canada, Canada, 1685--1690.Google ScholarGoogle Scholar
  24. N. Zhang, S. Zhong, and L. Tian. 2017. Using Blockchain to Protect Personal Privacy in the Scenario of Online Taxi-hailing. International Journal of Computers, Communications & Control 12, 6 (2017), 886--902.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    BDIoT '19: Proceedings of the 4th International Conference on Big Data and Internet of Things
    October 2019
    476 pages
    ISBN:9781450372404
    DOI:10.1145/3372938

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 7 January 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    BDIoT '19 Paper Acceptance Rate75of136submissions,55%Overall Acceptance Rate75of136submissions,55%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader