0% found this document useful (0 votes)
37 views19 pages

Research Paper-1

This document presents a systematic review of the privacy challenges associated with IoT-based blockchain technology. It analyzes 20 relevant articles, highlighting how blockchain can enhance IoT privacy and security while also noting its limitations such as low scalability and high computational complexity. The findings suggest that while blockchain offers solutions for data protection and trust in IoT networks, significant privacy concerns remain that need to be addressed.

Uploaded by

pepakayalatarun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views19 pages

Research Paper-1

This document presents a systematic review of the privacy challenges associated with IoT-based blockchain technology. It analyzes 20 relevant articles, highlighting how blockchain can enhance IoT privacy and security while also noting its limitations such as low scalability and high computational complexity. The findings suggest that while blockchain offers solutions for data protection and trust in IoT networks, significant privacy concerns remain that need to be addressed.

Uploaded by

pepakayalatarun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Cluster Computing (2022) 25:2203–2221

https://doi.org/10.1007/s10586-021-03260-0 (0123456789().,-volV)(0123456789().
,- volV)

Privacy challenges of IoT-based blockchain: a systematic review


Wenbing Liang1 • Nan Ji2

Received: 13 July 2020 / Revised: 22 January 2021 / Accepted: 3 March 2021 / Published online: 30 March 2021
Ó The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021

Abstract
The Internet of Things (IoT) has infiltrated extensively into our lifestyles. Nevertheless, IoT privacy remains a significant
obstacle, primarily because of the large size and distributed existence of IoT networks. Also, numerous safety, authenti-
cation, and maintenance problems of IoT systems have been overcome by the decentralized existence of blockchain. To
obviate these privacy difficulties, the privacy challenges of IoT-based blockchain are examined systematically. Totally, 61
papers have been gained by electronic databases and based on different filters, 20 related articles were obtained and
analyzed. The findings showed that the blockchain could dominate the IoT restrictions, such as data protection and privacy.
It can also supply distributed storage, transparency, trust, and secure distributed IoT networks and supply a beneficial
guarantee for the privacy and security of IoT users. Simultaneously, it has low scalability, high computing complexity, IoT-
unsuitable latency, and high overhead bandwidth.

Keywords Privacy  Internet of things  Distributed systems  Blockchain  Computer networks  Systematic literature
review

1 Introduction systems, computers, artifacts, and services [7]. It is pro-


gressively used in diverse areas, like health care, industrial
In the past ten years, the Internet of Things (IoT) has been control, home automation, aviation, travel, hospitality,
the most evolving technology as the number of smart wearables, etc. [8, 9]. The IoT still poses big obstacles
devices and their related applications have risen exponen- while presenting production possibilities. Smart things are
tially in both manufacturing and science viewpoints [1, 2]. sensitive to attacks thanks to poor storage space and
The tremendous rise in the usage of IoT devices is largely computing power, as current encryption or cryptographic
attributed to two factors: the reduction in processing prices methods are insufficient [10]. So, privacy and security have
and the large accessibility of wireless connectivity [3, 4]. It been serious problems that will not be neglected in IoT
consists of heterogeneous sensor-embedded systems that growth [11].
can interact together directly with no human interference However, with the exponential development of IoT
[5]. In order to simplify much of our activities, these devices, it has become an important problem to safely
objects will be able to connect and interact together or with preserve the critical data produced by IoT devices [12].
their surroundings [6]. IoT is an umbrella concept and a The crucial IoT data was housed in a third cloud service
global physical system for multiple current and emerging provider in the standard IoT-cloud-based infrastructure
interoperable, integrated information and communication [13]. In such a way, though, the private IoT data can be
revealed by the cloud server because the whole data con-
tained in it is known to the cloud server. Nevertheless,
& Wenbing Liang blockchain storage has been considered a distributed and
liangwenbingbing@163.com
decentralized storing mechanism [13, 14]. The dynamic
Nan Ji scale of system connectivity, network interconnection, and
lianngwenbingbing@gmail.com
distributed existence of things in IoT offers a scope for the
1
Shanxi International Business Vocational College, definition of a central server in which the whole things or
Taiyuan 030031, Shanxi, China systems are compelled to relay to it for authentication
2
Weifang Technical University, Weifang, China [14–16]. Blockchain storage has been considered a

123
2204 Cluster Computing (2022) 25:2203–2221

distributed and decentralized storing procedure. Data is Study outcomes form a rigid framework against that a
shared and maintained via peer-to-peer networks on dozens successful and stable IoT and blockchain adoption is illu-
of nodes worldwide, and replicated algorithms create fur- minated accordingly. This segment demonstrates some
ther copies [13, 17]. study community’s work to fix the challenge, such as trust
Protection, robustness, seamless authentication, and protection, safe storage, security, privacy protection, and
basic maintenance services are necessary to interconnect access control in depth. This article tries to fill in the gaps
IoT nodes [18]. Blockchain came up as a feasible alter- in previous articles. So, some articles about IoT, block-
native to have those salient characteristics. Nakamoto and chain, and privacy have been reviewed in the current sec-
Bitcoin [19] presented the blockchain concept and the tion to emphasize our necessity to perform the study. We
production of the bitcoin cryptocurrency. This revolution- have listed the main features as well as the pros and cons of
ary technology has spread through nearly all industries articles in Table 1 to make our motivation for writing this
over the past ten years and has seen large implementations. article clearer.
Numerous IoT systems’ management, stability, and Hassan et al. [20] discussed the privacy problems
authentication problems have been overcome by the resulting from the combination of blockchain with IoT
decentralized existence of blockchain [10]. Over the last applications by concentrating on common applications.
few years, there has been a massive growth in implemen- Besides, they presented the deployment in blockchain-
tations for blockchain-based IoT networks. Albeit, data and based IoT networks of five privacy protection techniques
user privacy must be taken into account because consumer called encryption, minimization, mixing, private contract,
preferences are preserved in the blockchain network [20]. and differential privacy. Also, Verma [22] presented the
Whenever popular services are pooled, privacy is an issue. Systematic Literature Review (SLR) of security and pri-
In a number of IoT apps, such as sharing the data obtained vacy issues and their relevance to IoT in blockchain tech-
from temperature sensors installed on a farm, this privacy nology. Then, in addition to the latest threats, risks, cutting-
issue is not a big obstacle. Still, it may be a major issue edge arrangements, and IoT security concerns, they pro-
when it comes to those kinds of programs [21]. vided security prerequisites for IoT as a solution to current
A detailed analysis of privacy concerns in blockchain- frameworks, like blockchain. They described open research
based IoT systems is given in our present research, separate problems and IoT security challenges, particularly in the
from any prior papers and surveys. It is because we greatly security room, such as the unwavering quality of infor-
address the particular area of privacy concerns in the mation. Also, Alotaibi [23] checked out the remedies that
implementations of blockchain-based IoT systems. There is increase the IoT security, containing the anonymity and
extensive literature on previous survey papers concentrat- privacy of data, identity and authentication management,
ing on blockchain and its IoT integration, and some of availability, data integrity, and confidentiality with the
them have concentrated on blockchain protection and pri- utilization of the blockchain. Besides, he pointed out end-
vacy concerns. Albeit, there is no previous post, to the best to-end food traceability that has been supplied by many
of our understanding, that deeply addresses privacy technologies like IoT and blockchain. Ultimately, he
preservation techniques from the application perspective in checked out some systematic methods. So, his study is not
the blockchain-based IoT platform. We narrowly examined systematic and only discusses the IoT and blockchain in the
IoT technologies like smart homes, smart Healthcare, food industry. Still, this survey does not cover all domains
access control, and management data in our everyday lives about security issues in blockchain and IoT. Datta et al. [5]
among these privacy protection techniques. This study will presented privacy and authentication in IoT making uti-
serve as a framework for designing potential policies to lization of blockchain within Forest Fire. In order to create
protect privacy to resolve any privacy concerns of block- a public database with transactions that can not be
chain-operating IoT networks. In the continuation of this exploited by any third entity, the blockchain seeks to
section, the main contribution and motivation of this article develop a data system. The blockchain shapes transactions
are explained. via cryptographically connected blocks. In blockchain
technology, public-key cryptography is utilized to sign
transactions between subscribers. It quite clearly attains
2 Contribution and motivation anonymity as it is extremely complicated to alter or elim-
inate data blocks in the blockchain ledger.
Our key contribution is to explore the literature to illustrate Ferrag et al. [24] presented the issues related to security
IoT’s latest privacy concerns and how blockchain can and privacy in the green IoT-based agriculture domain.
nevertheless be used to solve these problems; we solve They began by defining a four-tier agricultural architecture
concerns and transparent security questions that can be focused on green IoT and summing up the latest studies
placed on the existing IoT frameworks via blockchain. concerned with smart agriculture. They then grouped

123
Cluster Computing (2022) 25:2203–2221 2205

Table 1 Related surveys on privacy challenges of IoT-based blockchain


PPapers Year Article Major contribution Discussed privacy in Disadvantage
type blockchain IoT

[20] 2019 Review Overview of privacy issues caused due to integration of 4 Not SLR
blockchain in IoT applications Not comprehensive
[22] 2019 SLR A systematic review of security and privacy problems and its 4 Weakness in comparing
scope with IoT blockchain articles
Not comprehensive
[23] 2019 Review Overview of utilizing blockchain to dominate cybersecurity 4 Not SLR
issues in the IoT Weakness in comparing
articles
Weakness in open
issues articles
[5] 2019 Review Overview of authentication and privacy preservation in IoT 4 Not SLR
based forest fire detection by using blockchain Weakness in comparing
articles
Focusing only on the
forest fire sector
[24] 2020 Review Overview of security and privacy for green IoT-based agriculture 4 Not SLR
Focusing only on the
agricultural sector
[3] 2020 Survey Overview of boosting IoT security and privacy through 4 Not SLR
blockchain Weakness in comparing
articles
[25] 2020 SLR A systematic review of blockchain for 5G-enabled IoT for 4 Weak privacy check-in
industrial automation blockchain
Not comprehensive

hazard models toward green IoT-based agriculture into five automation of industries for apps like smart home, smart
groups, including threats regarding encryption, privacy, city, smart agriculture, healthcare 4.0, supply chain man-
authentication, reputation, and usability properties. agement, and autonomous vehicles.
Besides, they offered taxonomy and side-by-side analysis Checking out the literature, it has been detected that
of modern strategies for IoT implementations to protected, blockchain could be used in obviating some security and
privacy-preserving innovations and how they can be suited privacy difficulties relevant to IoT. We understood that
for green IoT-based agriculture. Also, Alfandi et al. [3] various subjects in the current field are smart homes, smart
conducted a thorough literature review to obviate novel health, smart cities, and different frameworks depending on
security and privacy IoT-related issues. They are classified the considered articles in the present section. Several IoT
due to the architecture of the IoT layer: network, percep- security investigations [26, 27] explain the necessary
tion, and layer of the application. Besides, as a central security and privacy countermeasures and objectives with
foundation for addressing multiple IoT security and pri- no concentration on specified apps. Some of those inves-
vacy challenges, they researched blockchain technology. tigations limit their protected countermeasures to IoT
Furthermore, in combination with other emerging tech- security taxonomy [28, 29], IoT frameworks [30, 31],
nologies such as Machine Learning (ML), particularly in security communication protocols [3, 32], or trust-de-
intrusion detection systems, they investigated blockchain pended obviations [33]. Some surveys identify vulnerabil-
technology and its benefits. In addition, they outlined ity models that may require IoT network defense [29, 33].
complications and safety problems created by the intro- Lately, blockchain-based obviations for IoT security have
duction of blockchain with IoT apps. Ultimately, through been more absorptive in [24, 34, 35]. However, SLRs are
blockchain technologies, they suggested a system of IoT critical in conducting a review. These investigations could
protection and privacy specifications. Mistry et al. [25] not introduce a perfect SLR-based review of the privacy
presented detailed research of novel proposals regarding challenges in blockchain and IoT, analyzing subsequent
IoT with enabled 5G as supporting blockchain-based issues and their taxonomy. Besides, there exist fewer

123
2206 Cluster Computing (2022) 25:2203–2221

reviews on the present subject. This study presents the protecting privacy, maintaining the security of IoT cus-
modern blockchain technology for the issues in privacy tomers, data and devices, infrastructures, and ensuring the
resolved in IoT and fills the gap in the existing need. As far availability of IoT eco-system services [43]. Blockchain is
as we know, our survey is the first investigation that checks now resolving a vast variety of network constraints [44].
out the privacy countermeasures and blockchain-based Besides, as bitcoin and other cryptocurrencies have
solutions for IoT security. For doing so, we have evaluated lately become highly prominent, the fundamental principle
the questions below: of ‘‘blockchain’’ attracts unimaginable publicity [26]. As
RQ1: Why is blockchain used in the IoT? bitcoin has been a successful trend, everybody can be aided
(This question is answered in Sect. 1). by blockchain technologies in the vast fields and services,
RQ2: Which potential locations are there in the block- like IoT, voting, financial market, medical treatment, sup-
chain system for IoT? ply chain, and storage [45]. So, blockchain is the bitcoin
(This question is responded to in Sect. 4). network’s underlying mechanism. Using blockchain
RQ3: What are the benefits and drawbacks of the architecture, there will be more developments in non-fi-
blockchain in IoT? nancial and financial applications. A promising novel
(This question is answered in Sect. 5 in Table 3). transparent secure network, blockchain, has been champi-
RQ4: How can blockchain solve the IoT privacy oned to help fight the credibility of fake media in a
problems? framework in which resistance to data modification is
(This question is answered in Sect. 6). necessary [46]. Blockchain is a promising platform that can
Concepts IoT and blockchain are discussed in Sect. 2. supply safe and verifiable transfers and facilitate resource
An SLR is presented in Sect. 3. Section 4 has provided a conservation [47, 48]. As future support for apps and a
review of the chosen articles. Section 5 illustrates the broad range of essential applications will be available,
outcomes. The open issues and future works are presented blockchain is assessed [49]. Besides, blockchain is
in Sect. 6. Ultimately, Sect. 7 concludes the study. advanced as a significant future and present. It is consid-
ered a mechanical way of supplying money and supporting
metadata and agreements in the commercial business.
3 Background Blockchain has been initially utilized to record monetary
transactions, where total members encode and preserve
The growth at the heart and edge of rapid networking them (for instance, bitcoins and different digital forms of
media has ended in exponential volumes of advanced and money). In this manner, total transactions are straightfor-
intelligent wireless IoT devices [36]. So, diversified IoT ward, and any adjustments can be handily followed and
services are becoming more complex [37]. IoT is an recognized [50].
Internet movement that will connect virtually all environ- As we said, the deployment of the IoT would include the
mental products and exchange their data through the military, the livelihood of citizens, business, industry, etc.
Internet to build new services and apps to enhance our life It is self-evident whose network security is essential. An
quality [38]. The IoT helps multiple gadgets and items IoT application and security and privacy concerns have
around us to be resolvable, visible, and locatable utilizing various problems like scalability issues, bandwidth/traffic
inexpensive sensors. Physical objects may be enabled to crisis, and system mobility. In the developing situations of
build, obtain, and share information in a smooth way uti- IoT frameworks, there are more possibilities to have an
lizing the IoT [39]. IoT items range from smart household expanded number of cooperating gadgets or things in it. In
devices like smart adapters, smart bulbs, smart refrigera- order to utilize IoT in the integrity, confidentiality, autho-
tors, smart meters, temperature controls, smart ovens, rization, authentication, verification, trust, storage, and
smoke alarms to more advanced ones like radio frequency maintenance of real-life applications, usability issues have
identification devices, accelerometers, heartbeat detectors, to be tackled [51]. The harm and damages will be very
parking lot sensors, and several sensors in automobilist severe until the topic of computer protection arises, like
[40]. The open environment for implementation and the hacker interference, virus damage, malicious code attacks,
IoT’s restricted resources make it prone to disruptive etc. [52]. As a distributed network to strengthen IoT
attacks. The harm caused by infested Internet-connected security, blockchain has gained enormous publicity [53].
things impacts IoT security and challenges the entire So, blockchain innovation would give better answers to the
Internet eco-system to theoretically take advantage of issues looked at by the systems of IoT. Connection history
compromised things (smart devices) implemented as bot- is preserved in a blockchain that provides audibility. New
nets [41]. The preservation of IoT security and privacy is privacy threats are implemented in contrary when users are
closely related to the functional implementation of the IoT subjected to the full history of IoT interface communica-
[42]. IoT protection primarily targets at confidentiality, tion [54]. However, a range of restrictions underpinning

123
Cluster Computing (2022) 25:2203–2221 2207

blockchain utilization prevents its usage, especially in low- 4.3 Data analysis
energy and computing footprint apps [55]. Therefore, here,
the challenges of blockchain privacy in the IoT are Figure 1 displays a flow diagram of the outcomes of the
examined. literature quest and research collection. Searching relevant
databases initially identified 61 citations that were
screened. After exclusion of non-English, citation articles,
4 Indications for systematic reviews and duplicates, 53 articles were checked. So, 9 articles are
excluded based on the title. We checked the full text of 44
Systematic reviews may be narrowly characterized as a qualifying journals. Of these, 24 papers were omitted for
synthesis of research performed by specialized-skilled failing to follow requirements relating to the form, action,
review groups [56, 57]. They sought to find and obtain or outcome of the analysis. 20 of these manuscripts met all
foreign data related to a specific issue. They also wanted to criteria for inclusion in the systematic review.
review and synthesize the findings of this research in order
to advise practice, policy, and in some cases, more analysis
[58]. According to the Cochrane handbook, a systematic 5 Review of selected paper
analysis uses transparent, systematic approaches chosen to
reduce bias, thereby offering more accurate results from IoT is one of the exciting scientific filings that are being
which results can be derived, and decisions can be taken generated utilizing lots of smart apps. To incorporate IoT
[59]. Systematic reviews supplement a formal and pre- software, sensors, intelligent systems, and actuators are
defined procedure that involves comprehensive methods to utilized [63]. Attacks are being advanced and high-grade,
ensure that the findings are accurate and useful to end-users which is a significant issue day after day. Blockchain
[60]. These reviews might be considered the evidence-de- technology has been one of the modern approaches adopted
pended healthcare pillar [61] and are highly utilized to by both science and enterprise during the past few years,
advance reliable clinical guidelines [62]. with six core features: immutable, decentralized, autono-
mous, transparent, anonymous, and open-source [64]. The
4.1 Data sources and search strategy idea of blockchain is now gradually being used by scholars
and industry to attain security in IoT apps. The block-
– This systematic review reporting is consistent with the chain’s basic principle is that, if it is modified on the
checklist of PRISMA (Preferred Reporting Items for blockchain, the data created by subscribers or computers in
Systematic Reviews and Meta-Analyses). the past is checked for accuracy and cannot be tampered
– Elsevier, Springer, Emerald, IGI, SAGE, Taylor, Wiley, with. While the blockchain encourages honesty and non-
IEEE databases were searched until Dec- 2020. repudiation to some degree, the anonymity and privacy of
– The search terms (privacy, IoT, blockchain) were used the data or devices are not protected [65]. Therefore, in this
in databases. subsection, we deliberate recent literature on blockchain in
IoT security procedures. We have discussed 20 articles
The quest was restricted to primary scientific journals
related to privacy and blockchain challenges on the IoT in
published in English until Dec-2020 that specified the word
the present section. Related articles are divided into 4
IoT, privacy, and blockchain in some shape or type. Papers
sections and are discussed. The classification of articles
were deemed to be available in English and published in
includes management data, access control, smart home, and
the journals. To find other related publications, reference
smart health. In the following, each category will be
lists of related publications and grey literature were
reviewed (See Fig. 2). Also, in Fig. 3, some promising
checked.
IoT-depended apps are illustrated.
4.2 Study selection and data extraction
5.1 Data management
Reports that fulfilled the requirements and contained a
IoT can possibly change how we consider information and
keyword description were included. The primary screening
communication technology. IoT has been concentrated
of abstracts and titles and database search were conducted.
broadly across numerous fields, for example, communica-
Then, papers were categorized as irrelevant, unsure, or
tion, networking, business, security, and management
relevant. When all related papers have been found, full
communities [44, 60]. To achieve network-relevant activ-
texts of all detected papers would have been checked, and
ities, the IoT environment demands reliability, security,
data would have been collected (see Table 2).
scalability, and endurance. The data management node first

123
2208 Cluster Computing (2022) 25:2203–2221

Table 2 The principles for paper selection and their descriptions


I/E Criteria Description

Exclusion Search engine reason The title, abstract, and keywords are in English, but not the full-text
(SER)
Without full-text The full-text of the paper is not available for the assessment
(WF)
Non-related (NR) NR-1: The paper is not academic, editorial note, conference review, content, or foreword
NR-2: The definition around ‘blockchain’ is not about IoT
Loosely related (LR) The focus is not on the review, survey, discussion, or problem-solving of privacy, IoT, blockchain, where:
LR-1: Privacy, IoT, and blockchain is just used as an instance fact
LR-2: Privacy, IoT, and blockchain is just used as a part of its upcoming research line, upcoming
viewpoint, or upcoming necessity
LR-3: Privacy, IoT, and blockchain is just used as a cited expression
LR-4: Privacy, IoT, and blockchain is just used in keywords and/or references
Inclusion Partially related (PR) PR-1: A study around the 4th industrial revolution without stating privacy, IoT, and blockchain
PR-2: Privacy, IoT, and blockchain are just used to back the explanation of a few problems or trends within
the article
PR-3: Privacy, IoT, and blockchain are an object that needs to be studied, surveyed, or deliberated
Closely related (CR) The research attempts of an article are obviously and devoted explicitly to privacy, IoT, and blockchain

Fig. 1 The flowchart of the Bibliographic database search


search strategy

Records retrieved (n=60) Exclusion of non-English language


Identificatio

Supplementary papers selected literature (n=2)


through bibliographic trail
n

exploration and reference list (n=1)

Documents entered into Duplicates are removed (n=1)


citation manager (n=59) Citation articles are removed (n=5)
Screening

Articles are excluded based on title


Title and abstract screening (n=5)
(n=53) Articles are excluded based on
abstract (n=4)
Eligibility

Full-text papers assessed for Only the abstract was available in


eligibility (n=44) English (n=6)
The full text of some papers was
removed for various reasons (n=18)
Inclusion

Number of included articles


(n=20)

encrypts and shards the whole of its IoT devices’ data The ability to enable sensors, computers, and computa-
gathered and stores it in each node of the distributed net- tional objects to execute tasks independently has become a
work [13]. Afterward, the transaction information has been requirement in today’s highly digitized environment.
maintained in the blockchain, containing the address in Manually managing vast volumes of data is virtually dif-
which the mutual file is held, the data hash, and the invoice, ficult. It is not an easy job to build IoT systems that operate
protecting the file’s routing path from manipulation [13]. safely, effectively, and freely. Blockchain reveals a

123
Cluster Computing (2022) 25:2203–2221 2209

learning, they developed the data-sharing issue into a


Data Smart machine-learning issue. Data privacy is well-preserved by
management healthcare disclosing the data model rather than releasing individual
data. Eventually, they incorporated federated learning into
Privacy challenges
of blockchain in the approved blockchain consensus mechanism so that
the IoT federated training can also be utilized for consensus com-
puting operations. Numerical findings extracted from real-
world databases revealed that good precision, high per-
Access control Smart home
formance, and increased security were accomplished using
the suggested data-sharing plan.
Fig. 2 The category of IoT blockchain privacy challenges Zhao et al. [68] used the blockchain to build a new
privacy-preserving remote data integrity checking plan for
IoT information management systems without trusted third
parties. The suggested framework was more fitting for
functional implementations in the data management sys-
tem. In the remote data integrity monitoring process, it
does not require a third party. Their layout stops the loss of
data privacy imposed by a third party who is not trusted.
Correctness, public authentication, dynamics, privacy, and
security are met by their design. The practical findings
revealed that in communication and computation, their
design was successful.
Authors in Shen et al. [69] proposed a secure support
vector machine with a privacy-preserving support vector
machine training scheme over blockchain-based encrypted
IoT data. Writers used the blockchain strategies to establish
a secure and reliable network for exchanging data between
various data suppliers. IoT data is encrypted and then
Fig. 3 Applications of IoT [64] registered on a distributed ledger. Using a holomorphic
cryptosystem, paillier, the researchers developed secure
promise to promote the safe incorporation of IoT devices building blocks like secure polynomial multiplication and
[61]. Blockchain is not the solution to anything that secure contrast. A stable support vector machine training
threatens the IoT, but it does play a strong role in solving algorithm is also developed, which needs just two inter-
certain important security problems [66]. actions in a single iteration without a trusted third party.
Investigators in Rahulamathavan et al. [65] suggested Rigorous security review has demonstrated that the sug-
novel privacy-preserving blockchain architecture for IoT gested model guarantees that critical data remains confi-
apps relied on Attribute-Based Encryption (ABE) proce- dential with each data supplier as well as the specifications
dures. It was the first method to merge novel encryption of the help vector machine model for data analysts. The
with blockchain technologies. The flexibility and fine- efficiency of the suggested method is demonstrated using
grained design of the encryption can control and utilize the detailed studies.
transaction data depending on attributes. The suggested
model altered the blockchain protocol method marginally 5.2 Access control
to follow the ABE methodology without endangering the
blockchain’s crucial security attributes. The privacy and About 150,000 IoT systems have recently been exploited,
security of the suggested model were evaluated, and and the inquiries have established access control as the
techniques for mitigating certain identified attacks were primary responsibility for the security breach [70]. The
developed. The study demonstrates that in terms of implementation of inappropriate access control devices
attaining privacy with reduced computing overhead, the may also inflict substantial privacy and economic risk to
blockchain-powered IoT would benefit from feature-de- entities and companies [71]. FairAccess is a platform for
pendent encryption. access control that utilizes intelligent contracts and a
Lu et al. [67] planned a blockchain-empowered secure blockchain in which they are maintained. Smart contracts
data sharing architecture for distributed multiple parties. are utilized to exchange access control policies with access
After that, integrating privacy-preserved federated tokens for compliance [72]. FairAccess leverages the

123
2210 Cluster Computing (2022) 25:2203–2221

popular blockchain attributes (distribution, full-fledged, 5.3 Smart home


and append-only ledger) to create a promising approach to
solve the above-mentioned IoT access management issues. Over the last years, IoT has been one of the most exciting
Nevertheless, it is not easy to implement blockchain fields of study. Many technologies are built utilizing the
technologies to manage access control functions, and there IoT model, such as a smart home, a smart environment that
are other important problems: The transparent side of the monitors smart traffic control, etc. [76]. Each of these tools
blockchain versus the private dimension of certain rules for is good to utilize without human intervention. Using vari-
access control and the underlying issue of traceability. ous sensors, actuators, and techniques, the app will operate
Access control poses huge IoT obstacles. Unsurpris- in real-time. IoT delivers an app with high simplicity,
ingly, it is difficult to enforce current access control performance, and real-time processing. Manufacturers of
requirements on smart objects due to their limited exis- home appliances are trying to get customer reviews to
tence. The implementation of strong and trusted third develop their goods and services in order to create a smart
parties to manage access control logic may damage user home framework [77]. Albeit, to fully exploit the IoT
privacy. Ouaddah et al. [73] demonstrated how it could be definition, privacy and security challenges have to be
really enticing for blockchain, the innovative system adequately handled. The decentralized structure of block-
behind bitcoin, to confront those new obstacles. They then chain has made multiple improvements in the security
suggested FairAccess as a new shared pseudonym and domain [51]. The pervasive deployment of IoT devices
privacy protection system for authorization control that increases collaboration and connectivity and supports
utilizes blockchain technologies’ consistency on behalf of nearly every part of our lives, from development to shop-
restricted devices to handle access control. ping to smart homes. Low degrees of security protection in
Nguyen et al. [74] explained how blockchain could be these devices present unauthorized users’ opportunity
utilized to fix IoT data privacy problems. They also built a because of their restricted resources. A blockchain is
framework model of a trust-less access control manage- populated based on smart home device traffic so that a
ment process with the help of smart contracts to guarantee corresponding transaction is retained in the blockchain for
that consumers have complete control over their data and each interaction among devices [53]. Although IoT brings
can monitor how third-party providers access data. Besides, noteworthy favorable circumstances over customary com-
they suggested a blockchain company ware upgrade munication technologies for smart home applications, these
scheme that helps deter malicious data generated by IoT implementations are still extremely uncommon [78]. Var-
system tampering. ious investigations on IoT and smart home security and
An end-to-end privacy-preserving platform for IoT data privacy are available. Even though the home gateway
utilizing blockchain technologies was suggested by Loukil handles the exchange of packets to and from the home,
et al. [75]. The smart contract’s utilization in their frame- smart homes are susceptible to attack carried out by sub-
work would then enforce compliance with the privacy scribers’ smart-phones [79]
necessity due to the provider’s privacy requirements (i.e., Dorri et al. [80] highlighted the different main compo-
data owner) and demands from the end-user (i.e., data nents of the smart home tier and addressed the different
utilizer). To do so, by presenting the key elements and related transactions and methods. They also introduced an
functionalities, they detail the configuration of the system integrated empirical analysis of its security and privacy.
structure and illustrate an example of how it functions in a The simulation outcomes showed that for low resource IoT
real-world use-case. devices, the overheads incurred by their technique are
Ouaddah [8] addressed the shortcomings of the cen- limited and controllable. They asserted that, due to
tralized IoT security paradigm and suggested the block- notable security and privacy advantages on offer, such
chain solution to introduce security and privacy to IoT overheads are worth their weight.
devices as an instance of a prosperous distributed frame- Dorri et al. [53] analyzed the IoT-based blockchain
work. In this way, they launched FairAccess and PPDAC to categorization of devices. They demonstrated that privacy
guarantee fine-grained access control functions for IoT issues are raised by device recognition in blockchain-based
devices with clear anonymity assurance for IoT end-users. IoT. Unlike traditional IoT device categorization approa-
A lightweight and privacy-preserving access control sys- ches where the identity needs physical access to the net-
tem focused on the new blockchain technology, primarily work, any individual may classify devices regardless of
permissionless and public form. The suggested architecture their position in the blockchain-based IoT. They utilized a
maintained the advantages of the blockchain to satisfy IoT smart home environment as the IoT’s symbolic case study.
security and privacy appearing necessities while addressing To categorize the devices, they deployed machine learning
the difficulties in combining the blockchain to IoT. algorithms on the blockchain. The findings found that

123
Cluster Computing (2022) 25:2203–2221 2211

attacks can be up to 90% effective in categorizing the information. Data transaction and transmission security
devices’ form and number in a smart home. They suggested have been maintained using the introduction of unique
three timestamp obfuscation tactics to minimize the suc- device authentication. Simultaneously, it will protect IoT
cessfulness of device categorization, like integrating sev- privacy by making it easy to change the encryption key
eral packets into a single transaction, mixing multiple with a smart contract.
packet ledgers, and unexpectedly delaying transactions.
The suggested techniques of time stamp obfuscation will 5.4 Smart healthcare
minimize the success rate to below 30 percent.
In order to provide the requirements, Mohanty et al. [81] IoT is used as one of the latest technologies that can be
generated an Efficient Lightweight Integrated blockchain described as an integrated device network globally. It is
(ELIB) model. As a significant example, the introduced now entering all levels of society, with health care being
concept has been implemented in a smart home setting to the most vital application among them [83]. In health care,
validate its applicability in different IoT scenarios. In a the main IoT implementations include real-time control of
smart home, the resource-limited services benefit from a smart wearables, patient body criteria, tracking necessities,
centralized manager who creates shared keys for dis- etc. The gathered sensor data is then utilized to test
tributing data, handling all outgoing and incoming objectives by multiple third parties [84]. The privacy of the
demands. The proposed ELIB model provides an overlay individuals whose data is being processed is a big issue that
network in which fully equipped resources can be com- emerges here. The identification of the individuals is in
bined into a shared blockchain that confirms committed danger of preserving the confidentiality of the captured
security and privacy. In the provided ELIB model, a series sensor data. Some changes created by intruders to this
of three optimizations were conducted, namely certificate health-related data may have a negative effect on any-
less cryptography and, lightweight consensus algorithm, body’s life [85]. Blockchain is the solution to the men-
Distributed Throughput Management (DTM) framework. tioned issue here. Blockchain can be described as a
In terms of energy consumption, processing time, and distributed blockchain ledger that can simultaneously
overhead, a rigorous simulation was performed under document transactions and avoid changes to the reported
various scenarios. Compared to the baseline system, the data. Blockchain has not only seemed resistant to abuse of
ELIB achieves a net saving of 50 percent in processing its data but is one of the most revolutionary innovations
time with the least energy utilization of 0.07 mJ. The revolutionizing diverse areas and realms, like IoT [86]. The
attained practical results suggested that under many styles and volumes of medical images have greatly
assessment parameters, the ELIB displays optimal improved with the introduction of medical IoT devices. In
efficiency. order to promote disease detection and increase treatment
Zhao et al. [77] developed a federated learning frame- quality, the retrieval of diagnostic images is of consider-
work that leverages the credibility process to help pro- able significance. However, it could raise peoples’ privacy
ducers of home appliances train a model of machine issues because medical images contain confidential and
learning depending on data from clients. To safeguard private data from patients.
consumers’ privacy and enhance the precision of the test, Diabetes prevention and treatment are critical activities
they imposed differential privacy on the derived properties that can be achieved by constantly tracking health records,
and suggested a new strategy for normalization. They like blood glucose levels. The utilization of IoT devices is
empirically found that their normalization methodology required to make the procedure automated. Azbeg et al.
performs better when characteristics are under differential [87] proposed an IoT and blockchain-based platform
privacy protection than batch normalization. Besides, they architecture to promote diabetes follow-up and help
are developing an incentive scheme to reward users in patients treat it better themselves. Their architecture inte-
order to encourage more clients to engage in the crowd- grates IoT with blockchain technologies to gather data
sourcing federated learning challenge. from patients, share it in a near real-time and safe way with
Islam and Kundu [82] addressed the trust, security, and their healthcare teams while protecting the privacy of the
privacy issues related to contractual renting or leasing of patient.
home-enabled IoT devices. They propose a new approach Leveraging on the blockchain technology, Le et al. [88]
for totally undermining the mediation of the home-sharing suggested a per-missioned blockchain-based IoT forensics
economy and preserving the privacy of IoT devices for framework to elevate the authenticity, integrity, and non-
consumers of the home-sharing economy. The smart con- repudiation attributes for the gathered evidence. They
tract in their protocol simplifies the decentralization of the established the workflow from evidence acquisition and
home-sharing economy. Their suggested protocol allows dissemination to review and subsequent archiving and
subscribers to monitor their own transactions and disposal for the whole procedure. They created various

123
2212 Cluster Computing (2022) 25:2203–2221

types of transactions that are ideal for this forensic appli- Things (M IoT) applications. The suggested method helps
cation using smart contract leverage. They used an updated patients to be in full charge of their own data. It also makes
Merkle signature scheme to mask the identity of the evi- it possible for data users to view the data of patients
dence submitter from the public to resolve the identity without compromising their privacy. The model should be
privacy problem further. utilized to preserve the interests of people concerned with
Shen et al. [89] suggested a blockchain-based system for their personal data and is standardized by the general law
medical image retrieval with privacy protection. First, they of data security. In their recommended system, before
identified standard medical image retrieval scenarios and uploading to the cloud data center, patient data obtained by
summarized the related system architecture criteria. They IoT sensors is packeted and encrypted. The data packet
introduced the layered structure and hazard model of the hash is utilized as the index to retrieve the data packet from
suggested structure utilizing the new blockchain approa- the data server. Indexes are maintained over the blockchain
ches. They obtained a carefully chosen attribute vector in tamper-proof smart contact. In order to preserve their
from each medical image and built a tailored transaction data against unauthorized entry, the smart contract also
layout to handle large-size images with storage-constrained provides a patient-defined access management protocol.
blocks, preserving the privacy of medical images and Finally, Juyal et al. [91] suggested an IoT-depended skin
image properties. surveillance system relying on a blockchain data protection
Srivastava et al. [55] provided a transactional protocol and safety method. A secure method of data transfer is
for remote patient monitoring with the utilization of recommended for IoT devices utilized in a distributed
directed acyclic graphs. In both private and public block- framework. By a special key to recognizing each subscriber
chain, they utilize a modern blockchain protocol named when he signs, privacy is guaranteed. Through generating
GHOSTDAG. Their latest suggested approach aims at hash functions for any transaction element, the blockchain
addressing established healthcare protection challenges concept often solves security problems. The blockchain
without compromising scalability (an attribute of classic principle also solves security issues via the generation of
blockchain structure). In existing blockchain executions, hash functions for any transaction feature. The suggested
sluggish computational velocity and energy utilization are solutions enable IoT-based skin surveillance systems to
serious problems. Their model aims to eliminate these retain and share medical data across the network without
problems and, relative to any solution that tries to utilize a interference, privately and safely. Table 3 summarizes the
classic blockchain Resource Provision-ing Method (RPM) articles’ most important features (key factors, advantages,
system, provides a stable, high-throughput, quick, and and disadvantages) in this section.
reliable RPM system. The suggested solution outlined in
their analysis is an initial work in progress that provides an
insight into any IoT-based RPM framework via a block- 6 Results and discussion
chain-based paradigm. A test base capable of applying the
protocol to have some empirical outcomes to show feasi- This study concentrated on the privacy of IoT and block-
bility, scalability, security, and computational load is the chain technologies in this article. Security and privacy in
key next phase for their plan. IoT are among the most relevant problems in academia and
Bhalaji et al. [86] suggested a blockchain-depended business today [92]. Current security solutions are not well
method for privacy preservation in Healthcare IoT. The equipped because of the IoT resource limitation aspect.
suggested approach to secure health-related IoT data Blockchain technology is highlighted due to its security
requires a protection framework that can be accomplished features. The blockchain’s decentralized, autonomous, and
by (cryptography-based) privacy preservation techniques trust-less intrinsic characteristics make it an optimal aspect
(algorithms) and blockchain, including privacy preserva- to become a fundamental component of IoT solutions. It
tion and preservation of data integrity. The necessity for a can potentially enhance the IoT sector [93] and notably
more secure, reliable, and feasible framework for the pro- help attain the insight of decentralized and private-by-de-
tection of privacy comes with more details. The recom- sign IoT [94]. The subsequent popular blockchain attri-
mended system utilizes a recently proposed encryption butes, outlined in Fig. 4, make it an appealing technology
algorithm to solve this and protect privacy, encrypting to solve the IoT privacy and security issues listed above
personal and confidential information. The second step that [8].
integrates blockchain to store data collected by the sensor A high portion of investigations performed on IoT
protects the confidentiality of data and helps to discover security and privacy concentrated on supplying security or
any unwanted or unlawful changes to data. privacy. Authors assume that privacy and security are
Alamri et al. [90] recommended a new blockchain-based similarly necessary for a device to be safe. Furthermore,
privacy preservation method for Medical Internet-of- the most important aspect is data privacy that can just be

