Blockchain is one of the most discussed and highly accepted technologies, primarily due to its application in almost every field where third parties are needed for trust. Blockchain technology relies on distributed consensus for trust, which is accomplished using hash functions and public-key cryptography. Most of the cryptographic algorithms in use today are vulnerable to quantum attacks. In this work, a systematic literature review is done so that it can be repeated, starting with identifying the research questions. Focusing on these research questions, literature is analysed to find the answers to these questions. The survey is completed by answering the research questions and identification of the research gaps. It is found in the literature that 30% of the research solutions are applicable for the data layer, 24% for the application and presentation layer, 23% for the network layer, 16% for the consensus layer and only 1% for hardware and infrastructure layer. We also found that 6% of the solutions are not blockchain-based but present different distributed ledger technology.
SummaryCloud storage in the network enables the users to access the data from anywhere irrespective of any devices, which prevents data loss and provides centralized management. The cloud server is a pooled, centrally located server resource that many users can access as needed. More efficient data storage and processing could be achieved through fog computing devices and, the fog node handles the task including the semantic transformation of the data before transmitting it to the back‐end cloud servers, managing the process of data from several edge devices simultaneously. The security of the cloud and fog nodes acts as a key component, and that must be ensured for effective computations. In this research, the security of the fog‐assisted Internet of Things (IoT) network is enhanced using the proposed advanced encryption credibility approach (Ad‐En credibility approach), which ensures the privacy and security of the networks by preventing malicious attempts of accessing the data. The proposed Ad‐En credibility approach is performed based on a modified Diffie‐Hellman algorithm that consists of different phases such as the setup phase, entry and identity phase, fog node entry validation phase, and authentication phase. These phases perform different functions and provide strong authentication mechanisms that secure the data with high confidentiality by detecting malicious attempts within a reduced time. The efficiency of the research is proved by measuring the computational time, memory usage, and detection rate. The proposed Ad‐En credibility approach consumed less time of 7 s and memory usage of 8.17 mb with a high detection rate of 85.34%.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.