Research Paper-1
Research Paper-1
https://doi.org/10.1007/s10586-021-03260-0 (0123456789().,-volV)(0123456789().
,- volV)
Received: 13 July 2020 / Revised: 22 January 2021 / Accepted: 3 March 2021 / Published online: 30 March 2021
Ó The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
Abstract
The Internet of Things (IoT) has infiltrated extensively into our lifestyles. Nevertheless, IoT privacy remains a significant
obstacle, primarily because of the large size and distributed existence of IoT networks. Also, numerous safety, authenti-
cation, and maintenance problems of IoT systems have been overcome by the decentralized existence of blockchain. To
obviate these privacy difficulties, the privacy challenges of IoT-based blockchain are examined systematically. Totally, 61
papers have been gained by electronic databases and based on different filters, 20 related articles were obtained and
analyzed. The findings showed that the blockchain could dominate the IoT restrictions, such as data protection and privacy.
It can also supply distributed storage, transparency, trust, and secure distributed IoT networks and supply a beneficial
guarantee for the privacy and security of IoT users. Simultaneously, it has low scalability, high computing complexity, IoT-
unsuitable latency, and high overhead bandwidth.
Keywords Privacy Internet of things Distributed systems Blockchain Computer networks Systematic literature
review
123
2204 Cluster Computing (2022) 25:2203–2221
distributed and decentralized storing procedure. Data is Study outcomes form a rigid framework against that a
shared and maintained via peer-to-peer networks on dozens successful and stable IoT and blockchain adoption is illu-
of nodes worldwide, and replicated algorithms create fur- minated accordingly. This segment demonstrates some
ther copies [13, 17]. study community’s work to fix the challenge, such as trust
Protection, robustness, seamless authentication, and protection, safe storage, security, privacy protection, and
basic maintenance services are necessary to interconnect access control in depth. This article tries to fill in the gaps
IoT nodes [18]. Blockchain came up as a feasible alter- in previous articles. So, some articles about IoT, block-
native to have those salient characteristics. Nakamoto and chain, and privacy have been reviewed in the current sec-
Bitcoin [19] presented the blockchain concept and the tion to emphasize our necessity to perform the study. We
production of the bitcoin cryptocurrency. This revolution- have listed the main features as well as the pros and cons of
ary technology has spread through nearly all industries articles in Table 1 to make our motivation for writing this
over the past ten years and has seen large implementations. article clearer.
Numerous IoT systems’ management, stability, and Hassan et al. [20] discussed the privacy problems
authentication problems have been overcome by the resulting from the combination of blockchain with IoT
decentralized existence of blockchain [10]. Over the last applications by concentrating on common applications.
few years, there has been a massive growth in implemen- Besides, they presented the deployment in blockchain-
tations for blockchain-based IoT networks. Albeit, data and based IoT networks of five privacy protection techniques
user privacy must be taken into account because consumer called encryption, minimization, mixing, private contract,
preferences are preserved in the blockchain network [20]. and differential privacy. Also, Verma [22] presented the
Whenever popular services are pooled, privacy is an issue. Systematic Literature Review (SLR) of security and pri-
In a number of IoT apps, such as sharing the data obtained vacy issues and their relevance to IoT in blockchain tech-
from temperature sensors installed on a farm, this privacy nology. Then, in addition to the latest threats, risks, cutting-
issue is not a big obstacle. Still, it may be a major issue edge arrangements, and IoT security concerns, they pro-
when it comes to those kinds of programs [21]. vided security prerequisites for IoT as a solution to current
A detailed analysis of privacy concerns in blockchain- frameworks, like blockchain. They described open research
based IoT systems is given in our present research, separate problems and IoT security challenges, particularly in the
from any prior papers and surveys. It is because we greatly security room, such as the unwavering quality of infor-
address the particular area of privacy concerns in the mation. Also, Alotaibi [23] checked out the remedies that
implementations of blockchain-based IoT systems. There is increase the IoT security, containing the anonymity and
extensive literature on previous survey papers concentrat- privacy of data, identity and authentication management,
ing on blockchain and its IoT integration, and some of availability, data integrity, and confidentiality with the
them have concentrated on blockchain protection and pri- utilization of the blockchain. Besides, he pointed out end-
vacy concerns. Albeit, there is no previous post, to the best to-end food traceability that has been supplied by many
of our understanding, that deeply addresses privacy technologies like IoT and blockchain. Ultimately, he
preservation techniques from the application perspective in checked out some systematic methods. So, his study is not
the blockchain-based IoT platform. We narrowly examined systematic and only discusses the IoT and blockchain in the
IoT technologies like smart homes, smart Healthcare, food industry. Still, this survey does not cover all domains
access control, and management data in our everyday lives about security issues in blockchain and IoT. Datta et al. [5]
among these privacy protection techniques. This study will presented privacy and authentication in IoT making uti-
serve as a framework for designing potential policies to lization of blockchain within Forest Fire. In order to create
protect privacy to resolve any privacy concerns of block- a public database with transactions that can not be
chain-operating IoT networks. In the continuation of this exploited by any third entity, the blockchain seeks to
section, the main contribution and motivation of this article develop a data system. The blockchain shapes transactions
are explained. via cryptographically connected blocks. In blockchain
technology, public-key cryptography is utilized to sign
transactions between subscribers. It quite clearly attains
2 Contribution and motivation anonymity as it is extremely complicated to alter or elim-
inate data blocks in the blockchain ledger.
Our key contribution is to explore the literature to illustrate Ferrag et al. [24] presented the issues related to security
IoT’s latest privacy concerns and how blockchain can and privacy in the green IoT-based agriculture domain.
nevertheless be used to solve these problems; we solve They began by defining a four-tier agricultural architecture
concerns and transparent security questions that can be focused on green IoT and summing up the latest studies
placed on the existing IoT frameworks via blockchain. concerned with smart agriculture. They then grouped
123
Cluster Computing (2022) 25:2203–2221 2205
[20] 2019 Review Overview of privacy issues caused due to integration of 4 Not SLR
blockchain in IoT applications Not comprehensive
[22] 2019 SLR A systematic review of security and privacy problems and its 4 Weakness in comparing
scope with IoT blockchain articles
Not comprehensive
[23] 2019 Review Overview of utilizing blockchain to dominate cybersecurity 4 Not SLR
issues in the IoT Weakness in comparing
articles
Weakness in open
issues articles
[5] 2019 Review Overview of authentication and privacy preservation in IoT 4 Not SLR
based forest fire detection by using blockchain Weakness in comparing
articles
Focusing only on the
forest fire sector
[24] 2020 Review Overview of security and privacy for green IoT-based agriculture 4 Not SLR
Focusing only on the
agricultural sector
[3] 2020 Survey Overview of boosting IoT security and privacy through 4 Not SLR
blockchain Weakness in comparing
articles
[25] 2020 SLR A systematic review of blockchain for 5G-enabled IoT for 4 Weak privacy check-in
industrial automation blockchain
Not comprehensive
hazard models toward green IoT-based agriculture into five automation of industries for apps like smart home, smart
groups, including threats regarding encryption, privacy, city, smart agriculture, healthcare 4.0, supply chain man-
authentication, reputation, and usability properties. agement, and autonomous vehicles.
Besides, they offered taxonomy and side-by-side analysis Checking out the literature, it has been detected that
of modern strategies for IoT implementations to protected, blockchain could be used in obviating some security and
privacy-preserving innovations and how they can be suited privacy difficulties relevant to IoT. We understood that
for green IoT-based agriculture. Also, Alfandi et al. [3] various subjects in the current field are smart homes, smart
conducted a thorough literature review to obviate novel health, smart cities, and different frameworks depending on
security and privacy IoT-related issues. They are classified the considered articles in the present section. Several IoT
due to the architecture of the IoT layer: network, percep- security investigations [26, 27] explain the necessary
tion, and layer of the application. Besides, as a central security and privacy countermeasures and objectives with
foundation for addressing multiple IoT security and pri- no concentration on specified apps. Some of those inves-
vacy challenges, they researched blockchain technology. tigations limit their protected countermeasures to IoT
Furthermore, in combination with other emerging tech- security taxonomy [28, 29], IoT frameworks [30, 31],
nologies such as Machine Learning (ML), particularly in security communication protocols [3, 32], or trust-de-
intrusion detection systems, they investigated blockchain pended obviations [33]. Some surveys identify vulnerabil-
technology and its benefits. In addition, they outlined ity models that may require IoT network defense [29, 33].
complications and safety problems created by the intro- Lately, blockchain-based obviations for IoT security have
duction of blockchain with IoT apps. Ultimately, through been more absorptive in [24, 34, 35]. However, SLRs are
blockchain technologies, they suggested a system of IoT critical in conducting a review. These investigations could
protection and privacy specifications. Mistry et al. [25] not introduce a perfect SLR-based review of the privacy
presented detailed research of novel proposals regarding challenges in blockchain and IoT, analyzing subsequent
IoT with enabled 5G as supporting blockchain-based issues and their taxonomy. Besides, there exist fewer
123
2206 Cluster Computing (2022) 25:2203–2221
reviews on the present subject. This study presents the protecting privacy, maintaining the security of IoT cus-
modern blockchain technology for the issues in privacy tomers, data and devices, infrastructures, and ensuring the
resolved in IoT and fills the gap in the existing need. As far availability of IoT eco-system services [43]. Blockchain is
as we know, our survey is the first investigation that checks now resolving a vast variety of network constraints [44].
out the privacy countermeasures and blockchain-based Besides, as bitcoin and other cryptocurrencies have
solutions for IoT security. For doing so, we have evaluated lately become highly prominent, the fundamental principle
the questions below: of ‘‘blockchain’’ attracts unimaginable publicity [26]. As
RQ1: Why is blockchain used in the IoT? bitcoin has been a successful trend, everybody can be aided
(This question is answered in Sect. 1). by blockchain technologies in the vast fields and services,
RQ2: Which potential locations are there in the block- like IoT, voting, financial market, medical treatment, sup-
chain system for IoT? ply chain, and storage [45]. So, blockchain is the bitcoin
(This question is responded to in Sect. 4). network’s underlying mechanism. Using blockchain
RQ3: What are the benefits and drawbacks of the architecture, there will be more developments in non-fi-
blockchain in IoT? nancial and financial applications. A promising novel
(This question is answered in Sect. 5 in Table 3). transparent secure network, blockchain, has been champi-
RQ4: How can blockchain solve the IoT privacy oned to help fight the credibility of fake media in a
problems? framework in which resistance to data modification is
(This question is answered in Sect. 6). necessary [46]. Blockchain is a promising platform that can
Concepts IoT and blockchain are discussed in Sect. 2. supply safe and verifiable transfers and facilitate resource
An SLR is presented in Sect. 3. Section 4 has provided a conservation [47, 48]. As future support for apps and a
review of the chosen articles. Section 5 illustrates the broad range of essential applications will be available,
outcomes. The open issues and future works are presented blockchain is assessed [49]. Besides, blockchain is
in Sect. 6. Ultimately, Sect. 7 concludes the study. advanced as a significant future and present. It is consid-
ered a mechanical way of supplying money and supporting
metadata and agreements in the commercial business.
3 Background Blockchain has been initially utilized to record monetary
transactions, where total members encode and preserve
The growth at the heart and edge of rapid networking them (for instance, bitcoins and different digital forms of
media has ended in exponential volumes of advanced and money). In this manner, total transactions are straightfor-
intelligent wireless IoT devices [36]. So, diversified IoT ward, and any adjustments can be handily followed and
services are becoming more complex [37]. IoT is an recognized [50].
Internet movement that will connect virtually all environ- As we said, the deployment of the IoT would include the
mental products and exchange their data through the military, the livelihood of citizens, business, industry, etc.
Internet to build new services and apps to enhance our life It is self-evident whose network security is essential. An
quality [38]. The IoT helps multiple gadgets and items IoT application and security and privacy concerns have
around us to be resolvable, visible, and locatable utilizing various problems like scalability issues, bandwidth/traffic
inexpensive sensors. Physical objects may be enabled to crisis, and system mobility. In the developing situations of
build, obtain, and share information in a smooth way uti- IoT frameworks, there are more possibilities to have an
lizing the IoT [39]. IoT items range from smart household expanded number of cooperating gadgets or things in it. In
devices like smart adapters, smart bulbs, smart refrigera- order to utilize IoT in the integrity, confidentiality, autho-
tors, smart meters, temperature controls, smart ovens, rization, authentication, verification, trust, storage, and
smoke alarms to more advanced ones like radio frequency maintenance of real-life applications, usability issues have
identification devices, accelerometers, heartbeat detectors, to be tackled [51]. The harm and damages will be very
parking lot sensors, and several sensors in automobilist severe until the topic of computer protection arises, like
[40]. The open environment for implementation and the hacker interference, virus damage, malicious code attacks,
IoT’s restricted resources make it prone to disruptive etc. [52]. As a distributed network to strengthen IoT
attacks. The harm caused by infested Internet-connected security, blockchain has gained enormous publicity [53].
things impacts IoT security and challenges the entire So, blockchain innovation would give better answers to the
Internet eco-system to theoretically take advantage of issues looked at by the systems of IoT. Connection history
compromised things (smart devices) implemented as bot- is preserved in a blockchain that provides audibility. New
nets [41]. The preservation of IoT security and privacy is privacy threats are implemented in contrary when users are
closely related to the functional implementation of the IoT subjected to the full history of IoT interface communica-
[42]. IoT protection primarily targets at confidentiality, tion [54]. However, a range of restrictions underpinning
123
Cluster Computing (2022) 25:2203–2221 2207
blockchain utilization prevents its usage, especially in low- 4.3 Data analysis
energy and computing footprint apps [55]. Therefore, here,
the challenges of blockchain privacy in the IoT are Figure 1 displays a flow diagram of the outcomes of the
examined. literature quest and research collection. Searching relevant
databases initially identified 61 citations that were
screened. After exclusion of non-English, citation articles,
4 Indications for systematic reviews and duplicates, 53 articles were checked. So, 9 articles are
excluded based on the title. We checked the full text of 44
Systematic reviews may be narrowly characterized as a qualifying journals. Of these, 24 papers were omitted for
synthesis of research performed by specialized-skilled failing to follow requirements relating to the form, action,
review groups [56, 57]. They sought to find and obtain or outcome of the analysis. 20 of these manuscripts met all
foreign data related to a specific issue. They also wanted to criteria for inclusion in the systematic review.