123
Cluster Computing (2022) 25:2203–2221 2213

Table 3 Comparison of the key factors, advantage and disadvantage of the studies
Papers Year Key factors Advantage Disadvantage

Management data
[65] 2017 IoT Improving security High complexity
Security Improving privacy
Privacy Low computational overhead
Blockchain Low cost
[67] 2019 IoT High accuracy High run time
Security High efficiency
Privacy High security
Blockchain High scalability
[68] 2020 Blockchain Improving correctness Lack of real-time review
IoT Improving privacy
Security Improving dynamics
Privacy Improving public verification
Improving security
[69] 2019 Blockchain High efficiency Failure to run in a real environment
IoT High accuracy
Security High scalability
Privacy
Smart city
Access control
[73] 2017 Bitcoin Solving the problem of centralized and Do not implement in a real environment
Privacy decentralized access control in IoT
Control Providing a stronger and transparent
access control tool
Blockchain
High integrity and security protections
IoT
[74] 2018 Bitcoin Strengthening data privacy Only presents the concepts and modelings
Blockchain High access control Don’t have a focus on realistic experiments to evaluate the performance
Data privacy High data transparency and robustness of the system, especially in terms of latency, throughput,
and stability
IoT Improving access tracking
[75] 2018 IoT Improving data ownership Lack of implementation of the framework in a network IoT
Privacy Improving data transparency
Blockchain Improving the data auditability for
Security users
[8] 2019 IoT Improving edge intelligence Lack of guarantee anonymity for users
Security Improving security
Privacy Improving privacy
Blockchain Improving access control
Smart home
[80] 2017 Blockchain Improving privacy High cost
IoT Improving security High traffic
Security Improving integrity High processing time
Privacy High confidentiality High energy consumption
Smart home High availability
[53] 2019 Blockchain Improving privacy Low success rates
IoT High accuracy
Security
Privacy
Smart home

123
2214 Cluster Computing (2022) 25:2203–2221

Table 3 continued
Papers Year Key factors Advantage Disadvantage

[81] 2020 Blockchain Low energy consumption Low scalability


IoT High performance
Security Low overhead
Privacy
Smart home
[77] 2020 Blockchain Improving privacy Low accuracy
IoT Up to date
Security
Privacy
Smart home
[82] 2020 IoT Increasing protect users’ IoT device Low scalability
Security privacy
Privacy Facilitating the decentralization of the
home-sharing economy
Trust
Increasing control information and
Home-sharing transactions
economy
Blockchain
Smart healthcare
[88] 2018 Blockchain Improving privacy Low reliability
IoT High efficiency
Security
Privacy
Smart Healthcare
[87] 2018 Blockchain Increasing patient privacy Don’t implemented in real world
IoT Increasing security between patient’s
Security devices
Privacy
Controlling and
managing
diabetes
[89] 2019 Blockchain Improving privacy Failure to run in a real environment
IoT Improving security
Security Improving image size
Privacy High feasibility
Smart Healthcare Low network latency
[55] 2019 Data sharing Improving computational speed Lack of a simulation environment to help gauge
Privacy Improving energy consumption the performance of the protocol
IoT devices High-security remote patient
Blockchain monitoring system
High-through put remote patient
monitoring system
High fast remote patient monitoring
system
High reliability remote patient
monitoring system
Proveing efficiency
High scalability
High computational load
[86] 2019 Blockchain High efficient Don’t implement it as a complete system
Privacy Incresing privacy
Healthcare IoT Maintaining data integrity

123
Cluster Computing (2022) 25:2203–2221 2215

Table 3 Comparison of the key factors, advantage and disadvantage of the studies
Papers Year Key factors Advantage Disadvantage

[90] 2020 Patients Increasing security Don’t define the access control policy
Privacy Increasing privacy for MIoT in smart contracts
MIoT Increasing ambient intelligence
Blockchain
[91] 2020 Privacy Increasing data protection Don’t implement the model in the real case study
Security Increasing confidentiality
IoT
Skin monitoring
system
Blockchain

connectivity and features to process and record a large


amount of data with more efficiency, privacy, and security.
Reducing cost Blockchain uses IoT; IoT can overcome its several inherent
main issues. For example, it can record all its transactions
Eliminating
Pesudonymous
identification
single point of using decentralized technology, with more supports of
failure
immutability and suitability [98]. Blockchain has interest-
ing validation and smart contracts, which are very useful
for IoT to manage its millions of transactions in more
Benefits of authentic ways. The results indicated that using blockchain,
Autonomous using the
interaction blockchain in
Transparency IoT can maintain all its information into cloud storage and
IoT maintain privacy and security information [80].
The investigators, on the other side, assessed the
blockchain-based smart home’s resistance to system
Enabling edge- grouping. The results showed that if the attacker is able to
Decentralization smartness connect the confidential data to a real person, this intrusion
principle
Enabling could lead to more severe security and privacy issues. To
privacy by do so, the attacker can manage the blockchain’s real-time
esign principle
traffic to obtain information about the lower-layer proto-
cols, including the transaction generator’s IP (a numerical
Fig.4 The benefits of combining the blockchain with IoT [8] label assigned to each device connected to a computer
network) address. The intruder will easily connect the
true when regarded end-to-end. The credibility of datasets computers to the end-user using this real-time data, which
that are utilized to develop a model is missing in the is a significant challenge to user security and privacy [53].
existing model. These datasets may be tampered with by The table below shows what factors have been examined
any competitor to achieve their desired performance. Pre- in the studies. Our reviews show the factors security, pri-
sently, the combination of ML algorithms with blockchain vacy, accuracy, efficiency, and energy consumption factors
methods to attain IoT security and privacy is a relatively have the most important studies. The results also show that
novel domain that needs more investigation [95]. anonymity, dynamics, run time, reliability factors are the
Recently many cryptocurrency wallets are attacked, but least important in the studies (Table 4).
no attack until now was founded in blockchain technology.
IoT and blockchain platform specifications for diverse
technologies and systems, including businesses and man- 7 Open issue and future works
ufacturing, have evolved exponentially over the years. The
use of these two new technologies as an interconnected This chapter briefly explains how our suggested solution
medium for many use cases is considerably important guarantees the security features and targets and retains
[96, 97]. Combining IoT and blockchain technologies can resistance to attacks. The blockchain-based structure
revolutionize the world to get the benefits of vast objects’ ensures the mechanism of authentication and identification.

