Next Article in Journal
Design of PAM-8 VLC Transceiver System Employing Neural Network-Based FFE and Post-Equalization
Next Article in Special Issue
Review and Development of a Scalable Lightweight Blockchain Integrated Model (LightBlock) for IoT Applications
Previous Article in Journal
An Adaptive Beetle Swarm Optimization Algorithm with Novel Opposition-Based Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Blockchain Application Analysis Based on IoT Data Flow

School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, China
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(23), 3907; https://doi.org/10.3390/electronics11233907
Submission received: 20 October 2022 / Revised: 16 November 2022 / Accepted: 23 November 2022 / Published: 26 November 2022
(This article belongs to the Special Issue Blockchain Technology Is Applied in the IoT System)

Abstract

:
In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given.

1. Introduction

With the arrival of the 5G era, the Internet of Things technology has been rapidly developed, the efficiency of information transmission dramatically improved, and people’s access to information gradually diversified. At the same time, the risk of privacy disclosure has also increased [1]. In 2019, American SR Lab carried out two attacks on voice agent software (VPA) and found that, after the exit command was issued, the subject’s conversations could still be eavesdropped [2]. In December 2020, the network security team found data leakage in SocialArks. The leaked database contained more than 408 GB of data and 318 million records. The number of affected users was about 214 million, mainly from three major social media sites: Instagram, Facebook, and LinkedIn, which seriously affected people’s lives; moreover, the data leakage seriously threatened the information security of the edge device owners of the Internet of Things.
Blockchain technology has anonymity protection and tamper resistance, effectively protecting information, user privacy, and the sharing of data in real-time [3]. It removes traditional third-party tools, does not rely on specific central nodes, realizes P2P transactions, and avoids the risk of privacy disclosure caused by a single point of failure. Blockchain features such as tamper resistance, decentralization, and traceability provide suitable conditions for data storage [4].
This paper mainly uses keyword extraction and reconstructed graph review methods to analyze the blockchain. A keyword extraction method was used to extract 82 representative papers published in the last five years from Web of Science and IEEE Xplore, which were combined with blockchain and Internet of Things technology. The 82 papers were divided into five modules by an inductive analysis, according to the different stages of data flow processing: data encryption module blockchain solution, data access control module blockchain solution, data extraction module blockchain solution, data storage module blockchain solution, and blockchain data visualization. The review method of reconstructed maps was used to simplify the complex models in the references and visualize them from the perspective of data flow processing. At the same time, some papers only propose ideas and methods, but no model diagram is conducive to the reader’s understanding. Due to this situation, a reconstructed diagram is presented to visualize and facilitate the reader’s experience.
By analyzing the overview papers on the combination of the Internet of Things and blockchain on the Web of Science and IEEE Xplore websites, we found that the current research reviews concern the application of blockchain technology in one or two data processing links of the Internet of Things. These reviews are one-sided and do not offer a comprehensive and objective assessment of all data processing links. The main contributions of this paper are as follows:
  • The entire process of IoT data flow from data receiving to data visualization is divided into five modules from the perspective of the data processing mode. There is no inductive method based on IoT data flow in the current research review.
  • This paper analyzes all data processing modules that combine IoT data and blockchain. Compared with the published overview papers in this field, the content is more comprehensive and the classification more specific.
  • The analysis method of the reconstruction diagram is adapted to display the various modules of the Internet of Things data stream processing data and to visualize the application of blockchain technology. The combination of graphics and text makes the expression more intuitive.
  • The research analyzed and summarized 82 papers from the past five years, showing the latest research progress of blockchain in the Internet of Things system.

2. Overview of Blockchain

Blockchain originated from Bitcoin, and since then, there have been alternative currencies with better privacy protection effects, such as Dashi Coin, Monroe Coin, and Zcash. Blockchain is a decentralized storage technology based on P2P network architecture. Its first description was in 2008 [5]. Between nodes, a unique information transmission mechanism was eventually adopted. The information is broadcasted to the entire domain. It abandons the traditional trust service relying on a reliable third party, supports point-to-point anonymous transactions throughout the process, greatly reduces the risk of network eavesdropping, and effectively protects user information security.

2.1. Working Principle

The blockchain system consists of Block Header, Block Body, and Policy Header, which form a chain structure with the sequence in the form of a “series connection”. The block header encapsulates the version number, timestamp, hash value of the previous block, Merkle root, and random value of the solution. The block body records the number of transactions. In addition to the Genesis block, each block in the blockchain contains the hash value of the previous block [6]. Figure 1 is the specific structure of the blockchain, and its workflow is as follows:
  • The encrypted transaction information is uploaded through the node, and the current node broadcasts the information to the nodes of the whole network in the form of relay forwarding;
  • Miners verify the signatures of the collected transaction information and write the effective information into the block;
  • The transaction information in a given period is formed into a new candidate block, and the node obtains the workload proof meeting the target difficulty through the PoW consensus mechanism;
  • The blocks found by this node are broadcast to the whole network;
  • The whole network node verifies this node. When the transaction information is valid and has never existed, it will be added to the blockchain after verification, and a new block extension chain will be created behind this block.

2.2. Consensus Algorithm

The consensus algorithm was first used to study distributed problems. In 1982, Lamport put forward the “Byzantine General Problem”, that is, how to make all nodes reach a consensus when there are dishonest nodes in the network. In response to this problem, he proposed the Byzantine Fault Tolerance (BFT) algorithm. Later, Castro and others proposed a practical Byzantine Fault Tolerance (PBFT) algorithm, that is, when the dishonest nodes in the network are less than 1/3 of the nodes in the whole network, the whole network can reach a consensus. The PBFT algorithm has lower complexity and less computing power than the BFT algorithm, which reduces power waste to a certain extent. In 1993, Cynthia proposed the PoW (Proof of work, PoW) mechanism. Subsequently, Nakamoto Cong announced that it would apply the PoW consensus mechanism to Bitcoin transactions. This mechanism relies on powerful computing power to ensure the blockchain is secure and tamper-resistant. To tamper with the data in the block, more than 51% of the whole network’s computing power must be mastered, thus, ensuring the security of the transaction [7]. In 2012, Peercoin adopted the Proof of Stake (PoS) mechanism as the consensus mechanism and selected the node with the highest equity in the system, according to the currency age for bookkeeping. Compared with the PoW consensus, Peercoin improved the transaction efficiency and increased the throughput. In 2014, Dan proposed the Delegated Proof of Steak (DPoS). This mechanism is similar to the “Board of Directors”. Members of the “Board of Directors” are elected by democratic election. Members need to pay a certain margin and can benefit from transaction fees. This consensus mechanism guarantees node interests speed up the block out and enable rapid consensus verification [8].

3. Division of IoT Data Flow Module

The Internet of Things is a new technology paradigm derived from the Internet era, which uses the network to intelligently control various terminal devices [9,10]. A global or specific local area network can be formed according to specific needs to achieve the interoperability of people and things [11]. The Internet of Things technology can be used in various fields, such as medical care [12,13], agricultural science and technology [14], and the ecological environment [15].
Based on the transmission direction of the Internet of Things’ data flow from a new perspective, this research integrates how the data flow can be combined with blockchain technology to prevent privacy leakage during the whole transportation process from sender to receiver. It reconstructs the data flow of the Internet of Things at a new level and visualizes the blockchain defense means with the reconstruction diagram analysis method. Figure 2 is the reconstruction diagram of the IoT data flow module division.

4. Blockchain Solutions

4.1. Data Encryption Module Blockchain Solution

In the Internet of Things system, data at the encryption layer are vulnerable to the threat of privacy disclosure, such as device firmware leakage, side channel-based device exceptions, etc. Encrypting data based on the blockchain can effectively reduce the risk of data leakage at the encryption layer.

4.1.1. Agent Re-Encryption Technology Based on Blockchain

Proxy re-encryption technology eliminates the dependence on third parties and decrypts data by transferring different keys to different users instead of using shared public keys as an intermediate link, which not only increases the security of information, but also reduces the complexity of operations [16,17,18,19,20,21,22,23]. Gao [16] proposed a combination of blockchain and proxy re-encryption technology for device communication and data sharing in the IoT community. Chen [17] proposed a threshold-based proxy re-encryption algorithm combined with the blockchain consensus algorithm, which eliminates the restrictions on the secure storage and distribution of private data in a distributed network and meets a wide range of data access needs. Manzoor [18] proposed a proxy re-encryption scheme to automate Internet of Things payments, transfer data from producers to consumers anonymously and securely, analyze the performance of hybrid systems by using an unlicensed Ethernet blockchain, and compare it with the IBM Super Accounting Structure, a licensed blockchain. Liyanage [19] proposed a proxy re-encryption scheme for data sharing in the Internet of Things. Data are only visible to owners and people in smart contracts, but the system lacks storage scalability. Pournaghi [20] proposed a proxy re-encrypted medical information sharing scheme based on blockchain and attributes, encrypted based on data attributes and stored on private blockchain, in contrast to public blockchain, which shares information on attribute fields, but the entire encryption process lacks a fine-grained division of privileges between individuals and hospitals. Figure 3 shows a reconstructed blockchain-based proxy re-encryption technique. Table 1 shows the abbreviated word in Figure 3.

4.1.2. Blockchain-Based Encryption Algorithm

In the aggregation process of Internet of Things data, various encryption algorithms can be used to encrypt the data [24,25,26,27,28,29,30,31,32]. During the aggregation process of distributed data, Louki [24] proposed to protect the privacy of aggregated data by combining blockchain with homologous encryption technology. Group-level aggregation can confuse IoT data, thus, complicating the inference of sensitive information from a single IoT device. Figure 4 is a reconstructed diagram of this scheme. Guo [25] discusses asymmetric encryption mechanisms on the blockchain, but each node in the blockchain is not completely anonymous. With the development of various anti-anonymous identity filtering and other technologies, it is still possible to locate and identify some key targets. Priyadarsini [26] proposed a hybrid chaotic encryption algorithm for medical images in the context of the Internet of Things. Guruprakash [27] proposed a hybrid elliptic curve algorithm and genetic algorithm to encrypt IoT data using blockchain technology, which greatly improves the overall performance of the IoT system. However, there is still room to improve the overall performance of consensus and physical identification mechanisms. Alshamrani [28] proposed a lightweight DNA-GA (DNA genetic algorithm) encryption method for resource-constrained Internet of Things devices on a blockchain, which improves data security and reduces encryption and decryption time. Abd-El-Atty [29] proposed a new blockchain-based quantum attack-resistant computer encryption algorithm for smart cities in the Internet of Things. The main advantage of the framework described is to help IoT nodes effectively share their data with other nodes and fully control their records.

4.1.3. Hierarchical Encryption Based on Blockchain

Different ecosystems of the Internet of Things have different requirements for data processing architectures. Pavithran [33] proposes a Hierarchical Encryption of Identity (HIBE) Block Chain architecture for privacy protection in the Internet of Things and uses edge computing and cloud computing to protect data privacy. Zhang [34] proposed using low-consumption hierarchical key distribution to encrypt data in the medical care Internet of Things (H-IoT) system for medical information sharing on the blockchain. Figure 5 is a reconstructed hierarchical data-sharing diagram of the medical care Internet of Things based on blockchain.

4.1.4. Attribute Encryption Based on Blockchain

Attribute-based Internet of Things encryption protects private data while making targeted calls to the data [35,36,37,38,39,40]. Rahulamathavan [35] proposed a privacy protection architecture for the Internet of Things based on attribute encryption and blockchain technology, which fully guarantees the privacy of data. Figure 6 is a reconstructed flow diagram of the attribute encryption (CP-ABE) algorithm based on a ciphertext encryption strategy. Lu [36] proposed a blockchain privacy protection scheme based on the combination of attribute encryption and access control of the Internet of Things. Smart contracts are used to implement access control, and blockchain technology is used for privacy protection. Nakanishi [37] proposed attribute-based encryption (CP-ABE) in the Intelligent Internet of Things (IoTA) to upload tokens with attribute encryption to the database. Yu [38] proposed an updatable and revocable attribute encryption method for blockchain-based IoT systems to achieve two-way compatibility.

4.2. Data Access Control Module Blockchain Solution

To protect the integrity and privacy of the data, a blockchain solution is introduced to the data access process. The blockchain-based access control architecture of the Internet of Things greatly reduces the risk of privacy leakage.

4.2.1. Attribute Access Control Based on Blockchain

Attribute-based access control can make control decisions [41,42,43,44,45,46] based on the access control policies and consensus algorithms that are created. Islam [41] proposed to combine attribute-based access control with blockchain-based access control to the Internet of Things (IoT) system. Intelligent contracts and distributed consensus provide access control to the Internet of Things. Yang [42] proposed using attribute-based access control to solve dynamic problems caused by dynamic access and data changes in the Internet of Things, and using blockchain technology to solve possible DDoS attacks. Ding [43] proposed the use of attribute-based access control for IoT systems to avoid single-point failures and data tampering, and the use of blockchain technology to record the distribution of attributes. Zaidi [44] is a distributed file system based on the Internet of Things. The effectiveness of the Attribute Access Control model is analyzed using the Intergalactic File System as an example. Data owners store ciphertext on blockchain through smart contracts.

4.2.2. Functional Access Control Based on Blockchain

Function-based access control can more closely meet the availability and interoperability of the Internet of Things [47,48,49,50,51,52,53]. Sivaselvan [47] set the functionality as a token and performed all operations with a blockchain. It not only meets the interoperability of the Internet of Things, but also meet the different needs of enterprises. This method satisfies the interoperability of Internet architecture between different scenarios. Bouras [48] presented a distributed access control architecture based on functions, which solves the problem of weak interoperability between IoT Federation networks. Liu [49] proposed a feature-based access control architecture to address smart delivery in a variety of Internet of Things environments, using blockchain and various discrete identifiers to identify devices in the Internet of Things while protecting user privacy and security. To meet the scalability of Smart Internet, Xu [50] proposed a function-based joint delegation model, which supports the hierarchical and multipoint delegation of privileges, registers, and revokes privileges using blockchain smart contracts, as well as providing a more scalable Internet of Things system. In IoTA Open Source Distributed Accounts, Pinjala [51] proposed the use of a Functional Access Control Framework, which provides unpaid transactions for the Internet of Things while guaranteeing the integrity and privacy of functional tokens.

4.2.3. Blockchain-Based Identity and Role Access Control

Identity-based access control architecture [54,55,56,57,58,59,60,61] and role-based access control architecture [62,63] are suitable for solving identity management issues in the Internet of Things. In the access control system of the Internet of Things, Bouras [54] proposed the use of identity management to identify and authorize access rights and store the rights information on the federation chain to ensure that the information cannot be tampered with. Cui [55] classified nodes according to their functional differences, built a blockchain between different nodes to form hierarchical networks, authenticated ordinary nodes in the local blockchain, and authenticated collection nodes in the common blockchain.

4.2.4. Fine-Grained Access Control Based on Blockchain

Fine-grained access control allows the creation of smart contracts detailing data privileges based on the data owner’s wishes [64,65,66,67,68,69]. Ding [64] proposed a fine-grained access control framework using licensing blockchain technology to enhance trust in untrusted environments by implementing a trusted access control mechanism. Xu [65] proposed a hierarchical attribute encryption algorithm for fine-grained access control by authorizing different user attributes. To achieve fine-grained access control and compatibility between attribute update and revocation on blockchain in the Internet of Things, Yu [38] proposed a fine-grained attribute-based encryption algorithm to solve the update problem of blockchain data.

4.3. Data Extraction Module Blockchain Solution

4.3.1. Searchable Encryption

The technology that enables data to be searched in encrypted situations is called searchable encryption (SE) technology, which is divided into two types: symmetric searchable encryption technology and asymmetric searchable encryption technology. To share data in the Internet of Things, asymmetric searchable encryption technology called public-key encryption with keyword search (PEKS), is commonly used. Searchable encryption uses bilinear mapping to map groups G1 and G2 of prime P on two vectors to one vector. Define a bilinear map e: G1 × G1→G2, conforms to the following characteristics:
  • Non-degenerate: If A is a generator of G1, e (a, a) maps to a generator of G2, and b, c ∈ G1 exists, satisfying e(b, c) e ≠ 1.
  • Bilinear: For any a, b ∈ G1, there exists x, y ∈ Z q * , so that the equation e (ax, by) = e (a, b) x y holds.
  • Computability: For any a, b ∈ G1, there is a valid algorithm to compute e (a, b).
The Internet of Things (IoT) has changed our lives through massive data production. Liu [39] proposed a blockchain-assisted searchable attribute encryption (BC-SABE) with efficient revocation and decryption capabilities, in which the traditional centralized server was replaced by the distributed blockchain system responsible for threshold parameter generation, key management, and user revocation. Xiang [69] proposed that blockchain be used as a database and searchable encryption mechanism for searching keywords using the same encryption technology. Through comparative analysis, the security and search ability of this scheme are proved.

4.3.2. Key Decryption

Algorithm 1 decrypts the searched data to obtain the information on the chain, the PEKS decryption algorithm is as follows:
Algorithm 1: PEKS Decryption Algorithm
Enter common parameters [params, g], public key, keyword, return ciphertext
Trapdoor Generation Algorithm:
Enter the public parameter [params], Secret key, keyword to look up, return trapdoor
def Trapdoor (params, sk, word):
pairing = Pairing(params)
hash_value = Element.from_hash (pairing, G1, G2) Hash1(str(word). encode(‘utf-8’)).hexdigest ())
return hash_value ** sk

4.4. Data Storage Module Blockchain Solution

The introduction of a decentralized consensus blockchain and the Intergalactic File System (IPFS) increases data storage and enables data expansion [70]. Ye [71] proposed to use IPFS and blockchain to store vehicle data in the Internet of Things together, so as to achieve the safe and effective storage of vehicle data. Sakakibara [72] proposed a cache technology based on a Field Programmable Gate Array (field programmable gate array) network interface card (NIC) to improve the storage of blockchain on the Internet of Things. The proposed system can reduce server overload. Xu [73] designed a non-dominant sorting genetic algorithm with clustering (NSGA-C). By adding clustering to ensure diversity, a suitable solution for different users is selected, which is superior to other improvements in local space consumption. Two-tier blockchain connects information on two different blockchains. Pal [74] proposed a dual-blockchain architecture, which moves the attribute storage and access of a public blockchain onto a secure private blockchain. Experiments show that the performance of this scheme has been greatly improved. Table 2 summarizes the current blockchain solutions for the Internet of Things data storage module.

4.5. Blockchain Data Visualization

Blockchain data in the Internet of Things require some operation after collection to achieve the visualization purpose. Song [75] proposed a visualization tool to visualize the IoT sensor data stored as transactions through a series of data monitoring in the blockchain. Scarlato [76] proposed a scheme for inserting and visualizing travel data on the blockchain, which achieves the goal of data visualization by writing back-end and front-end infrastructure codes and replicating databases to maintain the same data. Table 3 is a summary of blockchain solutions for IoT data flow.

5. Challenges and Application

5.1. Blockchain Challenges

Internet of Things security faces challenges in authentication, authorization/access control, availability, confidentiality integrity [77], reading the information, identifying malicious nodes, illegal exploitation, etc. The main challenges are as follows:
  • Security (75%), privacy (62.5%), resource limitation (50%), and scalability (50%) are the most important issues in block-based Internet of Things research [78].
  • In the blockchain-based Internet of Things, there is a bottleneck in the research process for edge-device distributed trust management [79].
  • According to the mapping between the characteristics of the Internet of Things and the blockchain, there is space for each terminal device in the Internet of Things to achieve absolute decentralization through the blockchain. When the blockchain network acts as a complete or lightweight node, different consensus mechanisms will change the effectiveness of the integration of the Internet of Things [80].
  • Blockchain technology is used when there are only a few nodes. As it takes some time to read information from the blockchain, it may slow down the speed of information reading.
  • Malicious nodes join the blockchain and use the consensus algorithm to obtain all information on the public ledger.
  • Blockchain technology is used by the dark net to engage in illegal activities.

5.2. Blockchain Application Scenarios

The Internet of Things is the integration of the physical world into the network world. It can provide related services according to different scenarios. The integration of the Internet of Things and blockchain can be applied in various fields. Tapia concluded from 164 papers that security and privacy (31.08%), health care (19.59%), and energy (9.46%) are the three most widely used areas [80]. We have categorized some application scenarios of blockchain, and Figure 7 shows other potential areas of blockchain, which are not limited to the applications discussed in this paper.
In addition to the application areas shown in the figure, the application scenarios include private data storage, education, banking, taxation, media, smart homes, etc. Figure 7 shows that blockchain is widely used in people’s lives, and blockchain can be utilized in various areas of life to protect data privacy. Blockchain applications in different areas improve data security and protect people’s privacy.

5.3. Other Data Privacy Protection Methods

Blockchain technology is widely used in all aspects of IoT information flow because of its good protection of information. Its consensus mechanism can handle many security issues, such as multi-party issues, lack of trusted third-party platforms, and the need to monitor activities between entities in real time. In addition, it can also resist a variety of attack types, such as replay attacks and witch attacks. In addition to blockchain technology, there are many ways to protect data privacy in the process of processing data. The following is a collation of other privacy protection methods:
Data perturbation technology [81]: The purpose of protecting data privacy is achieved by perturbing the original data. The data obtained by the attacker are not real; they are also distorted. In the data perturbation method, the localized differential privacy technology is the most widely used technology. It distorts the original data by adding noise to achieve the purpose of protecting data privacy. However, in the process of interference, the information loss is too large and the data availability is reduced. This process can use distributed ledgers to improve the data transmission speed and capacity and reduce data loss [82].
Data encryption technology: By encrypting the original data to achieve the purpose of protecting data privacy, common encryption methods include the Advanced Encryption Standard (AES) algorithm [83], RSA public key cryptography system, elliptic curve cryptosystems (ECC) algorithm [84], and homomorphic encryption algorithm [85]. However, in the encryption process, third-party servers are prone to privacy leakage. The decentralized characteristics of blockchain technology can be used to protect the security of data [86].
Data anonymization [87]: Data can be anonymized and selectively published according to its sensitivity, thereby reducing the risk of data privacy leakage. Common technologies include k-anonymity [88], L-Diversity [89], and T-Closeness [90]. However, the anonymous algorithm requires significant calculation, involves a large amount of data processing overhead, and is vulnerable to background knowledge attacks.
Federal Learning [91]: Based on the distributed framework, by using artificial intelligence algorithms, data modeling is realized under the mechanism of data non-sharing and encryption, and the built sharing model can be used by all participants. However, some work shows that federated learning can be easily leaked by third-party attackers, or by central servers in the process of training parameter update iteration.
Table 4 compares the differences between blockchain privacy protection methods and other privacy protection methods from four aspects. The comparison shows that the blockchain privacy protection method can better protect the privacy of data than other privacy protection methods.
The technical director of the US Department of Homeland Security (DHS) has created a flowchart to help people determine whether blockchain technology is needed. The comparison results in Table 4 show that blockchain is an appropriate way to manage data streams under very limited conditions [92]. However, other privacy protection methods have some pitfalls, and their degree of protection is lower than blockchain technology.

5.4. Blockchain Considerations

Blockchain should be selectively applied based on a full understanding of the technology. The technical director of the US Department of Homeland Security (DHS) has created a flowchart to help people determine whether blockchain technology is needed. The flow chart lists six questions to help those who are interested in using blockchain determine whether it is necessary; if the given six problems are met at the same time, it is necessary to use blockchain technology.
Blockchain technology also faces some problems in different application scenarios. In the field of medicine and healthcare, if patient data are shared and stored, problems such as excessive information, insufficient storage space, and slow information search speed arise. Therefore, a double-layer blockchain is proposed to solve this problem. In the field of Internet of Things, each IoT system uses its own alliance chain; that multiple Internet of Things systems realize multi-party information security sharing is a problem worthy of study. In the field of artificial intelligence, machine learning requires significant computing power; thus, how to generate high throughput in the case of a large number of concurrent requests needs further research.

6. Conclusions

The Internet of Things (IoT) system has a wide range of applications, and the interaction between devices is complex. The data flow faces multiple security threats in each module of data processing. Blockchain technology can defend against various threats, so it is applied in all aspects of data processing. In this paper, the keyword extraction method is used to extract 94 latest documents from the last five years. From a new perspective of data processing, these representative works are divided into five modules by inductive analysis; then, each module is visualized by a reconstruction graph. This paper summarizes 11 methods of processing IoT data combined with blockchain technology. The results show that blockchain technology can be applied to the entire transmission process of IoT data flow, but the degree of application is different. It is most widely used in data encryption and data access control. In the process of data visualization, the method is single, and there is still space for further research.
The most popular feature of blockchain technology is its non-tamperability. However, in the future, some work will likely involve modifying the data on the blockchain, requiring us to develop new technical means to solve it. Our future work will be devoted to studying how to selectively change the data on the blockchain to make more rational use of blockchain technology.

Author Contributions

Conceptualization, J.L. and X.Z.; formal analysis, J.L. and W.S.; investigation, J.L. and W.S.; data curation, J.L; writing—original draft preparation, J.L.; writing—review and editing, J.L. and X.Z.; supervision, X.Z.; funding acquisition, X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by grants from the National Natural Science Foundation of China (No.61802161), the Scientific Research Project of Liaoning Provincial Department of Education (No. JZL202015404, LJKZ0625), and the Applied Basic Research Program of Liaoning Province (No.2022JH2/101300280).

Data Availability Statement

The study did not report any data.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xie, Y.; Shi, j.; Huang, S.; Lei, K. Overview of the research on the Internet of Things for 5G named data network. Comput. Sci. 2020, 47, 217–225. [Google Scholar] [CrossRef]
  2. Guo, Z.; Lin, Z.; Li, P.; Chen, K. {SkillExplorer}: Understanding the Behavior of Skills in Large Scale. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, 12–14 August 2020. [Google Scholar]
  3. Wei, S.; Lv, W.; Li, S. Overview of typical security issues in block chain public chain application. J. Softw. 2022, 33, 324–355. [Google Scholar] [CrossRef]
  4. Yao, Q.; Zhang, D. Overview of identity management technology in block chain system. J. Softw. 2021, 32, 2260–2286. [Google Scholar] [CrossRef]
  5. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 1 November 2008).
  6. Wang, H.; Zhou, M. Blockchain based medical information security storage model. Comput. Sci. 2019, 46, 174–179. [Google Scholar] [CrossRef]
  7. Guo, S.; Wang, R.; Zhang, F. Overview of the Principle and Application of Blockchain Technology. Comput. Sci. 2021, 48, 271–281. [Google Scholar] [CrossRef]
  8. Yuan, Y.; Wang, F. Development Status and Prospect of Blockchain Technology. J. Autom. 2016, 42, 481–494. [Google Scholar] [CrossRef]
  9. Tian, Z.; Zhao, J. Overview of Blockchain Consensus Mechanism for the Internet of Things. Comput. Appl. 2021, 41, 917–929. [Google Scholar] [CrossRef]
  10. Leng, Z.; Wang, K.; Liang, W.; Zheng, Y. Overview of research on the application of super ledger in the Internet of Things from the perspective of reconstruction map. Comput. Appl. Res. 2022, 39, 1–13. [Google Scholar] [CrossRef]
  11. Yang, Y.; Zhou, W.; Zhao, S.; Liu, C.; Zhang, Y.; Wang, H.; Wang, W.; Zhang, Y. Overview of IoT security research: Threats, detection and defense. J. Commun. 2021, 42, 188–205. [Google Scholar] [CrossRef]
  12. Belfiore, A.; Cuccurullo, C.; Aria, M. IoT in healthcare: A scientometric analysis. Technol. Forecast. Soc. Chang. 2022, 184, 122001. [Google Scholar] [CrossRef]
  13. Mavrogiorgou, A.; Kiourtis, A.; Kyriazis, D. A pluggable IoT middleware for integrating data of wearable medical devices. Smart Health 2022, 26, 100326. [Google Scholar] [CrossRef]
  14. Ferrández-Pastor, F.-J.; Mora-Pascual, J.; Díaz-Lajara, D. Agricultural traceability model based on IoT and Blockchain: Application in industrial hemp production. J. Ind. Inf. Integr. 2022, 29, 100381. [Google Scholar] [CrossRef]
  15. Hu, R.; Shahzad, F.; Abbas, A.; Liu, X. Decoupling the influence of eco-sustainability motivations in the adoption of the green industrial IoT and the impact of advanced manufacturing technologies. J. Clean. Prod. 2022, 339, 130708. [Google Scholar] [CrossRef]
  16. Gao, Y.; Chen, Y.; Lin, H.; Rodrigues, J.J.P.C. Blockchain Based Secure IoT Data Sharing Framework for SDN-Enabled Smart Communities. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 514–519. [Google Scholar] [CrossRef]
  17. Chen, Y.; Hu, B.; Yu, H.; Duan, Z.; Huang, J. A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain. Electronics 2021, 10, 2359. [Google Scholar] [CrossRef]
  18. Manzoor, A.; Braeken, A.; Kanhere, S.S.; Ylianttila, M.; Liyanage, M. Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain. J. Netw. Comput. Appl. 2020, 176, 102917. [Google Scholar] [CrossRef]
  19. Manzoor, A.; Liyanage, M.; Braeke, A.; Kanhere, S.S.; Ylianttila, M. Blockchain Based Proxy Re-Encryption Scheme for Secure IoT Data Sharing. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Republic of Korea, 14–17 May 2019; pp. 99–103. [Google Scholar]
  20. Pournaghi, S.M.; Bayat, M.; Farjami, Y. MedSBA: A novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 4613–4641. [Google Scholar] [CrossRef]
  21. Sharma, S.; Swarnakar, A.; Babu, C.J.; Padmavathy, R.; Kumar, R. An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services. In Proceedings of the 5th IEEE International Conference on Computing, Communication & Security (ICCCS-2020), Patna, Bihar, India, 14–16 October 2020; pp. 1–8. [Google Scholar] [CrossRef]
  22. Meiliasari, R.P.; Syalim, A.; Yazid, S. Performance Analysis of the Symmetric Proxy Re-encryption Scheme. In Proceedings of the 2019 International Workshop on Big Data and Information Security (IWBIS), Bali, Indonesia, 11 October 2019; pp. 91–96. [Google Scholar] [CrossRef]
  23. Hussain, S.; Ullah, I.; Khattak, H.; Adnan, M.; Kumari, S.; Ullah, S.S.; Khan, M.A.; Khattak, S.J. A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid. IEEE Access 2020, 8, 93230–93248. [Google Scholar] [CrossRef]
  24. Loukil, F.; Ghedira-Guegan, C.; Boukadi, K.; Benharkat, A.-N. Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption. Sensors 2021, 21, 2452. [Google Scholar] [CrossRef] [PubMed]
  25. Guo, L.; Xie, H.; Li, Y. Data encryption based blockchain and privacy preserving mechanisms towards big data. J. Vis. Commun. Image Represent. 2019, 70, 102741. [Google Scholar] [CrossRef]
  26. Priyadarsini, N.R.; Bhama, P.R. B-SCORE–A blockchain based hybrid chaotic signatures for medical image encryption in an IoT environment. Concurr. Comput. Pract. Exp. 2022, 34, e7115. [Google Scholar] [CrossRef]
  27. Guruprakash, J.; Koppu, S. EC-ElGamal and Genetic Algorithm-Based Enhancement for Lightweight Scalable Blockchain in IoT Domain. IEEE Access 2020, 8, 141269–141281. [Google Scholar] [CrossRef]
  28. Alshamrani, S.S.; Basha, A.F. IoT data security with DNA-genetic algorithm using blockchain technology. Int. J. Comput. Appl. Technol. 2021, 65, 150–159. [Google Scholar] [CrossRef]
  29. El-Latif, A.A.A.; Abd-El-Atty, B.; Mehmood, I.; Muhammad, K.; Venegas-Andraca, S.E.; Peng, J. Quantum-Inspired Blockchain-Based Cybersecurity: Securing Smart Edge Utilities in IoT-Based Smart Cities. Inf. Process. Manag. 2021, 58, 102549. [Google Scholar] [CrossRef]
  30. Makarenko, I.; Semushin, S.; Suhai, S.; Kazmi, S.M.A.; Oracevic, A.; Hussain, R. A Comparative Analysis of Cryptographic Algorithms in the Internet of Things. In Proceedings of the 2020 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), Moscow, Russia, 27–29 October 2020; pp. 1–8. [Google Scholar] [CrossRef]
  31. Pang, Z.; Yao, Y.; Li, Q.; Zhang, X.; Zhang, J. Electronic Health Records Sharing Model based on Blockchain with Checkable State PBFT Consensus Algorithm. IEEE Access 2022, 10, 87803–87815. [Google Scholar] [CrossRef]
  32. Xie, X.; Chen, Y.-C. Decentralized Data Aggregation: A New Secure Framework Based on Lightweight Cryptographic Algorithms. In Proceedings of the 2021 IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, Fukushima, Japan, 30 January–2 February 2021; pp. 1–2. [Google Scholar] [CrossRef]
  33. Pavithran, D.; Al-Karaki, J.N.; Shaalan, K. Edge-Based Blockchain Architecture for Event-Driven IoT using Hierarchical Identity Based Encryption. Inf. Process. Manag. 2021, 58, 102528. [Google Scholar] [CrossRef]
  34. Zhang, J.; Yang, Y.; Liu, X.; Ma, J. An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things. IEEE Trans. Ind. Inform. 2022, 18, 7139–7150. [Google Scholar] [CrossRef]
  35. Rahulamathavan, Y.; Phan, R.C.-W.; Rajarajan, M.; Misra, S.; Kondoz, A. Privacy-Preserving Blockchain Based IoT Ecosystem Using Attribute-Based Encryption. In Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bhubaneswar, India, 17–20 December 2017; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  36. Lu, X.; Fu, S.; Jiang, C.; Lio, P. A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain. Secur. Commun. Networks 2021, 2021, 1–13. [Google Scholar] [CrossRef]
  37. Zhang, Y.; Nakanishi, R.; Sasabe, M.; Kasahara, S. Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things. Sensors 2021, 21, 5053. [Google Scholar] [CrossRef]
  38. Yu, G.; Zha, X.; Wang, X.; Ni, W.; Yu, K.; Yu, P.; Zhang, J.A.; Liu, R.P.; Guo, Y.J. Enabling Attribute Revocation for Fine-Grained Access Control in Blockchain-IoT Systems. IEEE Trans. Eng. Manag. 2020, 67, 1213–1230. [Google Scholar] [CrossRef]
  39. Liu, S.; Yu, J.; Xiao, Y.; Wan, Z.; Wang, S.; Yan, B. BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT. IEEE Internet Things J. 2020, 7, 7851–7867. [Google Scholar] [CrossRef]
  40. Guo, R.; Yang, G.; Shi, H.; Zhang, Y.; Zheng, D. O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System. IEEE Internet Things J. 2021, 8, 8949–8963. [Google Scholar] [CrossRef]
  41. Islam, A.; Madria, S. A Permissioned Blockchain Based Access Control System for IOT. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 469–476. [Google Scholar] [CrossRef]
  42. Yang, Q.; Zhang, M.; Zhou, Y.; Wang, T.; Xia, Z.; Yang, B. A Non-Interactive Attribute-Based Access Control Scheme by Blockchain for IoT. Electronics 2021, 10, 1855. [Google Scholar] [CrossRef]
  43. Ding, S.; Cao, J.; Li, C.; Fan, K.; Li, H. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 2019, 7, 38431–38441. [Google Scholar] [CrossRef]
  44. Zaidi, S.Y.A.; Shah, M.A.; Khattak, H.A.; Maple, C.; Rauf, H.T.; El-Sherbeeny, A.M.; El-Meligy, M.A. An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts. Sustainability 2021, 13, 10556. [Google Scholar] [CrossRef]
  45. Wang, P.; Yue, Y.; Sun, W.; Liu, J. An Attribute-Based Distributed Access Control for Blockchain-Enabled IoT. In Proceedings of the 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 21–23 October 2019; pp. 1–6. [Google Scholar] [CrossRef]
  46. Gao, S.; Piao, G.; Zhu, J.; Ma, X.; Ma, J. TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain. IEEE Trans. Veh. Technol. 2020, 69, 5784–5798. [Google Scholar] [CrossRef]
  47. Sivaselvan, N.; Bhat, V.; Rajarajan, M. Blockchain-Based Scheme for Authentication and Capability-based Access Control in IoT Environment. In Proceedings of the 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 28–31 October 2020; pp. 0323–0330. [Google Scholar] [CrossRef]
  48. Bouras, M.A.; Xia, B.; Abuassba, A.O.; Ning, H.; Lu, Q. IoT-CCAC: A blockchain-based consortium capability access control approach for IoT. PeerJ Comput. Sci. 2021, 7, e455. [Google Scholar] [CrossRef]
  49. Liu, Y.; Lu, Q.; Chen, S.; Qu, Q.; O’Connor, H.; Choo, K.-K.R.; Zhang, H. Capability-based IoT access control using blockchain. Digit. Commun. Netw. 2020, 7, 463–469. [Google Scholar] [CrossRef]
  50. Xu, R.; Chen, Y.; Blasch, E.; Chen, G. BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Computers 2018, 7, 39. [Google Scholar] [CrossRef] [Green Version]
  51. Pinjala, S.K.; Sivalingam, K.M. DCACI: A Decentralized Lightweight Capability-Based Access Control Framework Using IOTA for INTERNET of Things. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 13–18. [Google Scholar] [CrossRef]
  52. Nakamura, Y.; Zhang, Y.; Sasabe, M.; Kasahara, S. Capability-Based Access Control for the Internet of Things: An Ethereum Blockchain-Based Scheme. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar] [CrossRef]
  53. Nakamura, Y.; Zhang, Y.; Sasabe, M.; Kasahara, S. Exploiting Smart Contracts for Capability-Based Access Control in the Internet of Things. Sensors 2020, 20, 1793. [Google Scholar] [CrossRef]
  54. Bouras, M.A.; Lu, Q.; Dhelim, S.; Ning, H. A Lightweight Blockchain-Based IoT Identity Management Approach. Futur. Internet 2021, 13, 24. [Google Scholar] [CrossRef]
  55. Cui, Z.; Xue, F.; Zhang, S.; Cai, X.; Cao, Y.; Zhang, W.; Chen, J. A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN. IEEE Trans. Serv. Comput. 2020, 13, 241–251. [Google Scholar] [CrossRef]
  56. Vallois, V.; Mehaoua, A.; Amziani, M. Blockchain-Based Identity and Access Management in Industrial IoT Systems. In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), Bordeaux, France, 17–21 May 2021; pp. 623–627. [Google Scholar]
  57. Alamri, B.; Crowley, K.; Richardson, I. Blockchain-Based Identity Management Systems in Health IoT: A Systematic Review. IEEE Access 2022, 10, 59612–59629. [Google Scholar] [CrossRef]
  58. Truong, H.T.T.; Almeida, M.; Karame, G.; Soriente, C. Towards Secure and Decentralized Sharing of IoT Data. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 176–183. [Google Scholar] [CrossRef] [Green Version]
  59. Gebresilassie, S.K.; Rafferty, J.; Morrow, P.; Chen, L.L.; Abu-Tair, M.; Cui, Z. Distributed, Secure, Self-Sovereign Identity for IoT Devices. In Proceedings of the 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
  60. Fotohi, R.; Aliee, F.S. Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. Comput. Netw. 2021, 197, 108331. [Google Scholar] [CrossRef]
  61. Sharma, P.; Moparthi, N.R.; Namasudra, S.; Shanmuganathan, V.; Hsu, C. Blockchain-based IoT architecture to secure healthcare system using identity-based encryption. Expert Syst. 2021, 39, e12915. [Google Scholar] [CrossRef]
  62. Ameer, S.; Benson, J.; Sandhu, R. An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach. Information 2022, 13, 60. [Google Scholar] [CrossRef]
  63. Amoon, M.; Altameem, T.; Altameem, A. RRAC: Role based reputed access control method for mitigating malicious impact in intelligent IoT platforms. Comput. Commun. 2020, 151, 238–246. [Google Scholar] [CrossRef]
  64. Ding, Y.; Sato, H. Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy Environment. In Proceedings of the 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK, 3–6 August 2020; pp. 17–22. [Google Scholar] [CrossRef]
  65. Xu, H.; He, Q.; Li, X.; Jiang, B.; Qin, K. BDSS-FA: A Blockchain-Based Data Security Sharing Platform With Fine-Grained Access Control. IEEE Access 2020, 8, 87552–87561. [Google Scholar] [CrossRef]
  66. Zhu, Y.; Wu, X.; Hu, Z. Fine Grained Access Control Based on Smart Contract for Edge Computing. Electronics 2022, 11, 167. [Google Scholar] [CrossRef]
  67. Bao, Y.; Qiu, W.; Tang, P.; Cheng, X. Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System. IEEE J. Biomed. Health Inform. 2021, 26, 2041–2051. [Google Scholar] [CrossRef]
  68. Chen, L.; Huang, K.; Manulis, M.; Sekar, V. Password-authenticated searchable encryption. Int. J. Inf. Secur. 2020, 20, 675–693. [Google Scholar] [CrossRef]
  69. Xiang, X.; Zhao, X. Blockchain-assisted searchable attribute-based encryption for e-health systems. J. Syst. Arch. 2022, 124, 102417. [Google Scholar] [CrossRef]
  70. Subathra, G.; Antonidoss, A.; Singh, B.K. Decentralized Consensus Blockchain and IPFS-Based Data Aggregation for Efficient Data Storage Scheme. Secur. Commun. Networks 2022, 2022, 1–13. [Google Scholar] [CrossRef]
  71. Ye, H.; Park, S. Reliable Vehicle Data Storage Using Blockchain and IPFS. Electronics 2021, 10, 1130. [Google Scholar] [CrossRef]
  72. Sakakibara, Y.; Morishima, S.; Nakamura, K.; Matsutani, H. A Hardware-Based Caching System on FPGA NIC for Blockchain. IEICE Trans. Inf. Syst. 2018, E101.D, 1350–1360. [Google Scholar] [CrossRef] [Green Version]
  73. Xu, M.; Feng, G.; Ren, Y.; Zhang, X. On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm. IEEE Internet Things J. 2020, 7, 8547–8558. [Google Scholar] [CrossRef]
  74. Pal, S.; Rabehaja, T.; Hill, A.; Hitchens, M.; Varadharajan, V. On the integration of blockchain to the internet of things for enabling access right delegation. IEEE Internet Things J. 2019, 7, 2630–2639. [Google Scholar] [CrossRef]
  75. Song, J.; Nang, J.; Jang, J. Design of Anomaly Detection and Visualization Tool for IoT Blockchain. In Proceedings of the 2018 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 12–14 December 2018; pp. 1464–1465. [Google Scholar] [CrossRef]
  76. Scarlato, M.; Catte, M.; Massidda, C.; Modica, P.; Pinna, A.; Piras, R.; Tonelli, R.; Jeon, M. BATDIV: A Blockchain-based Approach for Tourism Data Insertion and Visualization. In Proceedings of the 2021 IoT Vertical and Topical Summit for Tourism, Cagliari, Italy, 20–24 September 2021; pp. 1–6. [Google Scholar] [CrossRef]
  77. Sharma, V.; Lal, N. A Detail Dominant Approach for IoT and Blockchain with their Research Challenges. In Proceedings of the 2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3), Lakshmangarh, India, 21–22 February 2020; pp. 1–6. [Google Scholar] [CrossRef]
  78. Tapia, J.Y.; Avila-Pesantez, D. Blockchain and IoT-Challenges and Its Role in Security: A Brief Overview. In Proceedings of the 2021 IEEE URUCON, Montevideo, Uruguay, 24–26 November 2021; pp. 504–507. [Google Scholar] [CrossRef]
  79. Fortino, G. Keynote Speech 1: Blockchain-Enabled Trust in Edge-Based Internet of Things Architectures: State of the Art and Research Challenges. In Proceedings of the 2021 Third International Conference on Blockchain Computing and Applications (BCCA), Tartu, Estonia, 15–17 November 2021; p. 1. [Google Scholar] [CrossRef]
  80. Romashkova, I.; Komarov, M.; Ometov, A. Demystifying Blockchain Technology for Resource-Constrained IoT Devices: Parameters, Challenges and Future Perspective. IEEE Access 2021, 9, 129264–129277. [Google Scholar] [CrossRef]
  81. Ma, C.; Yuan, L.; Han, L.; Ding, M.; Bhaskar, R.; Li, J. Data Level Privacy Preserving: A Stochastic Perturbation Approach based on Differential Privacy. IEEE Trans. Knowl. Data Eng. 2021, 1. [Google Scholar] [CrossRef]
  82. Hassan, S.; Fazea, Y.; Habbal, A.; Ibrahim, H. Twisted Laguerre-Gaussian Mode Division Multiplexing to Support Blockchain Applications. In Proceedings of the TENCON 2017-2017 IEEE Region 10 Conference, Penang, Malaysia, 5–8 November 2017; pp. 2050–2421. [Google Scholar] [CrossRef]
  83. Li, Y. User Privacy Protection Technology of Tennis Match Live Broadcast from Media Cloud Platform Based on AES Encryption Algorithm. In Proceedings of the 2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE), Dalian, China, 27–29 September 2020; pp. 267–269. [Google Scholar] [CrossRef]
  84. Jaspin, K.; Selvan, S.; Sahana, S.; Thanmai, G. Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm. In Proceedings of the 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 5–7 March 2021; pp. 791–796. [Google Scholar] [CrossRef]
  85. Karim, H.; Rawat, D.B. TollsOnly Please—Homomorphic Encryption for Toll Transponder Privacy in Internet of Vehicles. IEEE Internet Things J. 2021, 9, 2627–2636. [Google Scholar] [CrossRef]
  86. Xu, G.; Zhang, J.; Wang, L. An Edge Computing Data Privacy-Preserving Scheme Based on Blockchain and Homomorphic Encryption. In Proceedings of the 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS), Huaihua China, 15–17 July 2022; pp. 156–159. [Google Scholar] [CrossRef]
  87. Moqurrab, S.A.; Anjum, A.; Tariq, N.; Srivastava, G. Instant_Anonymity: A Lightweight Semantic Privacy Guarantee for 5G-enabled IIoT. IEEE Trans. Ind. Inform. 2022, 19, 951–959. [Google Scholar] [CrossRef]
  88. Esmeel, T.K.; Hasan, M.; Kabir, M.N.; Firdaus, A. Balancing Data Utility versus Information Loss in Data-Privacy Protection Using k-Anonymity. In Proceedings of the 2020 IEEE 8th Conference on Systems, Process and Control (ICSPC), Melaka, Malaysia, 11–12 December 2020; pp. 158–161. [Google Scholar] [CrossRef]
  89. Enam, A.; Sakib, S.; Rahman, S. An Algorithm for l-diversity Clustering of a Point-Set. In Proceedings of the 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox’sBazar, Bangladesh, 7–9 February 2019; pp. 1–6. [Google Scholar] [CrossRef]
  90. Ren, W.; Ghazinour, K.; Lian, X. kt-Safety: Graph Release via k-Anonymity and t-Closeness. IEEE Trans. Knowl. Data Eng. 2022, 1–12. [Google Scholar] [CrossRef]
  91. Si, G.; Zhang, Y.; Sun, Y. Privacy Protection Strategy Based on Federated Learning for Smart Park Multi Energy Fusion System. In Proceedings of the 2021 IEEE 4th International Conference on Computer and Communication Engineering Technology (CCET), Beijing, China, 13–15 August 2021; pp. 392–395. [Google Scholar] [CrossRef]
  92. Blockchain Technology Overview. Available online: https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.IR.8202.pdf (accessed on 3 October 2018).
Figure 1. Block structure reconstruction diagram.
Figure 1. Block structure reconstruction diagram.
Electronics 11 03907 g001
Figure 2. Division and reconstruction diagram of IoT data flow module.
Figure 2. Division and reconstruction diagram of IoT data flow module.
Electronics 11 03907 g002
Figure 3. Reconstruction of agent re-encryption technology based on blockchain.
Figure 3. Reconstruction of agent re-encryption technology based on blockchain.
Electronics 11 03907 g003
Figure 4. Data aggregation and reconstruction of privacy protection Internet of Things based on blockchain and homomorphic encryption.
Figure 4. Data aggregation and reconstruction of privacy protection Internet of Things based on blockchain and homomorphic encryption.
Electronics 11 03907 g004
Figure 5. Blockchain-based healthcare IoT layered data-sharing reconstruction diagram.
Figure 5. Blockchain-based healthcare IoT layered data-sharing reconstruction diagram.
Electronics 11 03907 g005
Figure 6. (CP-ABE) Algorithm process reconstruction diagram.
Figure 6. (CP-ABE) Algorithm process reconstruction diagram.
Electronics 11 03907 g006
Figure 7. Blockchain Application Scenarios.
Figure 7. Blockchain Application Scenarios.
Electronics 11 03907 g007
Table 1. Notation.
Table 1. Notation.
SymbolMeaning
ETCiphertext
IoT sensorsData owner
Data consumersData user
GDCGrade decision center
GIdentity level
CAccess condition-set
SKIDSecret key
RKIDRe-encryption key
Table 2. Data storage blockchain solution.
Table 2. Data storage blockchain solution.
Blockchain SolutionsReferencesPerformance Analysis
Interplanetary File System (IPFS) + Blockchain[70,71]Capacity expansion + secure storage
Network interface card (NIC) + blockchain[72]Reduce server overload + secure storage
Clustering (NSGA-C) + Genetic Algorithm[73]Minimum local space
Double-layer blockchain[74]Secure storage + Security Access + expansion
Table 3. Summary of Internet of Things data flow blockchain solutions.
Table 3. Summary of Internet of Things data flow blockchain solutions.
Module Division of IoT Data FlowTechnology or MethodReferences
Data Encryption Module Blockchain SolutionAgent Re-encryption Technology Based on
Blockchain
[16,17,18,19,20,21,22,23]
Blockchain-Based Encryption Algorithm[24,25,26,27,28,29,30,31,32]
Hierarchical Encryption Based on Blockchain[33,34]
Attribute Encryption Based on Blockchain[35,36,37,38,39,40]
Data Access Control Module Blockchain SolutionAttribute Access Control Based on Blockchain[41,42,43,44,45,46]
Function Access Control Based on Blockchain[47,48,49,50,51,52,53]
Identity and Role Access Control Based on
Blockchain
[54,55,56,57,58,59,60,61]
Fine-grained Access Control Based on Blockchain[64,65,66,67]
Data Extraction Module Blockchain SolutionSearchable Encryption Technology[68,69]
Key Decryption
Data Storage
Module Blockchain Solution
IPFS + NIC + NSGA-C + Double-Layer Blockchain[70,71,72,73,74]
Blockchain Data VisualizationVisualization Tools[75,76]
Table 4. Comparison of blockchain technology with other data privacy protection methods.
Table 4. Comparison of blockchain technology with other data privacy protection methods.
Privacy
Protection Method
TechniqueSmall Data LossTrusted Third PartyA Small Quantity of ComputationDifficult to Be Attacked by a Third Party
Blockchain Privacy ProtectionConsensus Algorithm, Smart ContractYES---YESYES
Data Perturbation Privacy ProtectionLocal Differential PrivacyNO---YESYES
Data Encryption Privacy ProtectionAES, RSA, ECCYESNOYESNO
Data Anonymous Privacy ProtectionK-anonymity,
L-Diversity,
T-Closeness
YESYESNONO
Federal Learning Privacy ProtectionDeep LearningYES---NONO
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, J.; Zhang, X.; Shi, W. Blockchain Application Analysis Based on IoT Data Flow. Electronics 2022, 11, 3907. https://doi.org/10.3390/electronics11233907

AMA Style

Li J, Zhang X, Shi W. Blockchain Application Analysis Based on IoT Data Flow. Electronics. 2022; 11(23):3907. https://doi.org/10.3390/electronics11233907

Chicago/Turabian Style

Li, Juxia, Xing Zhang, and Wei Shi. 2022. "Blockchain Application Analysis Based on IoT Data Flow" Electronics 11, no. 23: 3907. https://doi.org/10.3390/electronics11233907

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop