Skip to main content

Exploring Topics in Blockchain-Enabled Internet of Things

  • Chapter
  • First Online:
Blockchain Technology in Internet of Things

Abstract

Given the distinguishing features mentioned earlier, blockchain has taken the world by storm in the last decade for its ability to innovate existing applications, especially IoT application. A blockchain-enabled IoT application can establish a distributed and tamper-resistant ledger, audit previous transactions, and provide partial anonymity. Although blockchain has been identified as a key platform-enabling technology and it is embracing a peak of development, more research efforts must be put into building future blockchain-enabled IoT application systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Gai, M. Qiu, S. Jayaraman, L. Tao, Ontology-based knowledge representation for secure self-diagnosis in patient-centered teleheath with cloud systems, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 98–103

    Book  Google Scholar 

  2. N. Szabo, Formalizing and securing relationships on public networks. First Monday 2(9) (1997)

    Google Scholar 

  3. C. Dwork, Differential privacy, in Proceedings of the 33th International Colloquium on Automata, Languages, and Programming (ICALP), vol. 4052 (2006), pp. 1–12

    Google Scholar 

  4. H.T. Vo, A. Kundu, M. Mohania, Research directions in blockchain data management and analytics (2018). Available: https://openproceedings.org/2018/conf/edbt/paper-227.pdf

  5. R. Bost, R.A. Popa, S. Tu, S. Goldwasserm, Machine learning classification over eEncrypted data, in Proceedings of the Network and Distributed System Security (NDSS) Symposium (2015), pp. 331–344

    Google Scholar 

  6. W. Liu, J. He, M. Li, R. Jin, Z. Zhang, An efficient supervised energy disaggregation scheme for power service in smart grid. Intell. Autom. Soft Comput. PP(99), 1–10 (2018)

    Google Scholar 

  7. L. Zhu, M. Li, Z. Zhang, X. Du, M. Guizani, Big data mining of users’ energy consumption pattern in wireless smart grid. IEEE Wirel. Commun. 25(1), 84–89 (2018)

    Article  Google Scholar 

  8. S. Bi, R. Zhang, Z. Ding, S. Cui, Wireless communications in the era of big data. IEEE Commun. Mag. 53(10), 190–199 (2015)

    Article  Google Scholar 

  9. Y. Li, K. Liang, X. Tang, K. Gai, Cloud-based adaptive particle swarm optimization for waveband selection in big data. J. Signal Process. Syst. 90(8–9), 1105–1113 (2018)

    Article  Google Scholar 

  10. A.L. Steenkamp, A. Alawdah, O. Almasri, K. Gai, N. Khattab, C. Swaby, R. Abaas, Teaching case enterprise architecture specification case study. J. Inf. Syst. Educ. 24(2), 105 (2013)

    Google Scholar 

  11. R. DeStefano, L. Tao, K. Gai, Improving data governance in large organizations through ontology and linked data, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 279–284

    Book  Google Scholar 

  12. S. Khan, Z. Zhang, L. Zhu, M. Li, Q.G.K. Safi, X. Chen, Accountable and transparent TLS certificate management: an alternate public-key infrastructure (PKI) with verifiable trusted parties. Secur. Commun. Netw. 2018(8527010), 1–16 (2018)

    Article  Google Scholar 

  13. A. Miller, A. Juels, E. Shi, B. Parno, J. Katz, Permacoin repurposing bitcoin work for data preservation, in Proceedings of the IEEE Symposium on Security and Privacy (S&P) (2014), pp. 475–490

    Google Scholar 

  14. A massive amount of storage sits unused in data centers and hard drives around the world (2019). Available: https://filecoin.io

  15. R. Lu, X. Lin, Z. Shi, X. Shen, A lightweight conditional privacy-preservation protocol for vehicular traffic-monitoring systems. IEEE Intell. Syst. 28(3), 62–65 (2013)

    Article  Google Scholar 

  16. M. Sharples, J. Domingue, The blockchain and kudos: a distributed system for educational record, reputation and reward, in Proceedings of the European Conference on Technology Enhanced Learning (2016), pp. 490–496

    Google Scholar 

  17. X. Tang, C. Wang, X. Yuan, Q. Wang, Non-interactive privacy-preserving truth discovery in crowd sensing applications, in IEEE Conference on Computer Communications (INFOCOM) (2018), pp. 1–9

    Google Scholar 

  18. K. Gai, Z. Du, M. Qiu, H. Zhao, Efficiency-aware workload optimizations of heterogeneous cloud computing for capacity planning in financial industry, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 1–6

    Google Scholar 

  19. K. Gai, M. Qiu, H. Hassan, Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing. Concurrency Comput. Pract. Experience 29(7), e3856 (2017)

    Article  Google Scholar 

  20. H. Jean-Baptiste, M. Qiu, K. Gai, L. Tao, Model risk management systems-back-end, middleware, front-end and analytics, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 312–316