review and synthesize the findings of this research in order
to advise practice, policy, and in some cases, more analysis
[58]. According to the Cochrane handbook, a systematic 5 Review of selected paper
analysis uses transparent, systematic approaches chosen to
reduce bias, thereby offering more accurate results from IoT is one of the exciting scientific filings that are being
which results can be derived, and decisions can be taken generated utilizing lots of smart apps. To incorporate IoT
[59]. Systematic reviews supplement a formal and pre- software, sensors, intelligent systems, and actuators are
defined procedure that involves comprehensive methods to utilized [63]. Attacks are being advanced and high-grade,
ensure that the findings are accurate and useful to end-users which is a significant issue day after day. Blockchain
[60]. These reviews might be considered the evidence-de- technology has been one of the modern approaches adopted
pended healthcare pillar [61] and are highly utilized to by both science and enterprise during the past few years,
advance reliable clinical guidelines [62]. with six core features: immutable, decentralized, autono-
mous, transparent, anonymous, and open-source [64]. The
4.1 Data sources and search strategy idea of blockchain is now gradually being used by scholars
and industry to attain security in IoT apps. The block-
– This systematic review reporting is consistent with the chain’s basic principle is that, if it is modified on the
checklist of PRISMA (Preferred Reporting Items for blockchain, the data created by subscribers or computers in
Systematic Reviews and Meta-Analyses). the past is checked for accuracy and cannot be tampered
– Elsevier, Springer, Emerald, IGI, SAGE, Taylor, Wiley, with. While the blockchain encourages honesty and non-
IEEE databases were searched until Dec- 2020. repudiation to some degree, the anonymity and privacy of
– The search terms (privacy, IoT, blockchain) were used the data or devices are not protected [65]. Therefore, in this
in databases. subsection, we deliberate recent literature on blockchain in
IoT security procedures. We have discussed 20 articles
The quest was restricted to primary scientific journals
related to privacy and blockchain challenges on the IoT in
published in English until Dec-2020 that specified the word
the present section. Related articles are divided into 4
IoT, privacy, and blockchain in some shape or type. Papers
sections and are discussed. The classification of articles
were deemed to be available in English and published in
includes management data, access control, smart home, and
the journals. To find other related publications, reference
smart health. In the following, each category will be
lists of related publications and grey literature were
reviewed (See Fig. 2). Also, in Fig. 3, some promising
checked.
IoT-depended apps are illustrated.
4.2 Study selection and data extraction
5.1 Data management
Reports that fulfilled the requirements and contained a
IoT can possibly change how we consider information and
keyword description were included. The primary screening
communication technology. IoT has been concentrated
of abstracts and titles and database search were conducted.
broadly across numerous fields, for example, communica-
Then, papers were categorized as irrelevant, unsure, or
tion, networking, business, security, and management
relevant. When all related papers have been found, full
communities [44, 60]. To achieve network-relevant activ-
texts of all detected papers would have been checked, and
ities, the IoT environment demands reliability, security,
data would have been collected (see Table 2).
scalability, and endurance. The data management node first
123
2208 Cluster Computing (2022) 25:2203–2221
Exclusion Search engine reason The title, abstract, and keywords are in English, but not the full-text
(SER)
Without full-text The full-text of the paper is not available for the assessment
(WF)
Non-related (NR) NR-1: The paper is not academic, editorial note, conference review, content, or foreword
NR-2: The definition around ‘blockchain’ is not about IoT
Loosely related (LR) The focus is not on the review, survey, discussion, or problem-solving of privacy, IoT, blockchain, where:
LR-1: Privacy, IoT, and blockchain is just used as an instance fact
LR-2: Privacy, IoT, and blockchain is just used as a part of its upcoming research line, upcoming
viewpoint, or upcoming necessity
LR-3: Privacy, IoT, and blockchain is just used as a cited expression
LR-4: Privacy, IoT, and blockchain is just used in keywords and/or references
Inclusion Partially related (PR) PR-1: A study around the 4th industrial revolution without stating privacy, IoT, and blockchain
PR-2: Privacy, IoT, and blockchain are just used to back the explanation of a few problems or trends within
the article
PR-3: Privacy, IoT, and blockchain are an object that needs to be studied, surveyed, or deliberated
Closely related (CR) The research attempts of an article are obviously and devoted explicitly to privacy, IoT, and blockchain
encrypts and shards the whole of its IoT devices’ data The ability to enable sensors, computers, and computa-
gathered and stores it in each node of the distributed net- tional objects to execute tasks independently has become a
work [13]. Afterward, the transaction information has been requirement in today’s highly digitized environment.
maintained in the blockchain, containing the address in Manually managing vast volumes of data is virtually dif-
which the mutual file is held, the data hash, and the invoice, ficult. It is not an easy job to build IoT systems that operate
protecting the file’s routing path from manipulation [13]. safely, effectively, and freely. Blockchain reveals a
123
Cluster Computing (2022) 25:2203–2221 2209
123
2210 Cluster Computing (2022) 25:2203–2221
123
Cluster Computing (2022) 25:2203–2221 2211
attacks can be up to 90% effective in categorizing the information. Data transaction and transmission security
devices’ form and number in a smart home. They suggested have been maintained using the introduction of unique
three timestamp obfuscation tactics to minimize the suc- device authentication. Simultaneously, it will protect IoT
cessfulness of device categorization, like integrating sev- privacy by making it easy to change the encryption key
eral packets into a single transaction, mixing multiple with a smart contract.
packet ledgers, and unexpectedly delaying transactions.
The suggested techniques of time stamp obfuscation will 5.4 Smart healthcare
minimize the success rate to below 30 percent.
In order to provide the requirements, Mohanty et al. [81] IoT is used as one of the latest technologies that can be
generated an Efficient Lightweight Integrated blockchain described as an integrated device network globally. It is
(ELIB) model. As a significant example, the introduced now entering all levels of society, with health care being
concept has been implemented in a smart home setting to the most vital application among them [83]. In health care,
validate its applicability in different IoT scenarios. In a the main IoT implementations include real-time control of
smart home, the resource-limited services benefit from a smart wearables, patient body criteria, tracking necessities,
centralized manager who creates shared keys for dis- etc. The gathered sensor data is then utilized to test
tributing data, handling all outgoing and incoming objectives by multiple third parties [84]. The privacy of the
demands. The proposed ELIB model provides an overlay individuals whose data is being processed is a big issue that
network in which fully equipped resources can be com- emerges here. The identification of the individuals is in
bined into a shared blockchain that confirms committed danger of preserving the confidentiality of the captured
security and privacy. In the provided ELIB model, a series sensor data. Some changes created by intruders to this
of three optimizations were conducted, namely certificate health-related data may have a negative effect on any-
less cryptography and, lightweight consensus algorithm, body’s life [85]. Blockchain is the solution to the men-
Distributed Throughput Management (DTM) framework. tioned issue here. Blockchain can be described as a
In terms of energy consumption, processing time, and distributed blockchain ledger that can simultaneously
overhead, a rigorous simulation was performed under document transactions and avoid changes to the reported
various scenarios. Compared to the baseline system, the data. Blockchain has not only seemed resistant to abuse of
ELIB achieves a net saving of 50 percent in processing its data but is one of the most revolutionary innovations
time with the least energy utilization of 0.07 mJ. The revolutionizing diverse areas and realms, like IoT [86]. The
attained practical results suggested that under many styles and volumes of medical images have greatly
assessment parameters, the ELIB displays optimal improved with the introduction of medical IoT devices. In
efficiency. order to promote disease detection and increase treatment
Zhao et al. [77] developed a federated learning frame- quality, the retrieval of diagnostic images is of consider-
work that leverages the credibility process to help pro- able significance. However, it could raise peoples’ privacy
ducers of home appliances train a model of machine issues because medical images contain confidential and
learning depending on data from clients. To safeguard private data from patients.
consumers’ privacy and enhance the precision of the test, Diabetes prevention and treatment are critical activities
they imposed differential privacy on the derived properties that can be achieved by constantly tracking health records,
and suggested a new strategy for normalization. They like blood glucose levels. The utilization of IoT devices is
empirically found that their normalization methodology required to make the procedure automated. Azbeg et al.
performs better when characteristics are under differential [87] proposed an IoT and blockchain-based platform
privacy protection than batch normalization. Besides, they architecture to promote diabetes follow-up and help
are developing an incentive scheme to reward users in patients treat it better themselves. Their architecture inte-
order to encourage more clients to engage in the crowd- grates IoT with blockchain technologies to gather data
sourcing federated learning challenge. from patients, share it in a near real-time and safe way with
Islam and Kundu [82] addressed the trust, security, and their healthcare teams while protecting the privacy of the
privacy issues related to contractual renting or leasing of patient.
home-enabled IoT devices. They propose a new approach Leveraging on the blockchain technology, Le et al. [88]
for totally undermining the mediation of the home-sharing suggested a per-missioned blockchain-based IoT forensics
economy and preserving the privacy of IoT devices for framework to elevate the authenticity, integrity, and non-
consumers of the home-sharing economy. The smart con- repudiation attributes for the gathered evidence. They
tract in their protocol simplifies the decentralization of the established the workflow from evidence acquisition and
home-sharing economy. Their suggested protocol allows dissemination to review and subsequent archiving and
subscribers to monitor their own transactions and disposal for the whole procedure. They created various
123
2212 Cluster Computing (2022) 25:2203–2221
types of transactions that are ideal for this forensic appli- Things (M IoT) applications. The suggested method helps
cation using smart contract leverage. They used an updated patients to be in full charge of their own data. It also makes
Merkle signature scheme to mask the identity of the evi- it possible for data users to view the data of patients
dence submitter from the public to resolve the identity without compromising their privacy. The model should be
privacy problem further. utilized to preserve the interests of people concerned with
Shen et al. [89] suggested a blockchain-based system for their personal data and is standardized by the general law
medical image retrieval with privacy protection. First, they of data security. In their recommended system, before
identified standard medical image retrieval scenarios and uploading to the cloud data center, patient data obtained by
summarized the related system architecture criteria. They IoT sensors is packeted and encrypted. The data packet
introduced the layered structure and hazard model of the hash is utilized as the index to retrieve the data packet from
suggested structure utilizing the new blockchain approa- the data server. Indexes are maintained over the blockchain
ches. They obtained a carefully chosen attribute vector in tamper-proof smart contact. In order to preserve their
from each medical image and built a tailored transaction data against unauthorized entry, the smart contract also
layout to handle large-size images with storage-constrained provides a patient-defined access management protocol.
blocks, preserving the privacy of medical images and Finally, Juyal et al. [91] suggested an IoT-depended skin
image properties. surveillance system relying on a blockchain data protection
Srivastava et al. [55] provided a transactional protocol and safety method. A secure method of data transfer is
for remote patient monitoring with the utilization of recommended for IoT devices utilized in a distributed
directed acyclic graphs. In both private and public block- framework. By a special key to recognizing each subscriber
chain, they utilize a modern blockchain protocol named when he signs, privacy is guaranteed. Through generating
GHOSTDAG. Their latest suggested approach aims at hash functions for any transaction element, the blockchain
addressing established healthcare protection challenges concept often solves security problems. The blockchain
without compromising scalability (an attribute of classic principle also solves security issues via the generation of
blockchain structure). In existing blockchain executions, hash functions for any transaction feature. The suggested
sluggish computational velocity and energy utilization are solutions enable IoT-based skin surveillance systems to
serious problems. Their model aims to eliminate these retain and share medical data across the network without
problems and, relative to any solution that tries to utilize a interference, privately and safely. Table 3 summarizes the
classic blockchain Resource Provision-ing Method (RPM) articles’ most important features (key factors, advantages,
system, provides a stable, high-throughput, quick, and and disadvantages) in this section.
reliable RPM system. The suggested solution outlined in
their analysis is an initial work in progress that provides an
insight into any IoT-based RPM framework via a block- 6 Results and discussion
chain-based paradigm. A test base capable of applying the
protocol to have some empirical outcomes to show feasi- This study concentrated on the privacy of IoT and block-
bility, scalability, security, and computational load is the chain technologies in this article. Security and privacy in
key next phase for their plan. IoT are among the most relevant problems in academia and
Bhalaji et al. [86] suggested a blockchain-depended business today [92]. Current security solutions are not well
method for privacy preservation in Healthcare IoT. The equipped because of the IoT resource limitation aspect.
suggested approach to secure health-related IoT data Blockchain technology is highlighted due to its security
requires a protection framework that can be accomplished features. The blockchain’s decentralized, autonomous, and
by (cryptography-based) privacy preservation techniques trust-less intrinsic characteristics make it an optimal aspect
(algorithms) and blockchain, including privacy preserva- to become a fundamental component of IoT solutions. It
tion and preservation of data integrity. The necessity for a can potentially enhance the IoT sector [93] and notably
more secure, reliable, and feasible framework for the pro- help attain the insight of decentralized and private-by-de-
tection of privacy comes with more details. The recom- sign IoT [94]. The subsequent popular blockchain attri-
mended system utilizes a recently proposed encryption butes, outlined in Fig. 4, make it an appealing technology
algorithm to solve this and protect privacy, encrypting to solve the IoT privacy and security issues listed above
personal and confidential information. The second step that [8].
