Secure and Privacy for Internet of Things data Modelling and Evaluation using Consortium-based Blockchain Consensus Methods
Keywords:
Internet of Things (IoT), cloud-native infrastructure, consensus algorithms, blockchain architecture, MultiChain, Quorum, decentralization, security, privacy, trust, smart contracts, scalability,Abstract
Over the last 20 years, IoT networks have undergone tremendous development. A major issue with this development is the massive amount of data generated by nodes, even though these devices often have limited memory, resources, and computing power. There, cloud computing comes into play by providing a place to store data. The centralization and robustness of a large network that uses cloud computing can make it susceptible to attacks. On top of that, devices might be vulnerable to attacks because access control settings aren't strong enough. Nonetheless, cloud computing offers a foundation for the implementation of such a security system. According to these standards, mobile and edge devices aren't part of a centralised, secure infrastructure. Because of this, many are beginning to doubt the reliability of cloud intermediaries as a whole, which can lead to security and privacy breaches. With an eye towards the Internet of Things (IoT) and cloud-native infrastructure, this study will examine the issue of blockchain architecture's consensus algorithms as they pertain to the Quorum and MultiChain variations. Keeping decentralisation, security, and public verifiability intact while scaling the core layer is a noteworthy problem. One way to speed up blockchains is to use consortium blockchain frameworks, which do away with smart contracts running in parallel. The difficulties of integrating blockchain technology into the Internet of Things (IoT) setting are better addressed.
Downloads
References
Al Omar, A, Bhuiyan, MZA &Basu, A 2018, ‘Privacy-friendly platform for healthcare data in cloud based on blockchain environment’, International Journal of Information Security, vol. 95, pp. 511-521.
Alessi, M, Camillo, A, Giangreco, E, Matera, M, Pino, S &Storelli, D 2018, ‘Make users own their data: A decentralized personal data store prototype based on ethereum and ipfs’, 3rd International Conference on Smart and Sustainable Technologies (SpliTech), pp. 1-7. IEEE.
Ali, MS, Dolui, K &Antonelli, F 2017, ‘IoT data privacy via blockchains and IPFS’, In Proceedings of the Seventh International Conference on the Internet of Things, pp. 1-7.
Aljarbou, YS 2019, ‘Large File Transfer Using Multicast and P2P for Error Checking and Correction’, 2 nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1-3.
Alphand, O, Amoretti, M, Claeys, T, Dall'Asta, S, Duda, A, Ferrari, G, Rousseau, F, Tourancheau, B, Veltri, L &Zanichelli, F 2018, ‘IoTChain: A blockchain security architecture for the Internet of Things’, IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6
K. Ingole and D. Padole, "Design Approaches for Internet of Things Based System Model for Agricultural Applications," 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP), Nagpur, India, 2023, pp. 1-5, doi: 10.1109/ICETET-SIP58143.2023.10151606.
Chen, X, Zhang, K, Liang, X, Qiu, W, Zhang, Z &Tu, D 2020, ‘HyperBSA: A High-Performance Consortium Blockchain Storage Architecture for Massive Data’, IEEE Access, vol. 8, pp. 178402- 178413.
Dorri, A, Kanhere, S, Jurdak, R &Gauravaram, P 2019, ‘LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy’, Journal of Parallel and Distributed Computing, vol. 134, pp. 180-197.
Garay, J &Kiayias, A 2020, ‘Sok: A consensus taxonomy in the blockchain era’, In Cryptographers' Track at the RSA Conference, Springer, Cham., pp. 284-318.
Goyal, S, Sharma, N, Kaushik, I &Bhushan, B 2021, ‘Blockchain as a solution for security attacks in named data networking of things’, Security and Privacy Issues in IoT Devices and Sensor Networks, pp. 211-243.
Kang, J, Xiong, Z, Niyato, D, Wang, P, Ye, D & Kim, D 2019, ‘Incentivizing Consensus Propagation in Proof-of-Stake Based Consortium Blockchain Networks’, IEEE Wireless Communications Letters, vol. 8, pp. 157-160.
Kumar, R, Marchang, N &Tripathi, R 2020, ‘Distributed Off-Chain Storage of Patient Diagnostic Reports in Healthcare System Using IPFS and Blockchain’, International Conference on COMmunication Systems &NETworkS (COMSNETS), pp. 1-5
Li, J, Guo, D &Ren, L 2021, ‘Close latency-security trade-off for the Nakamoto consensus’, Proceedings of the 3rd ACM Conference on Advances in Financial Technologies.
Li, W, Feng, C, Zhang, L, Xu, H, Cao, B & Imran, M.A 2021, ‘A scalable multi-layer PBFT consensus for blockchain’, IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 5, pp. 1146-1160. 60.
Li, X, Jiang, P, Chen, T, Luo, X & Wen, Q 2020, ‘A Survey on the Security of Blockchain Systems’, Future Generation Computer Systems, vol. 107, pp. 841-853.
Liu, H, Han, D & Li, D 2020, ‘Fabric-iot: A Blockchain-Based Access Control System in IoT’, IEEE Access, vol. 8, pp. 18207-18218
Mahapatra, S, Singh, BK & Kumar, V 2020, ‘A Survey on Secure Transmission in Internet of Things: Taxonomy, Recent Techniques, Research Requirements, and Challenges’, Arabian Journal for Science and Engineering, pp. 1-30.
Malhotra, A, O'Neill, HM &Stowell, P 2021, ‘Thinking Strategically about Blockchain Adoption Risks and Risk Mitigation’, Business Horizons, vol. 65, pp. 159-171
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.