    Book  Google Scholar 

  21. X. Yu, T. Pei, K. Gai, L. Guo, Analysis on urban collective call behavior to earthquake, in IEEE 17th International Conference on High Performance Computing and Communications (HPCC) (IEEE, Piscataway, 2015), pp. 1302–1307

    Google Scholar 

  22. K. Gai, M. Qiu, M. Liu, H. Zhao, Smart resource allocation using reinforcement learning in content-centric cyber-physical systems, in International Conference on Smart Computing and Communication (Springer, Berlin, 2017), pp. 39–52

    Google Scholar 

  23. J. Dean, S. Ghemawat, MapReduce: simplified data processing on large clusters, in Proceedings of the 11th USENIX Symposium on Operating System Design and Implementation (OSDI) (2004), pp. 1–13

    Google Scholar 

  24. M. Qiu, K. Gai, B. Thuraisingham, L. Tao, H. Zhao, Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Futur. Gener. Comput. Syst. 80, 421–429, (2018)

    Article  Google Scholar 

  25. A. Ouaddah, A.A. Elkalam, A.A. Ouahman, Towards a novel privacy-preserving access control model based on blockchain technology in IoT, in Proceedings of the Europe and MENA Cooperation Advances in Information and Communication Technologies (2017), pp. 523–533

    Google Scholar 

  26. Ethereum Smart Contract Best Practices - Known Attacks (2016). Available: https://consensys.github.io/smart-contract-best-practices/known_attacks

  27. G. Ateniese, B. Magri, D. Venturi, E. Andrade, Redactable blockchain - or -rewriting history in bitcoin and friends, in Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P) (2017), pp. 1–9

    Google Scholar 

  28. K. Gai, M. Qiu, S.A. Elnagdy, Security-aware information classifications using supervised learning for cloud-based cyber risk management in financial big data, in IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity) (IEEE, Piscataway, 2016), pp. 197–202

    Google Scholar 

  29. K. Gai, M. Qiu, Reinforcement learning-based content-centric services in mobile sensing. IEEE Netw. 32(4), 34–39 (2018)

    Article  Google Scholar 

  30. Y. Li, K. Liang, X. Tang, K. Gai, Waveband selection based feature extraction using genetic algorithm, in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2017), pp. 223–227

    Book  Google Scholar 

  31. K. Gai, M. Qiu, Optimal resource allocation using reinforcement learning for IoT content-centric services. Appl. Soft Comput. 70, 12–21 (2018)

    Article  Google Scholar 

  32. S. Li, A. Leider, M. Qiu, K. Gai, M. Liu, Brain-based computer interfaces in virtual reality, in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2017), pp. 300–305

    Google Scholar 

  33. Z. Zhang, M. Li, L. Zhu, X. Li, SmartDetect: a smart detection scheme for malicious web shell codes via ensemble learning, in Proceedings of the 3rd International Conference on Smart Computing and Communication, Dec 2018, Best Paper Award

    Google Scholar 

  34. Y. Li, K. Gai, Z. Ming, H. Zhao, M. Qiu, Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. 12(4s), 67 (2016)

    Google Scholar 

  35. M. Qiu, K. Gai, Z. Xiong, Privacy-preserving wireless communications using bipartite matching in social big data. Futur. Gener. Comput. Syst. 87, 772–781 (2018)

    Article  Google Scholar 

  36. H. Zhao, K. Gai, J. Li, X. He, Novel differential schema for high performance big data telehealth systems using pre-cache, in IEEE 17th International Conference on High Performance Computing and Communications (HPCC) (IEEE, Piscataway, 2015), pp. 1412–1417

    Google Scholar 

  37. H. Zhao, M. Qiu, M. Chen, K. Gai, Cost-aware optimal data allocations for multiple dimensional heterogeneous memories using dynamic programming in big data. J. Comput. Sci. 26, 402–408 (2018)

    Article  Google Scholar 

  38. M. Qiu, W. Dai, K. Gai, Mobile Applications Development with Android: Technologies and Algorithms (Chapman and Hall/CRC, Boca Raton, 2016)

    Book  Google Scholar 

  39. K. Gai, M. Qiu, M. Liu, Z. Xiong, In-memory big data analytics under space constraints using dynamic programming. Futur. Gener. Comput. Syst. 83, 219–227 (2018)

    Article  Google Scholar 

  40. H. Jean-Baptiste, M. Qiu, K. Gai, L. Tao, Meta meta-analytics for risk forecast using big data meta-regression in financial industry, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 272–277

    Google Scholar 

  41. S. Jayaraman, L. Tao, K. Gai, N. Jiang, Drug side effects data representation and full spectrum inferencing using knowledge graphs in intelligent telehealth, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 289–294

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhu, L., Gai, K., Li, M. (2019). Exploring Topics in Blockchain-Enabled Internet of Things. In: Blockchain Technology in Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-21766-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21766-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21765-5

  • Online ISBN: 978-3-030-21766-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics