{"title":"Evaluating a Blockchain-based Method for Industrial IoT Data Confidentiality: Proof of Concept","authors":"E. Ashena","doi":"10.1109/ICWR51868.2021.9443118","DOIUrl":null,"url":null,"abstract":"Utilizing the Internet of Things in the industry has led to an event called IIoT (Industrial Internet of Things) due to make smart cities, communication routes, smart grids, etc. IIoT deals with various sensors, devices scattered on the edges, and cloud servers by identified standards and protocols in decentralized networks. Besides all benefits the IIoT has carried out, the data stream’s security and privacy remain a debatable subject of this technology. There are many solutions to overcome security issues and confidentiality breaches, but some do not completely consider the purpose. Factors like speed, integrity, security, and power consumption must be considered, and of course, the cost factor is a significant role in achieving the goal. The purpose of this article is to introduce a new scheme evolved from Blockchain methodology to overcome privacy and data confidentiality challenges.","PeriodicalId":377597,"journal":{"name":"2021 7th International Conference on Web Research (ICWR)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 7th International Conference on Web Research (ICWR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWR51868.2021.9443118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Utilizing the Internet of Things in the industry has led to an event called IIoT (Industrial Internet of Things) due to make smart cities, communication routes, smart grids, etc. IIoT deals with various sensors, devices scattered on the edges, and cloud servers by identified standards and protocols in decentralized networks. Besides all benefits the IIoT has carried out, the data stream’s security and privacy remain a debatable subject of this technology. There are many solutions to overcome security issues and confidentiality breaches, but some do not completely consider the purpose. Factors like speed, integrity, security, and power consumption must be considered, and of course, the cost factor is a significant role in achieving the goal. The purpose of this article is to introduce a new scheme evolved from Blockchain methodology to overcome privacy and data confidentiality challenges.