2024
DOI: 10.3390/iot5010002
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy

Ali Eghmazi,
Mohammadhossein Ataei,
René Jr Landry
et al.

Abstract: The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart houses, connected appliances, shipping, monitoring, smart supply chain management, and smart grids. As the number of devices all over the world is increasing (in all aspects of daily life), huge amounts of data are being produced as a result. New issues are theref… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Additionally, privacy impact assessments (PIAs) and compliance with regulations influence the identification, assessment, and mitigation of privacy risks. This paper investigated Technological aspects that impact privacy concerns including Security Updates [43][44][45][46] regarding technology adoption and mechanisms of development. technological risks included privacy threats [10,24].…”
Section: Data Privacy On Technological Perspectivesmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, privacy impact assessments (PIAs) and compliance with regulations influence the identification, assessment, and mitigation of privacy risks. This paper investigated Technological aspects that impact privacy concerns including Security Updates [43][44][45][46] regarding technology adoption and mechanisms of development. technological risks included privacy threats [10,24].…”
Section: Data Privacy On Technological Perspectivesmentioning
confidence: 99%
“…Network Risks [46] Study user authentication for layer Study the progress of privacy guidelines to data and system integrity. Adapting stakeholders' changes and Privacy Network Risks…”
Section: Privacy Environmental Risksmentioning
confidence: 99%
“…In this work, data are directly stored in the BC, which is not efficient, and the evaluation is performed in a simulated environment that is not realistic given the current advances in BC technology. The HyperLedger Fabric (https://www.hyperledger.org/projects/fabric (accessed on 25 March 2024)) BC (HLF) is used in [32] to provide data integrity and storage, also employing IPFS (https://ipfs.tech/distributedstoragesystem (accessed on 25 March 2024)) for distributed storage. This platform consists of four layers (physical, network, middle, application), and the authors have demonstrated its scalability in terms of throughput and transaction time and average latency; however, a limitation is that the integrity verification process is "hardcoded", merely based on BC and HLF, as no SCs are employed.…”
Section: Related Workmentioning
confidence: 99%