Full Text:   <3162>

Summary:  <1196>

CLC number: TP393

On-line Access: 2020-04-21

Received: 2018-05-30

Revision Accepted: 2019-04-07

Crosschecked: 2020-03-30

Cited: 0

Clicked: 3916

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Raheel Ahmed Memon

https://orcid.org/0000-0003-1206-3837

Jian Ping Li

https://orcid.org/0000-0003-2192-1450

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.4 P.563-586

http://doi.org/10.1631/FITEE.1800343


Cloud-based vs. blockchain-based IoT: a comparative survey and way forward


Author(s):  Raheel Ahmed Memon, Jian Ping Li, Junaid Ahmed, Muhammad Irshad Nazeer, Muhammad Ismail, Khursheed Ali

Affiliation(s):  School of Computer Science and Technology, University of Electronic Science and Technology of China, Chengdu 610031, China; more

Corresponding email(s):   raheelmemon@iba-suk.edu.pk, jpli2222@uestc.edu.cn

Key Words:  Internet of Things (IoT), Cloud, Blockchain, Data center, Taxonomy


Raheel Ahmed Memon, Jian Ping Li, Junaid Ahmed, Muhammad Irshad Nazeer, Muhammad Ismail, Khursheed Ali. Cloud-based vs. blockchain-based IoT: a comparative survey and way forward[J]. Frontiers of Information Technology & Electronic Engineering, 2020, 21(4): 563-586.

@article{title="Cloud-based vs. blockchain-based IoT: a comparative survey and way forward",
author="Raheel Ahmed Memon, Jian Ping Li, Junaid Ahmed, Muhammad Irshad Nazeer, Muhammad Ismail, Khursheed Ali",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="21",
number="4",
pages="563-586",
year="2020",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1800343"
}

%0 Journal Article
%T Cloud-based vs. blockchain-based IoT: a comparative survey and way forward
%A Raheel Ahmed Memon
%A Jian Ping Li
%A Junaid Ahmed
%A Muhammad Irshad Nazeer
%A Muhammad Ismail
%A Khursheed Ali
%J Frontiers of Information Technology & Electronic Engineering
%V 21
%N 4
%P 563-586
%@ 2095-9184
%D 2020
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1800343

TY - JOUR
T1 - Cloud-based vs. blockchain-based IoT: a comparative survey and way forward
A1 - Raheel Ahmed Memon
A1 - Jian Ping Li
A1 - Junaid Ahmed
A1 - Muhammad Irshad Nazeer
A1 - Muhammad Ismail
A1 - Khursheed Ali
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 21
IS - 4
SP - 563
EP - 586
%@ 2095-9184
Y1 - 2020
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1800343


Abstract: 
The internet of Things (IoT) has been evolving for more than a decade. Technological advancements have increased its popularity, but concerns and risks related to IoT are growing considerably along with the increased number of connected devices. In 2013, a new cryptography-based infrastructure called blockchain emerged with the potential to replace the existing cloud-based infrastructure of IoT through decentralization. In this article, we provide a taxonomy of the challenges in the current IoT infrastructure, and a literature survey with a taxonomy of the issues to expect in the future of the IoT after adopting blockchain as an infrastructure. The two architectures are compared based on their strengths and weaknesses. Then a brief survey of ongoing key research activities in blockchain is presented, which will have considerable impact on overcoming the challenges encountered in the applicability of blockchain in IoT. Finally, considering the challenges and issues in both infrastructures and the latest research activities, we propose a high-level hybrid IoT approach that uses the cloud, edge/fog, and blockchain together to avoid the limitations of each infrastructure.

基于云或区块链的物联网:比较调查和前进道路


Raheel Ahmed MEMON1,2, 李建平1, Junaid AHMED3, Muhammad Irshad NAZEER2, Muhammad ISMAIL2, Khursheed ALI2
1电子科技大学计算机科学与技术学院,中国成都市,610031
2巴基斯坦苏库尔商业管理大学计算机科学系,巴基斯坦苏库尔,65200
3电子科技大学自动化工程学院,中国成都市,610031

摘要:物联网已发展十多年,技术进步使其应用更加广泛,但随着连接设备增多,引发的担忧及带来的风险也在显著增加。2013年,一种新的基于加密技术的基础设施--区块链--应运而生,通过去中心化,基于区块链的物联网有可能取代现有基于云的物联网。本文对当前物联网基础设施面临的挑战进行分类,并对采用区块链作为基础设施后物联网可能遇到的问题作文献调查,比较了两种体系结构的优缺点。简要介绍了正在进行的有关区块链的关键研究,这些研究将对克服区块链在物联网应用中遇到的挑战产生显著影响。最后,考虑到这两种体系各自面临的挑战和问题以及最新研究进展,提出一种高水平的混合方案,该方案综合利用云、边缘/雾计算和区块链,以避免这两种体系的局限性。

关键词:物联网;云;区块链;数据中心;分类

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Aazam M, Khan I, Alsaffar AA, et al., 2014. Cloud of Things: integrating Internet of Things and cloud computing and the issues involved. Proc 11th Int Bhurban Conf on Applied Sciences and Technology, p.414-419.

[2]Ahmed F, Ko YB, 2016. Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur Commun Netw, 9(18):5143-5154.

[3]Akoush S, Sohan R, Rice A, et al., 2011. Free lunch: exploiting renewable energy for computing. https://www.usenix.org/events/hotos/tech/final_files/Akoush.pdf [Accessed on Sept. 22, 2018].

[4]Almadhoun R, Kadadha M, Alhemeiri M, et al., 2018. A user authentication scheme of IoT devices using blockchain- enabled fog nodes. IEEE/ACS 15th Int Conf on Computer Systems and Applications, p.1-8.

[5]Amazon, 2006. Announcing Amazon Elastic Compute Cloud (Amazon EC2) - beta. https://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta/ [Accessed on Jan. 18, 2018].

[6]Andersen MP, Kolb J, Chen KF, et al., 2017. Wave: a decentralized authorization system for IoT via blockchain smart contracts. https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-234.pdf [Accessed on May 29, 2019].

[7]Armbrust M, Fox A, Griffith R, et al., 2010. A view of cloud computing. Commun ACM, 53(4):50-58.

[8]Aulbach S, Grust T, Jacobs D, et al., 2008. Multi-tenant databases for software as a service: schema-mapping techniques. Proc ACM SIGMOD Int Conf on Management of Data, p.1195-1206.

[9]Bahga A, Madisetti VK, 2016. Blockchain platform for Industrial Internet of Things. J Softw Eng Appl, 9(10): 533-546.

[10]Banafa A, 2017. IoT and blockchain convergence: benefits and challenges. http://iot.ieee.org/newsletter/january-2017/iot-and-blockchain-convergence-benefits-and-challenges. html [Accessed on Feb. 23, 2018].

[11]Bano S, Al-Bassam M, Danzis G, 2017a. The road to scalable blockchain designs. Winter, 42(4):31-36.

[12]Bano S, Sonnino A, Al-Bassam M, et al., 2017b. SoK: consensus in the age of blockchains. https://arxiv.org/pdf/1711.03936.pdf [Accessed on Sept. 27, 2018].

[13]Bawany NZ, Shamsi JA, Salah K, 2017. DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab J Sci Eng, 42(2):425-441.

[14]Bellavista P, Zanni A, 2016. Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. IEEE 2nd Int Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow, p.1-6.

[15]Bhattasali T, Chaki R, 2011. A survey of recent intrusion detection systems for wireless sensor network. In: Wyld DC, Wozniak M, Chaki N, et al. (Eds.), Advances in Network Security and Applications. Springer Berlin Heidelberg, p.268-280.

[16]Biswas K, Muthukkumarasamy V, 2016. Securing smart cities using blockchain technology. IEEE 18th Int Conf on High Performance Computing and Communications, p.1392- 1393.

[17]Bonneau J, Miller A, Clark J, et al., 2015. SoK: research perspectives and challenges for Bitcoin and crypto- currencies. Proc IEEE Symp on Security and Privacy, p.104-121.

[18]Bonomi F, Milito R, Zhu J, et al., 2012. Fog computing and its role in the Internet of Things. Proc 1st Edition of the MCC Workshop on Mobile Cloud Computing, p.13-16.

[19]Brachmann M, Garcia-Morchon O, Kirsche M, 2011. Security for practical CoAP applications: issues and solution approaches. 10th GI/ITG KuVS Fachgespraech Sensornetze, p.1-4. https://www.researchgate.net/profile/Michael_Kirsche/publication/265973615_Security_for_Practical_CoAP_Applications_Issues_and_Solution_Approaches/links/5583f51c08ae4738295c2028.pdf [Accessed on Feb. 24, 2018].

[20]Brito J, Castillo A, 2013. Bitcoin: a Primer for Policymakers. Mercatus Center at George Mason University.

[21]Brown J, 2017. Companies forge cooperative to explore blockchain-based IoT security. https://www.ciodive.com/news/companies-forge-cooperative-to-explore-blockchain-based-iot-security/435007/ [Accessed on Feb. 23, 2018].

[22]Buterin V, 2013. Ethereum white paper. GitHub Repository.

[23]Buterin V, 2016. Privacy on the blockchain. Available from https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/ [Accessed on Sept. 27, 2018].

[24]Cachin C, 2016. Architecture of the Hyperledger Blockchain Fabric. IBM Research. https://pdfs.semanticscholar.org/f852/c5f3fe649f8a17ded391df0796677a59927f.pdf [Accessed on Feb. 24, 2018].

[25]Castro M, Liskov B, 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 20(4): 398-461.

[26]Chae SH, Choi W, Lee JH, et al., 2014. Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone. IEEE Trans Inform Forens Secur, 9(10): 1617-1628.

[27]Chen YY, Trappe W, Martin RP, 2007. Detecting and localizing wireless spoofing attacks. 4th Annual IEEE Communications Society Conf on Sensor, Mesh and Ad Hoc Communications and Networks, p.193-202.

[28]Christidis K, Devetsikiotis M, 2016. Blockchains and smart contracts for the Internet of Things. IEEE Access, 4:2292- 2303.

[29]Cisco, 2015. Fog computing the Internet of Things: extend the cloud to where the things are. White Paper. https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf

[30]Cohn RJ, Coppen RJ, Banks A, et al., 2014. MQTT version 3.1. https://www.oasis-open.org/committees/download.php/52951/mqtt-v3.1.1-csd06.pdf [Accessed on May 29, 2019].

[31]Conzon D, Bolognesi T, Brizzi P, et al., 2012. The VIRTUS middleware: an XMPP based architecture for secure IoT communications. 21st Int Conf on Computer Communications and Networks, p.1-6.

[32]Courtois NT, Bahack L, 2014. On subversive miner strategies and block withholding attack in Bitcoin digital currency. https://arxiv.org/abs/1402.1718 [Accessed on Sept. 16, 2018].

[33]Dhillon V, Metcalf D, Hooper M, 2017. Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you. Apress, Berkeley, CA.

[34]Dorri A, Kanhere SS, Jurdak R, et al., 2017a. LSB: a lightweight scalable blockchain for IoT security and privacy. https://arxiv.org/pdf/1712.02969.pdf [Accessed on Sept. 14, 2018].

[35]Dorri A, Kanhere SS, Jurdak R, et al., 2017b. Blockchain for IoT security and privacy: the case study of a smart home. IEEE Int Conf on Pervasive Computing and Communi- cations Workshops (PerCom Workshops), p.618-623.

[36]Drescher D, 2017. Blockchain basics. Apress, Berkeley, CA.

[37]Dvir A, Holczer T, Buttyan L, 2011. VeRA-version number and rank authentication in RPL. IEEE 8th Int Conf on Mobile Ad-hoc and Sensor Systems, p.709-714.

[38]Dwork C, Naor M, 1993. Pricing via processing or combatting junk mail. In: Brickell EF (Ed.), Advances in Cryptology—CRYPTO’ 92. Springer Berlin Heidelberg, p.139-147.

[39]Elham H, Lebbat A, Medromi H, 2012. Enhance security of cloud computing through fork virtual machine. IEEE Int Conf on Complex Systems, p.1-4.

[40]Eyal I, Sirer EG, 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun ACM, 61(7):95-102.

[41]Eyal I, Gencer AE, Sirer EG, et al., 2015. Bitcoin-NG: a scalable blockchain protocol. https://arxiv.org/abs/1510.02037

[42]Ficco M, Esposito C, Xiang Y, et al., 2017. Pseudo-dynamic testing of realistic edge-fog cloud ecosystems. IEEE Commun Mag, 55(11):98-104.

[43]Formisano C, Pavia D, Gurgen L, et al., 2015. The advantages of IoT and cloud applied to smart cities. 3rd Int Conf on Future Internet of Things and Cloud, p.325-332.

[44]Foschini L, Taleb T, Corradi A, et al., 2011. M2M-based metropolitan platform for IMS-enabled road traffic management in IoT. IEEE Commun Mag, 49(11):50-57.

[45]Gaetani E, Aniello L, Baldoni R, et al., 2017. Blockchain- based database to ensure data integrity in cloud computing environments. Italian Conf on Cybersecurity. https://eprints.soton.ac.uk/411996/ [Accessed on Sept. 27, 2018].

[46]Garai Á, Attila A, Péntek I, 2016. Cognitive telemedicine IoT technology for dynamically adaptive eHealth content management reference framework embedded in cloud architecture. 7th IEEE Int Conf on Cognitive Infocommunications, p.187-192.

[47]Gervais A, Karame GO, Wüst K, et al., 2016. On the security and performance of proof of work blockchains. Proc ACM SIGSAC Conf on Computer and Communications Security, p.3-16.

[48]Goiri Í, Beauchea R, Le K, et al., 2011a. Greenslot: scheduling energy consumption in green datacenters. Proc Int Conf for High Performance Computing, Networking, Storage and Analysis, p.1-11.

[49]Goiri Í, Le K, Guitart J, et al., 2011b. Intelligent placement of datacenters for Internet services. 31st Int Conf on Distributed Computing Systems, p.131-142.

[50]Granjal J, Monteiro E, Sá Silva J, 2013a. End-to-end transport- layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. IFIP Networking Conf, p.1-9. http://ieeexplore.ieee.org/abstract/document/6663530/ [Accessed on Feb. 24, 2018].]

[51]Granjal J, Monteiro E, Sá Silva J, 2013b. Application-layer security for the WoT: extending CoAP to support end-to- end message security for Internet-integrated sensing applications. LNCS, 7889:140-153.

[52]Granjal J, Monteiro E, Sá Silva J, 2015. Security for the Internet of Things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor, 17(3): 1294-1312.

[53]Hameed A, Khoshkbarforoushha A, Ranjan R, et al., 2016. A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. Computing, 98(7):751-774.

[54]Henze M, Wolters B, Matzutt R, et al., 2017. Distributed configuration, authorization and management in the cloud-based Internet of Things. IEEE Trustcom/ BigDataSE/ICESS, p.185-192.

[55]Hilton S, 2016. Dyn analysis summary of Friday October 21 Attack. Company News. https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ [Accessed on Feb. 24, 2018].

[56]Hong YWP, Lan PC, Kuo CCJ, 2013. Enhancing physical- layer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Process Mag, 30(5):29-40.

[57]Hummen R, Hiller J, Wirtz H, et al., 2013. 6LoWPAN fragmentation attacks and mitigation mechanisms. Proc 6th ACM Conf on Security and Privacy in Wireless and Mobile Networks, p.55-66.

[58]Hur J, Noh DK, 2011. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parall Distrib Syst, 22(7):1214-1221.

[59]Jagdeep K, Meghna S, 2017. Extending IoTs into the cloud- based platform for examining Amazon web services. Examining Cloud Computing Technologies Through the Internet of Things, p.216-227.

[60]Jakobsson M, Juels A, 1999. Proofs of work and bread pudding protocols (extended abstract). In: Preneel B (Ed.), Secure Information Networks. Springer, Boston, MA, p.258-272.

[61]Juniper Research, 2015. Cybercrime will cost businesses over $2 trillion by 2019. Press Releases. https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion [Accessed on Feb. 24, 2018].

[62]Khan MA, Salah K, 2018. IoT security: review, blockchain solutions, and open challenges. Fut Gener Comput Syst, 82:395-411.

[63]Khosravi A, Buyya R, 2018. Energy and carbon footprint- aware management of geo-distributed cloud data centers: a taxonomy, state of the art, and future directions. https://www.igi-global.com/chapter/energy-and-carbon-footprint-aware-management-of-geo-distributed-cloud- data-centers/189954 [Accessed on Sept. 22, 2018].

[64]Kim HG, 2008. Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. Proc Int Conf on Convergence and Hybrid Information Technology, p.796- 801.

[65]Kokoris-Kogias E, Jovanovic P, Gailly N, et al., 2016. Enhancing Bitcoin security and performance with strong consistency via collective signing. https://arxiv.org/abs/1602.06997

[66]Kshetri N, 2017a. Can blockchain strengthen the Internet of Things? IT Prof, 19(4):68-72.

[67]Kshetri N, 2017b. Blockchain’s roles in strengthening cyber- security and protecting privacy. Telecommun Pol, 41(10): 1027-1038.

[68]Li DR, Shen X, Chen NC, et al., 2017. Space-based information service in Internet plus era. Sci China Inform Sci, 60(10):102308.

[69]Li JW, Jia CF, Li J, et al., 2012. Outsourcing encryption of attribute-based encryption with mapreduce. LNCS, 7618: 191-201.

[70]Li Y, Marier-Bienvenue T, Perron-Brault A, et al., 2018. Blockchain technology in business organizations: a scoping review. Proc 51st Hawaii Int Conf on System Sciences.

[71]Liao CF, Bao SW, Cheng CJ, et al., 2017. On design issues and architectural styles for blockchain-driven IoT services. IEEE Int Conf on Consumer Electronics, p.351-352.

[72]Lin IC, Liao TC, 2017. A survey of blockchain security issues and challenges. Int J Netw Secur, 19(5):653-659.

[73]Liu CH, Yang B, Liu TC, 2014. Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw, 18:85-101.

[74]Luu L, Chu DH, Olickel H, et al., 2016a. Making smart contracts smarter. Proc ACM SIGSAC Conf on Computer and Communications Security, p.254-269.

[75]Luu L, Narayanan V, Zheng CD, et al., 2016b. A secure sharding protocol for open blockchains. Proc ACM SIGSAC Conf on Computer and Communications Security, p.17-30.

[76]Mahalle PN, Anggorojati B, Prasad NR, et al., 2013. Identity authentication and capability based access control (IACAC) for the Internet of Things. J Cyber Secur Mob, 1:309-348.

[77]Manral J, 2015. IoT enabled insurance ecosystem— possibilities, challenges and risks. http://arxiv.org/abs/1510.03146

[78]Marinakis YD, Walsh ST, Harms R, 2017. Internet of Things technology diffusion forecasts. Portland Int Conf on Management of Engineering and Technology, p.1-5.

[79]Memon RA, Li JP, Ahmed J, 2019a. Simulation model for blockchain systems using queuing theory. Electronics, 8(2):234.

[80]Memon RA, Li JP, Ahmed J, et al., 2019b. Modeling of blockchain based systems using queuing theory simulation. 15th Int Computer Conf on Wavelet Active Media Technology and Information Processing, p.107- 111.

[81]Moar J, 2017. Cybercrime & the Internet of Threats. White Paper, Juniper Research.

[82]Mollah MB, Azad MAK, Vasilakos A, 2017. Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput Appl, 84:38-54.

[83]Mosakheil JH, 2018. Security threats classification in blockchains. http://repository.stcloudstate.edu/msia_etds/48 [Accessed on Sept. 25, 2018].

[84]Nakamoto S, 2008. Bitcoin: a peer-to-peer electronic cash system. https://bitcoinsv.io/bitcoin

[85]Nakano SM, 2018. Cryptocurrency and Blockchain Blueprint for Beginners: All You Need to Know about Bitcoin, Ethereum, Ripple, Litecoin and other Popular Crypto- currencies. CreateSpace Independent Publishing Platform, USA.

[86]Ning HS, Liu H, 2015. Cyber-physical-social-thinking space based science and technology framework for the Internet of Things. Sci China Inform Sci, 58(3):1-19.

[87]Noubir G, Lin GL, 2003. Low-power DOS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mob Comput Commun Rev, 7(3):29-30.

[88]Ourad AZ, Belgacem B, Salah K, 2018. Using blockchain for IoT access control and authentication management. LNCS, 10972:150-164.

[89]Qi RM, Feng C, Liu Z, et al., 2017. Blockchain-powered Internet of Things, E-governance and E-democracy. In: Vinod KT (Ed.), E-Democracy for Smart Cities. Springer, Singapore, p.509-520.

[90]Qian XC, Zhang JD, 2010. Study on the structure of “Internet of Things (IoT)” business operation support platform. IEEE 12th Int Conf on Communication Technology, p.1068-1071.

[91]Ray PP, 2016. A survey of IoT cloud platforms. Fut Comput Inform J, 1(1-2):35-46.

[92]Riaz R, Kim KH, Ahmed HF, 2009. Security analysis survey and framework design for IP connected LoWPANs. Proc Int Symp on Autonomous Decentralized Systems, p.29-34.

[93]Rimal BP, Choi E, Lumb I, 2009. A taxonomy and survey of cloud computing systems. 5th Int Joint Conf on INC, IMS, and IDC, p.44-51.

[94]Rimba P, Tran AB, Weber I, et al., 2017. Comparing blockchain and cloud services for business process execution. IEEE Int Conf on Software Architecture, p.257-260.

[95]Sagiroglu S, Sinanc D, 2013. Big data: a review. Int Conf on Collaboration Technologies and Systems, p.42-47.

[96]Samaniego M, Deters R, 2017. Blockchain as a service for IoT. IEEE Int Conf on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), p.433-436.

[97]SAP, 2017. SAP announces first co-innovation customers, partners in blockchain initiative for Internet of Things. https://news.sap.com/sap-announces-first-co-innovation-customers-partners-in-blockchain-initiative-for-internet-of-things/ [Accessed on Feb. 24, 2018].

[98]Seibold S, Samman G, 2016. Consensus immutable agreement for the Internet of Value. Technical Report. https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmg-blockchain-consensus-mechanism.pdf

[99]Sethi M, Arkko J, Keränen A, 2012. End-to-end security for sleepy smart object networks. 37th Annual IEEE Conf on Local Computer Networks, p.964-972.

[100]Sherif MH, 2016. Protocols for Secure Electronic Commerce (3rd Ed.). CRC Press, Boca Raton, USA.

[101]Shveta, Pandey A, 2014. Energy conservation and security issues in cloud computing: a review. Int J Adv Comput Sci Cloud Comput, 2(1):57-60.

[102]Sicari S, Rizzardi A, Grieco LA, et al., 2015. Security, privacy and trust in Internet of Things: the road ahead. Comput Netw, 76:146-164.

[103]Singh D, Tripathi G, Jara AJ, 2014. A survey of Internet-of- Things: future vision, architecture, challenges and services. IEEE World Forum on Internet of Things, p.287- 292.

[104]Singh I, Lee SW, 2018. Comparative requirements analysis for the feasibility of blockchain for secure cloud. In: Kamalrudin M, Ahmad S, Ikram N (Eds.), Requirements Engineering for Internet of Things. Springer, Singapore, p.57-72.

[105]Singh J, Pasquier T, Bacon J, et al., 2016. Twenty security considerations for cloud-supported Internet of Things. IEEE Int Things J, 3(3):269-284.

[106]Singhal B, Dhameja G, Panda PS, 2018. Building an Ethereum DApp. In: Beginning Blockchain. Apress, Berkeley, CA, p.319-375.

[107]Soubra D, 2012. The 3Vs that define Big Data. https://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-data

[108]Stergiou C, Psannis KE, Kim BG, et al., 2018. Secure integration of IoT and cloud computing. Fut Gener Comput Syst, 78:964-975.

[109]Stormer H, Meier A, 2012. ePayment. In: eBusiness & eCommerce. Springer Berlin Heidelberg, p.181-202.

[110]Strite CP, 1920. Bread-Toaster. US1394450A. https://patents.google.com/patent/US1394450 [Accessed on Feb. 23, 2018].

[111]Sun L, Li Y, Memon RA, 2017. An open IoT framework based on microservices architecture. China Commun, 14(2): 154-162.

[112]Szabo N, 1996. Smart contracts: building blocks for digital markets. http://www.alamut.com/subj/economics/nick_szabo/smartContracts.html [Accessed on Feb. 24, 2018].

[113]Thakur M, 2017. Authentication, authorization and accounting with Ethereum blockchain. https://helda.helsinki.fi/bitstream/handle/10138/228842/aaa-ethereum-blockchain.pdf [Accessed on Sept. 11, 2018].

[114]Underwood S, 2016. Blockchain beyond Bitcoin. Commun ACM, 59(11):15-17.

[115]van der Meulen R, 2017. Gartner Says 8.4 Billion Connected “Things” will be in use in 2017, up 31 Percent from 2016. Gartner Press Release.

[116]Wang J, Wu P, Wang XY, et al., 2017. The outlook of blockchain technology for construction engineering management. Front Eng Manag, 4(1):67-75.

[117]Wang WB, Fan SQ, 2018. Attacking OpenSSL ECDSA with a small amount of side-channel information. Sci China Inform Sci, 61(3):032105.

[118]Wang YF, Uehara T, Sasaki R, 2015. Fog computing: issues and challenges in security and forensics. IEEE 39th Annual Computer Software and Applications Conf, p.53-59.

[119]Warren W, Bandeali A, 2017. 0x: an open protocol for decentralized exchange on the ethereum blockchain. https://0x.org/pdfs/0x_white_paper.pdf [Accessed on Feb. 24, 2018].

[120]Weekly K, Pister K, 2012. Evaluating sinkhole defense techniques in RPL networks. 20th Int Conf on Network Protocols, p.1-6.

[121]Whitmore A, Agarwal A, Da XL, 2015. The Internet of Things—a survey of topics and trends. Inform Syst Front, 17(2):261-274.

[122]Wilkinson S, Boshevski T, Brandoff J, et al., 2014. Storj—a peer-to-peer cloud storage network. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.785 [Accessed on Sept. 15, 2018].

[123]Wilusz D, Rykowski J, 2013. The architecture of coupon-based, semi-off-line, anonymous micropayment system for Internet of Things. In: Camarinha-Matos LM, Tomic S, Graça P (Eds.), Technological Innovation for the Internet of Things. Springer Berlin Heidelberg, p.125-132.

[124]Worldometer, 2018. World Population Projections. http://www.worldometers.info/world-population/world-population-projections/ [Accessed on Sept. 15, 2018].

[125]Xiao L, Greenstein LJ, Mandayam NB, et al., 2009. Channel- based detection of Sybil attacks in wireless networks. IEEE Trans Inform Forens Secur, 4(3):492-503.

[126]Xiong ZH, Zhang Y, Niyato D, et al., 2017. When mobile blockchain meets edge computing. https://arxiv.org/abs/1711.05938?context=cs

[127]Xu WY, Trappe W, Zhang YY, et al., 2005. The feasibility of launching and detecting jamming attacks in wireless networks. Proc 6th ACM Int Symp on Mobile Ad Hoc Networking and Computing, p.46-57.

[128]Yang C, Puthal D, Mohanty SP, et al., 2017. Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks. IEEE Consum Electron Mag, 6(4):48-56.

[129]Yao Q, 2018. A systematic framework to understand central bank digital currency. Sci China Inform Sci, 61(3): 033101.

[130]Yi SH, Qin ZR, Li Q, 2015. Security and privacy issues of fog computing: a survey. In: Xu K, Zhu H (Eds.), Wireless Algorithms, Systems, and Applications. Springer, Cham, p.685-695.

[131]Zhao JC, Zhang JF, Feng Y, et al., 2010. The study and application of the IoT technology in agriculture. 3rd Int Conf on Computer Science and Information Technology, p.462-465.

[132]Zhao W, Wang CW, Nakahira Y, 2011. Medical application on Internet of Things. IET Int Conf on Commun Technology and Application, p.660-665.

[133]Zhou J, Cao ZF, Dong XL, et al., 2017. Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag, 55(1):26-33.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2022 Journal of Zhejiang University-SCIENCE