123
2216 Cluster Computing (2022) 25:2203–2221

It, therefore, handles the management of connectivity to 7.1.1 Integrity


IoT devices. Blockchain networks use asymmetric cryp-
tography as a way of guaranteeing and ensuring transfers To recalculate the hash encryption for the entire block-
among subscribers [99]. In addition, blockchain uses the chain, the ‘‘mining’’ feature is generated if a node wishes to
digital signature principle that depends on private keys to enter certain records. The workload of the machine is so
guarantee subscribers’ identification and authentication heavy that the fraudulent nodes will never stay competitive
[100]. Integration of fog and blockchain serves the criteria with all stages of blockchain network generation (if its
of IoT for low response time while maintaining privacy and computing capacity is almost difficult to exceed 51% of the
security. In order to resolve the necessity for enhancement whole network).
and advancement in the hardware, infrastructure, and
technology utilized in both blockchain and IoT, like con- 7.1.2 Availability
sensus algorithms, scalability, virtualization, and storage,
this integration requires further study. Fog computing will The transaction and user authentication before actually
play a compulsory role as a middle layer between cloud sending data are limited to fraudulent demands to confirm
and IoT in the IoT infrastructure, taking the computing the availability of data resources [91].
services closest to the edge of the network. In this research, IoT security and privacy still remain a significant
fog computing was utilized to minimize the time of problem, primarily due to IoT networks’ vast scale and
response [101]. distributed existence. Blockchain-based methods supply
Identity management discussed in this paper’s literature decentralized privacy and security, but they require
will open many other ways for the researcher to apply it to notable power and energy, postponement, and computa-
smart health, smart logistics, smart retail, smart manufac- tional overhead that is not proper for most resource-re-
turing, etc. Some challenges may come up when we try to stricted IoT devices [80]. Technology has a wide potential
implement blockchain in IoT type resource-constrained in the medical and IoT industries, and the blockchains
devices. The major challenge in the blockchain is to reduce would broaden the reach of specialists and discourage
computation and resource requirements to store the abuse of patient medical knowledge, respectively [91]. For
blockchain. As a future scope, the researcher community future study in this area, in healthcare networks, adding
needs to focus on these two aspects parallel with applica- new implementation scenarios and how to boost recovery
tion-oriented development [92]. quality are also open topics to focus. Also, It is considered
The investigators tested the blockchain-based smart an open research concern to provide an appropriate stan-
home’s durability toward system labeling. The results dard of protection for IoT-based essential infrastructures,
showed that if the attacker is able to connect the confi- like connected vehicles [44]. In the following, we will
dential data to a specific subscriber, this intrusion could mention several future works that have been included in
lead to more severe privacy and security issues. To do so, previous studies.
the attacker can track the blockchain’s real-time traffic to
– The automatic remote data integrity test may be
attain knowledge about the lower-layer protocols, such as
explored in future works. Automated monitoring of
the transaction generator’s IP address. The intruder will
remote data integrity guarantees that integrity is
simply connect the devices to the end-user utilizing this
verified in real-time [68].
real-time data, which is a significant challenge to user
– Future studies would build a generalized architecture
privacy and security [53].
that allows a wide variety of ML training algorithms to
The three key problems addressed when designing the
be developed on multi-part encrypted datasets to
security architecture for any application are integrity,
maintain privacy [69].
confidentiality, and availability, known as the CIA.
– How to effectively ensure data protection through
blockchain technologies is still an open challenge that
7.1 Confidentiality
requires more investigation by studying more security
risks, designing more successful solutions, and easing
A unique key ensures verification of the sender by the
the risks [67, 102, 103].
cluster head. The data/message is encrypted with the
– A key issue to be solved in data exchange is how to
receiver’s public key, which can be decrypted and inter-
enhance the usefulness of data models mapped from
preted by the real user with its private key.
raw data, irrespective of the particular computational
tasks and ML algorithms. New smart mechanisms are
needed to boost the usefulness of data [67].

123
Table 4 Important factors identified in studies
Papers Security Privacy Anonymity Dynamics Correctness Energy Overhead Integrity Confiden- Avail- Efficiency Accuracy Cost Scalablility Run Reliability
consumption tiality ability time
Cluster Computing (2022) 25:2203–2221

Management data
[65] Yes Yes No No No No Yes No No No No No Yes No No No
[67] Yes No No No No No No No No No Yes Yes No Yes Yes No
[68] Yes Yes No Yes Yes No No No No No No No No No No No
[69] Yes Yes No No No No No No No No Yes Yes No No No No
Access Control
[73] Yes Yes No No No No No Yes No Yes Yes Yes No No No No
[4] Yes Yes No No Yes No No No No Yes Yes Yes No No No No
[5] Yes Yes No No No No No No Yes No No Yes No No No No
[8] Yes Yes Yes No No No No No No No No No No No No No
Smart home
[80] Yes Yes No No No No No Yes Yes Yes Yes No No No No No
[3] No Yes No No No No No No No No No Yes No No No No
[81] Yes Yes No No No Yes Yes No No No No No No No No No
[77] No Yes No No No No No No No No No Yes No No Yes No
[82] Yes Yes No No No Yes No No No No No No Yes No No No
Smart healthcare
[88] No Yes No No No No No No No No Yes No No No No Yes
[87] Yes Yes No No No Yes No No No No No No Yes Yes No Yes
[89] Yes Yes No No No No No No No Yes Yes No No No No No
[55] Yes Yes No No Yes Yes No Yes Yes Yes No Yes Yes No No No
[86] Yes Yes No No No No No Yes No No Yes Yes No No No No
[90] Yes Yes No No Yes Yes No No No No Yes Yes No No No No
[91] Yes Yes No No No Yes No No Yes No No No No Yes No No
2217

123
2218 Cluster Computing (2022) 25:2203–2221

– Future work can introduce a new distributed and search to some databases-Elsevier, Springer, IGI, emerald,
privacy preservation protocol to be integrated with SAGE, Taylor, Wiley, IEEE library. There may be other
FairAccess [104]. scholarly publications that might have a more compre-
hensive image of the relevant papers. Furthermore, in this
review, non-English publications were excluded. The
advantage of the present research work is to know the
8 Conclusion and limitations
influence of blockchain technology on preserving privacy
in IoT is achieved to a certain extent. In the future, we
A broad description of the various facets of IoT and
would like to concentrate on developing a novel privacy-
blockchain privacy is provided in this article. The consid-
preserving model that applies to the field of IoT.
erations of privacy and security were also included in the
framework of the analysis. This work offers a detailed
blockchain summary. It starts with a summary of block-
chain technology, covering the architecture of blockchain References
and main blockchain functionality. A discussion on
blockchain technology and relevant main technologies is 1. Sengupta, J., Ruj, S., Bit, S.D.: A Comprehensive survey on
performed. Therefore, we have thoroughly checked the attacks, security issues and blockchain solutions for IoT and
past and new papers on IoT and blockchain privacy in this IIoT. J. Netw. Comput. Appl. 149, 102481 (2020)
2. Jahantigh, M.N., Rahmani, A.M., Navimirour, N.J., Rezaee,
paper until Dec-2020. 20 chosen articles were ranked in A.J.I.C.: Integration of Internet of Things and cloud computing:
four types: 4 of them are about management data, 4 of them a systematic survey. IET Commun. 14(2), 165–176 (2019)
are about access control, 5 are about smart homes, and 7 3. Alfandi, O., Khanji, S., Ahmad, L., Khattak, A.: A survey on
are about smart healthcare. boosting IoT security and privacy through blockchain. Clust.
Comput. 25, 1–19 (2020)
The findings revealed that the development of block- 4. Sadrishojaei, M., Navimipour, N.J., Reshadi, M., Hosseinzadeh,
chain technology is hampered by many problems, like data M.: A new preventive routing method based on clustering and
privacy, security, scalability, etc. Several scholars have location prediction in the mobile internet of things. IEEE
accepted in past years that the synthesis of blockchain and Internet Things J. 41, 1–1 (2021)
5. S. Datta, A. K. Das, A. Kumar, and D. Sinha.: Authentication
IoT produces resilient, genuinely distributed peer-to-peer and privacy preservation in IoT based forest fire detection by
networks and the capacity to communicate in a trustless using blockchain: a review. In: International Conference on
and auditable way with peers. In the IoT field, though, few Internet of Things and Connected Technologies, 2019,
suggested solutions have addressed the privacy concern. pp. 133–143: Springer.
6. Pourghebleh, B., Wakil, K., Navimipour, N.J.: A comprehensive
The privacy demands, like consent and preference, intent study on the trust management techniques in the Internet of
definition, and collection restriction, have been less dis- Things. IEEE Internet Things J. 6(6), 9326–9337 (2019)
cussed in the IoT field, despite the rising pressure from the 7. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet
legislation. We have concentrated on privacy experiments of things: Vision, applications and research challenges. Ad Hoc
Netw. 10(7), 1497–1516 (2012)
to protect privacy utilizing blockchain technologies over 8. A. Ouaddah.: A blockchain based access control framework for
the entire IoT data lifecycle for these purposes. There may the security and privacy of IoT with strong anonymity unlink-
be some important security and applicability challenges ability and intractability guarantees. In: Advances in Computers,
when incorporating blockchain into IoT networks along- 115: Elsevier, 2019, pp. 211–258.
9. Borgia, E.: The Internet of Things vision: key features, appli-
side technology’s pervasive development. This study ana- cations and open issues. Comput. Commun. 54, 1–31 (2014)
lyzes IoT security specifications to detect potential security 10. Ghanbari, Z., Navimipour, N.J., Hosseinzadeh, M., Darwesh, A.:
and privacy weaknesses and minimize those threats by Resource allocation mechanisms and approaches on the Internet
implementing blockchain technologies. Our results showed of Things. Clust. Comput. 22(4), 1253–1282 (2019)
11. S. Fan, L. Song, and C. Sang.: Research on privacy protection in
that numerous technologies such as smart homes, smart IoT system based on blockchain. In: International Conference on
cities, healthcare systems, intelligent transportation sys- Smart Blockchain, 2019, pp. 1–10: Springer.
tems, supply chain systems, and agriculture fields are 12. D. P. Augustine and P. Raj.: Blockchain and IoT security. In:
introduced using IoT techniques. The development of Blockchain Technology and Applications: Auerbach Publica-
tions, 2020, pp. 51–64.
intelligent devices with wireless networking, storage space, 13. C. Ge, Z. Liu, and L. Fang. A blockchain based decentralized
and some computing power enables these devices to be data security mechanism for the Internet of Things. J. Parall. and
used real-time. Albeit, to a different degree, the IoT device Distributed Computing, 2020.
has security and privacy issues. 14. Vardhana, M., Arunkumar, N., Abdulhay, E., Vishnuprasad, P.:
Iot based real time trafic control using cloud computing. Clust.
Several restrictions appeared in the present investiga- Comput. 22(1), 2495–2504 (2019)
tion. The results of the current research should be assessed 15. Kim, H.-Y., Kim, J.-M.: A load balancing scheme based on
in light of its limitations. The present study restricted the deep-learning in IoT. Clust. Comput. 20(1), 873–878 (2017)

