Abstract
The Internet of Things (IoT) has been evolving for more than a decade. Technological advancements have increased its popularity, but concerns and risks related to IoT are growing considerably along with the increased number of connected devices. In 2013, a new cryptography-based infrastructure called blockchain emerged with the potential to replace the existing cloud-based infrastructure of IoT through decentralization. In this article, we provide a taxonomy of the challenges in the current IoT infrastructure, and a literature survey with a taxonomy of the issues to expect in the future of the IoT after adopting blockchain as an infrastructure. The two architectures are compared based on their strengths and weaknesses. Then a brief survey of ongoing key research activities in blockchain is presented, which will have considerable impact on overcoming the challenges encountered in the applicability of blockchain in IoT. Finally, considering the challenges and issues in both infrastructures and the latest research activities, we propose a high-level hybrid IoT approach that uses the cloud, edge/fog, and blockchain together to avoid the limitations of each infrastructure.
Similar content being viewed by others
References
Aazam M, Khan I, Alsaffar AA, et al., 2014. Cloud of Things: integrating Internet of Things and cloud computing and the issues involved. Proc 11th Int Bhurban Conf on Applied Sciences and Technology, p.414–419. https://doi.org/10.1109/IBCAST.2014.6778179
Ahmed F, Ko YB, 2016. Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur Commun Netw, 9(18):5143–5154. https://doi.org/10.1002/sec.1684
Akoush S, Sohan R, Rice A, et al., 2011. Free lunch: exploiting renewable energy for computing. https://www.usenix.org/events/hotos/tech/final_files/Akoush.pdf [Accessed on Sept. 22, 2018].
Almadhoun R, Kadadha M, Alhemeiri M, et al., 2018. A user authentication scheme of IoT devices using blockchainenabled fog nodes. IEEE/ACS 15th Int Conf on Computer Systems and Applications, p.1–8. https://doi.org/10.1109/AICCSA.2018.8612856
Amazon, 2006. Announcing Amazon Elastic Compute Cloud (Amazon EC2) - beta. https://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazonec2-beta/ [Accessed on Jan. 18, 2018].
Andersen MP, Kolb J, Chen KF, et al., 2017. Wave: a decentralized authorization system for IoT via blockchain smart contracts. https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-234.pdf [Accessed on May 29, 2019].
Armbrust M, Fox A, Griffith R, et al., 2010. A view of cloud computing. Commun ACM, 53(4):50–58. https://doi.org/10.1145/1721654.1721672
Aulbach S, Grust T, Jacobs D, et al., 2008. Multi-tenant databases for software as a service: schema-mapping techniques. Proc ACM SIGMOD Int Conf on Management of Data, p.1195–1206. https://doi.org/10.1145/1376616.1376736
Bahga A, Madisetti VK, 2016. Blockchain platform for Industrial Internet of Things. J Softw Eng Appl, 9(10): 533–546. https://doi.org/10.4236/jsea.2016.910036
Banafa A, 2017. IoT and blockchain convergence: benefits and challenges. http://iot.ieee.org/newsletter/january-2017/iot-and-blockchain-convergence-benefits-and-challenges.html [Accessed on Feb. 23, 2018].
Bano S, Al-Bassam M, Danzis G, 2017a. The road to scalable blockchain designs. Winter, 42(4):31–36.
Bano S, Sonnino A, Al-Bassam M, et al., 2017b. SoK: consensus in the age of blockchains. https://arxiv.org/pdf/1711.03936.pdf [Accessed on Sept. 27, 2018].
