1 Introduction

The expansion of mobile devices like smartphones, laptops, sensors, and wearable has fueled extraordinary improvements in IoT in recent years. More than 500 million IoT devices are expected to be connected together by 2030. This tremendous expansion of IoT is expected to result in a flood of new applications and services across various industries like gaming, security surveillance and entertainment. IoT systems usually demand considerable computational capacity to manage data supplied by sensor devices with low latency. This is useful to provide time-sensitive services like transportation and intelligent healthcare. Cloud computing can assist IoT devices with calculating chores, but latency is still an issue. In order to move compute and storage closer to the network’s edge, edge computing paradigm is introduced recently. The computational burden is imposed on edge devices in edge computing. However, moving large-scale computing and storage services to the edge introduces security risks, according to Microsoft’s Safelight, a cloud computing platform.

Blockchain has been hailed as a viable answer for ensuring security and privacy for edge computing networks, along with enabling future generations of edge computing technologies. Blockchain in coordination with edge computing establishes a new paradigm for edge-IoT networks, which reshapes and changes them to allow new industrial and customer applications and services. However, the difficulty of blockchain, which requires significant computational power, poses a barrier in combining blockchain alongside IoT, which has limited resource and space abilities [1].

1.1 Related Work and Survey Contributions

Various recent studies in IoT, blockchain, and related topics have been examined from technological perspectives. To produce review articles on this research subject, several attempts have been performed. In the survey papers [2,3,4], an assessment of recent initiatives to integrate blockchain technology into various IoT scenarios and applications was presented. IoT and blockchain technology integration was also covered by the authors of [5]. The examination of block chain potential related to the IoT applications was done, which includes the manufacturing of smart cars, aerial vehicles and 5 G networks. The assessment in [6] focused on an examination of the technical facets of blockchain, including basic principles, networking, and consensus techniques. The authors of [7] talked about the opportunities, problems, and research issues relative to the amalgamation of blockchain and cloud computing. The article [8] surveys the security services in blockchain technology to deliver security services. It also discuss technical qualities to address related problems in IoT and cloud computing. A recent assessment [9] covered an overview of the combined model of blockchain and its association with edge computing, which is a form of extended cloud computing. Table 1 lists the major themes and its literature reviews pertaining to BCoT and this study.

Table 1 Major themes and contributions of the literature reviews pertaining to BCoT

Unlike the review works mentioned in Table 1, the purpose of this essay is to evaluate and analyze current state-of-the-art blockchain projects in several IoT disciplines, with a focus on the health sector. The primary objective of this study is to give readers a complete understanding of the blockchain and IoT integration using information gathered from relevant websites, technical studies, academic articles, and newspapers.

This study also attempts to demonstrate the prospective use of blockchain in healthcare, as well as the obstacles and future paths of blockchain development. In various aspects, this study varies from other research studies. The present study publications [17,18,19,20] highlighted prevailing blockchain research on a restricted amount of attributes, while we broke down the examined research into multiple parts. Furthermore, the fundamentals of blockchain have been thoroughly explained to appeal to a diverse audience. On the contrary, we analyzed state-of-the-art studies from several IoT disciplines for eHealth, and also the study deficit but also the obstacles when considering blockchain to IoT, which are highlighted and explored in the paper with suggested alternatives. We adopt a systematic approach to review existing literature. Our primary search engine was Google and search engine of each scientific database. Figure 1a shows a word cloud of commonly found keywords in our collected articles from reputed publishers such as Springer, ACM, IEEE, Science Direct, MDPI, and Research Gate. We refer approximately 400 articles to conduct this survey, largely from last 5-6 years. Figure 1b presents an overview of articles from various scientific sources. The top two sources are Springer and IEEE, while the other technology sources such as blogs and white papers contribute significantly to this survey (Fig. 2).

Although the combination of blockchain with IoT opens up a flood of new business opportunities, there are still a few roadblocks to overcome before the full promise of Blockchain of Things can be achieved. We highlight potential research challenges and unresolved problems in the field based on the thorough assessment of BCoT for healthcare. We also contemplate the state-of-the-art approaches to address these challenges and gaps. To broaden the scope of BCoT in upcoming system and applications, some potential future research trajectories are also investigated.

Fig. 1
figure 1

a A word cloud of commonly found keywords in our collected articles for our survey, b An overview of percentage of articles from various scientific sources for our survey

Fig. 2
figure 2

The organization of this paper, illustrating contributions of this article

Fig. 3
figure 3

An overview of operations in blockchain for Bitcoin (image credit to the work [56])

2 Background Concepts on Blockchain, IoT, and Healthcare

This section describes mainly the background required to understand the context before state-of-the-art in block chain for healthcare. We first present a solid background about blockchain in Sect. 2.1. Section 2.2 further builds a topic and explains potential benefits of blockchain in healthcare. Finally, we build a foundation on Blockchain of Things term in Sect. 2.3.

2.1 Blockchain

A blockchain is a shared and distributed record system that’s also governed by various users in a P2P (peer-to-peer) network [21, 22]. Without a central authority or consolidated data storage administration, this method works [23]. Data is dispersed over multiple servers, and data reliability is preserved through reproduction and encoding [24, 25]. Blockchain was first published as an idea on October 31, 2008, according to a white paper created by Satoshi Nakamoto [26]. He devised the concept of bitcoin transactions on a medium that allowed digital transfers to be delivered personally from one peer to the other without the need for a banking agency. His major goal was to make a trust-free [27] program that utilizes peer-to-peer shared ledger innovation to overcome the double-spending challenge by computing the sequential order of activities [28]. The name “blockchain” alludes to a series of blocks, each of which contains a set of data about its history, current, and prospective [29, 30]. Whenever a new block is appended to the chain, each block performs a crucial function in linking with the prior block and the subsequent block [31]. Each block collects, verifies, and disseminates payments to other blocks [32]. This indicates that removing and amending a block in the chain could modify every following block [33, 34].

Blockchain network is a fragmented information scheme [35, 36] that stores details about every transaction history and runs on predetermined guidelines that specify how operations are performed and validated, but also how the whole system and its participants work [37]. Furthermore, because data is maintained on each server running in all of its various channels, such a system is sometimes described as a distributed registry [38, 39].

Any transaction unit in blockchain is merged into blocks of activities linked in the chain by hashing the preceding block’s information [40]. As a result of this virtue of irreversible, blockchain networks essential safety characteristic is reinforced [41]. Data in a block is restricted toward modification as it progresses all along the chain (the older it is) [42]. If an intruder attempts to modify any of the variables, the local register will become invalid promptly since, based on the hash function method, the hash numbers within the next block’s directives will be radically distinct [43, 44].

Figure 3 provides an overview of operations in blockchain for Bitcoin. It illustrates a set of operations, when participant A transfers digital coins to another participants B.

2.2 Benefits of Blockchain in Healthcare

Researchers find a strong domain for studying architectures using blockchain in healthcare [45, 46]. This technology helps to create a reliable storage for all health data and to track real-time data at a granular level [47]. The researchers working in healthcare industry may need a large datasets to understand complex disease, advance discovery of drugs, and design a personalized treatment [48]. Blockchain provides a shared ecosystem of a wide variety of exchanging datasets [49, 50]. It allows to include patients of different backgrounds such as socio-economic and ethnic. [51] suggested the enabling of blockchain in integration with the IoT device for Medical healthcare. The authors termed it as IoMT blockchain. Moreover, the shared ecosystem (such as blockchain) makes it easier for healthcare professionals to collect data from participants (e.g., under-severed by medical community), which are in interest for the general public [52,53,54,55].

The use of blockchain technologies in healthcare industry will motivate the development of new smart app that would encourage the development of personalized treatments [57, 58]. The validity of information for both the patient and the healthcare unit will remain the same without any changes or obligations. This will result in a brighter option for the treatment [59, 60].

2.3 Blockchain and IoT

IoT connects people, things, and items to give chances for data collection by incorporating powerful computers, monitors, and actuators, all of which broadcast data to the central host, usually a cloud server. IoT data collected from sources is analyzed to generate concepts and techniques that may be used to impact corporate operations and lead to existing offerings. However, the IoT ecosystem’s safety and anonymity are major problems that have stymied its widespread adoption. DDoS, Ransomware, and other unwanted assaults frequently target IoT systems. DDoS is a form of threat in which a subject, such as the main database, is assaulted with a large number of concurrent information queries from numerous hacked system networks, culminating in a loss of access for affected users on the network. Furthermore, as the volume of gadgets accessing an IoT network grows, current centralized platforms may have bottlenecks when identifying, authorizing, and linking new hubs to the network.

With the answers to such IoT issues, blockchain, also referred to as DTL, has surfaced as a game-changing innovation that has the capacity to solve several of the IoT protection, anonymity, and scalability issues. Blockchain’s shared record is tamper-proof, so there’s no need to verify the other participants. Smart communities, smart architecture, smart grids, smart mobility, smart homes, and smart medical centers are just a few examples of IoT implementations. The introduction of block chain into the IoT realm results in the formation of a distinctive block chain sector, which can be called as BCIoT. The enormous amount of data which will be produced by the IoT devices under the BCIoT model will have uniform access across the world. The information which is available and redeemed in the pastimes can also be accessed by various parties under the smart contract. The authenticity will be ensured by the telecommunication carriers and third parties which are responsible to hold the data from the block chain-based network. Since the beginning, security and privacy are the largest concern into any block chain network, which might lead to loss of faith and adaptability for the users [61].

  • If an IoT system requires a distributed P2P ecosystem, blockchain may address confidentiality and safety concerns.

  • If an IoT system needs the preservation of a payment transaction for its offered functions without the involvement of other entities, blockchain can be a potential safe option [62].

  • If IoT applications require the preservation of records and verification of consecutive activity, blockchain could be a viable option.

Nonetheless, when creating a system for IoT gadgets in connection with a blockchain registry, there are a few significant challenges that are needed to solve.

  • One of the most difficult aspects of merging IoT and blockchain is figuring out how to data generated by multiple IoT sensors on blockchain. Additionally, when performing payments, blockchain may experience slower efficiency or higher delay.

  • Maintaining security and activity anonymity is yet another consideration in the blockchain: in an open blockchain, payment record secrecy cannot be guaranteed. By examining activity histories, intruders can learn about the identity of people or gadgets.

Table 2 Summary of related work in eHealth using blockchain
Table 3 Summary of related work in security and access control

3 State-of-the-Art in Blockchain-Assisted IoT for Healthcare

State-of-the-art studies relevant to eHealth systems are examined in this section. eHealth makes healthcare facilities and other clinical advantages available quickly to people who need them. The implementation of blockchain concept in eHealth can adequately solve crucial concerns of confidentiality and protection, as well as improve overall efficiency to encourage patient treatment and the progressive transition of current medical systems intodistributed eHealth [22, 63,64,65]. Researchers want to use IoT, fog, cloud, and blockchain to create an eHealth framework for safely providing information, data management, and network management.

Due to recent technological advancements in IoT, the connectivity has allowed the access of patient information, safe medication monitoring, hospital resources, and intelligent devices (e.g., smart phones, medical devices) which have promoted with blockchain-driven healthcare. For example, the physician frequently needs a reference of a patient’s previous illness records, which can be compiled while the patient sees several doctors at various hospitals and clinics. Clients do not have recourse to the EMRs of healthcare practitioners in most contemporary eHealth scenarios. Yet, if a patient has insight into his health records, he can minimize the repetition of documents and medically unnecessary testing. Blockchain can significantly affect health service effectiveness and prices by giving patients full ownership over their prior health files, comprising records, financial information, lab results, x-rays and sign checks. Health data collected in distant patient surveillance contexts is quickly increasing and other health data, posing several issues, such as data sharing and data availability outside of healthcare facilities. Patients can use blockchain to improve the permission and trust of their medical records. In the following, we have articulated the state-of-the-art research in the area of IoT eHealthcare with blockchain assistance (Tables 2 and 3).

3.1 Hospital and Medicine Management Using Blockchain

Jamil et al. [66] created a blockchain-driven tracking software for health centers. People wearing sensor modules send important signs to approved blocks on blockchain systems in the hospital. The technology is improved and built on a cloud with front-end development using JavaScript frameworks. REST APIs, which IoT devices or a web user either triggers, offer product-centered solutions on blockchain. A contract enabled regulated entry to a ledger that ensures patient data is kept private and compatible with metadata, and the suggested channel housed blockchain ledger operations. The entry management strategy is also developed to enable network users and consumers to view allowed data and activities, ensuring that only approved professionals have accessibility to and alter IoT. The hubs on blockchain deployed couch storage to store the important sign deals. The system’s efficiency is evaluated using the Hyperledger [74] test software, which comprised transaction read latency & throughput. Celesti et al. [75] have presented an eHealth solution that used an Ethereum blockchain to link the clouds of a federal institution to create a tele-medical facility. And though the writers explained the suggested system’s medical process, no exhaustive study was performed to establish the platform’s viability.

In many nations, a lack of proper state law and rules leads to tests and procurement of drugs from doctors’ favored medical centers [67]. In addition, healthcare workers constantly manage patients’ medical information, and diagnostic examinations are under their direction and monitoring, with patients being refused entry to those records. As a result, patients need to operate a similar exam two times when they change to a different medical practitioner. Rather et al. [67] presented a blockchain-driven hybrid model for handling multimedia created by IoT services to address these challenges presented in the conventional health service. The project’s blockchain network comprises two sorts of hubs: certifying hubs and mining hubs, as well as executing servers. The preset executing block ensures that the miners data is not changed and modified. To assess the hypothesized scheme’s safety, NS2 was used to replicate it.

The opportunity for blockchain to protect medicine supply networks is enormous. By making the actual drug logistics accessible to all partners at any point in the system, blockchain can effectively prevent fake products. Haq et al. [76] leverage blockchain to avoid fraudulent medicines in a drug delivery system. From medication creation to delivery, every activity performed on this platform was documented in a permissioned blockchain that approved officials can only access. As an outcome, the program guarantees openness and simplifies drug trading integrity. By combining blockchain, cloud, and IoT, Nguyen et al. [68] developed an abstract, diagnostic evaluation, and management system. They linked the information management software with a data sharing portal using a distributed mobile blockchain connection. A sensible access-based authentication method guarantees data confidentiality and authenticity on the admission security level. However, blockchain’s durability and transmission costs were not studied.

Investigators are very interested in using blockchain to offer safe and dependable storage space for the healthcare industry. But, only a few nations (e.g., Estonia, Peru) have implemented blockchain health systems in actuality. Recently, blockchain-driven medical procurement control system was launched in Peru [77]. blockchain was integrated with the Amazon Cloud to govern the healthcare logistic system, maintaining a safe interaction between sales staff, producers, and customers. Agreements are being created to store medical sensor information to avoid unauthorized changes and adjustments. The suggested technique does have a flaw in that it does not handle privacy protection. The efficacy of blockchain concept in delivering health solutions via IoT and Cloud of Things was noted by Kang et al. [78]. Unfortunately, no performance evaluations for the suggested protocol have been completed.

3.2 Blockchain for eHealth Information Protection

Maintaining anonymity in an eHealth system allows for more effective communication between the doctor and the patient, which is essential for good care, independence, and the prevention of financial harm, shame, and prejudice [88].

Blockchain-driven IoT eHealth was created by experts [89,90,91,92] to secure patient and healthcare worker confidentiality. Ref. [89] study is a secrecy health data interchange solution that combines an IoT network with storage on cloud. To protect health records, EMRs are kept safe on the cloud level utilizing clever deal software, while the categorization of the documents is preserved in blockchain. As a result, EMRs cannot be modified or altered irresponsibly. Unfortunately, the system has yet to be applied in a real-world setting.

Ref. [90] used blockchain to create a privacy-preserving cloud health information system. The cloud blockchain record stores bright contract-regulated encrypted medical files. Encrypting content before entering it into blockchain efficiently addresses user privacy concerns, improving the openness and safety of storage on cloud systems. The work’s shortcoming is that there were no evaluations among standards and smart contract-based methods.

A robust cloud-assisted blockchain EHR infrastructure was developed in Ref. [91] with four units: a key generation center, healthcare providers, cloud users, and data clients like insurance companies. Blockchain stores patient records with a time-stamped, which improves the legitimacy and transparency of health information. The study’s flaw is that no agreement for data storage management has been created. All parties on blockchain P2P system have access to blockchain record. Before publishing a block onto the decentralized blockchain record, users validate its composition. The transparency of blockchain poses a severe threat to patient confidentiality in the eHealth sector. The work [92] redesigned blockchain peer-to-peer system to accommodate Attribute-Based Encryption methods (ABE). Depending on their functions in blockchain network, the experts classed blockchain sites as cluster heads, feature authority, and miners. blockchain network’s cluster head is linked to IoT devices to obtain data. The cluster head is in charge of performing algorithmically focused processes such as data acquisition and encryption/decryption. At the same time, Attribute Authorities (AA) can give the competencies needed to decipher statistics to doctors, nurses, and other health professionals standing as miners. The chosen miners can decode the blocks utilizing AA’s characteristics for confirming and certifying blocks.

3.2.1 Interoperability

Interoperability between current databases, institutions, and national borders is very important for healthcare industry. This could improve the information quality and patients’ life. Au et al. [93] developed a cloud-assisted system for securely sharing medical data. The personal information of patients’ can be stored on a cloud server. As a result, doctors can share patient data for further research purposes without releasing personal information.

Patients-driven interoperability, in which users employ assisted APIs to access personal medical data, was the focus of William et al. [94]. The authors looked at how blockchain may be used to protect patient health data interactions, share it with others, identify data seekers, and aggregate disparate data. According to the authors, more research should focus on blockchain patient-assisted interoperability’s current limits. They utilize blockchain’s scalability difficulty in managing clinical data transaction volume as an example of these difficulties. Finally, Gaby et al. [95]presented the Ancile to address interoperability, which is an Ethereum-based system that employs contracts to regulate data access and privacy. freshly developed encryption techniques were used for privacy, along with the Ethereum-based smart contracts. The framework proposed by the authors, is in early ages in the community and require further more investigation, as well as development. The authors proposes the Ancile as an early stage framework in the Ethereum community, and it needs further investigation and development.

