“…As a result, BC is protected by distributing data over a large number of linked fog nodes. Authors proposed several architectural designs to support security in FC environment ([ 81 , 84 , 104 , 120 , 139 ]): to protect against frauds ([ 73 , 147 , 149 , 164 , 168 , 181 , 221 β 223 ]), to enhance and achieve data confidentiality ([ 48 , 123 , 192 , 229 ]), to enhance and achieve data integrity ([ 32 , 58 , 61 , 87 , 94 , 127 , 193 , 227 ]), and to achieve data availability ([ 137 , 192 , 204 ]). The majority of the selected studies under this category reported that BC can help against fraud attacks in FC, followed by data integrity purpose, and the least purpose mentioned was to achieve data availability.…”