Privacy protection for fog computing and the internet of things data based on blockchain
- PDF / 1,676,438 Bytes
- 15 Pages / 595.276 x 790.866 pts Page_size
- 74 Downloads / 196 Views
(0123456789().,-volV)(0123456789(). ,- volV)
Privacy protection for fog computing and the internet of things data based on blockchain Yanhui Liu1,2
•
Jianbiao Zhang1,2 • Jing Zhan1,2
Received: 15 May 2020 / Revised: 30 September 2020 / Accepted: 6 October 2020 The Author(s) 2020
Abstract With the development of the Internet of Things (IoT) field, more and more data are generated by IoT devices and transferred over the network. However, a large amount of IoT data is sensitive, and the leakage of such data is a privacy breach. The security of sensitive IoT data is a big issue, as the data is shared over an insecure network channel. Current solutions include symmetric encryption and access controls to secure the data transfer, but they have some drawbacks such as a single point of failure. Blockchain is a promising distributed ledger technology that can prevent the malicious tampering of data, offering reliable data storage. This paper proposes a distributed access control system based on blockchain technology to secure IoT data. The proposed mechanism is based on fog computing and the concept of the alliance chain. This method uses mixed linear and nonlinear spatiotemporal chaotic systems (MLNCML) and the least significant bit (LSB) to encrypt the IoT data on an edge node and then upload the encrypted data to the cloud. The proposed mechanism can solve the problem of a single point of failure of access control by providing the dynamic and fine-grained access control for IoT data. The experimental results of this method demonstrated that it can protect the privacy of IoT data efficiently. Keywords Blockchain IoT Access control Data privacy Cloud storage
1 Introduction The Internet of things is an emerging technology. Owing to the accompanying growth of IoT, a great deal of attention has focused on the issues of IoT devices [1]. IoT is a system of interconnected computing devices with unique identifiers (UIDs) and can perform data communications without any human involvement. The definition of the IoT has evolved due to the convergence of multiple technologies in it, such as real-time analytics, machine learning, & Yanhui Liu [email protected] & Jianbiao Zhang [email protected] Jing Zhan [email protected] 1
Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
2
Beijing Key Laboratory of Trusted Computing, Beijing 100124, China
commodity sensors, and embedded systems. The term ‘‘things’’ refers to intelligent and self-configurable devices. These devices are used to build efficient and dynamic platforms for communication and collaboration [2]. The devices used in IoT are heterogeneous and resource-constrained in terms of storage, power, and computation. According to a study published by Gartner, the number of connected devices in IoT will rise to 20 billion by the year 2020 [3]. However, there are several serious concerns raised due to the growth of IoT [4], especially in the areas of privacy and security of data. Consequently, the governments and industry h
Data Loading...