skip to main content
research-article

Three-tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy

Authors Info & Claims
Published:21 August 2023Publication History
Skip Abstract Section

Abstract

Recently, most of the Internet of things (IoT) infrastructures are highly centralized with single points of failure, which results in serious security and privacy issues of IoT data. Fortunately, blockchain technique can provide a decentralized and secure IoT framework to deal with security issues based on the characteristics of decentralization, non-tampering, openness, transparency, and traceability. However, the blockchain consensus protocol guarantees the safety and reliability of data, but it also brings problems such as scalability limitations and poor storage extensibility, resulting in the inability to directly integrate blockchain and the IoT in existing conditions. In this article, a private three-tier local blockchain, Three-tier architecture Blockchain (TBchain), is proposed to solve the problem by splitting part of the transactions in the public blockchain and locking them in a higher-level blockchain TBchain. Additionally, the private blockchain TBchain is connected to the public blockchain to build a hierarchical blockchain network to provide privacy protection for the IoT data stored on the blockchain. Finally, we implement an IoT framework based on TBchain and the InterPlanetary File System (IPFS) to realize the decentralized IoT, which guarantees the user’s access control right to personal data. Experimental results show that the IoT framework based on TBchain and IPFS realizes the user’s access control right to personal data by verifying in advance to ensure the confidentiality and security of shared data, and improves the security and privacy of IoT data and transactions. Moreover, we prove that the scalability and storage extensibility of the blockchain is positively correlated with the number of data blocks in TBchain.

REFERENCES

  1. [1] N. A. Anagnostopoulos, S. Ahmad, T. Arul, D. Steinmetzer, M. Hollick, and S. Katzenbeisser. 2020. Low-cost security for next-generation IoT networks. ACM Transactions on Internet Technology 20, 3 (2020), 1–31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] A. Dorri, S. S. Kanhere, R. Jurdak, and G. Praveen. 2017. Blockchain for IoT security and privacy: The case study of a smart home. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 618–623.Google ScholarGoogle Scholar
  3. [3] M. S. Ali, K. Dolui, and F. Antonelli. 2017. IoT data privacy via blockchains and IPFS. In Proceedings of the 7th International Conference on the Internet of Things, 1–7.Google ScholarGoogle Scholar
  4. [4] E. Bertino, K. K. R. Choo, D. Georgakopolous, and S. Nepal. 2016. Internet of Things (IoT) smart and secure service delivery. ACM Transactions on Internet Technology 16, 4 (2016), 1–7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] S. Nakamoto and A. Bitcoin. 2008. A peer-to-peer electronic cash system. Bitcoin. Retrieved from https://bitcoin.org/bitcoin.pdf. Accessed October 2022.Google ScholarGoogle Scholar
  6. [6] M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli, and M. H. Rehmani. 2018. Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Communications Surveys and Tutorials 21, 2 (2018), 1676–1717.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] S. Biswas, K. Sharif, F. Li, B. Nour, and Y. Wang. 2018. A scalable blockchain framework for secure transactions in IoT. IEEE Internet of Things Journal 6, 3 (2018), 4650–4659.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] S. Madumidha, P. SivaRanjani, S. Rajesh, and S. Sivajumar. 2018. Blockchain security for Internet of Things: A literature survey. International Journal of Pure and Applied Mathematics 119, 16 (2018), 3677–3686.Google ScholarGoogle Scholar
  9. [9] K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, S. E. Gün, and D. Song. 2016. On scaling decentralized blockchains. International Conference on Financial Cryptography and Data Security. Springer, Berlin, 106–125.Google ScholarGoogle Scholar
  10. [10] A. Dorri, S. S. Kanhere, and R. Jurdak. 2017. Towards an optimized blockchain for IoT. 2017 IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation. IEEE, Pittsburgh, 173–178.Google ScholarGoogle Scholar
  11. [11] J. Wu, F. Xiong, and C. Li. 2019. Application of Internet of Things and blockchain technologies to improve accounting information quality. IEEE Access 7 (2019), 100090–100098.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] A. Rejeb, J. G. Keogh, and H. Treiblmaier. 2019. Leveraging the Internet of Things and blockchain technology in supply chain management. Future Internet 11, 7 (2019), 161.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] C. Li and L. J. Zhang. 2017. A blockchain based new secure multi-layer network model for Internet of Things. 2017 IEEE International Congress on Internet of Things (ICIOT), Honolulu, 2017, 33–41.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito. 2018. Blockchain and iot integration: A systematic survey. Sensors 18, 8 (2018), 2575.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] W. Chen, M. Ma, Y. Ye, Z. Zheng, and Y. Zhou. 2018. IoT service based on jointcloud blockchain: The case study of smart traveling. 2018 IEEE Symposium on Service-oriented System Engineering. IEEE, 216–221.Google ScholarGoogle Scholar
  16. [16] T. Hardjono and N. Smith. 2016. Cloud-based commissioning of constrained devices using permissioned blockchains. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. 2016, 29–36.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] G. Zyskind, O. Nathan, and A. Pentland. 2015. Decentralizing privacy: Using blockchain to protect personal data. 2015 IEEE Security and Privacy Workshops. IEEE, FAIRMONT, 180–184.Google ScholarGoogle Scholar
  18. [18] M. Conoscenti, A. Vetro, and J. C. De Martin. 2017. Peer to peer for privacy and decentralization in the Internet of Things. 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C). IEEE, Buenos Aires, 288–290.Google ScholarGoogle Scholar
  19. [19] P. K. Sharma, M. Y. Chen, and J. H. Park. 2017. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6, (2017), 115–124.Google ScholarGoogle Scholar
  20. [20] N. Tapas, G. Merlino, and F. Longo. 2018. Blockchain-based IoT-cloud authorization and delegation. 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 411–416.Google ScholarGoogle Scholar
  21. [21] X. Wang, X. Zha, W. Ni, R. P. Liu, Y. J. Guo, X. Niu, and K. Zheng. 2019. Survey on blockchain for Internet of Things. Computer Communications 136 (2019), 10–29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Z. Guan, N. Wang, X. Fan, X. Liu, L. Wu, and S. Wan. 2020. Achieving secure search over encrypted data for e-Commerce: A blockchain approach. ACM Transactions on Internet Technology 21, 1 (2020), 1–17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] E. Bertino, K. K. R. Choo, D. Georgakopolous, and S. Nepal. 2016. Internet of Things (IoT) smart and secure service delivery. ACM Transactions on Internet Technology (TOIT), 16, 4 (2016), 1–7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] D. Kushner. 2019. The real story of stuxnet. Retrieved from https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet. Accessed September 17, 2019.Google ScholarGoogle Scholar
  25. [25] I. Arghire. 2019. Mirai-based botnet launches massive DDOS attack on streaming service. Avast. What Is the Mirai Botnet? (2019), https://www.avast.com/c-mirai. Accessed October 2022.Google ScholarGoogle Scholar
  26. [26] K. Li, X. Wang, Q. Ni, and M. Huang. 2022. Entropy-based reinforcement learning for computation offloading service in software-defined multi-access edge computing. Future Generation Computer Systems 136 (2022), 241–251.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] F. Li, Y. Lu, X. Wang, Y. Bi, T. Pan, Y. Zhang, and Y. Wang. 2020. Software-defined networking-assisted content delivery at edge of mobile social networks. IEEE Internet of Things Journal, 7, 9 (2020), 8122–8132.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Shi Cheng, Lianbo Ma, Hui Lu, Xiujuan Lei, and Yuhui Shi. 2021. Evolutionary computation for solving search-based data analytics problems. Artificial Intelligence Review 54, 2 (2021), 1321–1348.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] J. Cha, S. K. Singh, Y. Pan, and J. H. Park. 2020. Blockchain-based cyber threat intelligence system architecture for sustainable computing. Sustainability 12, 16 (2020), 6401.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] J. Feng, L. T. Yang, R. Zhang, W. Qiang and J. Chen. 2020. Privacy preserving high-order bi-lanczos in cloud-fog computing for industrial applications. IEEE Transactions on Industrial Informatics. 18, 10 (2020), 7009–7018.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] J. Feng, L. T. Yang, R. Zhang, and B. S. Gavuna. 2020. Privacy-preserving tucker train decomposition over blockchain-based encrypted industrial IoT data. IEEE Transactions on Industrial Informatics 17, 7 (2020), 4904–4913.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] A. Al Sadawi, M. S. Hassan, and M. Ndiaye. 2021. A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges. IEEE Access 9 (2021), 54478–54497.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] O. Alfandi, S. Khanji, L. Ahmad, and A. Khattak. 2021. A survey on boosting IoT security and privacy through blockchain. Cluster Computing 24, 1 (2021), 37–55.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] S. Singh, A. S. M. S. Hosen, and B. Yoon. 2021. Blockchain security attacks, challenges, and solutions for the future distributed iot network. IEEE Access 9 (2021), 13938–13959.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] B. Bera, S. Saha, A. K. Das, and A. V. Vasilakos. 2021. Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet of Things Journal 8, 7 (2021), 5744–5761.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] L. Da Xu, Y. Lu, and L. Li. 2021. Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal 8, 13 (2021), 10452–10473.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] W. Liang and N. Ji. 2021. Privacy challenges of IoT-based blockchain: A systematic review. Cluster Computing, 25 (2022), 2203–2221.Google ScholarGoogle Scholar
  38. [38] B. Mbarek, N. Jabeur, T. Pitner, and A. U. H. Yasar. 2021. Mbs: Multilevel blockchain system for IoT. Personal and Ubiquitous Computing 25, 1 (2021), 247–254.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Three-tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 23, Issue 3
        August 2023
        303 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3615983
        • Editor:
        • Ling Liu
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 August 2023
        • Online AM: 5 September 2022
        • Accepted: 17 January 2022
        • Revised: 21 September 2021
        • Received: 27 December 2020
        Published in toit Volume 23, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text