Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information
Abstract
:1. Introduction
2. Preliminaries
2.1. Blockchain
2.2. Related Works
2.2.1. Traditional Work on Data Integrity
2.2.2. Application on Data Integrity
2.2.3. Blockchain-Based Work on Data Integrity
2.2.4. Others Work on Data Integrity
3. Distributed Management of Hierarchical IoT Information Based on Blockchain
3.1. Overview
3.2. Link IoT Devices between Subgroups
3.3. Creating IoT Subgroup Keys Using Vector Approximation
3.4. Creating and Validating IoT Information Blocks
Algorithms 1 Block generation algorithm for IoT information. |
Input: IoT information included in the subgroup Output: Generate replication information for odd/even 1: for all IoT information do 2: The IoT device generates IoT Information i [1, k] 3: Check its IoT Information 4: if sub-group generate IoT Information from IoT devices then 5: Store the IoT Information block 6: else 7: Return i 8: end if 9: if the IoT Information block can be identified then 10: Regenerate hash values for odd/even of IoT Information 11: else 12: reconfirm block the IoT Information 13: end if 14: end for |
Algorithm 2 Check algorithm of IoT information block. |
Input: IoT information block Output: Results of IoT information block check in the subgroup 1: share its block between each subgroup 2: for all IoT block information do contain from IoT device 3: if contain its block information in the subgroup then 4: if all the IoT block information are identical then 5: Accept this block 6: broadcast the accepted block information 7: else 8: Reject this block 9: Reject broadcast the rejected block information 10: end if 11: end if 12: end for 13: if accepted block information > rejected block information then 14: Each IoT device stores this block 15: else 16: Each IoT devices delete this block 17: end if |
4. Evaluation
4.1. Environment Setting
4.2. Performance Analysis
4.2.1. Blockchain Creation Time According to Blockchain Length
4.2.2. Latency Time Due to IoT Information Processing in a Blockchain-Based Overlay Network
4.2.3. Comparison of Integrity Verification Processing Times by Blockchain Size
4.2.4. Blockchain-Based Integrity Verification Overhead Comparison
4.2.5. Comparison of Blockchain-Based Integrity Verification Accuracy
4.2.6. The Rate of Change in Key According to the Blockchain-Based Hash Value
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Deng, H.; Wu, Q.; Qin, B.; Chow, S.S.M. Tracing and revoking leaked credentials: Accountability in leaking sensitive out-sourced data. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIA CCS ’14), Kyoto, Japan, 3–6 June 2014; ACM: New York, NY, USA; pp. 425–434. [Google Scholar]
- Ateniese, G.; Burns, R.; Curtmola, R.; Herring, J.; Kissner, L.; Peterson, Z.; Song, D. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS ’07), Alexandria, VA, USA, 29 October–2 November 2007; pp. 598–609. [Google Scholar]
- Prasanth, D.; Sandeep, N.; Chaitanya, T. Integrity Verification on Clustered Data using PDP in Cloud Environments. In Proceedings of the Sixth International Conference on Advances in Computing, Electronics and Electrical Technology—CEET 2016, Kuala Lumpur, Malaysia, 26–27 November 2016; pp. 145–149. [Google Scholar] [CrossRef] [Green Version]
- Wee, K.N.; Wen, Y.; Zhu, H. Private data deduplication protocols in cloud storage. In Proceedings of the SAC’12, Trento, Italy, 26–30 March 2012; ACM: New York, NY, USA, 2012; pp. 441–446. [Google Scholar]
- Wang, B.; Li, B.; Li, H. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. IEEE Trans. Serv. Comput. 2013, 8, 92–106. [Google Scholar] [CrossRef] [Green Version]
- Bowers, K.D.; Juels, A.; Oprea, A. Proofs of retrievability: Theory and implementation. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW’09), Chicago, IL, USA, 13 November 2009; ACM: New York, NY, USA; pp. 43–54. [Google Scholar]
- Erway, C.C.; Kupcu, A.; Papamanthou, C.; Tamassia, R. Dynamic provable data possession. In Proceedings of the CCS, Chicago, IL, USA, 9–13 November 2009; ACM: New York, NY, USA, 2009; pp. 213–222. [Google Scholar]
- Wang, H. Proxy Provable Data Possession in Public Clouds. IEEE Trans. Serv. Comput. 2013, 6, 551–559. [Google Scholar] [CrossRef]
- Zhu, Y.; Hu, H.; Ahn, G.-J.; Yu, M. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 2231–2244. [Google Scholar] [CrossRef] [Green Version]
- Wang, Q.; Wang, C.; Li, J.; Ren, K.; Lou, W. Enabling public verifiability and data dynamics for storage security in cloud computing. In European Symposium on Research in Computer Security; Springer: Berlin/Heidelberg, Germany, 2009; pp. 355–370. [Google Scholar]
- Nguyen, T.; Hoang, D.; Nguyen, D.; Seneviratne, A. Initial trust establishment for personal space IoT systems. In Proceedings of the 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 1–4 May 2017; pp. 784–789. [Google Scholar]
- Gwak, B.; Cho, J.-H.; Lee, D.; Son, H. TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 74–85. [Google Scholar]
- Pinel, E.C.; Long, A.E.; Landau, M.J.; Alexander, K.; Pyszczynski, T. Seeing I to I: A pathway to interpersonal connect-edness. J. Personal. Soc. Psychol. 2006, 90, 243–257. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Aman, M.N.; Chua, K.C.; Sikdar, B. Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet Things J. 2017, 4, 1327–1340. [Google Scholar] [CrossRef]
- Doukas, C.; Maglogiannis, I.; Koufi, V.; Malamateniou, F.; Vassilacopoulos, G. Enabling data protection through pki en-cryption in iot mhealth devices. In Proceedings of the IEEE 12th International Conference on Bioinformatics Bioengineering (BIBE), Memphis, TN, USA, 11–13 November 2012; pp. 25–29. [Google Scholar]
- Aman, M.N.; Sikdar, B.; Chua, K.C.; Ali, A. Low Power Data Integrity in IoT Systems. IEEE Internet Things J. 2018, 5, 3102–3113. [Google Scholar] [CrossRef]
- Conti, F.; Schilling, R.; Schiavone, P.D.; Pullini, A.; Rossi, D.; Gurkaynak, F.K.; Muehlberghuber, M.; Gautschi, M.; Loi, I.; Haugou, G.; et al. An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics. IEEE Trans. Circuits Syst. I Regul. Pap. 2017, 64, 2481–2494. [Google Scholar] [CrossRef] [Green Version]
- Wang, B.; Li, B.; Li, H. Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2014, 2, 43–56. [Google Scholar] [CrossRef]
- Huang, K.; Xian, M.; Fu, S.; Liu, J. Securing the cloud storage audit service: Defending against frame and collude attacks of third party auditor. IET Commun. 2014, 8, 2106–2113. [Google Scholar] [CrossRef] [Green Version]
- Liu, C.; Chen, J.; Yang, L.T.; Zhang, X.; Yang, C.; Ranjan, R.; Rao, K. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2234–2244. [Google Scholar] [CrossRef]
- Liu, B.; Yu, X.L.; Chen, S.; Xu, X.; Zhu, L. Blockchain Based Data Integrity Service Framework for IoT Data. In Proceedings of the 2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA, 25–30 June 2017; pp. 468–475. [Google Scholar]
- Yue, D.; Li, R.; Zhang, Y.; Tian, W.; Peng, C. Blockchain based data integrity veri_cation in P2P cloud storage. In Proceedings of the ICPADS, Sentosa, Singapore, 11–13 December 2018; pp. 561–568. [Google Scholar]
- Liang, X.; Shetty, S.; Tosh, D.; Kamhoua, C.; Kwiat, K.; Njilla, L. ProvChain: A blockchain-based data provenance archi-tecture in cloud environment with enhanced privacy and availability. In Proceedings of the 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid, Spain, 14–17 May 2017; pp. 468–477. [Google Scholar]
- Wang, C.; Chen, S.; Feng, Z.; Jiang, Y.; Xue, X. Block chain-based data audit and access control mechanism in service col-laboration. In Proceedings of the 2019 IEEE International Conference on Web Services (ICWS), Milan, Italy, 8–13 July 2019; pp. 214–218. [Google Scholar]
- Tkachenko, R.; Izonin, I.; Kryvinska, N.; Dronyuk, I.; Zub, K. An Approach towards missing data management using im-proved GRNN-SGTM ensemble method. Eng. Sci. Technol. Int. J. 2020, 1–15. [Google Scholar] [CrossRef]
- Zare, Y.; Rhee, K.Y. Formulation of tunneling resistance between neighboring carbon nantubes in polymer nanocompo-sites. Eng. Sci. Technol. Int. J. 2020, 1–6. [Google Scholar] [CrossRef]
- Tkachenko, R.; Izonin, I.; Dronyuk, I.; Logoyda, M.; Tkachenko, P. Recovery of Missing Sensor Data with GRNN-based Cascade Scheme. Int. J. Sens. Wirel. Commun. Control 2020, 10, 1. [Google Scholar] [CrossRef]
- Dong, Y.; Sun, L.; Liu, D.; Feng, M.; Miao, T. A Survey on Data Integrity Checking in Cloud. In Proceedings of the 2018 1st International Cognitive Cities Conference (IC3), Okinawa, Japan, 7–9 August 2018; pp. 109–113. [Google Scholar]
- Pujar, S.R.; Cjaudhari, S.S.; Aparna, R. Survey on Data Integrity and Verification for Cloud Storage. In Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 1–3 July 2020; pp. 1–7. [Google Scholar]
- Maheswari, K.; Bhanu, S.S.; Nickolas, S. A Survey on Data Integrity Checking and Enhancing Security for Cloud to Fog Computing. In Proceedings of the 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, India, 5–7 March 2020; pp. 121–127. [Google Scholar]
Division | Centralized Ledger Management | Distributed Ledger Management |
---|---|---|
Cloud Storage | | |
Type | Centralized management | Distributed management |
Notarization and management entity | Notarize all transaction details by the central third party | -All transaction participants view, notarize, and manage transaction details -Transaction history is shared and archived for all network participants |
Cost | The high cost of maintenance(management) | -Low system deployment costs -Low maintenance costs |
Characteristics | -Advantages: (1) quick transaction speed, (2) ease of control -Disadvantages: Vulnerable to security (Dos vulnerable to attacks and hacking) | -Advantages: (1) Maintaining transparency in transaction information, (2) No DDos attack, (3) No forgery of transaction details. -Advantages: (1) relatively slow transaction speed, (2) the complexity of control |
Feature | Description |
---|---|
Seamless blockchain provisioning | Provides a very simple model for creating blockchain as part of a PaaS environment. |
Elastic scalability | Simplifies adding and removing nodes to a blockchain network. |
Global Availability | Cloud environments enable blockchain provisioning anywhere in the world. |
Simple programming model | Provides a simple programming model for creating blockchain applications by abstracting the underlying blockchain infrastructure. |
Parameter | Value |
---|---|
The transmit/receive the power of the users | 0.1 W/0.05 W |
The network coverage radius | 400 m |
The static circuit power | 0.1 W |
The path loss exponent | 3 |
The available bandwidth for | 12 MHz/6 MHz |
The maximum size of the blockchain | 2 Mbytes |
The power of noise | −174 dBm/Hz |
The mean value of Rayleigh fading | 1 |
Input data size | 5 kbits/s |
Delay threshold | 10 s |
Computation workload/intensity | 18,000 CPU cycles/bit |
Computation energy efficiency coefficient of the processor’s chip in the APs/users , | |
The computational capability of the Aps | 10–100 GHz CPU cycles/s |
The Computational capability of the users | 1–10 GHz CPU cycles/s |
The unit price of energy | 0.1 Token/J |
Number of Blockchain | Blockchain Generation Time (ms) | |||
---|---|---|---|---|
No Using Transaction Cumulative | Using 3 Average Transaction Cumulative | Using 5 Average Transaction Cumulative | Using 10 Average Transaction Cumulative | |
10 | 5.71 | 4.82 | 3.53 | 2.45 |
25 | 6.43 | 5.27 | 4.39 | 3.26 |
50 | 7.12 | 6.68 | 5.23 | 4.48 |
100 | 8.96 | 8.34 | 7.34 | 6.74 |
150 | 13.25 | 12.39 | 10.54 | 9.17 |
200 | 20.38 | 16.83 | 14.75 | 12.47 |
250 | 26.34 | 21.16 | 18.61 | 16.31 |
300 | 33.66 | 27.31 | 24.36 | 20.79 |
Number of IoT Info. | Latency Time for IoT Information Processing (ms) | ||
---|---|---|---|
Common Network | Overlay Network | Overlay Network Based on Blockchain | |
100 | 73.25 | 58.74 | 46.29 |
250 | 66.57 | 52.69 | 43.48 |
500 | 61.15 | 48.53 | 40.26 |
750 | 58.83 | 46.75 | 39.27 |
1000 | 57.18 | 45.03 | 37.74 |
Number of IoT Info. | Integrity Verification Processing Times by Blockchain Size (ms) | ||
---|---|---|---|
Common Network | Overlay Network | Overlay Network Based on Blockchain | |
100 | 13.74 | 11.21 | 9.91 |
250 | 15.67 | 13.31 | 10.37 |
500 | 18.31 | 15.76 | 13.32 |
750 | 21.08 | 18.65 | 17.84 |
1000 | 25.17 | 22.39 | 19.08 |
Number of IoT Info. | Latency Time for IoT Information Processing (ms) | |||||
---|---|---|---|---|---|---|
No Overlay Network | Overlay Network | |||||
No Using RSA | Only Using RSA | Using TCA and RSA | No Using RSA | Only Using RSA | Using TCA and RSA | |
100 | 63.19 | 57.81 | 54.82 | 60.79 | 54.72 | 51.71 |
250 | 67.71 | 63.94 | 57.65 | 64.67 | 57.69 | 53.27 |
500 | 71.54 | 67.62 | 60.74 | 66.54 | 60.92 | 57.62 |
750 | 76.13 | 72.64 | 65.93 | 71.32 | 64.81 | 54.58 |
1000 | 81.32 | 77.63 | 69.78 | 76.14 | 67.34 | 60.42 |
Number of IoT Info. | Verification Accuracy for IoT Information Processing (ms) | |||||
---|---|---|---|---|---|---|
No Overlay Network | Overlay Network | |||||
No Using RSA | Only Using RSA | Using TCA and RSA | No Using RSA | Only Using RSA | Using TCA and RSA | |
100 | 63.94 | 67.93 | 73.98 | 70.19 | 73.17 | 76.93 |
250 | 66.76 | 69.86 | 75.19 | 72.91 | 75.31 | 78.84 |
500 | 70.03 | 72.64 | 77.25 | 73.94 | 77.83 | 81.16 |
750 | 73.85 | 75.04 | 80.37 | 76.75 | 80.16 | 84.75 |
1000 | 77.39 | 81.06 | 84.63 | 83.68 | 85.95 | 89.42 |
Evaluation Item | Key Length in Blockchain | |||
---|---|---|---|---|
64 | 128 | 256 | 512 | |
53.148 | 53.967 | 54.525 | 54.742 | |
41.521 | 42.161 | 42.597 | 42.767 | |
4.424 | 4.258 | 4.892 | 4.923 | |
4.017 | 3.879 | 4.325 | 4.415 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jeong, Y.-S.; Sim, S.-H. Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information. Sensors 2021, 21, 2049. https://doi.org/10.3390/s21062049
Jeong Y-S, Sim S-H. Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information. Sensors. 2021; 21(6):2049. https://doi.org/10.3390/s21062049
Chicago/Turabian StyleJeong, Yoon-Su, and Sung-Ho Sim. 2021. "Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information" Sensors 21, no. 6: 2049. https://doi.org/10.3390/s21062049
APA StyleJeong, Y.-S., & Sim, S.-H. (2021). Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information. Sensors, 21(6), 2049. https://doi.org/10.3390/s21062049