integrates blockchain to store data collected by the sensor A high portion of investigations performed on IoT
protects the confidentiality of data and helps to discover security and privacy concentrated on supplying security or
any unwanted or unlawful changes to data. privacy. Authors assume that privacy and security are
Alamri et al. [90] recommended a new blockchain-based similarly necessary for a device to be safe. Furthermore,
privacy preservation method for Medical Internet-of- the most important aspect is data privacy that can just be
123
Cluster Computing (2022) 25:2203–2221 2213
Table 3 Comparison of the key factors, advantage and disadvantage of the studies
Papers Year Key factors Advantage Disadvantage
Management data
[65] 2017 IoT Improving security High complexity
Security Improving privacy
Privacy Low computational overhead
Blockchain Low cost
[67] 2019 IoT High accuracy High run time
Security High efficiency
Privacy High security
Blockchain High scalability
[68] 2020 Blockchain Improving correctness Lack of real-time review
IoT Improving privacy
Security Improving dynamics
Privacy Improving public verification
Improving security
[69] 2019 Blockchain High efficiency Failure to run in a real environment
IoT High accuracy
Security High scalability
Privacy
Smart city
Access control
[73] 2017 Bitcoin Solving the problem of centralized and Do not implement in a real environment
Privacy decentralized access control in IoT
Control Providing a stronger and transparent
access control tool
Blockchain
High integrity and security protections
IoT
[74] 2018 Bitcoin Strengthening data privacy Only presents the concepts and modelings
Blockchain High access control Don’t have a focus on realistic experiments to evaluate the performance
Data privacy High data transparency and robustness of the system, especially in terms of latency, throughput,
and stability
IoT Improving access tracking
[75] 2018 IoT Improving data ownership Lack of implementation of the framework in a network IoT
Privacy Improving data transparency
Blockchain Improving the data auditability for
Security users
[8] 2019 IoT Improving edge intelligence Lack of guarantee anonymity for users
Security Improving security
Privacy Improving privacy
Blockchain Improving access control
Smart home
[80] 2017 Blockchain Improving privacy High cost
IoT Improving security High traffic
Security Improving integrity High processing time
Privacy High confidentiality High energy consumption
Smart home High availability
[53] 2019 Blockchain Improving privacy Low success rates
IoT High accuracy
Security
Privacy
Smart home
123
2214 Cluster Computing (2022) 25:2203–2221
Table 3 continued
Papers Year Key factors Advantage Disadvantage
123
Cluster Computing (2022) 25:2203–2221 2215
Table 3 Comparison of the key factors, advantage and disadvantage of the studies
Papers Year Key factors Advantage Disadvantage
[90] 2020 Patients Increasing security Don’t define the access control policy
Privacy Increasing privacy for MIoT in smart contracts
MIoT Increasing ambient intelligence
Blockchain
[91] 2020 Privacy Increasing data protection Don’t implement the model in the real case study
Security Increasing confidentiality
IoT
Skin monitoring
system
Blockchain
123
2216 Cluster Computing (2022) 25:2203–2221
123
Table 4 Important factors identified in studies
Papers Security Privacy Anonymity Dynamics Correctness Energy Overhead Integrity Confiden- Avail- Efficiency Accuracy Cost Scalablility Run Reliability
consumption tiality ability time
Cluster Computing (2022) 25:2203–2221
Management data
[65] Yes Yes No No No No Yes No No No No No Yes No No No
[67] Yes No No No No No No No No No Yes Yes No Yes Yes No
[68] Yes Yes No Yes Yes No No No No No No No No No No No
[69] Yes Yes No No No No No No No No Yes Yes No No No No
Access Control
[73] Yes Yes No No No No No Yes No Yes Yes Yes No No No No
[4] Yes Yes No No Yes No No No No Yes Yes Yes No No No No
[5] Yes Yes No No No No No No Yes No No Yes No No No No
[8] Yes Yes Yes No No No No No No No No No No No No No
Smart home
[80] Yes Yes No No No No No Yes Yes Yes Yes No No No No No
[3] No Yes No No No No No No No No No Yes No No No No
[81] Yes Yes No No No Yes Yes No No No No No No No No No
[77] No Yes No No No No No No No No No Yes No No Yes No
[82] Yes Yes No No No Yes No No No No No No Yes No No No
Smart healthcare
[88] No Yes No No No No No No No No Yes No No No No Yes
[87] Yes Yes No No No Yes No No No No No No Yes Yes No Yes
[89] Yes Yes No No No No No No No Yes Yes No No No No No
[55] Yes Yes No No Yes Yes No Yes Yes Yes No Yes Yes No No No
[86] Yes Yes No No No No No Yes No No Yes Yes No No No No
[90] Yes Yes No No Yes Yes No No No No Yes Yes No No No No
[91] Yes Yes No No No Yes No No Yes No No No No Yes No No
2217
123
2218 Cluster Computing (2022) 25:2203–2221
– Future work can introduce a new distributed and search to some databases-Elsevier, Springer, IGI, emerald,
privacy preservation protocol to be integrated with SAGE, Taylor, Wiley, IEEE library. There may be other
FairAccess [104]. scholarly publications that might have a more compre-
hensive image of the relevant papers. Furthermore, in this
review, non-English publications were excluded. The
advantage of the present research work is to know the
8 Conclusion and limitations
influence of blockchain technology on preserving privacy
in IoT is achieved to a certain extent. In the future, we
A broad description of the various facets of IoT and
would like to concentrate on developing a novel privacy-
blockchain privacy is provided in this article. The consid-
preserving model that applies to the field of IoT.
erations of privacy and security were also included in the
framework of the analysis. This work offers a detailed
blockchain summary. It starts with a summary of block-
chain technology, covering the architecture of blockchain References
and main blockchain functionality. A discussion on
blockchain technology and relevant main technologies is 1. Sengupta, J., Ruj, S., Bit, S.D.: A Comprehensive survey on
performed. Therefore, we have thoroughly checked the attacks, security issues and blockchain solutions for IoT and
past and new papers on IoT and blockchain privacy in this IIoT. J. Netw. Comput. Appl. 149, 102481 (2020)
2. Jahantigh, M.N., Rahmani, A.M., Navimirour, N.J., Rezaee,
paper until Dec-2020. 20 chosen articles were ranked in A.J.I.C.: Integration of Internet of Things and cloud computing:
four types: 4 of them are about management data, 4 of them a systematic survey. IET Commun. 14(2), 165–176 (2019)
are about access control, 5 are about smart homes, and 7 3. Alfandi, O., Khanji, S., Ahmad, L., Khattak, A.: A survey on
are about smart healthcare. boosting IoT security and privacy through blockchain. Clust.
Comput. 25, 1–19 (2020)
The findings revealed that the development of block- 4. Sadrishojaei, M., Navimipour, N.J., Reshadi, M., Hosseinzadeh,
chain technology is hampered by many problems, like data M.: A new preventive routing method based on clustering and
privacy, security, scalability, etc. Several scholars have location prediction in the mobile internet of things. IEEE
accepted in past years that the synthesis of blockchain and Internet Things J. 41, 1–1 (2021)
5. S. Datta, A. K. Das, A. Kumar, and D. Sinha.: Authentication
IoT produces resilient, genuinely distributed peer-to-peer and privacy preservation in IoT based forest fire detection by
networks and the capacity to communicate in a trustless using blockchain: a review. In: International Conference on
and auditable way with peers. In the IoT field, though, few Internet of Things and Connected Technologies, 2019,
suggested solutions have addressed the privacy concern. pp. 133–143: Springer.
6. Pourghebleh, B., Wakil, K., Navimipour, N.J.: A comprehensive
The privacy demands, like consent and preference, intent study on the trust management techniques in the Internet of
definition, and collection restriction, have been less dis- Things. IEEE Internet Things J. 6(6), 9326–9337 (2019)
cussed in the IoT field, despite the rising pressure from the 7. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet
legislation. We have concentrated on privacy experiments of things: Vision, applications and research challenges. Ad Hoc
Netw. 10(7), 1497–1516 (2012)
to protect privacy utilizing blockchain technologies over 8. A. Ouaddah.: A blockchain based access control framework for
the entire IoT data lifecycle for these purposes. There may the security and privacy of IoT with strong anonymity unlink-
be some important security and applicability challenges ability and intractability guarantees. In: Advances in Computers,
when incorporating blockchain into IoT networks along- 115: Elsevier, 2019, pp. 211–258.
9. Borgia, E.: The Internet of Things vision: key features, appli-
side technology’s pervasive development. This study ana- cations and open issues. Comput. Commun. 54, 1–31 (2014)
lyzes IoT security specifications to detect potential security 10. Ghanbari, Z., Navimipour, N.J., Hosseinzadeh, M., Darwesh, A.:
and privacy weaknesses and minimize those threats by Resource allocation mechanisms and approaches on the Internet
implementing blockchain technologies. Our results showed of Things. Clust. Comput. 22(4), 1253–1282 (2019)
11. S. Fan, L. Song, and C. Sang.: Research on privacy protection in
that numerous technologies such as smart homes, smart IoT system based on blockchain. In: International Conference on
cities, healthcare systems, intelligent transportation sys- Smart Blockchain, 2019, pp. 1–10: Springer.
tems, supply chain systems, and agriculture fields are 12. D. P. Augustine and P. Raj.: Blockchain and IoT security. In:
introduced using IoT techniques. The development of Blockchain Technology and Applications: Auerbach Publica-
tions, 2020, pp. 51–64.
intelligent devices with wireless networking, storage space, 13. C. Ge, Z. Liu, and L. Fang. A blockchain based decentralized
and some computing power enables these devices to be data security mechanism for the Internet of Things. J. Parall. and
used real-time. Albeit, to a different degree, the IoT device Distributed Computing, 2020.
has security and privacy issues. 14. Vardhana, M., Arunkumar, N., Abdulhay, E., Vishnuprasad, P.:
Iot based real time trafic control using cloud computing. Clust.
Several restrictions appeared in the present investiga- Comput. 22(1), 2495–2504 (2019)
tion. The results of the current research should be assessed 15. Kim, H.-Y., Kim, J.-M.: A load balancing scheme based on
in light of its limitations. The present study restricted the deep-learning in IoT. Clust. Comput. 20(1), 873–878 (2017)
123
Cluster Computing (2022) 25:2203–2221 2219
16. A. Lamba, S. Singh, S. Balvinder, N. Dutta, and S. Rela.: Mit- authentication mechanism for IoT systems. Clust. Comput. 73,
igating IoT security and privacy challenges using distributed 1–21 (2020)
ledger based blockchain (Dl-BC) technology. Int. J. Technol. 36. I. A. Ridhawi, M. Aloqaily, and Y. Jararweh.: an incentive-
Res. Eng., 4(8), 2017. based mechanism for volunteer computing using blockchain.
17. Elhabob, R., Zhao, Y., Eltayieb, N., Abdelgader, A.M., Xiong, arXiv preprint arXiv:2009.11901, (2020)
H.: Identity-based encryption with authorized equivalence test 37. I. Al Ridhawi, M. Aloqaily, A. Boukerche, and Y. Jaraweh.: A
for cloud-assisted IoT. Clust. Comput. 23(2), 1085–1101 (2020) Blockchain-based decentralized composition solution for IoT
18 Azad, P., Navimipour, N.J., Rahmani, A.M., Sharifi, A.: The services. In: ICC 2020–2020 IEEE International Conference on
role of structured and unstructured data managing mechanisms Communications (ICC), 2020, pp. 1–6: IEEE
in the Internet of things. Clust. Comput. 10, 1–14 (2019) 38. H. F. Atlam and G. B. Wills.: IoT security, privacy, safety and
19. S. Nakamoto and A. Bitcoin.: A peer-to-peer electronic cash ethics. In: Digital Twin Technologies and Smart Cities:
system. Bitcoin. URL: https://bitcoin.org/bitcoin.pdf, vol. 4, Springer, 2020, pp. 123–149.
2008. 39. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar,
20. Hassan, M.U., Rehmani, M.H., Chen, J.: Privacy preservation in B.: A survey on IoT security: application areas, security threats,
blockchain based IoT systems: integration issues, prospects, and solution architectures. IEEE Access 7, 82721–82743 (2019)
challenges, and future research directions. Futur. Gener. Com- 40. F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain.: Machine
put. Syst. 97, 512–529 (2019) learning in IoT security: current solutions and future challenges.
21. A. Pouraghily, M. N. Islam, S. Kundu, and T. Wolf.: Privacy in IEEE Communications Surveys & Tutorials, (2020)
blockchain-enabled iot devices. In: 2018 IEEE/ACM Third 41. Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Far-
International Conference on Internet-of-Things Design and uki, P.: Network intrusion detection for IoT security based on
Implementation (IoTDI), 2018, pp. 292–293: IEEE. learning techniques. IEEE Commun. Surv. Tutor. 21(3),
22. Verma, V.K.: Blockchain technology: systematic review of 2671–2701 (2019)
security and privacy problems and its scope with Internet of 42. Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge
Things (IoT). J. Netw. Secur. 7(1), 24–28 (2019) computing-based designs for iot security. Digit. Commun. Netw.
23. Alotaibi, B.: Utilizing blockchain to overcome cyber security 6(2), 195–202 (2020)
concerns in the internet of things: a review. IEEE Sens. J. 43. Hassan, W.H.: Current research on Internet of Things (IoT)
19(23), 10953–10971 (2019) security: a survey. Comput. Netw. 148, 283–294 (2019)
24. Ferrag, M.A., Shu, L., Yang, X., Derhab, A., Maglaras, L.: 44. O. Alfandi, S. Otoum, and Y. Jararweh.: Blockchain solution for
Security and privacy for green IoT-based agriculture: review, IoT-based critical infrastructures: byzantine fault tolerance. In:
blockchain solutions, and challenges. IEEE Access 8, NOMS 2020–2020 IEEE/IFIP network operations and man-
32031–32053 (2020) agement symposium, 2020, pp. 1–4: IEEE.
25. Mistry, I., Tanwar, S., Tyagi, S., Kumar, N.: Blockchain for 5G- 45. Opara, E.U., Soluade, O.A.: Straddling the next cyber frontier:
enabled IoT for industrial automation: a systematic review, The empirical analysis on network security, exploits, and vul-
solutions, and challenges. Mech. Syst. Signal Process. 135, nerabilities. Int. J. Electron. Inform. Eng. 3(1), 10–18 (2015)
106382 (2020) 46. Chen, Q., Srivastava, G., Parizi, R.M., Aloqaily, M., Al Rid-
26. Tseng, L., Yao, X., Otoum, S., Aloqaily, M., Jararweh, Y.: hawi, I.: An incentive-aware blockchain-based solution for
Blockchain-based database in an IoT environment: challenges, internet of fake media things. Inform. Process. Manag. 57(6),
opportunities, and analysis. Clust. Comput. 23(3), 2151–2165 102370 (2020)
(2020) 47. Dehghani, M., et al.: Blockchain-based securing of data
27. Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure exchange in a power transmission system considering conges-
communication protocols for the Internet of Things. Ad Hoc tion management and social welfare. Sustainability 13(1), 90
Netw. 32, 17–31 (2015) (2021)
28. H. Li, L. Pei, D. Liao, X. Wang, D. Xu, and J. Sun.: BDDT: use 48. Dehghani, M., et al.: Blockchain-based securing of data
blockchain to facilitate IoT data transactions. Clust. Comput. exchange in a power transmission system considering conges-
J. Netw. Softw. Tools Appl. (2020) tion management and social welfare. Sustainability 13(1), 1–1
29. Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet (2020)
of Things security: a survey. J. Netw. Comput. Appl. 88, 10–28 49. O. Bouachir, M. Aloqaily, L. Tesng, and A. Boukerche.:
(2017) Blockchain and fog computing for cyber-physical systems: case
30 Pavithran, D., Shaalan, K., Al-Karaki, J.N., Gawanmeh, A.: of smart industry. arXiv preprint arXiv:2005.12834, (2020)
Towards building a blockchain framework for IoT. Clust. 50. Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future for
Comput. 5, 1–15 (2020) internet of things security: a position paper. Digital Commun.
31. Ammar, M., Russello, G., Crispo, B.: Internet of Things: a Netw. 4(3), 149–160 (2018)
survey on the security of IoT frameworks. J. Inform. Secur. 51. B. K. Mohanta, U. Satapathy, S. S. Panda, and D. Jena.: A novel
Appl. 38, 8–27 (2018) approach to solve security and privacy issues for IoT applica-
32. Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of tions using blockchain. In: 2019 International Conference on
things: a survey of existing protocols and open research issues. Information Technology (ICIT), 2019, pp. 394–399: IEEE
IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015) 52. Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network
33. Altaf, A., Abbas, H., Iqbal, F., Derhab, A.: Trust models of intrusion detection for IoT system based on transfer learning
internet of smart things: a survey, open issues, and future algorithm. Clust. Comput. 22(4), 9889–9904 (2019)
directions. J. Netw. Comput. Appl. 137, 93–111 (2019) 53. A. Dorri, C. Roulin, R. Jurdak, and S. S. Kanhere.: On the
34. Khan, M.A., Salah, K.: IoT security: review, blockchain solu- activity privacy of blockchain for IoT. In: 2019 IEEE 44th
tions, and open challenges. Futur. Gener. Comput. Syst. 82, Conference on Local Computer Networks (LCN), 2019,
395–411 (2018) pp. 258–261: IEEE
35 Khalid, U., Asim, M., Baker, T., Hung, P.C., Tariq, M.A., 54. Ma, M., Shi, G., Li, F.: Privacy-oriented blockchain-based dis-
Rafferty, L.: A decentralized lightweight blockchain-based tributed key management architecture for hierarchical access
control in the IoT scenario. IEEE Access 7, 34045–34059 (2019)
123
2220 Cluster Computing (2022) 25:2203–2221
55. G. Srivastava, R. M. Parizi, A. Dehghantanha, and K.-K. blockchain technology in IoT. In: Europe and MENA Cooper-
R. Choo.: Data sharing and privacy for patient IoT devices using ation Advances in Information and Communication Technolo-
blockchain. In: International Conference on Smart City and gies: Springer, 2017, pp. 523–533.
Informatization, 2019, pp. 334–348: Springer. 74. T. D. Nguyen, H.-A. Pham, and M. T. Thai.: Leveraging
56. Y. Charband and N. J. Navimipour.: Knowledge sharing blockchain to enhance data privacy in iot-based applications. In:
mechanisms in the education: a systematic review of the state of International Conference on Computational Social Networks,
the art literature and recommendations for future research. Ky- 2018, pp. 211–221: Springer
bernetes, 2018. 75. F. Loukil, C. Ghedira-Guegan, K. Boukadi, and A. N. Ben-
57. Hajiali, M.: Big data and sentiment analysis: a comprehensive harkat.: Towards an end-to-end IoT data privacy-preserving
and systematic literature review. Concurr. Comput. Pract. Exper. framework using blockchain technology. In: International Con-
32(14), e5671 (2020) ference on Web Information Systems Engineering, 2018,
58. Aromataris, E., Pearson, A.: The systematic review: an over- pp. 68–78: Springer
view. AJN Am. J. Nurs. 114(3), 53–58 (2014) 76. M. Aloqaily, O. Bouachir, A. Boukerche, and I. A. Ridhawi.:
59. Masnoon, N., Shakib, S., Kalisch-Ellett, L., Caughey, G.E.: Design guidelines for blockchain-assisted 5G-UAV networks.
What is polypharmacy? A systematic review of definitions. arXiv preprint arXiv:2007.15286, (2020)
BMC Geriatr. 17(1), 230 (2017) 77. Y. Zhao et al. (2020) Privacy-preserving blockchain-based
60. Heidari, A., Jabraeil Jamali, M.A., Jafari Navimipour, N., federated learning for IoT devices. IEEE Internet Things J.
Akbarpour, S.J.I.J.O.C.S.: ’’Internet of things offloading: ongo- 78. Stojkoska, B.L.R., Trivodaliev, K.V.: A review of Internet of
ing issues, opportunities, and future challenges. J. Commun. Things for smart home: challenges and solutions. J. Clean. Prod.
Syst, 33(14), 4474 (2020) 140, 1454–1464 (2017)
61. Munn, Z., Porritt, K., Lockwood, C., Aromataris, E., Pearson, 79. V. Sivaraman, D. Chan, D. Earl, and R. Boreli.: Smart-phones
A.: Establishing confidence in the output of qualitative research attacking smart-homes. In Proceedings of the 9th ACM Con-
synthesis: the ConQual approach. BMC Med. Res. Methodol. ference on Security & Privacy in Wireless and Mobile Net-
14(1), 1–7 (2014) works, 2016, pp. 195–200.
62. Munn, Z., Peters, M.D., Stern, C., Tufanaru, C., McArthur, A., 80. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram.:
Aromataris, E.: Systematic review or scoping review? Guidance Blockchain for IoT security and privacy: The case study of a
for authors when choosing between a systematic or scoping smart home. In 2017 IEEE international conference on pervasive
review approach. BMC Med. Res. Methodol. 18(1), 143 (2018) computing and communications workshops (PerCom work-
63. Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues shops), 2017, pp. 618–623: IEEE
and challenges. IJ Netw. Secur. 19(5), 653–659 (2017) 81. Mohanty, S.N., et al.: An efficient lightweight integrated
64. B. K. Mohanta, D. Jena, S. Ramasubbareddy, M. Daneshmand, blockchain (ELIB) model for IoT security and privacy. Futur.
and A. H. Gandomi.: Addressing security and privacy issues of Gener. Comput. Syst. 102, 1027–1037 (2020)
IoT using blockchain technology. IEEE Internet Things J. 82. M. N. Islam and S. Kundu.: IoT security, privacy and trust in
(2020). home-sharing economy via blockchain. In Blockchain Cyber-
65. Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and security, Trust and Privacy: Springer, 2020, pp. 33–50
A. Kondoz.: Privacy-preserving blockchain based IoT ecosys- 83. G. Tripathi, M. A. Ahad, and S. Paiva.: S2HS-A blockchain
tem using attribute-based encryption. In: 2017 IEEE Interna- based approach for smart healthcare system. In: Healthcare,
tional Conference on Advanced Networks and 2020, 8(1), 100391: Elsevier
Telecommunications Systems (ANTS), 2017, pp. 1–6: IEEE. 84. S. Chakraborty, S. Aich, and H.-C. Kim.: A secure healthcare
66. A. Erdem, S. Ö. Yildirim, and P. Angin.: Blockchain for system design framework using blockchain technology. In: 2019
ensuring security, privacy, and trust in IoT environments: the 21st International Conference on Advanced Communication
state of the art. In: Security, privacy and trust in the IoT envi- Technology (ICACT), 2019, pp. 260–264: IEEE
ronment: Springer, 2019, pp. 97–122. 85. J. Qiu, X. Liang, S. Shetty, and D. Bowden.: Towards secure and
67. Lu, Y., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain smart healthcare in smart cities using blockchain. In: 2018 IEEE
and federated learning for privacy-preserved data sharing in International Smart Cities Conference (ISC2), 2018, pp. 1–4:
industrial IoT. IEEE Trans. Industr. Inf. 16(6), 4177–4186 IEEE
(2019) 86. N. Bhalaji, P. Abilashkumar, and S. Aboorva.: A Blockchain
68. Zhao, Q., Chen, S., Liu, Z., Baker, T., Zhang, Y.: Blockchain- based approach for privacy preservation in healthcare IoT. In:
based privacy-preserving remote data integrity checking International Conference on Intelligent Computing and Com-
scheme for IoT information systems. Inf. Process. Manage. munication Technologies, 2019, pp. 465–473: Springer.
57(6), 102355 (2020) 87. K. Azbeg, O. Ouchetto, S. J. Andaloussi, L. Fetjah, and A.
69. Shen, M., Tang, X., Zhu, L., Du, X., Guizani, M.: Privacy- Sekkaki.: Blockchain and IoT for security and privacy: a plat-
preserving support vector machine training over blockchain- form for diabetes self-management. In: 2018 4th International
based encrypted IoT data in smart cities. IEEE Internet Things J. Conference on Cloud Computing Technologies and Applica-
6(5), 7702–7712 (2019) tions (Cloudtech), 2018, pp. 1–5: IEEE
70. B. Krebs.: Hacked cameras, DVRs powered today’s massive 88. D.-P. Le, H. Meng, L. Su, S. L. Yeo, and V. Thing.: Biff: A
internet outage. Krebs on Security, 2016. blockchain-based IoT forensics framework with identity pri-
71. O. J. A. Pinno, A. R. A. Gregio, and L. C. De Bona.: Con- vacy. In TENCON 2018–2018 IEEE Region 10 Conference,
trolchain: blockchain as a central enabler for access control 2018, pp. 2372–2377: IEEE
authorizations in the IoT. In: Globecom 2017–2017 IEEE Glo- 89. Shen, M., Deng, Y., Zhu, L., Du, X., Guizani, N.: Privacy-
bal Communications Conference, 2017, pp. 1–6: IEEE preserving image retrieval for medical IoT systems: a block-
72 Ouaddah, A., Mousannif, H., AbouElkalam, A., Ouahman, A.A.: chain-based approach. IEEE Netw. 33(5), 27–33 (2019)
Access control in the Internet of Things: Big challenges and new 90. B. Alamri, I. T. Javed, and T. Margaria.: Preserving patients’
opportunities. Comput. Netw. 112, 237–262 (2017) privacy in medical IoT using blockchain. In: International
73. A. Ouaddah, A. AbouElkalam, and A. A. Ouahman.: Towards a Conference on Edge Computing, 2020, pp. 103–110: Springer
novel privacy-preserving access control model based on
123
Cluster Computing (2022) 25:2203–2221 2221
91. S. Juyal, S. Sharma, A. Harbola, and A. S. Shukla.: Privacy and hydrogen storage-based intelligent parking lot of electric vehi-
security of IoT based skin monitoring system using blockchain cles. J. Energy Storage 27, 101057 (2020)
approach. In: 2020 IEEE International Conference on Elec- 104. A. Ouaddah, A. Abou El Kalam, and A. A. Ouahman.: Har-
tronics, Computing and Communication Technologies (CON- nessing the power of blockchain technology to solve IoT secu-
ECCT), 2020, pp. 1–5: IEEE rity & privacy issues. In: ICC, 2017, pp. 7:1–7:10.
92. C. Patel.: IoT privacy preservation using blockchain. (2019)
93. Christidis, K., Devetsikiotis, M.: Blockchains and smart con- Publisher’s Note Springer Nature remains neutral with regard to
tracts for the internet of things. IEEE Access 4, 2292–2303 jurisdictional claims in published maps and institutional affiliations.
(2016)
94. Taylor, P.J., Dargahi, T., Dehghantanha, A., Parizi, R.M., Choo,
K.-K.R.: A systematic literature review of blockchain cyber
Wenbing Lianga received his
security. Digit Commun. Netw 6(2), 147–156 (2020)
master degree in economics. He
95. N. Waheed, X. He, and M. Usman.: Security & privacy in IoT
is a teacher of business admin-
using machine learning & blockchain: Threats & Countermea-
istration department in ShanXi
sures. arXivpreprint arXiv:2002.03488, 2020.
International Business Voca-
96. Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F.,
tional College, China. His
Rehmani, M.H.: Applications of blockchains in the Internet of
research interests include eco-
Things: a comprehensive survey. IEEE Commun. Surv. Tutor.
nomic development and finance.
21(2), 1676–1717 (2018)
Many papers and two mono-
97. C. S. Kouzinopoulos et al.: Using blockchains to strengthen the
graphs have been published by
security of internet of things. In: International ISCIS Security
him.
Workshop, 2018, pp. 90–100: Springer, Cham
98. Shahzad, A., Zhang, K., Gherbi, A.: Intuitive development to
examine collaborative IoT supply chain system underlying pri-
vacy and security levels and perspective powering through
proactive blockchain. Sensors 20(13), 3760 (2020)
99. C. Yu, Y. Leng, J. Li, and J. Yu.: Blockchain crowdfunding Nan Ji was graduated at Wei-
projects evaluation using GRA-TOPSIS. Kybernetes, 2020. fang Technical University,
100. O. Mounnan, A. El Mouatasim, O. Manad, T. Hidar, A. Abou El Weifang, China. Now, he is
Kalam, and N. Idboufker.: Privacy-aware and authentication working on network security
based on blockchain with fault tolerance for IoT enabled fog and social media. Internet of
computing. In: 2020 Fifth International Conference on Fog and things and cloud computing are
Mobile Edge Computing (FMEC), 2020, pp. 347–352: IEEE other research fileds of him. He
101. A. H. Alkhazaali and A. Oğuz.: Lightweight fog based solution published many papers in these
for privacy-preserving in IoT using blockchain. In: 2020 Inter- domains.
national Congress on Human-Computer Interaction, Optimiza-
tion and Robotic Applications (HORA), 2020, pp. 1–10: IEEE
102. Bagal, H.A., Soltanabad, Y.N., Dadjuo, M., Wakil, K., Ghadimi,
N.: Risk-assessment of photovoltaic-wind-battery-grid based
large industrial consumer using information gap decision theory.
Sol. Energy 169, 343–352 (2018)
103. Liu, J., Chen, C., Liu, Z., Jermsittiparsert, K., Ghadimi, N.: An
IGDT-based risk-involved optimal bidding strategy for
123