Azaria et al. [96] presented a blockchain-based system that can manage EMRs record. The proposed techniques ensure immutable records, easy access, accountability, authentication and the secrecy of sensitive medical data. It can also be adapted to existing data storage providers’ systems, assuring compatibility. However, interoperability involves a significant degree of data sharing and transmission. Information could be copied, spread, or modified due to this. Roehrs et al. [97] proposed a framework that combines disparate data from various sources. OmniPHR is a scalable and elastic system that combines blockchain concepts to handle massive datasets.

3.3 mHealth Blockchain

Utilizing mobile-assisted encrypted text messaging, patient applications, and tele-health, healthcare professionals have boosted their patients’ involvement and commitment to medical procedures. However, private communications among various hospital units including patients are still the most common usage of portable devices in IoT healthcare in the current environment. Nonetheless, blockchain-related efforts [69, 70, 72, 73] have used smartphone apps to correctly record health information from a patient’s sensing devices and provide timely health services.

Liang et al. [69] developed cloud computing environment powered by blockchain, that sends data from sensing devices to cloud processors through a smartphone. The researchers wanted to create a patient-centered system that would allow medical providers and insurance firms to exchange health information. Customers, mobile sensors, health professionals, insurance firms, the cloud environment, and blockchain platform were among the six types of participants in the program. Hyperledger Fabrics, a permission business blockchain, was used to verify and maintain the patient’s data while distributing it to other parties. Three goals were achieved by deploying blockchain in the cloud:

  • To guarantee that data input is accurate.

  • To respond to demands for data entry from other entities.

  • User authentication access control should be implemented.

The cloud service is set up to link to the P2P dispersed blockchain channel’s members via a Hyperledger Fabric user, ensuring that the cloud user’s demands remain anonymous. However, they did disregard safety concerns like vicious assaults on IoT devices.

Similarly, Nguyen et al. [70] proposed a system that would link several EHR systems and allow healthcare practitioners and clients to access health information. blockchain was integrated into a cloud server, where intelligent contracts facilitate data entry operations. In cloud, a decentralized storage makes an effective data sharing than centralized distributed systems that has privacy and low latency. Ni et al. [72] figured out HealthChain. The system which is proposed by the author contains three important parts that were performing the operations as data collection, verification and storage.

The study contemplated various members to maintain less mining cost. They also devised an efficient decision-making approach for maximizing the economic benefits of mining operations. The researchers, however, did not specify which modeling techniques or computer languages were employed to undertake the efficiency investigation.

Ichikawa et al. [73] proposed a mHealth system which used blockchain to protect data from manipulation. They created a mobile app that uses the JSON standard to record data from sensing devices and save it in a Hyperledger Fabrics personal blockchain. In addition, the writers looked at how well health data was integrated into fault circuits. Privacy vulnerabilities between sensors and the mobile app, on the other hand, have not been resolved.

3.4 In eHealth, Blockchain was Used to Control Access

A safety compromise might hinder a patient’s privacy, illness, or even life by manipulating patient information, eHealth system safety is critical [98]. Authorization is one of the essential security elements since it guarantees that only authorized users with the appropriate permissions have entry to health services. The privileges of any individual, entity, or institution to obtain health records inside the domain are referred to as access control. Healthcare organizations must, of course, establish fine-grained access control [99]. For example, only prior enrolled providers must have admittance to a real-time Electrocardiograph (EKG) tracking system. Various ways [79, 100,101,102] have been suggested to handle verification and access control challenges in blockchain eHealth network.

Table 4 Summary of related work in different architectures for BCoT in healthcare

Tanwar et al. [79] suggested distributed ledger to handle health record access rules based on these challenges. In their patient healthcare paradigm, the author conducted many methods that determined entry rules for care providers. They used Hyperledger Fabric & Caliper, Docker, Wireshark recording tool, and Composer to evaluate the system’s efficiency regarding bandwidth and delay.

To further secure the security and availability of data, Wang et al. [100] developed a data sharing platform which can provide fine-grained network access. Wang et al. [100] created a distributed cloud infrastructure including an Inter Planetary File System (IPFS) for distributed data, and an Ethereum. A wise contract-based access control managing method has been proposed in this study to execute search terms in the distributed storage, which improves the platform’s QoS and security. However, one of the study’s flaws is that data protection and the latency caused by access control approaches were not considered. Wang and colleagues [103] desired a blockchain cloud architecture to hold medical data utilizing health data activity login mechanism with blockchain. Blockchain’s P2P network detects any changes to the cloud files. In reality, this model reduces the expenditures of third-party digital storage management. The paper, however, does not provide a blockchain sample.

In Ref. [101], Islam et al. built a system to aid Health Prescriptions so that clients obtain doctor suggestions. After proper validation, the platform issues a Security Access Token (SAT) to IoT systems, that determines the rights of medical devices and assets for the user. When requesting operations from the network, IoT devices have included encoded SAT. Furthermore, it incorporates an access control based on OpenID method to protect illegal access to health gadgets. The design, however, is notional, and no effectiveness study was conducted.

Ramani et al. [102] proposed a blockchain-driven method for data availability for the healthcare. With a patient’s authorization, the technology enables doctors to update and extract health data. To assess safety, a unique blockchain was proposed. However, the authors did not use emulator or create a prototype to test the suggested technology’s effectiveness.

GDPR [104] defined privacy policies across Europe to safeguard users’ rights and secrecy over their health records. As per the rules, a provider must include capabilities for the user’s permission and removal of that permission in their platform. Furthermore, the provider must publish a statement on how the user data is managed and utilized on the user’s demand. Moreover, the service provider should deliver all of the data to the consumer in a computer-readable manner. Ref. [105] proposed a new eHealth architecture that combined blockchain innovation and the cloud to transmit health data with authenticated persons effectively and openly while adhering to data standards such as GDPR. To assure the QoS of the shared information, the writers used an AI model to evaluate the reliability of health data. However, the article’s main flaw is that no effectiveness evaluation was carried out.

3.5 Blockchain-Assisted eHealth Data Storage

Table 5 Summary of related work in blockchain of things for resource-constrained devices

In a standard cloud IoT-enabled care system, health records are often handled and kept in cloud, under the management of several Cloud-Service Providers (CSPs). CSP should be open but wary of the potential of necessary patient data being leaked. While adopting cloud network security, EHRs are also vulnerable to numerous data storage assaults. Blockchain has the potential to make existing systems of storing patient records safer and more efficient. Data integrity may be preserved while also assuring that it is tamper-proof using blockchain. On-chain keeping is one technique to save data on a blockchain. However, putting a block on blockchain comes at a considerable cost [110]. Therefore, on-chain storage isn’t seen to be economically or practically possible. On blockchain system, though, additional data storage process known as off-chain can be used. The hash code of data that is comparatively brief, is saved in the ledger, while the information is held in standard archives in an off-chain fashion. The on-chain technique has a cheap storage price since the hash value is relatively brief [111]. The majority of the studies described in Tables 4 and 5 have taken an off-chain database strategy to address the memory cost issue on blockchain system. Zheng et al. [105] proposed a methodology for exchanging individual health data in real-time utilizing blockchain-driven distributed storage on cloud. Health records are typically securely stored off-chain in traditional storage on cloud to alleviate the space strain in blockchain system, with only hash values injected into blockchain. But, a basic sample has yet to be created.

The usage of blockchain in healthcare has become fashionable, particularly when it comes to securing medical data sharing and management. The technique is taken by Zyskind et al. [26] uses blockchain which enables service providers and user to share information and data with maintaining security. In this solution, there are two types of transactions. Transactions are used to save and retrieve data, to begin with (Tdata). Second, transactions to access are used to control access. MedRec [96] is a decentralized Electronic Medical Record (EMR) management system based on blockchain. It includes a functioning prototype based on three different Ethereum smart contract types. Patient data is accessed after successful authentication from various medical facilities utilizing MedRec. Yue et al. [112] suggested a blockchain-based healthcare data gateway. Its purpose is to provide patients control over their information while also protecting their privacy. On the other hand, the authors do not go into enough depth regarding how to prevent a service from unfolding content of data when computing raw data. [113] employed an agreement system and identity-assisted authentication to verify user membership. However, only those who have been invited and authenticated are able to exchange sensitive health information safely. Patients and clinicians can access cloud archives and share data with Medshare [82], a blockchain-driven solution described by the same authors. Provenance, control, and auditing of data are all guaranteed.

3.6 In eHealth, Blockchain has Facilitated Information Sharing

Given the delicate aspect of patient records, protecting patient confidentiality while transferring EHRs is a crucial concern. Because of its scalability and tampering resilience, blockchain has emerged as a viable answer to this problem [81]. Xia et al. proposed a medical data exchange paradigm dubbed Medshare in Ref. [82], which used blockchain to exchange data between unknown CSPs. The authors developed an entry tracking model that enables smart contracts to monitor data users’ access behavior and identify security breaches. blockchain-driven CSPs could allow inspection and confirm the origin of healthcare experts without jeopardizing privacy protection. Cloud-assisted data acquisition issues should be acknowledged and resolved. The study in Ref. [80] provided a standard encryption solution for ensuring adequate access control and user identification when transporting information in the cloud layer to resolve this concern.

Doctors are often trained to provide medication and treatment to patients to treat a given ailment. Many disorders, meanwhile, necessitate cross-border health expertise from a variety of medical providers around the world. For more accurate medical care, specific assessment, and cure, blockchain system can ease the interchange of health providers’ skills. Wang et al. [100] proposed a modified healthcare system that combines expertise from three areas: synthetic intelligence, computer tests, and concurrent execution to increase the accuracy of medical care and cure. First, a “descriptive cognition” artificial healthcare system (AHS) was created to replicate and represent patients’ and doctors’ fixed and fluid properties. Second, computer studies were performed to combine several illness situations to examine the relevance of alternative therapy courses in AHS. “Intelligence anticipatory” is the name of the stage. Finally, the final routine was picked from a roster of experts’ recommendations and implemented simultaneously in AHS and the existing healthcare system to give “prescriptive knowledge”. To enable EHRs to be traded, reviewed, and verified, the platform used a consortium blockchain that included users, health experts & institutions in healthcare and blockchain-powered intelligent contracts.

Health data storage on blockchain is a transparent and fair platform that can help to improve health services. Indeed, integrating cloud, IoT, and blockchain can significantly allow innovative health solutions to develop [114]. Dwivedi et al. devised a distributed blockchain data protection mechanism in Ref. [83]. Five elements make up the equipment: an overlaid network, cloud servers, care providers, intelligent contracts, and clients. The work used a P2P network to connect blockchain to storage on cloud. Each storage on cloud maintains health information in the shape of blocks, and the hash bits of these blocks are saved in blockchain, making it easier to trace any modifications in the cloud data. A dual encryption system is also offered to protect info from possible threats. The study’s flaw is that no accurate tests of the proposed safety method have been produced.

Nguyen et al. [70] proposed a blockchain-driven EHR sharing design with standard interplanetary file system storage (IPFS). In addition, smart contracts were created to construct a reliable access control system to improve the safety of EHRs throughout their transfer. In particular, a data transfer method for client entry to the EHRs network was created. Amazon Web Services offered cloud for the mobility trials, which were done on a mobile Android application. The assessment’s findings show that the proposed method can be used in various e-health settings.

Medchain, a system for exchanging medical records, was suggested by Shen et al. [84]. The writers used two decentralized systems: a blockchain peer-to-peer channel and a traditional peer-to-peer channel. blockchain network keeps irreversible data summaries and info, activity, and operation fingerprints, whereas the conventional P2P network retains mutable data and meeting details. In the data exchange process, a procedure for bundling and removing changeable data is included, which can decrease storage overhead. Fan et al. [85] proposed a blockchain-driven clinical sharing feature in which local clinics acquire medical abstracts from regional hospitals and other healthcare centers’ electronic medical records. After analysis, the local hospitals bundle health information into blocks and send them to the agreement hubs. Inciting inquiries, checking, and confirming blocks is the duty of hospitals serving as both commands and endorsers. A hospital can choose to keep its patient data on its ledger or send it to blockchain.

3.7 Blockchain-Enabled eHealth Contracting

The outsourcing medical services to CSPs have grown important in reducing the computing burden [115] locally in recent years. An act of relocating a company’s inner activities or products and decision-making to providers through contractual agreements is known as outsourcing [116]. Outsourcing work to a cloud computing service, on the other hand, presents many additional issues. For example, the cloud provider may be interested in a recipient’s sensitive information and violate the client’s confidentiality. In addition, the customer must sign contracts with a provider to ensure that privacy is protected [117]. Blockchain has been examined as a possible solution to resource exporting concerns such as safety, anonymity, money, and agreement [118,119,120].

Cao et al. [118, 119] introduced a cloud-assisted eHealth system that uses blockchain to safeguard medical users’ EHR exports. A blockchain system called Ethereum was used to handle user activities without the demand for a third party. Health records were inserted into tamper-proof Ethereum to protect the validity of EHRs. A smart contract for service management, on the other hand, has not been examined. Park et al. [119] proposed using cloud-assisted crowd-sourcing to create the CORUS medical correction and assessment system. Crowd-sourcing is a method of gathering works, information, or viewpoints/opinions from many individuals using the web, social networks, and mobile apps. Crowd-sourcing enthusiasts work as paid contractors, whereas others volunteer to accomplish jobs [121].

Crowd-sourcing on a typical system has various flaws, including a sole source of error, the operator’s hidden misconduct, and a disagreement between task applicants and employees [120]. The distributed account in blockchain enhances the credibility of verified records and the efficacy of the suggested crowd-sourcing system [119]. Blockchain, a groundbreaking distributed concept, can be adjusted to eliminate the shortcomings of conventional crowd-sourcing schemes and usher in technological advances such as devolution and openness [120, 122]. Furthermore, Park et al. [119] used blockchain to entice many users by giving funds for delivering accurate data. However, the efficiency study of the cloud blockchain has not been explored, which is a flaw in the paper.

3.8 In eHealth, a Blockchain Smart Contract

Due to their programmed aspect, smart contracts have become one of the most looked at innovations since the advent of blockchain [123]. A smart contract consists of rules and agreements expressed in computer code. When a contract-related event occurs, the intelligent contract recorded in the shared database is executed directly on blockchain without needing a third party [123].

Daragh et al. [124] created a smart medical contract with a timer design to manage record entry and permissions. By implementing appropriate user rules, the agreements proposed in this study control activities and track computations on EMRs. Authors presented an incentive-driven mining mechanism to reduce the need for virtual money. In this mining method, the server with the lowest rating creates the next block, while high rated nodes approves newer nodes in the blockchain system. This maintains provider stability and the system’s long-term viability. The testing was performed on Ethereum, an open-source network that includes the implementation of smart contracts making use of solidarity programming syntax. But, cybersecurity was not handled, and there was no way to obtain continual health records on blockchain.

Kazmi et al. [125] created a blockchain-driven remote monitoring platform that used smart contracts to register patients as well as healthcare providers and grant permits for wearable sensors. In addition, the software can provide a genuine notice, encouraging consumers and healthcare professionals to participate in patient surveillance. The suggested program’s intelligent contracts were created using the Ethereum network. They used Remix, an open-source web engine, to develop, analyze, and publish their smart contracts. Unfortunately, safety and confidentiality concerns were overlooked while obtaining data from sensors.

Hang et al. [126] presented a blockchain-driven infrastructure to safeguard EMR administration across hospital divisions. Smart contracts were used to store patient records, record files, and limit entry to healthcare data among various health organizations in the EMR administration network. They put the framework through an experiment conducted on many hospitals to show that the system is feasible in effectiveness and potency. Hyperledger was used to create smart contracts. The tests and concepts were detailed in great depth. The paper in Ref. [127] identified the use of blockchain and IoT driven e-Healthcare systems.

Malamas et al. [128] developed a forensics-enabled architecture for medical equipment using blockchain. The technology uses smart contracts on blockchain to provide good authorization. The intelligent agreement establishes rules and ensures that records are kept safe and secure. In addition, the Proof-of-Stake (PoS) consensus protocol certifies blockchain activities. Patients, doctors, healthcare providers, and investigators typically make a wide array of inquiries to a biological database utilizing appropriate API at any one time. Therefore, it is essential in a typical log record process to ensure tamper-proof content and client inquiries. According to Mytis et al. [129], blockchain confirms a validity and non-repudiation of data recovery from a traditional biological registry. The scheme consists of three parts:

  • A front-end functionality that third parties can use to make requests.

  • A connection for conversing with the biomedical functionality.

  • A smart contract among applications and the database connection logs all users inquiries in blockchain.

The Ethereum blockchain implemented smart contract to ensure authorization modules written in Solidity. MongoDB was used to store Biomedical data.

3.9 In eHealth, a Lightweight Blockchain

Due to mathematical concepts like required cryptographic methods, PoW and the Merkle Hash Tree [132], most critically, IoT is frequently underperforming. Experts have offered a range of ways to improve present blockchain [127, 130, 133].

Ismail et al. [130] presented a gentle blockchain-driven healthcare design. The authors separated blockchain network regionally and assigned distinct functions to blockchain hubs. The Leader Blockchain Manager (HBCM), often known as the cluster head, is in charge of operations and block creation. The HBC avoids forking by keeping a replica of ledgers for its users. The personalized blockchain can speed up computing and interaction, but it cannot ensure that the record is tamper-proof. Regarding convenience and computation complexity, the suggested approach was tested on NS3 and contrasted with the Bitcoin blockchain. Srivastava et al. [134] used lightweight cryptographic techniques like the ARX encryption method to reduce energy usage of blockchain-driven healthcare. Furthermore, the Ring Signatures were employed to improve the singer’s secrecy and personal qualities.

Ray et al. [135] also announced the creation of IoBHealth. This new IoT-driven eHealthcare blockchain architecture is more resilient, safe, accessible, and efficient for collecting and sharing EHR data in healthcare. Attia et al. [136] designed a system that is IoT-driven blockchain-assisted to follow patients via intelligent devices. The writers built an User Interface that allows users can view data ledger in simple representations and displays using Hyperledger Fabric as a blockchain. Furthermore, rather than employing device IDs, the platform used the Naming Data Networking method, which facilitates data portability between discrete groups.

After a miner accomplishes the PoW for a block in a chain-organized blockchain, the block is transmitted all across the system, creating a scalability issue and a high network overhead. Srivastava et al., by adding the GHOSTDAG mechanism, a transactional verification system, [137] developed a sustainable blockchain for remote monitoring. Instead of a single massive chain of blocks, the GOSTDAGE method treats each operation as a cluster.

The issues of combining blockchain with sensing devices were addressed by Dwivedi et al. [133]. blockchain network, storage on cloud, medical providers, intelligent contracts, and clients outfitted with devices for the clinical purposes are all part of the network. The algorithm, which regulates the block chain network comprises of a centralized server, which acts on top in the hierarchy. This server is responsible to handle all the blocks that are committed across the various peer nodes in the P2P network. The clustered server is responsible for the inspection as well as execution of the blocks.

Yang et al. [131] presented a new consensus protocol to support eHealth blockchain applications. Proof of Familiarity (PoF) is a suggested decentralized system that comprises a cooperative medical decision-making process for providing healthcare to a person. The technology allows a healed patient to help a new patient with comparable conditions and illnesses, a medical judgment from various doctors, and health company marketing strategies during this procedure. To make an excellent shared medical choice, all parties, both healthcare practitioners and formerly treated patients, contribute comments. This judgment and the hash of the patient records are saved on-chain, while the health information is held off-chain in a database server. The paper’s flaw is that the model has yet to be tested to see if the suggested consensus process is feasible.

3.10 In eHealth, Blockchain-Enabled Accessible Encryption.

The initial method of storing health data has altered due to the fast expansion of cloud computing [106]. In principle, health data is critical and must be safeguarded from illegal access. Therefore, before being uploaded to cloud services, health data is usually protected. The data encryption determines the effectiveness of obtaining these data on the cloud [138]. SE (Searchable Encryption), a potential cipher technology, ensures data protection while preserving data discoverability [106]. However, most current systems, especially Searchable Public-key Encryption (SPE), are subject to dynamic leakage-exploiting threats or are incapable of fulfilling the performance demands of real applications [106]. Authors have explored combining blockchain with a regular cloud retention system to provide a robust and reliable keyword search in the healthcare sector.

Chen et al. offer improved searchable encryption in Ref. [106]. Blockchain is being used to create a healthcare system. The search indicator is saved on blockchain, while the cloud service records the information. To obtain the data, customers must first request approval and an encryption key from the holder. In contrast to prior research in Ref. [139], the platform used a complicated Boolean expression to retrieve the index-building EHRs. It permitted queries that allowed various care workers to seek authorization to view and engage with the health records. In addition, Ethereum blockchain-based smart contract was built to track remuneration, comprising transaction cost, between the people participating in a multi-user situation.

Wang et al. [140] devised a blockchain-driven cloud-aided consortium structure for managing and retrieving electronic health data. blockchain maintains encoded phrases to make it easier to find health data that has been transmitted to the cloud. They designed the framework of blocks and operations to store information safely and created basic cryptosystems. When users have consented to the data owner, the cloud database supports re-encryption and transmits the re-encrypted cipher text to the selected data applicant. A blockchain-assisted accessible EHR storage solution was also proposed in the paper [141]. To guarantee fine-grained user access to EHRs, the cloud provider saves health data by utilizing attribute-based cryptography. blockchain contains EHR data phrases used to create indexes that allow data users to locate data material on storage on cloud. Blockchain was advocated by Noh et al. [142] for logging records of health files controlled by cloud providers. A proxy re-encryption mechanism was added to the original study for privately transferring patient data.

Yuksel et al. [143] looked into E-Health Services’ privacy, security, and integrity (EHS). They described and classified the existing encryption methods in use in this industry based on access control, searching, and emergency response strategies. Khan et al. [144] investigated GPIT, a patient identification system that anonymizes patient information while preserving the data connected with it. An identity key, which encrypts the patient’s name, gender, and mobile phone number, is used to gain access to medical records. The GPIT system was put to the test in Bangladesh’s healthcare sector. Suzuki and Muai [145] proposed a blockchain-driven log system that is based on strict audit for confirming the request response system for the client and the server.

3.11 eHealth Systems with Blockchain Capabilities

Fog computing offers numerous advantages and is ideal for applications requiring quick reaction times, low latency, and authentic operations, particularly in healthcare [107, 146]. On the other hand, fog computing raises questions about multiple systems, safety, anonymity, reliability, and strategic planning [147]. Blockchain has been implemented in fog-enabled systems to address these challenges. In video stream analysis, Islam et al. [107] upload the input to a fog server located near the video camera rather than the cloud. The writers created a framework for recognizing human activities that used blockchain-driven fog–cloud computing. Before entering information into a multi-class Support Vector Machine (SVM) decoder using an error correction, they selected the main characteristics from the video feed. The paper’s advantage is that it examines the reliability of the movement detection method utilizing various databases. Nevertheless, the writers did not explain how blockchain was used in the proposed methodology, and no performance evaluation of blockchain, fog, or cloud services was done.

A mixed edge blockchain-driven eHealth structure is utilized by Akkaoui et al. [108]. Four layers make up the structure: end users, border pool, worldwide blockchain, off-chain memory. The concept is similar to that proposed in Ref. [146] to run mining processes on edge to improve performance and transactional processing delay. The edge comprises many devices that verify the legitimacy of operations and categorize them as normal or not relevant. Ethereum stores blocks containing EMR metadata and body area sensor data while [146] runs a mining system on the edge network and stores blocks consisting of metadata on edge [108]. It used a second blockchain to speed up the production of blocks. In addition, the writers [108] have created many smart contracts to provide role-based patient data sharing.

Neto et al. [148] proposed blockchain as a study topic for applications that change DNA sequence data. A blockchain-driven architecture for generic e-health applications has been presented as a solution. They also developed a proof of concept using DNA sequence data to investigate the blockchain applicability in e-health applications and a research map. Finally, Neto et al. [149] described the use of blockchain in an e-health, which included a performance analysis of transaction validation times using the distributed database BigchainDB.

Chendeb et al. [150] built and adapted a multi-layer IoT/blockchain-driven architecture for medical applications. Doctors, healthcare providers, insurance firms, and pharmacies are just a few of the people who deal with this information. The design concepts are essential to correctly manage the raw data streams provided by a distributed blockchain using cloud architecture. The suggested architecture has high availability, resilience, real-time data transmission and low latency.

4 Research Gaps and Potential Solutions

Although the combination of blockchain with IoT opens up a flood of new business opportunities, there are still a few roadblocks to overcome before the full promise of Blockchain of Things (BCoT) can be achieved. We identify several main problems in integrating blockchain into IoT in this article, describe the current state-of-the-art and offer solutions.

4.1 Resource Constraints

The bulk of devices is resource-constrained. Computational capabilities, storage, battery, and network connectivity are all constrained in sensors and RFID tags, for example. Passive RFID tags, for example, have no batteries and rely on RFID readers or the ambient environment for energy [151]. On the other hand, General Blockchain necessitates significant computer power, bandwidth, and speed. For example, most blockchain systems use Proof of Work (PoW) as their primary consensus mechanism. However, PoW mining requires a substantial amount of computing power. In addition, Bitcoin’s PoW, for example, has been discovered to require a significant amount of energy [152]. As a result, low-power IoT devices may not use energy-intensive consensus methods.

Most IoT devices have limited computing power and precise hardware specification. As a result, IoT devices cannot perform blockchain mining tasks because they are insufficiently capable or time-consuming. Aside from that, blockchain requires data encryption regularly. Since different IoT devices have diverse computational capabilities, encryption performance and time may differ. Furthermore, additional procedures such as consistency algorithms and frequent testing necessitate a large amount of CPU power, which is incompatible with the low battery capacity of IoT devices.

In addition, because of the vast bulk of blockchain data, widespread adoption of blockchains in the IoT is not possible. As time goes on, the ledger will grow. On the other hand, most devices have limited physical storage. Low-power IoT typically have 10 to 100 KB of memory for data and memory storage. However, storing the entire chain on a blockchain necessitates a significant storage space. Bitcoin, for example, necessitates more than 200 GB of memory, but Ethereum necessitates over 1.5T. The storage of a copy of blockchain for IoT components is not conceivable. Blockchain will be too large for each IoT device to keep.

Large volumes of data captured in near real-time exacerbate the dilemma. Furthermore, blockchains are architected for a situation with a constant network connectivity, which may not be achievable in IoT, which commonly suffers from poor network connectivity and an unpredictable network due to device failure (e.g., battery depletion). Data is constantly sent from IoT devices and the IoT system requires real-time response [153]. Due to its extensive cryptography protection system and validation procedures, blockchain systems are restricted and they lacks the ability of real-time. A big quantity of data is required for the fast coordination of fresh blocks between blockchain servers in a chain-structured database, which can boost blockchain performance [154, 155]. Furthermore, IoT devices are anticipated to be linked to high computational, memory, and network capabilities to exchange IoT data with prospective partners. As a result, the challenge is to improve overall efficiency of blockchain to fulfill the demand for real-time requirements in IoT systems.

Furthermore, to reach to an agreement on how to keep blockchain correct and generate new blocks, the consensus process in blockchain requires constant information sharing between nodes. This approach needs bandwidth and a minimum network latency. The bandwidth requirements for IoT devices, on the other hand, are always strict.

Using edge computing and cloud computing technologies in conjunction with Blockchain of Things could enable IoT devices to overcome resource constraints. For instance, cloud or some edge servers may act as a primary node, storing all data and participating in most operations like initiating and validating transactions (i.e., mining). In contrast, devices can act as lightweight nodes to store only a portion of data (e.g., hash value of blockchain data) and performing less computationally intensive tasks (e.g., initiating transactions) [156]. The orchestration of edge and cloud becomes a crucial challenge in resource allocation in BCoT [157].

4.2 Handling Big Data in Blockchain

Every user in blockchain network contains an access to the personal minor ledger. A new block is appended and broadcasted across the entire P2P network. All the hierarchical servers updates the local records based on the local record. This type of distributed system can help to get performance, remove bottlenecks, and reduce the demand for third-party credibility [158], IoT systems can be a threat to the memory capacity of a member in the P2P network. For instance, if 1000 users trade a single MB image every day in blockchain system, the analysis in Ref. [158] estimated that a blockchain server would require around 730 GB of file storage annually. As a result, when it comes to blockchain and IoT data, one of the challenges is to respond to the growing digital storage demands.

Crypto-currencies have been the most successful implementation of Blockchain, to complete transactions with minor charges for third party support. On the other hand, eHealth differ from crypto-currencies in terms of storage needs [159]. Health data is continuously streamed in a patient monitoring system, and transactions are created more often. Blockchain topology makes storing all health data on blockchain challenging for patients. In Ref. [160], the Patient Agent was given the ability to determine quick repositories for each data block based on its characteristics and privacy needs to overcome these challenges. The distributed ledger stores data blocks that require blockchain-driven secure storage. For instance, billing records, healthcare professional notes, and drug summaries can all be analyzed and kept in ledger.

A plethora of archives for records have emerged in the healthcare recently. Examples are government-managed EHRs, healthcare provider-managed EMRs, patient-managed Personal Health Records (PHRs), and current blockchain-driven systems handled mainly through technology. Repositories differ in security and quality. Depending on circumstances, the sensitivity and value of the health data contained in archives differ greatly from patient to patient. It isn’t easy to know which digital record store is optimal for preserving entire datasets. Wearable device health data is collected on a continuous basis. Because of the usage of technology, the issues are magnified. This effort was aided by the writers [160]. They allowed the Patient-Centric Agent to be utilized in machine learning-based applications and a storage model for data including suggestions.

As a result, you can make decisions fast, even while using real-time data. The model is divided into two parts: an upper part deals with input processing and algorithms to create dataset for training, and the lower half deals with ML models. The upper component of the model receives input from a variety of data blocks with various features. Several procedures are used to decide the repository for each data block, including correlation coefficient analysis, distance measures, heuristics rules and user preferences.

4.3 Data Analysis in Blockchain and Edge Computing

Large volumes of data are being created in near real-time. IoT data is vast in volume, varied in nature, and valuable in business. Big Data Analytics (BDA) may extract hidden information from IoT data and make intelligent decisions. On the other hand, traditional BDA methodologies are challenging to implement in blockchain of Things because of two factors: (1) Traditional BDA systems cannot be used with devices due to resource constraints. In addition, complex BDA methods cannot be built directly on IoT due to their limited computational capabilities.

Furthermore, keeping it locally on IoT devices is impractical due to the vast amount of blockchain data. Although cloud can help with challenges for data upload including privacy breach and latency [161]; the execution of algorithms for the data analysis on any block chain network as anonymous peer node will be difficult. Blockchain can address privacy by encrypting and digitally signing data records. Performing data analytics, on the other hand, frequently necessitates data decryption. Despite this, the decryption process often takes time, resulting in inefficient data analytics [162]. Without the decryption parameter, it is very tough to identify any means of data analysis on the data present in the block chain.

Edge computing can complement cloud computing by bringing computation from the cloud to the edge, which is closer to the customers. In addition, edge computing can increase reaction time, privacy protection, and context awareness compared to cloud computing. As a result, outsourcing BDA functions to edge servers can address the problem of cloud computing privacy leakage and long latency [163]. For the data analytics over the blockchain applications, there have been some significant advancements:

  1. 1.

    Complicated community detection over network [164] to identify many addresses for the same user.

  2. 2.

    Feature extraction of Bitcoin data transaction patterns to identify relationships [165].

  3. 3.

    Analysis of Ethereum user accounts & codes to detect fraud.

4.4 Scalability

Blockchains are also not extensively used in large-scale IoT due to their scalability. Transactions per second can be a unit for measuring the scalability. A plot between transactions per second vs. a number of IoT devices and workloads was made [127, 166]. Unfortunately, many blockchain systems have difficulty with throughput. As an example, Bitcoin process seven transactions per second, according to the authors in [167]. On the other hand, VISA can manage 2,000+ transactions/second, while PayPal can handle nearly 170 [168, 169]. Therefore, due to its lack of scalability, the Bitcoin may not be suited for IoT according to reference [170]. In conclusion, existing Blockchain may not be sufficient for high-volume transaction applications such as IoT.

Two approaches to improving blockchain scalability in IoT are possible: 1) developing scalable consensus algorithms and 2) creating private or consortium blockchain for devices. First, to boost transaction throughput, we can employ the consensus-localization technique. Meanwhile, new blockchain structures such as Directed Acyclic Graph [171] may be built that permits non-conflicting blocks to be linked with the primary chain, reducing the bifurcation resolution cost. Alternatively, one may combine PoW with Practical Byzantine Fault Tolerance (PBFT) [172] to boost PoW performance, similar to the Sharing Protocol described in [173], in which a puzzle was handled completely in POW, and then consensus is established in numerous small groups.

The transactions which are taking place into the private block chain can complete faster in comparison to the public block chain transactions due to the full controlled access to limited users. Private blockchain make forming an agreement simple. Furthermore, completely regulated blockchain meets the need for an organization to have complete control over several critical sectors [127, 133]. Despite some efforts (such as Hyperledger,Footnote 1 GemOS,Footnote 2 and MultichainFootnote 3), more mature consortium blockchain platforms serving specific sectors are envisaged.

4.5 Adaptability

There is a significant rise in the devices and applications used by these devices. As a result, one of the challenges for the integrated blockchain and edge is to deal with increasing number of user as well as the tasks of varying complexities, as well as the ability to adapt in the environment that allows various applications or IoT devices to connect to or leave blockchain network freely.

Tt is very difficult to acquire and achieve a high scalability in a block chain network, which is fully decentralized and highly secure. As per Vitalik Buterin, it is really impossible to achieve such high level of scalability. In contrast to the fact, IoT devices are more easily accessible and data can be fetched from these devices with ease, as compared to a secure decentralized block chain network. As a general fact, the IoT devices connect to the network on and off at various intervals of time. For example, PBFT [172] consensus method is well suited to IoT systems. In contrast, the PBFT approach can only be used in a fixed-size network with members who cannot easily change. For managing a number of devices, that isn’t scalable.

4.6 Data Reliability

IoT-based edge computing architectures are currently complex, with poor communication security and largely upstream communication pathways. As a result, data integrity and reliability are compromised. These challenges include data loss, malicious data insertion, network overload as well as computing power overload at the central node. For example, devices in homes have access to personal information about our lives and daily routines. This data must be shared with other devices and services to be valuable to us. However, this suggests that the homeowners are at a high risk of being targeted by hackers. In addition, companies and governments that invest in IoT are more vulnerable to data thefts from offshore thieves, competitors, or adversaries. Allowing blockchain to control data access on IoT devices would add an extra layer of security that any malicious agent would have to get around. In addition, it would be safeguarded by some of the most potent encryption standards available.

Traditional data protection measures, such as using a trusted central institution, rely on a centralized approach. Conventional systems are inappropriate for edge computing because the trusted central entity may have single point for failure possibilities. The security of the entire edge computing system is affected if the centralized system’s integrity-preserving system is compromised. A blockchain, a decentralized ledger that tracks transactions, is a viable solution. In blockchain, transactions are recorded as blocks, which form a linked list data structure. A hash value is assigned to each newly created block, which joins the previous and current blocks in an irreversible chain. This process is broadcast to all miners, and when the majority of miners return to the agreement, the freshly created block is successfully added. Because all users can confirm the transaction’s legality, it’s practically impossible to attack unless the attacker has control of majority of the clients, which is a feature of blockchain’s decentralized nature. As a result, in edge computing, blockchain is essential for assuring data integrity.

4.7 Incentive Mechanism in Blockchain for IoT

A well-designed incentive structure is a good stimulant for blockchain systems. For example, a miner who completes the computationally tricky task first will be rewarded with a certain amount of Bitcoins. Meanwhile, an Ethereum transaction can be charged a fee (i.e., gas) to compensate miners for contract execution. As a result, when designing incentive mechanisms for blockchain, there are two issues to consider: (1) a fee for proving (or mining) a block and (2) a price for completing a transaction (or a contract).

Designing an organized system for Blockchain of Things that meets the needs of a wide range of applications, on the other hand, is challenging. Digital currency platforms, for example, are in which miners are interested in a digital currency’s price. The BTC reward for a produced block, for example, will be half every 210,000 blocks [158]. As a result, miners can be discouraged from contributing to the puzzle’s solution due to the lower payout, leading them to seek out alternative blockchain platforms. Therefore, it’s critical to understand how to build a reliable digital currency rewarding and publishing mechanism to ensure blockchain systems’ integrity.

On the other side, users in consortium blockchain are driven by their integrity and reputation. As a result, in addition to digital currency, reputation credits (similar to the credit score in bank) can be considered as beneficial in personal repudiation systems [174], shareable economic [175], provenance of data [176], and the medical drug supply chain [177]. For example, RepChain [178] is a recent study that creates an incentive structure based on each node’s reputation.

4.8 Verifiable Computation

Edge computing administration is a constraint for edge computing, due to dispersed edge devices, their fragmented ownership, and population.

While the decentralized edge computing platform eliminates the need for a centralized administrative center, the issue is establishing decentralized mutual trust among participants. Verifiable computing, for example, permits computation to be offloaded to specific untrustworthy clients while the results remain correct. One of the difficulties with edge computing networks is maintaining verifiability in uploading computational activities to edge computation devices. The computation is outsourced to one or more servers using the computation function or the public key, and the result is provided along with proof to confirm the computation. By incorporating Blockchain, edge computing can be scaled to vast numbers of computations available in devices and third-party services. At the same time, smart contracts in blockchain should ensure efficient computation scheduling and correctness due to the incentive and autonomy of smart contracts.

4.9 Resource Management

Blockchain does not depend on a centralized server to maintain transaction data unlike other systems making use of centralized ledgers. Instead, users of blockchain network record and distribute data blocks. High transaction throughput as well as efficiency can be achieved by blockchain. It also ensures data privacy and integrity.

Deploying blockchain application in the edge devices has various challenges. First, it is because of mining process, which necessitates a large amount of computer processing power and energy from mobile devices to solve the Proof-of-Work (PoW) problem. The edge computing paradigm was created to address the issue, allowing miners to offload their mining work to a service provider making use of an edge computing device. However, efficiently allocating the limited edge computing resources to miners remains a problem.

4.10 Security Vulnerability

Although deploying blockchain at devices can improve security by providing encryption and digital signatures, due to the flaws in edge devices and blockchain systems, security remains a serious concern for BCoT.

On the one hand, edge devices are becoming more popular in industrial settings because of their ease of use and scalability. However, on the other hand, IoT is prone to security weaknesses such as passive eavesdropping [179] and replaying attacks [180] because of open wireless channel. Furthermore, due to resource constraints, traditional heavy-weighted encryption algorithms may not be viable for IoT devices [181]. Furthermore, managing keys (which are essential to encryption schemes) in a distributed context is difficult.

Meanwhile, blockchain such as smart contract programming faults [182], have their own security problems. Malevolent users can intercept blockchain communications utilizing the Border Gateway Protocol (BGP) routing mechanism, as proven in [183], resulting in prolonged block broadcasting delays. [184] also shows how a DAO attack exploited smart contract vulnerabilities to steal $50 million in Ethereum.

Security issues in blockchain can be solved by either strengthening IoT system security or addressing loopholes in blockchain. For instance, a collaborative jamming [185] was developed to improve security while requiring no additional hardware for IoT nodes. The work [186] uses key generations in a Long Range (LoRa) IoT network based on the unpredictability of wireless channels. There have also been notable developments in the area of blockchain defect correction. SABRE, for example, is a secure network for blockchain that can protect them against routing assaults, according to a recent paper by [187]. Furthermore, Corda and Stellar sacrifice smart contract expressiveness for smart contract verifiability [127].

4.11 Regulatory Issues in the IoT

Blockchain’s precision and security draw a wide range of applications in economics as well as law. For example, recently, a ransom attack was observed on the private network of New York Times, which was grabbed by the attention of U.S. Congress. A possible solution for such a cyberattack is to deploy a decentralized block chain network. The organization is currently looking on, and effective solution with the help of block chain. Since there are no regulations in the blockchain application management, various underground trading sites like now-defunct Silk [188] resulted in various scandals.

While some blockchain technical aspects like independence, security, and digitization are potential safety options for a variety of IoT applications, these characteristics when coupled provide a series of significant regulatory complexities [172]. For instance, data is continuously recorded in the Distributed Transaction Ledger (DTL) on peer-to-peer system and cannot be erased or updated, according to the immutability function. Furthermore, information cannot be vetted for secrecy before being published on blockchain given the lack of management. Activities taken as a response of running code on a DTL, such as smart agreements, may be illegal. Owing to the obscurity of the DTL, it is difficult to discern the individuals involved in illicit activities exchanges. While blockchain’s automated function has numerous benefits, the players responsible for certain behaviors like coding faults and obfuscation remain unclear. Existing IoT legislations are becoming obsolete, particularly with the introduction of emerging competitive technologies like blockchain, and must be updated in order to complete the DTL [158].

Filippi et al. [189] describe blockchain to be a transforming technology from “Code is a law” to “Law is Code”. Because of the decentralized nature of blockchain, traditional legislation cannot regulate it. Smart contract, which converts legislation into code can make laws. A smart device can be leveraged to turn directly into a product. Blockchain’s agreement Within the knowledge-driven economy, Pokrovskaia et al. [190] stressed the importance of having tax, financial, and societal regulating mechanisms. They stressed the importance of a well-defined regulatory framework for blockchain and fog computing. Effective governance and monitoring are essential for the long-term viability and adaptation of Blockchain. To appropriately control any cyberspace applications, Lessig [191] outlined three methods: law, economic means, and social norms. Combining these three methods allows blockchain-driven IoT applications to be governed appropriately. During the present scenario, there are no rules and regulations that will regulate the block chain applications inside a public or private network. Various IoT driven applications which are collecting data from sensors based devices will be responsible to define certain social norms. The rules will be applied to all the block chain applications so as to control and manage the data flowing through the information channel across these applications. One of the most important feature is to activate the smart contracts in the block chain network. A blockchain smart contract can be used to turn law into a product. Within the knowledge-driven economy, Pokrovskaia et al. [190] stressed the importance of having control mechanisms for tax, finance, and society. They emphasized the importance of a well-designed regulatory framework for blockchain and edge. Effective governance and monitoring are required for Blockchain to be sustainable and adaptable. Lessig [192] outlined four methods for adequately controlling any cyberspace applications: social norms, laws, and economic means. By combining these four methods, blockchain-driven IoT applications may be successfully governed. No legislations are available to handle and manage the blockchain applications. IoT application-oriented smart agents can define the norms for the blockchain applications to cope with tracking and controlling blockchain. It shows how an architecture of IoT and blockchain might specify regulating norms that are now absent in crypto-currencies such as Bitcoin, which has a solid security architecture, but other regulatory mechanisms have yet to be implemented.

Heimdall, a distributed smart contract-based framework described by Batista et al. [193], allows users to regulate access to sensitive data acquired by IoT devices while adhering to GDPR and the General Data Protection Law. User must be able to activate or deprive from any type of access without the intervention of a third party; personal data may or may not be accessible depending on the norms and protocol of the system; and audit the data from being modified to deleted. To do so, create a smart contract which can manage access control, write a protocol that explains the various operations and the activities that go along with them, define access rules, create a distributed system to check access rules.

4.12 To Balance Between Energy Consumption and Security

The enormous computing capacity requires to execute blockchain, which has hindered the development of digital services on top of blockchain platforms, for instance, energy consumption of Bitcoin in a contrast with Ireland’s residential electricity usage that the IoT devices cannot acquire [194]. According to Zhou et al. [154], the Bitcoin system consumes far more power than numerous countries. Furthermore, IoT data handling is being challenged by experts in blockchain. The experts claim that core mechanisms can be optimized to improve the number of verified blocks per second [195]. PoW agreement method for blockchain elimination can be used, for example, cut energy usage and improve results [196]. PoW, on the other hand, protects the blocks from hostile Sybil threats and renders them tamper-proof. The aim is to fine-tune blockchain operations such that safety and reliability must be balanced [197].

Mining blocks on P2P blockchain requires more resources than resource-constrained devices can provide. A blockchain agent (described in Refs. [146, 198]) may handle blockchain actions on behalf of devices when running on cloud and edge. The blockchain agent in Ref. [198] maintains various blockchain for IoT data and performs a consensus process.

Uddin et al. [198] aided in overcoming the difficulties of developing EHR blockchain to enable remote patient monitoring. An agent can be created in this proposal to connect blockchain. It is a software agent with AI models, which runs on a user’s device. However, creating a software agent on a smartphone is problematic because these devices may be linked to various sensors. For example, suppose the agent-containing device can be stolen or hacked. In that case, the activities of several IoT devices connected to the Gateway may be disrupted, exposing them to various harmful assaults [199]. As a result, the software agent must run on device or cloud to support distributed environments [200].

The blockchain agent (described in Ref. [198]) has the following functions.

  • On the patient’s end, provide security and privacy.

  • Determine how much data needs to be stored and how secure it needs to be. Some streams, for example, will require storage on blockchain, while others can be archived with less security.

  • Manage blockchain service providers. For example inserting in a blockchain by selecting a service provider and picking a miner based on latency, trust, energy consumption, and availability.

Uddin et al. [198] built a system for the monitoring of a patient in a hospital (as shown in Fig. 4), which uses an agent to connect blockchain to IoT devices. The framework’s agent is responsible to handle a specific piece of the blockchain, which includes the access control, mining as well as the selection of a minor. The handling of real-time of data is done with the help of several block chain connecting together for managing the privacy. To enhance the protection of the data across this agent oriented architecture, a lightweight communication protocol is used. The application which runs on a patience personal device ensures that the aging process runs on it. The intermediate device between a smart phone and the network of the agent block chain connects the sensor which are located at the body of the patient. The connectivity between the block chain peer nodes with the sensors is managed by the intermediate device. In this work, Java was used in the blockchain to analyze the performance of critical algorithms. The NetBeans IDE analyzed the performance of blockchain over network.

Fig. 4
figure 4

Basic operations in blockchain of things for Healthcare (image credit to the work [56])

4.13 Balancing Throughput and Concurrency

Because a blockchain depends on a decentralized ledger, the participants must spread blocks over the network to include and synchronize them by executing a validation method. The bandwidth of devices is restricted [5]. However, some of devices at the edge have been found to have enough bandwidth, due to the technology advancements. The bandwidth necessary to run a blockchain, on the other hand, may reach the upper limits of edge servers. To address this issue, an agent [198] don’t commit the transactions directly; instead, it organizes a set of transactions into blocks. As a result, many transactions do not move over decentralized network in real time. As a result, incorporating blockchain agent [198] into the eHealth architecture can help to reduce bandwidth requirements. In addition, reduction of the bandwidth consumption can be achieved by the blockchain agent.

In Ref. [198], the agent operates on the patient’s hardware and facilitates collaboration among blockchain network and IoT sensors [200]. Due to this, the patient data is usually at stake of the cyberattacks (e.g., denial of service). Ref. [146] suggested a solution to this challenge. Ref. [146] decentralized the blockchain agent by replicating it at the smartphone level. This is achieved with the placement of the Body Area Sensor Networks, at the processing fog layer and the far processing takes place at the cloud layer. The fuzzy inference method was used to create a lightweight modified PoS consensus system for blockchain to process patient records quickly. At fog and cloud, the consensus mechanism to process data was incorporated.

They are replicating the blockchain Agent in Refs. [146] at three levels allows patients’ responsibilities to be outsourced to edge and cloud nodes while maintaining privacy. The method of decentralization for the patient agent data in eHealth design ensures software longevity. It also preserves the secure storage of medical data without third-party trusted authorities. The near processing layer consists of edge devices, which is the next level of the sensing layer. The suitable component, which comprises numerous cloud service providers, enables blockchain to handle and store large amounts of data. The iFogSim was used to model a decentralized eHealth framework. Java was used to implement a consensus mechanism and an algorithm that preserves privacy in task migration. To measure the energy usage and block generation, the performance of essential algorithms was examined. Scyther [183, 198] was used to test the security systems’ strength and resilience against significant cyberattacks. Finally, the proposed frameworks were compared to other existing methods in terms of several metrics to illustrate the practicality of the methodology in eHealth monitoring.

4.14 Maintaining Both Transparency and Privacy

Critical industries like banking requires the transaction openness. Blockchain is a suitable solution to achieve this. However, while fetching data from the IoT platforms, like eHealth that are enabled with blockchain, there are chances for the customer privacy compromise [158]. Since the blockchain data is decentralized in nature and is replicated in various nodes, information processing may lead to data leak or breach. Homomorphic encryption technology in association with blockchain architecture can be a probable solution to preserve user data [201]. Homomorphic encryption technique handles user data without decryption, while addressing data privacy concerns. In a decentralized approach, the combination of homomorphic encryption with blockchain-driven eHealth can address a privacy challenge [201]. Therefore, a scheme using homomorphic encryption is need to be developed.

COVID-19’s current worldwide health issue necessitates tracking patients without a centralized entity, tamper-proof data exchange, and ensuring privacy while collecting COVID-19 data. To address COVID-19 issues, blockchain can be highly beneficial. The use of federated AI and learning in blockchain [192, 202, 203] can enable data collection and share user information while addressing privacy concerns.

5 Conclusion and Future Research

The combination of blockchain with IoT establishes a new paradigm for edge-IoT networks, which reshapes and changes them to allow new emerging applications in various fields such as healthcare. Several obstacles to implementing blockchain technology in the IoT area are noted in this review article, and it discusses how these obstacles are being overcome. Examining existing blockchain and Internet of Things (IoT) articles in relation to several aspects reveals both their strengths and weaknesses. Because BCoT has received so much interest from academia and business, other technologies will probably have an impact on its evolution. Future services and applications may have access to a variety of opportunities due to the confluence of BCoT and these technologies. In order to empower both worlds, we will provide future research directions for integrating BCoT in such technologies and share insights on these technologies in this area.

5.1 BCoT and machine Learning

Future BCoT’s key goal is to offer ubiquity in IoT services while enhancing system performance and security to keep up with the rising demands of user traffic and new services in future networks, such as 5 G and beyond. It is imperative to develop solutions for crucial BCoT network problems such resource scheduling, system management, and networking optimization if we are to meet these objectives. The majority of present-day solutions, however, are built on centralized designs or conventional optimization techniques, which presents some significant difficulties [167]. The data explosion which is expected to occur with the immense amount of data streaming through the IOT devices to the blockchain network may render the conventional method of data analytics and processing ineffective. It is also expected that the data streams at a very faster rate, which might provide latency issues due to the high rate of dynamics. Machine learning has been a highly effective approach to addressing these issues and helping future BCoT. The use of machine learning is very pronounced and accepted across a wide range of applications globally. Whether it is computer vision, recognition of speech, diagnosis of medical images, etc., the use of machine learning empowers the application by enabling artificial intelligence in machines to take effective decisions. Supervise and non-supervisory learning parameters are really responsible for providing intelligence to the machines, for taking their own decisions. Data training model to learn from these inputs, and deliver profound results is indeed one of the key features, which is responsible to provide enhanced network performances in machine learning technology. It is also expected that the use of machine learning will be able to revolutionize the present BCoT services.

5.2 In 5 G Networks and Beyond: BCoT

The unfathomable level of innovation offered by the next mobile network generations (5 G and beyond), along with some key benefits like high data rates, low network latency, energy savings, lower operating costs, higher system throughput, and widespread device connectivity, has completely changed industry and society. However, use of computing paradigms like 5 G, SDN, cloud computing and D2D communications can be very susceptible to security and privacy concerns of an individual user [120]. For instance, there are still significant security concerns with SDN, including forged or simulated traffic, control plane, and controller vulnerabilities, and a lack of trust-based protocols between the applications [121]. Additionally, it’s still unclear how to ensure between the service provider and the user to reduce the danger of data leakage during resource sharing between NFV clients and servers [122]. In such situations, the blockchain can offer workable security solutions. For instance, SDN implementation for the decentralized authorization using the smart contracts make use of blockchain to establish decentralized authentication methods [123]. Blockchain can also increase trust between network elements, such as SDN controllers and network users, by utilizing shared ledgers, allowing for dependable interactions and safe data exchange. Blockchain technology in NFV can protect system integrity from data risks, such as malicious VM alterations and data attacks, and secure the delivery of network functions [132]. The network slicing idea, which enables different tenants to share the same physical gear, is another component of 5 G that is necessary to support upcoming IoT applications. Inter-slice security vulnerabilities still exist with the network slicing procedure, though. For example, by taking advantage of information stored on the block corresponding to a target sliced user or domain [130].

Blockchain network is also expected to provide end-to-end networks slices, which creates dependable resources for the supplier. There will be a full control with the help of such a mechanism. [134]. Slice requests are submitted to the blockchain network using smart contracts for authentication. This allows resource providers to trade resources on contracts that include sub-slice components, and it also allows for the immutable recording and storage of sub-slice deployment information on the blockchain. Blockchain is able to foster confidence among all the D2D users and guarantee open and trustworthy data exchange between various users in 5 G networks [136]. Resourceful devices as laptops, servers or smartphones can be used for engaging mining of data at the blockchain servers. However, the lightweight devices involved in the D2D transactions are only for the use of services. These devices are only communicating for services and do not contribute to the mining of blockchain data [131].