Bawany NZ, Shamsi JA, Salah K, 2017. DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab J Sci Eng, 42(2):425–441. https://doi.org/10.1007/s13369-017-2414-5
Bellavista P, Zanni A, 2016. Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. IEEE 2nd Int Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow, p.1–6. https://doi.org/10.1109/RTSI.2016.7740614
Bhattasali T, Chaki R, 2011. A survey of recent intrusion detection systems for wireless sensor network. In: Wyld DC, Wozniak M, Chaki N, et al. (Eds.), Advances in Network Security and Applications. Springer Berlin Heidelberg, p.268–280. https://doi.org/10.1007/978-3-642-22540-6_27
Biswas K, Muthukkumarasamy V, 2016. Securing smart cities using blockchain technology. IEEE 18th Int Conf on High Performance Computing and Communications, p.1392–1393. https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198
Bonneau J, Miller A, Clark J, et al., 2015. SoK: research perspectives and challenges for Bitcoin and cryptocurrencies. Proc IEEE Symp on Security and Privacy, p.104–121. https://doi.org/10.1109/SP.2015.14
Bonomi F, Milito R, Zhu J, et al., 2012. Fog computing and its role in the Internet of Things. Proc 1st Edition of the MCC Workshop on Mobile Cloud Computing, p.13–16. https://doi.org/10.1145/2342509.2342513
Brachmann M, Garcia-Morchon O, Kirsche M, 2011. Security for practical CoAP applications: issues and solution approaches. 10th GI/ITG KuVS Fachgespraech Sensornetze, p.1–4. https://www.researchgate.net/profile/Michael_Kirsche/publication/265973615_Security_for_Practical_CoAP_Applications_Issues_and_Solution_Approaches/links/5583f51c08ae4738295c2028.pdf [Accessed on Feb. 24, 2018].
Brito J, Castillo A, 2013. Bitcoin: a Primer for Policymakers. Mercatus Center at George Mason University.
Brown J, 2017. Companies forge cooperative to explore blockchain-based IoT security. https://www.ciodive.com/news/companies-forge-cooperative-to-explore-blockchain-based-iot-security/435007/ [Accessed on Feb. 23, 2018].
Buterin V, 2013. Ethereum white paper. GitHub Repository.
Buterin V, 2016. Privacy on the blockchain. Available from https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/ [Accessed on Sept. 27, 2018].
Cachin C, 2016. Architecture of the Hyperledger Blockchain Fabric. IBM Research. https://pdfs.semanticscholar.org/f852/c5f3fe649f8a17ded391df0796677a59927f.pdf [Accessed on Feb. 24, 2018].
Castro M, Liskov B, 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 20(4): 398–461. https://doi.org/10.1145/571637.571640
Chae SH, Choi W, Lee JH, et al., 2014. Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone. IEEE Trans Inform Forens Secur, 9(10): 1617–1628. https://doi.org/10.1109/TIFS.2014.2341453
Chen YY, Trappe W, Martin RP, 2007. Detecting and localizing wireless spoofing attacks. 4th Annual IEEE Communications Society Conf on Sensor, Mesh and Ad Hoc Communications and Networks, p.193–202. https://doi.org/10.1109/SAHCN.2007.4292831
Christidis K, Devetsikiotis M, 2016. Blockchains and smart contracts for the Internet of Things. IEEE Access, 4:2292–2303. https://doi.org/10.1109/ACCESS.2016.2566339
Cisco, 2015. Fog computing the Internet of Things: extend the cloud to where the things are. White Paper. https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf
Cohn RJ, Coppen RJ, Banks A, et al., 2014. MQTT version 3.1. https://www.oasis-open.org/committees/download.php/52951/mqtt-v3.1.1-csd06.pdf [Accessed on May 29, 2019].
Conzon D, Bolognesi T, Brizzi P, et al., 2012. The VIRTUS middleware: an XMPP based architecture for secure IoT communications. 21st Int Conf on Computer Communications and Networks, p.1–6. https://doi.org/10.1109/ICCCN.2012.6289309
Courtois NT, Bahack L, 2014. On subversive miner strategies and block withholding attack in Bitcoin digital currency. https://arxiv.org/abs/1402.1718 [Accessed on Sept. 16, 2018].
Dhillon V, Metcalf D, Hooper M, 2017. Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3081-7_1
Dorri A, Kanhere SS, Jurdak R, et al., 2017a. LSB: a lightweight scalable blockchain for IoT security and privacy. https://arxiv.org/pdf/1712.02969.pdf [Accessed on Sept. 14, 2018].
Dorri A, Kanhere SS, Jurdak R, et al., 2017b. Blockchain for IoT security and privacy: the case study of a smart home. IEEE Int Conf on Pervasive Computing and Communications Workshops (PerCom Workshops), p.618–623. https://doi.org/10.1109/PERCOMW.2017.7917634
Drescher D, 2017. Blockchain basics. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2604-9
Dvir A, Holczer T, Buttyan L, 2011. VeRA-version number and rank authentication in RPL. IEEE 8th Int Conf on Mobile Ad-hoc and Sensor Systems, p.709–714. https://doi.org/10.1109/MASS.2011.76
Dwork C, Naor M, 1993. Pricing via processing or combatting junk mail. In: Brickell EF (Ed.), Advances in Cryptology—CRYPTO’ 92. Springer Berlin Heidelberg, p.139–147. https://doi.org/10.1007/3-540-48071-4_10
Elham H, Lebbat A, Medromi H, 2012. Enhance security of cloud computing through fork virtual machine. IEEE Int Conf on Complex Systems, p.1–4. https://doi.org/10.1109/ICoCS.2012.6458569
Eyal I, Sirer EG, 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun ACM, 61(7):95–102. https://doi.org/10.1145/3212998
Eyal I, Gencer AE, Sirer EG, et al., 2015. Bitcoin-NG: a scalable blockchain protocol. https://arxiv.org/abs/1510.02037
Ficco M, Esposito C, Xiang Y, et al., 2017. Pseudo-dynamic testing of realistic edge-fog cloud ecosystems. IEEE Commun Mag, 55(11):98–104. https://doi.org/10.1109/MCOM.2017.1700328
Formisano C, Pavia D, Gurgen L, et al., 2015. The advantages of IoT and cloud applied to smart cities. 3rd Int Conf on Future Internet of Things and Cloud, p.325–332. https://doi.org/10.1109/FiCloud.2015.85
Foschini L, Taleb T, Corradi A, et al., 2011. M2M-based metropolitan platform for IMS-enabled road traffic management in IoT. IEEE Commun Mag, 49(11):50–57. https://doi.org/10.1109/MCOM.2011.6069709
Gaetani E, Aniello L, Baldoni R, et al., 2017. Blockchainbased database to ensure data integrity in cloud computing environments. Italian Conf on Cybersecurity. https://eprints.soton.ac.uk/411996/ [Accessed on Sept. 27, 2018].
Garai Á, Attila A, Péntek I, 2016. Cognitive telemedicine IoT technology for dynamically adaptive eHealth content management reference framework embedded in cloud architecture. 7th IEEE Int Conf on Cognitive Infocommunications, p.187–192. https://doi.org/10.1109/CogInfoCom.2016.7804547
Gervais A, Karame GO, Wüst K, et al., 2016. On the security and performance of proof of work blockchains. Proc ACM SIGSAC Conf on Computer and Communications Security, p.3–16. https://doi.org/10.1145/2976749.2978341
Goiri Í, Beauchea R, Le K, et al., 2011a. Greenslot: scheduling energy consumption in green datacenters. Proc Int Conf for High Performance Computing, Networking, Storage and Analysis, p.1–11. https://doi.org/10.1145/2063384.2063411
Goiri Í, Le K, Guitart J, et al., 2011b. Intelligent placement of datacenters for Internet services. 31st Int Conf on Distributed Computing Systems, p.131–142. https://doi.org/10.1109/ICDCS.2011.19
Granjal J, Monteiro E, Sá Silva J, 2013a. End-to-end transportlayer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. IFIP Networking Conf, p.1–9. http://ieeexplore.ieee.org/abstract/document/6663530/ [Accessed on Feb. 24, 2018].
Granjal J, Monteiro E, Sá Silva J, 2013b. Application-layer security for the WoT: extending CoAP to support end-toend message security for Internet-integrated sensing applications. LNCS, 7889:140–153. https://doi.org/10.1007/978-3-642-38401-1_11
Granjal J, Monteiro E, Sá Silva J, 2015. Security for the Internet of Things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor, 17(3): 1294–1312. https://doi.org/10.1109/COMST.2015.2388550
Hameed A, Khoshkbarforoushha A, Ranjan R, et al., 2016. A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. Computing, 98(7):751–774. https://doi.org/10.1007/s00607-014-0407-8
Henze M, Wolters B, Matzutt R, et al., 2017. Distributed configuration, authorization and management in the cloud-based Internet of Things. IEEE Trustcom/BigDataSE/ICESS, p.185–192. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.236
Hilton S, 2016. Dyn analysis summary of Friday October 21 Attack. Company News. https://dyn.com/blog/dyn-analysis-summary-of-fridayoctober-21-attack/ [Accessed on Feb. 24, 2018].
Hong YWP, Lan PC, Kuo CCJ, 2013. Enhancing physicallayer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Process Mag, 30(5):29–40. https://doi.org/10.1109/MSP.2013.2256953
Hummen R, Hiller J, Wirtz H, et al., 2013. 6LoWPAN fragmentation attacks and mitigation mechanisms. Proc 6th ACM Conf on Security and Privacy in Wireless and Mobile Networks, p.55–66. https://doi.org/10.1145/2462096.2462107
Hur J, Noh DK, 2011. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parall Distrib Syst, 22(7):1214–1221. https://doi.org/10.1109/TPDS.2010.203
Jagdeep K, Meghna S, 2017. Extending IoTs into the cloudbased platform for examining Amazon web services. Examining Cloud Computing Technologies Through the Internet of Things, p.216–227.
Jakobsson M, Juels A, 1999. Proofs of work and bread pudding protocols (extended abstract). In: Preneel B (Ed.), Secure Information Networks. Springer, Boston, MA, p.258–272. https://doi.org/10.1007/978-0-387-35568-9_18
Juniper Research, 2015. Cybercrime will cost businesses over $2 trillion by 2019. Press Releases. https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion [Accessed on Feb. 24, 2018].
Khan MA, Salah K, 2018. IoT security: review, blockchain solutions, and open challenges. Fut Gener Comput Syst, 82:395–411. https://doi.org/10.1016/j.future.2017.11.022
Khosravi A, Buyya R, 2018. Energy and carbon footprintaware management of geo-distributed cloud data centers: a taxonomy, state of the art, and future directions. https://www.igi-global.com/chapter/energy-and-carbonfootprint-aware-management-of-geo-distributed-clouddata-centers/189954 [Accessed on Sept. 22, 2018].
Kim HG, 2008. Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. Proc Int Conf on Convergence and Hybrid Information Technology, p.796–801. https://doi.org/10.1109/ICHIT.2008.261
Kokoris-Kogias E, Jovanovic P, Gailly N, et al., 2016. Enhancing Bitcoin security and performance with strong consistency via collective signing. https://arxiv.org/abs/1602.06997
Kshetri N, 2017a. Can blockchain strengthen the Internet of Things? IT Prof, 19(4):68–72. https://doi.org/10.1109/MITP.2017.3051335
Kshetri N, 2017b. Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun Pol, 41(10): 1027–1038. https://doi.org/10.1016/j.telpol.2017.09.003
Li DR, Shen X, Chen NC, et al., 2017. Space-based information service in Internet plus era. Sci China Inform Sci, 60(10):102308. https://doi.org/10.1007/s11432-016-9164-1
Li JW, Jia CF, Li J, et al., 2012. Outsourcing encryption of attribute-based encryption with mapreduce. LNCS, 7618: 191–201. https://doi.org/10.1007/978-3-642-34129-8_17
Li Y, Marier-Bienvenue T, Perron-Brault A, et al., 2018. Blockchain technology in business organizations: a scoping review. Proc 51st Hawaii Int Conf on System Sciences. https://doi.org/10.24251/HICSS.2018.565
Liao CF, Bao SW, Cheng CJ, et al., 2017. On design issues and architectural styles for blockchain-driven IoT services. IEEE Int Conf on Consumer Electronics, p.351–352. https://doi.org/10.1109/ICCE-China.2017.7991140
Lin IC, Liao TC, 2017. A survey of blockchain security issues and challenges. Int J Netw Secur, 19(5):653–659. https://doi.org/10.6633/IJNS.201709.19(5).01
Liu CH, Yang B, Liu TC, 2014. Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw, 18:85–101. https://doi.org/10.1016/j.adhoc.2013.02.008
Luu L, Chu DH, Olickel H, et al., 2016a. Making smart contracts smarter. Proc ACM SIGSAC Conf on Computer and Communications Security, p.254–269. https://doi.org/10.1145/2976749.2978309
Luu L, Narayanan V, Zheng CD, et al., 2016b. A secure sharding protocol for open blockchains. Proc ACM SIGSAC Conf on Computer and Communications Security, p.17–30. https://doi.org/10.1145/2976749.2978389
Mahalle PN, Anggorojati B, Prasad NR, et al., 2013. Identity authentication and capability based access control (IACAC) for the Internet of Things. J Cyber Secur Mob, 1:309–348.
Manral J, 2015. IoT enabled insurance ecosystem—possibilities, challenges and risks. http://arxiv.org/abs/1510.03146
Marinakis YD, Walsh ST, Harms R, 2017. Internet of Things technology diffusion forecasts. Portland Int Conf on Management of Engineering and Technology, p.1–5. https://doi.org/10.23919/PICMET.2017.8125435
Memon RA, Li JP, Ahmed J, 2019a. Simulation model for blockchain systems using queuing theory. Electronics, 8(2):234. https://doi.org/10.3390/electronics8020234
Memon RA, Li JP, Ahmed J, et al., 2019b. Modeling of blockchain based systems using queuing theory simulation. 15th Int Computer Conf on Wavelet Active Media Technology and Information Processing, p.107–111. https://doi.org/10.1109/ICCWAMTIP.2018.8632560
Moar J, 2017. Cybercrime & the Internet of Threats. White Paper, Juniper Research.
Mollah MB, Azad MAK, Vasilakos A, 2017. Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput Appl, 84:38–54. https://doi.org/10.1016/j.jnca.2017.02.001
Mosakheil JH, 2018. Security threats classification in blockchains. http://repository.stcloudstate.edu/msia_etds/48 [Accessed on Sept. 25, 2018].
Nakamoto S, 2008. Bitcoin: a peer-to-peer electronic cash system. https://bitcoinsv.io/bitcoin
Nakano SM, 2018. Cryptocurrency and Blockchain Blueprint for Beginners: All You Need to Know about Bitcoin, Ethereum, Ripple, Litecoin and other Popular Cryptocurrencies. CreateSpace Independent Publishing Platform, USA.
Ning HS, Liu H, 2015. Cyber-physical-social-thinking space based science and technology framework for the Internet of Things. Sci China Inform Sci, 58(3):1–19. https://doi.org/10.1007/s11432-014-5209-2
Noubir G, Lin GL, 2003. Low-power DOS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mob Comput Commun Rev, 7(3):29–30. https://doi.org/10.1145/961268.961277
Ourad AZ, Belgacem B, Salah K, 2018. Using blockchain for IoT access control and authentication management. LNCS, 10972:150–164. https://doi.org/10.1007/978-3-319-94370-1_11
Qi RM, Feng C, Liu Z, et al., 2017. Blockchain-powered Internet of Things, E-governance and E-democracy. In: Vinod KT (Ed.), E-Democracy for Smart Cities. Springer, Singapore, p.509–520. https://doi.org/10.1007/978-981-10-4035-1_17
Qian XC, Zhang JD, 2010. Study on the structure of “Internet of Things (IoT)” business operation support platform. IEEE 12th Int Conf on Communication Technology, p.1068–1071. https://doi.org/10.1109/ICCT.2010.5688537
Ray PP, 2016. A survey of IoT cloud platforms. Fut Comput Inform J, 1(1-2):35–46. https://doi.org/10.1016/j.fcij.2017.02.001
Riaz R, Kim KH, Ahmed HF, 2009. Security analysis survey and framework design for IP connected LoWPANs. Proc Int Symp on Autonomous Decentralized Systems, p.29–34. https://doi.org/10.1109/ISADS.2009.5207373
Rimal BP, Choi E, Lumb I, 2009. A taxonomy and survey of cloud computing systems. 5th Int Joint Conf on INC, IMS, and IDC, p.44–51. https://doi.org/10.1109/NCM.2009.218
Rimba P, Tran AB, Weber I, et al., 2017. Comparing blockchain and cloud services for business process execution. IEEE Int Conf on Software Architecture, p.257–260. https://doi.org/10.1109/ICSA.2017.44
Sagiroglu S, Sinanc D, 2013. Big data: a review. Int Conf on Collaboration Technologies and Systems, p.42–47. https://doi.org/10.1109/CTS.2013.6567202
Samaniego M, Deters R, 2017. Blockchain as a service for IoT. IEEE Int Conf on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), p.433–436. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102
SAP, 2017. SAP announces first co-innovation customers, partners in blockchain initiative for Internet of Things. https://news.sap.com/sap-announces-first-co-innovation-customers-partners-in-blockchain-initiative-for-internet-of-things/ [Accessed on Feb. 24, 2018].
Seibold S, Samman G, 2016. Consensus immutable agreement for the Internet of Value. Technical Report. https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmg-blockchain-consensus-mechanism.pdf
Sethi M, Arkko J, Keränen A, 2012. End-to-end security for sleepy smart object networks. 37th Annual IEEE Conf on Local Computer Networks, p.964–972. https://doi.org/10.1109/LCNW.2012.6424089
Sherif MH, 2016. Protocols for Secure Electronic Commerce (3rd Ed.). CRC Press, Boca Raton, USA.
Shveta, Pandey A, 2014. Energy conservation and security issues in cloud computing: a review. Int J Adv Comput Sci Cloud Comput, 2(1):57–60.
Sicari S, Rizzardi A, Grieco LA, et al., 2015. Security, privacy and trust in Internet of Things: the road ahead. Comput Netw, 76:146–164. https://doi.org/10.1016/j.comnet.2014.11.008
Singh D, Tripathi G, Jara AJ, 2014. A survey of Internet-of-Things: future vision, architecture, challenges and services. IEEE World Forum on Internet of Things, p.287–292. https://doi.org/10.1109/WF-IoT.2014.6803174
Singh I, Lee SW, 2018. Comparative requirements analysis for the feasibility of blockchain for secure cloud. In: Kamalrudin M, Ahmad S, Ikram N (Eds.), Requirements Engineering for Internet of Things. Springer, Singapore, p.57–72. https://doi.org/10.1007/978-981-10-7796-8_5
Singh J, Pasquier T, Bacon J, et al., 2016. Twenty security considerations for cloud-supported Internet of Things. IEEE Int Things J, 3(3):269–284. https://doi.org/10.1109/JIOT.2015.2460333
Singhal B, Dhameja G, Panda PS, 2018. Building an Ethereum DApp. In: Beginning Blockchain. Apress, Berkeley, CA, p.319–375. https://doi.org/10.1007/978-1-4842-3444-0_6
Soubra D, 2012. The 3Vs that define Big Data. https://www.datasciencecentral.com/forum/topics/the-3vsthat-define-big-data
Stergiou C, Psannis KE, Kim BG, et al., 2018. Secure integration of IoT and cloud computing. Fut Gener Comput Syst, 78:964–975. https://doi.org/10.1016/j.future.2016.11.031
Stormer H, Meier A, 2012. ePayment. In: eBusiness & eCommerce. Springer Berlin Heidelberg, p.181–202. https://doi.org/10.1007/978-3-642-29802-8_7
Strite CP, 1920. Bread-Toaster. US1394450A. https://patents.google.com/patent/US1394450 [Accessed on Feb. 23, 2018].
Sun L, Li Y, Memon RA, 2017. An open IoT framework based on microservices architecture. China Commun, 14(2): 154–162. https://doi.org/10.1109/CC.2017.7868163
Szabo N, 1996. Smart contracts: building blocks for digital markets. http://www.alamut.com/subj/economics/nick_szabo/smartContracts.html [Accessed on Feb. 24, 2018].
Thakur M, 2017. Authentication, authorization and accounting with Ethereum blockchain. https://helda.helsinki.fi/bitstream/handle/10138/228842/aaa-ethereum-blockchain.pdf [Accessed on Sept. 11, 2018].
Underwood S, 2016. Blockchain beyond Bitcoin. Commun ACM, 59(11):15–17. https://doi.org/10.1145/2994581
van der Meulen R, 2017. Gartner Says 8.4 Billion Connected “Things” will be in use in 2017, up 31 Percent from 2016. Gartner Press Release.
Wang J, Wu P, Wang XY, et al., 2017. The outlook of blockchain technology for construction engineering management. Front Eng Manag, 4(1):67–75. https://doi.org/10.15302/J-FEM-2017006
Wang WB, Fan SQ, 2018. Attacking OpenSSL ECDSA with a small amount of side-channel information. Sci China Inform Sci, 61(3):032105. https://doi.org/10.1007/s11432-016-9030-0
Wang YF, Uehara T, Sasaki R, 2015. Fog computing: issues and challenges in security and forensics. IEEE 39th Annual Computer Software and Applications Conf, p.53–59. https://doi.org/10.1109/COMPSAC.2015.173
Warren W, Bandeali A, 2017. 0x: an open protocol for decentralized exchange on the ethereum blockchain. https://0x.org/pdfs/0x_white_paper.pdf [Accessed on Feb. 24, 2018].
Weekly K, Pister K, 2012. Evaluating sinkhole defense techniques in RPL networks. 20th Int Conf on Network Protocols, p.1–6. https://doi.org/10.1109/ICNP.2012.6459948
Whitmore A, Agarwal A, Da XL, 2015. The Internet of Things—a survey of topics and trends. Inform Syst Front, 17(2):261–274. https://doi.org/10.1007/s10796-014-9489-2
Wilkinson S, Boshevski T, Brandoff J, et al., 2014. Storj—a peer-to-peer cloud storage network. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.785 [Accessed on Sept. 15, 2018].
Wilusz D, Rykowski J, 2013. The architecture of coupon-based, semi-off-line, anonymous micropayment system for Internet of Things. In: Camarinha-Matos LM, Tomic S, Graça P (Eds.), Technological Innovation for the Internet of Things. Springer Berlin Heidelberg, p.125–132. https://doi.org/10.1007/978-3-642-37291-9_14
Worldometer, 2018. World Population Projections. http://www.worldometers.info/world-population/worldpopulation-projections/ [Accessed on Sept. 15, 2018].
Xiao L, Greenstein LJ, Mandayam NB, et al., 2009. Channelbased detection of Sybil attacks in wireless networks. IEEE Trans Inform Forens Secur, 4(3):492–503. https://doi.org/10.1109/TIFS.2009.2026454
Xiong ZH, Zhang Y, Niyato D, et al., 2017. When mobile blockchain meets edge computing. https://arxiv.org/abs/1711.05938?context=cs
Xu WY, Trappe W, Zhang YY, et al., 2005. The feasibility of launching and detecting jamming attacks in wireless networks. Proc 6th ACM Int Symp on Mobile Ad Hoc Networking and Computing, p.46–57. https://doi.org/10.1145/1062689.1062697
Yang C, Puthal D, Mohanty SP, et al., 2017. Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks. IEEE Consum Electron Mag, 6(4):48–56. https://doi.org/10.1109/MCE.2017.2714695
Yao Q, 2018. A systematic framework to understand central bank digital currency. Sci China Inform Sci, 61(3): 033101. https://doi.org/10.1007/s11432-017-9294-5
Yi SH, Qin ZR, Li Q, 2015. Security and privacy issues of fog computing: a survey. In: Xu K, Zhu H (Eds.), Wireless Algorithms, Systems, and Applications. Springer, Cham, p.685–695. https://doi.org/10.1007/978-3-319-21837-3_67
Zhao JC, Zhang JF, Feng Y, et al., 2010. The study and application of the IoT technology in agriculture. 3rd Int Conf on Computer Science and Information Technology, p.462–465. https://doi.org/10.1109/ICCSIT.2010.5565120
Zhao W, Wang CW, Nakahira Y, 2011. Medical application on Internet of Things. IET Int Conf on Commun Technology and Application, p.660–665. https://doi.org/10.1049/cp.2011.0751
Zhou J, Cao ZF, Dong XL, et al., 2017. Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag, 55(1):26–33. https://doi.org/10.1109/MCOM.2017.1600363CM
Author information
Authors and Affiliations
Contributions
Raheel Ahmed MEMON, Junaid AHMED, and Muhammad ISMAIL performed literature survey and processed the collected information. Raheel Ahmed MEMON and Junaid AHMED drafted the manuscript. Muhammad Irshad NAZEER and Khursheed ALI helped organize the manuscript. Jian Ping LI supervised the overall work.
Corresponding author
Additional information
Compliance with ethics guidelines
Raheel Ahmed MEMON, Jian Ping LI, Junaid AHMED, Muhammad Irshad NAZEER, Muhammad ISMAIL, and Khursheed ALI declare that they have no conflict of interest.
Project supported by the National Natural Science Foundation of China (No. 61370073), the National High-Tech R&D Program of China (No. 2007AA01Z423), and the Science and Technology Department of Sichuan Province, China
Rights and permissions
About this article
Cite this article
Memon, R.A., Li, J.P., Ahmed, J. et al. Cloud-based vs. blockchain-based IoT: a comparative survey and way forward. Front Inform Technol Electron Eng 21, 563–586 (2020). https://doi.org/10.1631/FITEE.1800343
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/FITEE.1800343