BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation

@article{Zhou2018BeeKeeperAB,
  title={BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation},
  author={Lijing Zhou and Licheng Wang and Yiru Sun and Pin Lv},
  journal={IEEE Access},
  year={2018},
  volume={6},
  pages={43472-43488}
}
Currently, Internet of Things (IoT) and blockchain technologies are experiencing exponential growth in academia and industry. [...] Key Result For instance, the response time is about 22.5 s since the block interval of Ethereum blockchain is about 15 s. In fact, if we use some other blockchain with short block interval, the response time may be obviously short.Expand
BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation
TLDR
To the best of the knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data from the devices. Expand
Chapter Ten - Integration of IoT with blockchain and homomorphic encryption: Challenging issues and opportunities
TLDR
The potential of integration of blockchain based-IoT with homomorphic encryption that can secure the IoT data with high privacy in a decentralized mode is presented. Expand
Performance Evaluation of Broadcast Domain on the Lightweight Multi-Fog Blockchain Platform for a LoRa-Based Internet of Things Network
TLDR
This paper simulates how the broadcast domain on LMF works and verify the results in lower latency and energy transmission compared to the standard blockchain model, and shows that the average increase of the total delivery time on the LMF platform was smaller than the average rise in the total Delivery time (Taverage). Expand
Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
TLDR
The privacy issues caused due to integration of blockchain in IoT applications by focusing over the applications of the authors' daily use are discussed, and implementation of five privacy preservation strategies in blockchain-based IoT systems named as anonymization, encryption, private contract, mixing, and differential privacy are discussed. Expand
Consensus Mechanism of IoT Based on Blockchain Technology
TLDR
A lightweight and high-throughput consensus mechanism, combined with blockchain technology, is proposed in this study and machine learning methods are introduced to identify or remove outliers in the sensor data before such data are uploaded to the chain. Expand
Embedding Blockchain Technology Into IoT for Security: A Survey
  • Li D. Xu, Yang Lu, Ling Li
  • Computer Science
  • IEEE Internet of Things Journal
  • 2021
TLDR
This article systematically analyzes state of the art of IoT security based on the blockchain, paying special attention to the security features, issues, technologies, approaches, and related scenarios in blockchain-embedded IoT. Expand
Decentralized Data Aggregation: A New Secure Framework based on Lightweight Cryptographic Algorithms
TLDR
This paper proposes an improved solution for dencentralized data aggregation (DDA) on IoT by using secret sharing to improve its efficiency, and smart contracts as the computing processors, and uses local differential privacy and cryptographic primitives such as token-based encryption. Expand
Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges
TLDR
This survey investigates some of the work that has been done to enable the integrated blockchain and edge computing system and discusses the research challenges, identifying several vital aspects of the integration of blockchain andEdge computing: motivations, frameworks, enabling functionalities, and challenges. Expand
A Study on Leveraging Blockchain Technology for IoT Security Enhancement
  • S. M. Muzammal, R. Murugesan
  • Computer Science
  • 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA)
  • 2018
TLDR
The adoption of IoT in various fields and its applications to automate and improve living conditions, along with security and privacy risks arising from organization and functioning of different IoT components are reviewed. Expand
A Security Framework for IoT Authentication and Authorization Based on Blockchain Technology
  • M. A. Rashid, Houshyar Honar Pajooh
  • Computer Science
  • 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
  • 2019
TLDR
This work proposes a multi-layer security network model for IoT network based on blockchain technology and implements an open source blockchain platform Hyperledger Fabric to verify the proposed system. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 33 REFERENCES
An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology
TLDR
This work implemented the IoT and Blockchain integrated system with Eris Blockchain and equivalent computing devices to emulate IoT devices and proposes an out-of-band two-factor authentication scheme for IoT devices based on Blockchain infrastructure. Expand
Managing IoT devices using blockchain platform
TLDR
This work proposes using blockchain to build IoT system, which can control and configure IoT devices and build key management system, and chooses Ethereum because it can manage the system in a more fine-grained way. Expand
A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT
TLDR
The results of the evaluation show that performance is improved by reducing the induced delay, reducing the response time, increasing throughput, and the ability to detect real-time attacks in the IoT network with low performance overheads. Expand
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption
TLDR
A new privacy-preserving blockchain architecture for IoT applications based on attribute-based encryption (ABE) techniques is proposed and security, privacy, and numerical analyses are presented to validate the proposed model. Expand
Blockchain for IoT security and privacy: The case study of a smart home
TLDR
This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains. Expand
Blockchain Based Data Integrity Service Framework for IoT Data
TLDR
A blockchain-based framework for Data Integrity Service is proposed, under which a more reliable data integrity verification can be provided for both the Data Owners and the Data Consumers, without relying on any Third Party Auditor (TPA). Expand
Towards an Optimized BlockChain for IoT
  • A. Dorri, S. Kanhere, R. Jurdak
  • Computer Science
  • 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)
  • 2017
TLDR
A lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy benefits, is proposed. Expand
Peer to Peer for Privacy and Decentralization in the Internet of Things
TLDR
This paper discusses the research motivation, the research idea applied in a possible scenario and the scalability problem, which involves the use of Peer-to-Peer storage networks in combination with the blockchain. Expand
A Decision Framework for Blockchain Platforms for IoT and Edge Computing
TLDR
This work presents a decision framework to help practitioners systematically evaluate the potential use of blockchains in an IoT context and thinks that the Internet of Things can also benefit from blockchain technology. Expand
Peer to Peer File Sharing by Blockchain Using IOT
TLDR
Aiming at tackling the critical issue of identity revocation, this work introduces outsourcing computation into IBE for the first time and proposes a revocable IBE scheme in the server-aided setting. Expand
...
1
2
3
4
...