Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Three-tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy

Published: 21 August 2023 Publication History

Abstract

Recently, most of the Internet of things (IoT) infrastructures are highly centralized with single points of failure, which results in serious security and privacy issues of IoT data. Fortunately, blockchain technique can provide a decentralized and secure IoT framework to deal with security issues based on the characteristics of decentralization, non-tampering, openness, transparency, and traceability. However, the blockchain consensus protocol guarantees the safety and reliability of data, but it also brings problems such as scalability limitations and poor storage extensibility, resulting in the inability to directly integrate blockchain and the IoT in existing conditions. In this article, a private three-tier local blockchain, Three-tier architecture Blockchain (TBchain), is proposed to solve the problem by splitting part of the transactions in the public blockchain and locking them in a higher-level blockchain TBchain. Additionally, the private blockchain TBchain is connected to the public blockchain to build a hierarchical blockchain network to provide privacy protection for the IoT data stored on the blockchain. Finally, we implement an IoT framework based on TBchain and the InterPlanetary File System (IPFS) to realize the decentralized IoT, which guarantees the user’s access control right to personal data. Experimental results show that the IoT framework based on TBchain and IPFS realizes the user’s access control right to personal data by verifying in advance to ensure the confidentiality and security of shared data, and improves the security and privacy of IoT data and transactions. Moreover, we prove that the scalability and storage extensibility of the blockchain is positively correlated with the number of data blocks in TBchain.

References

[1]
N. A. Anagnostopoulos, S. Ahmad, T. Arul, D. Steinmetzer, M. Hollick, and S. Katzenbeisser. 2020. Low-cost security for next-generation IoT networks. ACM Transactions on Internet Technology 20, 3 (2020), 1–31.
[2]
A. Dorri, S. S. Kanhere, R. Jurdak, and G. Praveen. 2017. Blockchain for IoT security and privacy: The case study of a smart home. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 618–623.
[3]
M. S. Ali, K. Dolui, and F. Antonelli. 2017. IoT data privacy via blockchains and IPFS. In Proceedings of the 7th International Conference on the Internet of Things, 1–7.
[4]
E. Bertino, K. K. R. Choo, D. Georgakopolous, and S. Nepal. 2016. Internet of Things (IoT) smart and secure service delivery. ACM Transactions on Internet Technology 16, 4 (2016), 1–7.
[5]
S. Nakamoto and A. Bitcoin. 2008. A peer-to-peer electronic cash system. Bitcoin. Retrieved from https://bitcoin.org/bitcoin.pdf. Accessed October 2022.
[6]
M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli, and M. H. Rehmani. 2018. Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Communications Surveys and Tutorials 21, 2 (2018), 1676–1717.
[7]
S. Biswas, K. Sharif, F. Li, B. Nour, and Y. Wang. 2018. A scalable blockchain framework for secure transactions in IoT. IEEE Internet of Things Journal 6, 3 (2018), 4650–4659.
[8]
S. Madumidha, P. SivaRanjani, S. Rajesh, and S. Sivajumar. 2018. Blockchain security for Internet of Things: A literature survey. International Journal of Pure and Applied Mathematics 119, 16 (2018), 3677–3686.
[9]
K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, S. E. Gün, and D. Song. 2016. On scaling decentralized blockchains. International Conference on Financial Cryptography and Data Security. Springer, Berlin, 106–125.
[10]
A. Dorri, S. S. Kanhere, and R. Jurdak. 2017. Towards an optimized blockchain for IoT. 2017 IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation. IEEE, Pittsburgh, 173–178.
[11]
J. Wu, F. Xiong, and C. Li. 2019. Application of Internet of Things and blockchain technologies to improve accounting information quality. IEEE Access 7 (2019), 100090–100098.
[12]
A. Rejeb, J. G. Keogh, and H. Treiblmaier. 2019. Leveraging the Internet of Things and blockchain technology in supply chain management. Future Internet 11, 7 (2019), 161.
[13]
C. Li and L. J. Zhang. 2017. A blockchain based new secure multi-layer network model for Internet of Things. 2017 IEEE International Congress on Internet of Things (ICIOT), Honolulu, 2017, 33–41.
[14]
A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito. 2018. Blockchain and iot integration: A systematic survey. Sensors 18, 8 (2018), 2575.
[15]
W. Chen, M. Ma, Y. Ye, Z. Zheng, and Y. Zhou. 2018. IoT service based on jointcloud blockchain: The case study of smart traveling. 2018 IEEE Symposium on Service-oriented System Engineering. IEEE, 216–221.
[16]
T. Hardjono and N. Smith. 2016. Cloud-based commissioning of constrained devices using permissioned blockchains. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. 2016, 29–36.
[17]
G. Zyskind, O. Nathan, and A. Pentland. 2015. Decentralizing privacy: Using blockchain to protect personal data. 2015 IEEE Security and Privacy Workshops. IEEE, FAIRMONT, 180–184.
[18]
M. Conoscenti, A. Vetro, and J. C. De Martin. 2017. Peer to peer for privacy and decentralization in the Internet of Things. 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C). IEEE, Buenos Aires, 288–290.
[19]
P. K. Sharma, M. Y. Chen, and J. H. Park. 2017. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6, (2017), 115–124.
[20]
N. Tapas, G. Merlino, and F. Longo. 2018. Blockchain-based IoT-cloud authorization and delegation. 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 411–416.
[21]
X. Wang, X. Zha, W. Ni, R. P. Liu, Y. J. Guo, X. Niu, and K. Zheng. 2019. Survey on blockchain for Internet of Things. Computer Communications 136 (2019), 10–29.
[22]
Z. Guan, N. Wang, X. Fan, X. Liu, L. Wu, and S. Wan. 2020. Achieving secure search over encrypted data for e-Commerce: A blockchain approach. ACM Transactions on Internet Technology 21, 1 (2020), 1–17.
[23]
E. Bertino, K. K. R. Choo, D. Georgakopolous, and S. Nepal. 2016. Internet of Things (IoT) smart and secure service delivery. ACM Transactions on Internet Technology (TOIT), 16, 4 (2016), 1–7.
[24]
D. Kushner. 2019. The real story of stuxnet. Retrieved from https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet. Accessed September 17, 2019.
[25]
I. Arghire. 2019. Mirai-based botnet launches massive DDOS attack on streaming service. Avast. What Is the Mirai Botnet? (2019), https://www.avast.com/c-mirai. Accessed October 2022.
[26]
K. Li, X. Wang, Q. Ni, and M. Huang. 2022. Entropy-based reinforcement learning for computation offloading service in software-defined multi-access edge computing. Future Generation Computer Systems 136 (2022), 241–251.
[27]
F. Li, Y. Lu, X. Wang, Y. Bi, T. Pan, Y. Zhang, and Y. Wang. 2020. Software-defined networking-assisted content delivery at edge of mobile social networks. IEEE Internet of Things Journal, 7, 9 (2020), 8122–8132.
[28]
Shi Cheng, Lianbo Ma, Hui Lu, Xiujuan Lei, and Yuhui Shi. 2021. Evolutionary computation for solving search-based data analytics problems. Artificial Intelligence Review 54, 2 (2021), 1321–1348.
[29]
J. Cha, S. K. Singh, Y. Pan, and J. H. Park. 2020. Blockchain-based cyber threat intelligence system architecture for sustainable computing. Sustainability 12, 16 (2020), 6401.
[30]
J. Feng, L. T. Yang, R. Zhang, W. Qiang and J. Chen. 2020. Privacy preserving high-order bi-lanczos in cloud-fog computing for industrial applications. IEEE Transactions on Industrial Informatics. 18, 10 (2020), 7009–7018.
[31]
J. Feng, L. T. Yang, R. Zhang, and B. S. Gavuna. 2020. Privacy-preserving tucker train decomposition over blockchain-based encrypted industrial IoT data. IEEE Transactions on Industrial Informatics 17, 7 (2020), 4904–4913.
[32]
A. Al Sadawi, M. S. Hassan, and M. Ndiaye. 2021. A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges. IEEE Access 9 (2021), 54478–54497.
[33]
O. Alfandi, S. Khanji, L. Ahmad, and A. Khattak. 2021. A survey on boosting IoT security and privacy through blockchain. Cluster Computing 24, 1 (2021), 37–55.
[34]
S. Singh, A. S. M. S. Hosen, and B. Yoon. 2021. Blockchain security attacks, challenges, and solutions for the future distributed iot network. IEEE Access 9 (2021), 13938–13959.
[35]
B. Bera, S. Saha, A. K. Das, and A. V. Vasilakos. 2021. Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet of Things Journal 8, 7 (2021), 5744–5761.
[36]
L. Da Xu, Y. Lu, and L. Li. 2021. Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal 8, 13 (2021), 10452–10473.
[37]
W. Liang and N. Ji. 2021. Privacy challenges of IoT-based blockchain: A systematic review. Cluster Computing, 25 (2022), 2203–2221.
[38]
B. Mbarek, N. Jabeur, T. Pitner, and A. U. H. Yasar. 2021. Mbs: Multilevel blockchain system for IoT. Personal and Ubiquitous Computing 25, 1 (2021), 247–254.

Cited By

View all
  • (2024)Design and use of a wireless temperature measurement network system integrating artificial intelligence and blockchain in electrical power engineeringPLOS ONE10.1371/journal.pone.029639819:1(e0296398)Online publication date: 2-Jan-2024
  • (2024)Duo‐HInternational Journal of Network Management10.1002/nem.230034:6Online publication date: 12-Nov-2024
  • (2023)A novel privacy protection method of residents’ travel trajectories based on federated blockchain and InterPlanetary file systems in smart citiesPeerJ Computer Science10.7717/peerj-cs.14959(e1495)Online publication date: 27-Jul-2023

Index Terms

  1. Three-tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 23, Issue 3
      August 2023
      303 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3615983
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 August 2023
      Online AM: 05 September 2022
      Accepted: 17 January 2022
      Revised: 21 September 2021
      Received: 27 December 2020
      Published in TOIT Volume 23, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IoT
      2. blockchain
      3. security
      4. privacy
      5. scalability
      6. storage extensibility

      Qualifiers

      • Research-article

      Funding Sources

      • Science and Technology Planning Project of Shenyang City
      • National Natural Science Foundation of China
      • LiaoNing Revitalization Talents Program

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)220
      • Downloads (Last 6 weeks)30
      Reflects downloads up to 23 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Design and use of a wireless temperature measurement network system integrating artificial intelligence and blockchain in electrical power engineeringPLOS ONE10.1371/journal.pone.029639819:1(e0296398)Online publication date: 2-Jan-2024
      • (2024)Duo‐HInternational Journal of Network Management10.1002/nem.230034:6Online publication date: 12-Nov-2024
      • (2023)A novel privacy protection method of residents’ travel trajectories based on federated blockchain and InterPlanetary file systems in smart citiesPeerJ Computer Science10.7717/peerj-cs.14959(e1495)Online publication date: 27-Jul-2023

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media