Abstract
Given the distinguishing features mentioned earlier, blockchain has taken the world by storm in the last decade for its ability to innovate existing applications, especially IoT application. A blockchain-enabled IoT application can establish a distributed and tamper-resistant ledger, audit previous transactions, and provide partial anonymity. Although blockchain has been identified as a key platform-enabling technology and it is embracing a peak of development, more research efforts must be put into building future blockchain-enabled IoT application systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Gai, M. Qiu, S. Jayaraman, L. Tao, Ontology-based knowledge representation for secure self-diagnosis in patient-centered teleheath with cloud systems, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 98–103
N. Szabo, Formalizing and securing relationships on public networks. First Monday 2(9) (1997)
C. Dwork, Differential privacy, in Proceedings of the 33th International Colloquium on Automata, Languages, and Programming (ICALP), vol. 4052 (2006), pp. 1–12
H.T. Vo, A. Kundu, M. Mohania, Research directions in blockchain data management and analytics (2018). Available: https://openproceedings.org/2018/conf/edbt/paper-227.pdf
R. Bost, R.A. Popa, S. Tu, S. Goldwasserm, Machine learning classification over eEncrypted data, in Proceedings of the Network and Distributed System Security (NDSS) Symposium (2015), pp. 331–344
W. Liu, J. He, M. Li, R. Jin, Z. Zhang, An efficient supervised energy disaggregation scheme for power service in smart grid. Intell. Autom. Soft Comput. PP(99), 1–10 (2018)
L. Zhu, M. Li, Z. Zhang, X. Du, M. Guizani, Big data mining of users’ energy consumption pattern in wireless smart grid. IEEE Wirel. Commun. 25(1), 84–89 (2018)
S. Bi, R. Zhang, Z. Ding, S. Cui, Wireless communications in the era of big data. IEEE Commun. Mag. 53(10), 190–199 (2015)
Y. Li, K. Liang, X. Tang, K. Gai, Cloud-based adaptive particle swarm optimization for waveband selection in big data. J. Signal Process. Syst. 90(8–9), 1105–1113 (2018)
A.L. Steenkamp, A. Alawdah, O. Almasri, K. Gai, N. Khattab, C. Swaby, R. Abaas, Teaching case enterprise architecture specification case study. J. Inf. Syst. Educ. 24(2), 105 (2013)
R. DeStefano, L. Tao, K. Gai, Improving data governance in large organizations through ontology and linked data, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 279–284
S. Khan, Z. Zhang, L. Zhu, M. Li, Q.G.K. Safi, X. Chen, Accountable and transparent TLS certificate management: an alternate public-key infrastructure (PKI) with verifiable trusted parties. Secur. Commun. Netw. 2018(8527010), 1–16 (2018)
A. Miller, A. Juels, E. Shi, B. Parno, J. Katz, Permacoin repurposing bitcoin work for data preservation, in Proceedings of the IEEE Symposium on Security and Privacy (S&P) (2014), pp. 475–490
A massive amount of storage sits unused in data centers and hard drives around the world (2019). Available: https://filecoin.io
R. Lu, X. Lin, Z. Shi, X. Shen, A lightweight conditional privacy-preservation protocol for vehicular traffic-monitoring systems. IEEE Intell. Syst. 28(3), 62–65 (2013)
M. Sharples, J. Domingue, The blockchain and kudos: a distributed system for educational record, reputation and reward, in Proceedings of the European Conference on Technology Enhanced Learning (2016), pp. 490–496
X. Tang, C. Wang, X. Yuan, Q. Wang, Non-interactive privacy-preserving truth discovery in crowd sensing applications, in IEEE Conference on Computer Communications (INFOCOM) (2018), pp. 1–9
K. Gai, Z. Du, M. Qiu, H. Zhao, Efficiency-aware workload optimizations of heterogeneous cloud computing for capacity planning in financial industry, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 1–6
K. Gai, M. Qiu, H. Hassan, Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing. Concurrency Comput. Pract. Experience 29(7), e3856 (2017)
H. Jean-Baptiste, M. Qiu, K. Gai, L. Tao, Model risk management systems-back-end, middleware, front-end and analytics, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 312–316
X. Yu, T. Pei, K. Gai, L. Guo, Analysis on urban collective call behavior to earthquake, in IEEE 17th International Conference on High Performance Computing and Communications (HPCC) (IEEE, Piscataway, 2015), pp. 1302–1307
K. Gai, M. Qiu, M. Liu, H. Zhao, Smart resource allocation using reinforcement learning in content-centric cyber-physical systems, in International Conference on Smart Computing and Communication (Springer, Berlin, 2017), pp. 39–52
J. Dean, S. Ghemawat, MapReduce: simplified data processing on large clusters, in Proceedings of the 11th USENIX Symposium on Operating System Design and Implementation (OSDI) (2004), pp. 1–13
M. Qiu, K. Gai, B. Thuraisingham, L. Tao, H. Zhao, Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Futur. Gener. Comput. Syst. 80, 421–429, (2018)
A. Ouaddah, A.A. Elkalam, A.A. Ouahman, Towards a novel privacy-preserving access control model based on blockchain technology in IoT, in Proceedings of the Europe and MENA Cooperation Advances in Information and Communication Technologies (2017), pp. 523–533
Ethereum Smart Contract Best Practices - Known Attacks (2016). Available: https://consensys.github.io/smart-contract-best-practices/known_attacks
G. Ateniese, B. Magri, D. Venturi, E. Andrade, Redactable blockchain - or -rewriting history in bitcoin and friends, in Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P) (2017), pp. 1–9
K. Gai, M. Qiu, S.A. Elnagdy, Security-aware information classifications using supervised learning for cloud-based cyber risk management in financial big data, in IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity) (IEEE, Piscataway, 2016), pp. 197–202
K. Gai, M. Qiu, Reinforcement learning-based content-centric services in mobile sensing. IEEE Netw. 32(4), 34–39 (2018)
Y. Li, K. Liang, X. Tang, K. Gai, Waveband selection based feature extraction using genetic algorithm, in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2017), pp. 223–227
K. Gai, M. Qiu, Optimal resource allocation using reinforcement learning for IoT content-centric services. Appl. Soft Comput. 70, 12–21 (2018)
S. Li, A. Leider, M. Qiu, K. Gai, M. Liu, Brain-based computer interfaces in virtual reality, in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2017), pp. 300–305
Z. Zhang, M. Li, L. Zhu, X. Li, SmartDetect: a smart detection scheme for malicious web shell codes via ensemble learning, in Proceedings of the 3rd International Conference on Smart Computing and Communication, Dec 2018, Best Paper Award
Y. Li, K. Gai, Z. Ming, H. Zhao, M. Qiu, Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. 12(4s), 67 (2016)
M. Qiu, K. Gai, Z. Xiong, Privacy-preserving wireless communications using bipartite matching in social big data. Futur. Gener. Comput. Syst. 87, 772–781 (2018)
H. Zhao, K. Gai, J. Li, X. He, Novel differential schema for high performance big data telehealth systems using pre-cache, in IEEE 17th International Conference on High Performance Computing and Communications (HPCC) (IEEE, Piscataway, 2015), pp. 1412–1417
H. Zhao, M. Qiu, M. Chen, K. Gai, Cost-aware optimal data allocations for multiple dimensional heterogeneous memories using dynamic programming in big data. J. Comput. Sci. 26, 402–408 (2018)
M. Qiu, W. Dai, K. Gai, Mobile Applications Development with Android: Technologies and Algorithms (Chapman and Hall/CRC, Boca Raton, 2016)
K. Gai, M. Qiu, M. Liu, Z. Xiong, In-memory big data analytics under space constraints using dynamic programming. Futur. Gener. Comput. Syst. 83, 219–227 (2018)
H. Jean-Baptiste, M. Qiu, K. Gai, L. Tao, Meta meta-analytics for risk forecast using big data meta-regression in financial industry, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 272–277
S. Jayaraman, L. Tao, K. Gai, N. Jiang, Drug side effects data representation and full spectrum inferencing using knowledge graphs in intelligent telehealth, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 289–294
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Zhu, L., Gai, K., Li, M. (2019). Exploring Topics in Blockchain-Enabled Internet of Things. In: Blockchain Technology in Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-21766-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-21766-2_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21765-5
Online ISBN: 978-3-030-21766-2
eBook Packages: Computer ScienceComputer Science (R0)