123
Cluster Computing (2022) 25:2203–2221 2219

16. A. Lamba, S. Singh, S. Balvinder, N. Dutta, and S. Rela.: Mit- authentication mechanism for IoT systems. Clust. Comput. 73,
igating IoT security and privacy challenges using distributed 1–21 (2020)
ledger based blockchain (Dl-BC) technology. Int. J. Technol. 36. I. A. Ridhawi, M. Aloqaily, and Y. Jararweh.: an incentive-
Res. Eng., 4(8), 2017. based mechanism for volunteer computing using blockchain.
17. Elhabob, R., Zhao, Y., Eltayieb, N., Abdelgader, A.M., Xiong, arXiv preprint arXiv:2009.11901, (2020)
H.: Identity-based encryption with authorized equivalence test 37. I. Al Ridhawi, M. Aloqaily, A. Boukerche, and Y. Jaraweh.: A
for cloud-assisted IoT. Clust. Comput. 23(2), 1085–1101 (2020) Blockchain-based decentralized composition solution for IoT
18 Azad, P., Navimipour, N.J., Rahmani, A.M., Sharifi, A.: The services. In: ICC 2020–2020 IEEE International Conference on
role of structured and unstructured data managing mechanisms Communications (ICC), 2020, pp. 1–6: IEEE
in the Internet of things. Clust. Comput. 10, 1–14 (2019) 38. H. F. Atlam and G. B. Wills.: IoT security, privacy, safety and
19. S. Nakamoto and A. Bitcoin.: A peer-to-peer electronic cash ethics. In: Digital Twin Technologies and Smart Cities:
system. Bitcoin. URL: https://bitcoin.org/bitcoin.pdf, vol. 4, Springer, 2020, pp. 123–149.
2008. 39. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar,
20. Hassan, M.U., Rehmani, M.H., Chen, J.: Privacy preservation in B.: A survey on IoT security: application areas, security threats,
blockchain based IoT systems: integration issues, prospects, and solution architectures. IEEE Access 7, 82721–82743 (2019)
challenges, and future research directions. Futur. Gener. Com- 40. F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain.: Machine
put. Syst. 97, 512–529 (2019) learning in IoT security: current solutions and future challenges.
21. A. Pouraghily, M. N. Islam, S. Kundu, and T. Wolf.: Privacy in IEEE Communications Surveys & Tutorials, (2020)
blockchain-enabled iot devices. In: 2018 IEEE/ACM Third 41. Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Far-
International Conference on Internet-of-Things Design and uki, P.: Network intrusion detection for IoT security based on
Implementation (IoTDI), 2018, pp. 292–293: IEEE. learning techniques. IEEE Commun. Surv. Tutor. 21(3),
22. Verma, V.K.: Blockchain technology: systematic review of 2671–2701 (2019)
security and privacy problems and its scope with Internet of 42. Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge
Things (IoT). J. Netw. Secur. 7(1), 24–28 (2019) computing-based designs for iot security. Digit. Commun. Netw.
23. Alotaibi, B.: Utilizing blockchain to overcome cyber security 6(2), 195–202 (2020)
concerns in the internet of things: a review. IEEE Sens. J. 43. Hassan, W.H.: Current research on Internet of Things (IoT)
19(23), 10953–10971 (2019) security: a survey. Comput. Netw. 148, 283–294 (2019)
24. Ferrag, M.A., Shu, L., Yang, X., Derhab, A., Maglaras, L.: 44. O. Alfandi, S. Otoum, and Y. Jararweh.: Blockchain solution for
Security and privacy for green IoT-based agriculture: review, IoT-based critical infrastructures: byzantine fault tolerance. In:
blockchain solutions, and challenges. IEEE Access 8, NOMS 2020–2020 IEEE/IFIP network operations and man-
32031–32053 (2020) agement symposium, 2020, pp. 1–4: IEEE.
25. Mistry, I., Tanwar, S., Tyagi, S., Kumar, N.: Blockchain for 5G- 45. Opara, E.U., Soluade, O.A.: Straddling the next cyber frontier:
enabled IoT for industrial automation: a systematic review, The empirical analysis on network security, exploits, and vul-
solutions, and challenges. Mech. Syst. Signal Process. 135, nerabilities. Int. J. Electron. Inform. Eng. 3(1), 10–18 (2015)
106382 (2020) 46. Chen, Q., Srivastava, G., Parizi, R.M., Aloqaily, M., Al Rid-
26. Tseng, L., Yao, X., Otoum, S., Aloqaily, M., Jararweh, Y.: hawi, I.: An incentive-aware blockchain-based solution for
Blockchain-based database in an IoT environment: challenges, internet of fake media things. Inform. Process. Manag. 57(6),
opportunities, and analysis. Clust. Comput. 23(3), 2151–2165 102370 (2020)
(2020) 47. Dehghani, M., et al.: Blockchain-based securing of data
27. Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure exchange in a power transmission system considering conges-
communication protocols for the Internet of Things. Ad Hoc tion management and social welfare. Sustainability 13(1), 90
Netw. 32, 17–31 (2015) (2021)
28. H. Li, L. Pei, D. Liao, X. Wang, D. Xu, and J. Sun.: BDDT: use 48. Dehghani, M., et al.: Blockchain-based securing of data
blockchain to facilitate IoT data transactions. Clust. Comput. exchange in a power transmission system considering conges-
J. Netw. Softw. Tools Appl. (2020) tion management and social welfare. Sustainability 13(1), 1–1
29. Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet (2020)
of Things security: a survey. J. Netw. Comput. Appl. 88, 10–28 49. O. Bouachir, M. Aloqaily, L. Tesng, and A. Boukerche.:
(2017) Blockchain and fog computing for cyber-physical systems: case
30 Pavithran, D., Shaalan, K., Al-Karaki, J.N., Gawanmeh, A.: of smart industry. arXiv preprint arXiv:2005.12834, (2020)
Towards building a blockchain framework for IoT. Clust. 50. Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future for
Comput. 5, 1–15 (2020) internet of things security: a position paper. Digital Commun.
31. Ammar, M., Russello, G., Crispo, B.: Internet of Things: a Netw. 4(3), 149–160 (2018)
survey on the security of IoT frameworks. J. Inform. Secur. 51. B. K. Mohanta, U. Satapathy, S. S. Panda, and D. Jena.: A novel
Appl. 38, 8–27 (2018) approach to solve security and privacy issues for IoT applica-
32. Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of tions using blockchain. In: 2019 International Conference on
things: a survey of existing protocols and open research issues. Information Technology (ICIT), 2019, pp. 394–399: IEEE
IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015) 52. Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network
33. Altaf, A., Abbas, H., Iqbal, F., Derhab, A.: Trust models of intrusion detection for IoT system based on transfer learning
internet of smart things: a survey, open issues, and future algorithm. Clust. Comput. 22(4), 9889–9904 (2019)
directions. J. Netw. Comput. Appl. 137, 93–111 (2019) 53. A. Dorri, C. Roulin, R. Jurdak, and S. S. Kanhere.: On the
34. Khan, M.A., Salah, K.: IoT security: review, blockchain solu- activity privacy of blockchain for IoT. In: 2019 IEEE 44th
tions, and open challenges. Futur. Gener. Comput. Syst. 82, Conference on Local Computer Networks (LCN), 2019,
395–411 (2018) pp. 258–261: IEEE
35 Khalid, U., Asim, M., Baker, T., Hung, P.C., Tariq, M.A., 54. Ma, M., Shi, G., Li, F.: Privacy-oriented blockchain-based dis-
Rafferty, L.: A decentralized lightweight blockchain-based tributed key management architecture for hierarchical access
control in the IoT scenario. IEEE Access 7, 34045–34059 (2019)

123
2220 Cluster Computing (2022) 25:2203–2221

55. G. Srivastava, R. M. Parizi, A. Dehghantanha, and K.-K. blockchain technology in IoT. In: Europe and MENA Cooper-
R. Choo.: Data sharing and privacy for patient IoT devices using ation Advances in Information and Communication Technolo-
blockchain. In: International Conference on Smart City and gies: Springer, 2017, pp. 523–533.
Informatization, 2019, pp. 334–348: Springer. 74. T. D. Nguyen, H.-A. Pham, and M. T. Thai.: Leveraging
56. Y. Charband and N. J. Navimipour.: Knowledge sharing blockchain to enhance data privacy in iot-based applications. In:
mechanisms in the education: a systematic review of the state of International Conference on Computational Social Networks,
the art literature and recommendations for future research. Ky- 2018, pp. 211–221: Springer
bernetes, 2018. 75. F. Loukil, C. Ghedira-Guegan, K. Boukadi, and A. N. Ben-
57. Hajiali, M.: Big data and sentiment analysis: a comprehensive harkat.: Towards an end-to-end IoT data privacy-preserving
and systematic literature review. Concurr. Comput. Pract. Exper. framework using blockchain technology. In: International Con-
32(14), e5671 (2020) ference on Web Information Systems Engineering, 2018,
58. Aromataris, E., Pearson, A.: The systematic review: an over- pp. 68–78: Springer
view. AJN Am. J. Nurs. 114(3), 53–58 (2014) 76. M. Aloqaily, O. Bouachir, A. Boukerche, and I. A. Ridhawi.:
59. Masnoon, N., Shakib, S., Kalisch-Ellett, L., Caughey, G.E.: Design guidelines for blockchain-assisted 5G-UAV networks.
What is polypharmacy? A systematic review of definitions. arXiv preprint arXiv:2007.15286, (2020)
BMC Geriatr. 17(1), 230 (2017) 77. Y. Zhao et al. (2020) Privacy-preserving blockchain-based
60. Heidari, A., Jabraeil Jamali, M.A., Jafari Navimipour, N., federated learning for IoT devices. IEEE Internet Things J.
Akbarpour, S.J.I.J.O.C.S.: ’’Internet of things offloading: ongo- 78. Stojkoska, B.L.R., Trivodaliev, K.V.: A review of Internet of
ing issues, opportunities, and future challenges. J. Commun. Things for smart home: challenges and solutions. J. Clean. Prod.
Syst, 33(14), 4474 (2020) 140, 1454–1464 (2017)
61. Munn, Z., Porritt, K., Lockwood, C., Aromataris, E., Pearson, 79. V. Sivaraman, D. Chan, D. Earl, and R. Boreli.: Smart-phones
A.: Establishing confidence in the output of qualitative research attacking smart-homes. In Proceedings of the 9th ACM Con-
synthesis: the ConQual approach. BMC Med. Res. Methodol. ference on Security & Privacy in Wireless and Mobile Net-
14(1), 1–7 (2014) works, 2016, pp. 195–200.
62. Munn, Z., Peters, M.D., Stern, C., Tufanaru, C., McArthur, A., 80. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram.:
Aromataris, E.: Systematic review or scoping review? Guidance Blockchain for IoT security and privacy: The case study of a
for authors when choosing between a systematic or scoping smart home. In 2017 IEEE international conference on pervasive
review approach. BMC Med. Res. Methodol. 18(1), 143 (2018) computing and communications workshops (PerCom work-
63. Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues shops), 2017, pp. 618–623: IEEE
and challenges. IJ Netw. Secur. 19(5), 653–659 (2017) 81. Mohanty, S.N., et al.: An efficient lightweight integrated
64. B. K. Mohanta, D. Jena, S. Ramasubbareddy, M. Daneshmand, blockchain (ELIB) model for IoT security and privacy. Futur.
and A. H. Gandomi.: Addressing security and privacy issues of Gener. Comput. Syst. 102, 1027–1037 (2020)
IoT using blockchain technology. IEEE Internet Things J. 82. M. N. Islam and S. Kundu.: IoT security, privacy and trust in
(2020). home-sharing economy via blockchain. In Blockchain Cyber-
65. Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and security, Trust and Privacy: Springer, 2020, pp. 33–50
A. Kondoz.: Privacy-preserving blockchain based IoT ecosys- 83. G. Tripathi, M. A. Ahad, and S. Paiva.: S2HS-A blockchain
tem using attribute-based encryption. In: 2017 IEEE Interna- based approach for smart healthcare system. In: Healthcare,
tional Conference on Advanced Networks and 2020, 8(1), 100391: Elsevier
Telecommunications Systems (ANTS), 2017, pp. 1–6: IEEE. 84. S. Chakraborty, S. Aich, and H.-C. Kim.: A secure healthcare
66. A. Erdem, S. Ö. Yildirim, and P. Angin.: Blockchain for system design framework using blockchain technology. In: 2019
ensuring security, privacy, and trust in IoT environments: the 21st International Conference on Advanced Communication
state of the art. In: Security, privacy and trust in the IoT envi- Technology (ICACT), 2019, pp. 260–264: IEEE
ronment: Springer, 2019, pp. 97–122. 85. J. Qiu, X. Liang, S. Shetty, and D. Bowden.: Towards secure and
67. Lu, Y., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain smart healthcare in smart cities using blockchain. In: 2018 IEEE
and federated learning for privacy-preserved data sharing in International Smart Cities Conference (ISC2), 2018, pp. 1–4:
industrial IoT. IEEE Trans. Industr. Inf. 16(6), 4177–4186 IEEE
(2019) 86. N. Bhalaji, P. Abilashkumar, and S. Aboorva.: A Blockchain
68. Zhao, Q., Chen, S., Liu, Z., Baker, T., Zhang, Y.: Blockchain- based approach for privacy preservation in healthcare IoT. In:
based privacy-preserving remote data integrity checking International Conference on Intelligent Computing and Com-
scheme for IoT information systems. Inf. Process. Manage. munication Technologies, 2019, pp. 465–473: Springer.
57(6), 102355 (2020) 87. K. Azbeg, O. Ouchetto, S. J. Andaloussi, L. Fetjah, and A.
69. Shen, M., Tang, X., Zhu, L., Du, X., Guizani, M.: Privacy- Sekkaki.: Blockchain and IoT for security and privacy: a plat-
preserving support vector machine training over blockchain- form for diabetes self-management. In: 2018 4th International
based encrypted IoT data in smart cities. IEEE Internet Things J. Conference on Cloud Computing Technologies and Applica-
6(5), 7702–7712 (2019) tions (Cloudtech), 2018, pp. 1–5: IEEE
70. B. Krebs.: Hacked cameras, DVRs powered today’s massive 88. D.-P. Le, H. Meng, L. Su, S. L. Yeo, and V. Thing.: Biff: A
internet outage. Krebs on Security, 2016. blockchain-based IoT forensics framework with identity pri-
71. O. J. A. Pinno, A. R. A. Gregio, and L. C. De Bona.: Con- vacy. In TENCON 2018–2018 IEEE Region 10 Conference,
trolchain: blockchain as a central enabler for access control 2018, pp. 2372–2377: IEEE
authorizations in the IoT. In: Globecom 2017–2017 IEEE Glo- 89. Shen, M., Deng, Y., Zhu, L., Du, X., Guizani, N.: Privacy-
bal Communications Conference, 2017, pp. 1–6: IEEE preserving image retrieval for medical IoT systems: a block-
72 Ouaddah, A., Mousannif, H., AbouElkalam, A., Ouahman, A.A.: chain-based approach. IEEE Netw. 33(5), 27–33 (2019)
Access control in the Internet of Things: Big challenges and new 90. B. Alamri, I. T. Javed, and T. Margaria.: Preserving patients’
opportunities. Comput. Netw. 112, 237–262 (2017) privacy in medical IoT using blockchain. In: International
73. A. Ouaddah, A. AbouElkalam, and A. A. Ouahman.: Towards a Conference on Edge Computing, 2020, pp. 103–110: Springer
novel privacy-preserving access control model based on

123
Cluster Computing (2022) 25:2203–2221 2221

91. S. Juyal, S. Sharma, A. Harbola, and A. S. Shukla.: Privacy and hydrogen storage-based intelligent parking lot of electric vehi-
security of IoT based skin monitoring system using blockchain cles. J. Energy Storage 27, 101057 (2020)
approach. In: 2020 IEEE International Conference on Elec- 104. A. Ouaddah, A. Abou El Kalam, and A. A. Ouahman.: Har-
tronics, Computing and Communication Technologies (CON- nessing the power of blockchain technology to solve IoT secu-
ECCT), 2020, pp. 1–5: IEEE rity & privacy issues. In: ICC, 2017, pp. 7:1–7:10.
92. C. Patel.: IoT privacy preservation using blockchain. (2019)
93. Christidis, K., Devetsikiotis, M.: Blockchains and smart con- Publisher’s Note Springer Nature remains neutral with regard to
tracts for the internet of things. IEEE Access 4, 2292–2303 jurisdictional claims in published maps and institutional affiliations.
(2016)
94. Taylor, P.J., Dargahi, T., Dehghantanha, A., Parizi, R.M., Choo,
K.-K.R.: A systematic literature review of blockchain cyber
Wenbing Lianga received his
security. Digit Commun. Netw 6(2), 147–156 (2020)
master degree in economics. He
95. N. Waheed, X. He, and M. Usman.: Security & privacy in IoT
is a teacher of business admin-
using machine learning & blockchain: Threats & Countermea-
istration department in ShanXi
sures. arXivpreprint arXiv:2002.03488, 2020.
International Business Voca-
96. Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F.,
tional College, China. His
Rehmani, M.H.: Applications of blockchains in the Internet of
research interests include eco-
Things: a comprehensive survey. IEEE Commun. Surv. Tutor.
nomic development and finance.
21(2), 1676–1717 (2018)
Many papers and two mono-
97. C. S. Kouzinopoulos et al.: Using blockchains to strengthen the
graphs have been published by
security of internet of things. In: International ISCIS Security
him.
Workshop, 2018, pp. 90–100: Springer, Cham
98. Shahzad, A., Zhang, K., Gherbi, A.: Intuitive development to
examine collaborative IoT supply chain system underlying pri-
vacy and security levels and perspective powering through
proactive blockchain. Sensors 20(13), 3760 (2020)
99. C. Yu, Y. Leng, J. Li, and J. Yu.: Blockchain crowdfunding Nan Ji was graduated at Wei-
projects evaluation using GRA-TOPSIS. Kybernetes, 2020. fang Technical University,
100. O. Mounnan, A. El Mouatasim, O. Manad, T. Hidar, A. Abou El Weifang, China. Now, he is
Kalam, and N. Idboufker.: Privacy-aware and authentication working on network security
based on blockchain with fault tolerance for IoT enabled fog and social media. Internet of
computing. In: 2020 Fifth International Conference on Fog and things and cloud computing are
Mobile Edge Computing (FMEC), 2020, pp. 347–352: IEEE other research fileds of him. He
101. A. H. Alkhazaali and A. Oğuz.: Lightweight fog based solution published many papers in these
for privacy-preserving in IoT using blockchain. In: 2020 Inter- domains.
national Congress on Human-Computer Interaction, Optimiza-
tion and Robotic Applications (HORA), 2020, pp. 1–10: IEEE
102. Bagal, H.A., Soltanabad, Y.N., Dadjuo, M., Wakil, K., Ghadimi,
N.: Risk-assessment of photovoltaic-wind-battery-grid based
large industrial consumer using information gap decision theory.
Sol. Energy 169, 343–352 (2018)
103. Liu, J., Chen, C., Liu, Z., Jermsittiparsert, K., Ghadimi, N.: An
IGDT-based risk-involved optimal bidding strategy for

123

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy