Abstract
Recently, most of the Internet of things (IoT) infrastructures are highly centralized with single points of failure, which results in serious security and privacy issues of IoT data. Fortunately, blockchain technique can provide a decentralized and secure IoT framework to deal with security issues based on the characteristics of decentralization, non-tampering, openness, transparency, and traceability. However, the blockchain consensus protocol guarantees the safety and reliability of data, but it also brings problems such as scalability limitations and poor storage extensibility, resulting in the inability to directly integrate blockchain and the IoT in existing conditions. In this article, a private three-tier local blockchain, Three-tier architecture Blockchain (TBchain), is proposed to solve the problem by splitting part of the transactions in the public blockchain and locking them in a higher-level blockchain TBchain. Additionally, the private blockchain TBchain is connected to the public blockchain to build a hierarchical blockchain network to provide privacy protection for the IoT data stored on the blockchain. Finally, we implement an IoT framework based on TBchain and the InterPlanetary File System (IPFS) to realize the decentralized IoT, which guarantees the user’s access control right to personal data. Experimental results show that the IoT framework based on TBchain and IPFS realizes the user’s access control right to personal data by verifying in advance to ensure the confidentiality and security of shared data, and improves the security and privacy of IoT data and transactions. Moreover, we prove that the scalability and storage extensibility of the blockchain is positively correlated with the number of data blocks in TBchain.
- [1] N. A. Anagnostopoulos, S. Ahmad, T. Arul, D. Steinmetzer, M. Hollick, and S. Katzenbeisser. 2020. Low-cost security for next-generation IoT networks. ACM Transactions on Internet Technology 20, 3 (2020), 1–31.Google ScholarDigital Library
- [2] A. Dorri, S. S. Kanhere, R. Jurdak, and G. Praveen. 2017. Blockchain for IoT security and privacy: The case study of a smart home. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 618–623.Google Scholar
- [3] M. S. Ali, K. Dolui, and F. Antonelli. 2017. IoT data privacy via blockchains and IPFS. In Proceedings of the 7th International Conference on the Internet of Things, 1–7.Google Scholar
- [4] E. Bertino, K. K. R. Choo, D. Georgakopolous, and S. Nepal. 2016. Internet of Things (IoT) smart and secure service delivery. ACM Transactions on Internet Technology 16, 4 (2016), 1–7.Google ScholarDigital Library
- [5] S. Nakamoto and A. Bitcoin. 2008. A peer-to-peer electronic cash system. Bitcoin. Retrieved from https://bitcoin.org/bitcoin.pdf. Accessed October 2022.Google Scholar
- [6] M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli, and M. H. Rehmani. 2018. Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Communications Surveys and Tutorials 21, 2 (2018), 1676–1717.Google ScholarCross Ref
- [7] S. Biswas, K. Sharif, F. Li, B. Nour, and Y. Wang. 2018. A scalable blockchain framework for secure transactions in IoT. IEEE Internet of Things Journal 6, 3 (2018), 4650–4659.Google ScholarCross Ref
- [8] S. Madumidha, P. SivaRanjani, S. Rajesh, and S. Sivajumar. 2018. Blockchain security for Internet of Things: A literature survey. International Journal of Pure and Applied Mathematics 119, 16 (2018), 3677–3686.Google Scholar
- [9] K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, S. E. Gün, and D. Song. 2016. On scaling decentralized blockchains. International Conference on Financial Cryptography and Data Security. Springer, Berlin, 106–125.Google Scholar
- [10] A. Dorri, S. S. Kanhere, and R. Jurdak. 2017. Towards an optimized blockchain for IoT. 2017 IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation. IEEE, Pittsburgh, 173–178.Google Scholar
- [11] J. Wu, F. Xiong, and C. Li. 2019. Application of Internet of Things and blockchain technologies to improve accounting information quality. IEEE Access 7 (2019), 100090–100098.Google ScholarCross Ref
- [12] A. Rejeb, J. G. Keogh, and H. Treiblmaier. 2019. Leveraging the Internet of Things and blockchain technology in supply chain management. Future Internet 11, 7 (2019), 161.Google ScholarCross Ref
- [13] C. Li and L. J. Zhang. 2017. A blockchain based new secure multi-layer network model for Internet of Things. 2017 IEEE International Congress on Internet of Things (ICIOT), Honolulu, 2017, 33–41.Google ScholarCross Ref
- [14] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito. 2018. Blockchain and iot integration: A systematic survey. Sensors 18, 8 (2018), 2575.Google ScholarCross Ref
- [15] W. Chen, M. Ma, Y. Ye, Z. Zheng, and Y. Zhou. 2018. IoT service based on jointcloud blockchain: The case study of smart traveling. 2018 IEEE Symposium on Service-oriented System Engineering. IEEE, 216–221.Google Scholar
- [16] T. Hardjono and N. Smith. 2016. Cloud-based commissioning of constrained devices using permissioned blockchains. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. 2016, 29–36.Google ScholarDigital Library
- [17] G. Zyskind, O. Nathan, and A. Pentland. 2015. Decentralizing privacy: Using blockchain to protect personal data. 2015 IEEE Security and Privacy Workshops. IEEE, FAIRMONT, 180–184.Google Scholar
- [18] M. Conoscenti, A. Vetro, and J. C. De Martin. 2017. Peer to peer for privacy and decentralization in the Internet of Things. 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C). IEEE, Buenos Aires, 288–290.Google Scholar
- [19] P. K. Sharma, M. Y. Chen, and J. H. Park. 2017. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6, (2017), 115–124.Google Scholar
- [20] N. Tapas, G. Merlino, and F. Longo. 2018. Blockchain-based IoT-cloud authorization and delegation. 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 411–416.Google Scholar
- [21] X. Wang, X. Zha, W. Ni, R. P. Liu, Y. J. Guo, X. Niu, and K. Zheng. 2019. Survey on blockchain for Internet of Things. Computer Communications 136 (2019), 10–29.Google ScholarDigital Library
- [22] Z. Guan, N. Wang, X. Fan, X. Liu, L. Wu, and S. Wan. 2020. Achieving secure search over encrypted data for e-Commerce: A blockchain approach. ACM Transactions on Internet Technology 21, 1 (2020), 1–17.Google ScholarDigital Library
- [23] E. Bertino, K. K. R. Choo, D. Georgakopolous, and S. Nepal. 2016. Internet of Things (IoT) smart and secure service delivery. ACM Transactions on Internet Technology (TOIT), 16, 4 (2016), 1–7.Google ScholarDigital Library
- [24] D. Kushner. 2019. The real story of stuxnet. Retrieved from https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet. Accessed September 17, 2019.Google Scholar
- [25] I. Arghire. 2019. Mirai-based botnet launches massive DDOS attack on streaming service. Avast. What Is the Mirai Botnet? (2019), https://www.avast.com/c-mirai. Accessed October 2022.Google Scholar
- [26] K. Li, X. Wang, Q. Ni, and M. Huang. 2022. Entropy-based reinforcement learning for computation offloading service in software-defined multi-access edge computing. Future Generation Computer Systems 136 (2022), 241–251.Google ScholarDigital Library
- [27] F. Li, Y. Lu, X. Wang, Y. Bi, T. Pan, Y. Zhang, and Y. Wang. 2020. Software-defined networking-assisted content delivery at edge of mobile social networks. IEEE Internet of Things Journal, 7, 9 (2020), 8122–8132.Google ScholarCross Ref
- [28] Shi Cheng, Lianbo Ma, Hui Lu, Xiujuan Lei, and Yuhui Shi. 2021. Evolutionary computation for solving search-based data analytics problems. Artificial Intelligence Review 54, 2 (2021), 1321–1348.Google ScholarDigital Library
- [29] J. Cha, S. K. Singh, Y. Pan, and J. H. Park. 2020. Blockchain-based cyber threat intelligence system architecture for sustainable computing. Sustainability 12, 16 (2020), 6401.Google ScholarCross Ref
- [30] J. Feng, L. T. Yang, R. Zhang, W. Qiang and J. Chen. 2020. Privacy preserving high-order bi-lanczos in cloud-fog computing for industrial applications. IEEE Transactions on Industrial Informatics. 18, 10 (2020), 7009–7018.Google ScholarCross Ref
- [31] J. Feng, L. T. Yang, R. Zhang, and B. S. Gavuna. 2020. Privacy-preserving tucker train decomposition over blockchain-based encrypted industrial IoT data. IEEE Transactions on Industrial Informatics 17, 7 (2020), 4904–4913.Google ScholarCross Ref
- [32] A. Al Sadawi, M. S. Hassan, and M. Ndiaye. 2021. A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges. IEEE Access 9 (2021), 54478–54497.Google ScholarCross Ref
- [33] O. Alfandi, S. Khanji, L. Ahmad, and A. Khattak. 2021. A survey on boosting IoT security and privacy through blockchain. Cluster Computing 24, 1 (2021), 37–55.Google ScholarDigital Library
- [34] S. Singh, A. S. M. S. Hosen, and B. Yoon. 2021. Blockchain security attacks, challenges, and solutions for the future distributed iot network. IEEE Access 9 (2021), 13938–13959.Google ScholarCross Ref
- [35] B. Bera, S. Saha, A. K. Das, and A. V. Vasilakos. 2021. Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet of Things Journal 8, 7 (2021), 5744–5761.Google ScholarCross Ref
- [36] L. Da Xu, Y. Lu, and L. Li. 2021. Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal 8, 13 (2021), 10452–10473.Google ScholarCross Ref
- [37] W. Liang and N. Ji. 2021. Privacy challenges of IoT-based blockchain: A systematic review. Cluster Computing, 25 (2022), 2203–2221.Google Scholar
- [38] B. Mbarek, N. Jabeur, T. Pitner, and A. U. H. Yasar. 2021. Mbs: Multilevel blockchain system for IoT. Personal and Ubiquitous Computing 25, 1 (2021), 247–254.Google ScholarCross Ref
Index Terms
- Three-tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy
Recommendations
IoT data privacy via blockchains and IPFS
IoT '17: Proceedings of the Seventh International Conference on the Internet of ThingsBlockchain, the underlying technology of cryptocurrency networks like Bitcoin, can prove to be essential towards realizing the vision of a decentralized, secure, and open Internet of Things (IoT) revolution. There is a growing interest in many research ...
A review of IoT security and privacy using decentralized blockchain techniques
AbstractIoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT ...
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Comments