Sangeeta Gupta, Premkumar Chithaluru, May El Barachi, Manoj Kumar
{"title":"通过物联网云和结构环境使用区块链技术确保数据访问安全","authors":"Sangeeta Gupta, Premkumar Chithaluru, May El Barachi, Manoj Kumar","doi":"10.1002/spy2.356","DOIUrl":null,"url":null,"abstract":"In the current landscape, staying abreast of the latest technological advancements is a formidable challenge, especially given the deluge of data inundating the internet. The realization has dawned that effectively managing the surge in emerging data necessitates the integration of multiple technologies. In pursuit of this objective, the Internet of Things (IoT), renowned for its sensor‐based data capture capabilities, is frequently coupled with blockchain technology to ensure secure data storage and access. This amalgamation, in turn, leverages the cloud environment when data volume surpasses a machine's processing capacity, thus mitigating infrastructure and maintenance costs. This study endeavors to optimize data storage within the blocks of the blockchain (BCT) by storing an index that points to the actual data. This innovative approach not only conserves storage space but also enhances operational efficiency. Furthermore, it simplifies the task of identifying malicious or faulty nodes deployed at different locations for data capture within the prescribed time frame. To exemplify this implementation, a case study is presented, focusing on securing user votes through the creation of contracts. The results showcased underscore the preference for a permissioned blockchain, such as Fabric, over a permissionless one, like Ethereum, particularly in the context of security considerations. The findings reveal that as the number of operations (in this case, votes cast) increases, Ethereum's performance deteriorates, while Fabric exhibits exceptional robustness. Additionally, the study analyzes sensor data simulated via IoT nodes before and after the application of security algorithms to underscore the significance of the proposed Secure Cloud‐Based Blockchain (SCB2) model. The analysis encompasses various facets, including the creation, validation, and computation times of transactions and blocks within a node, and positions the model favorably in comparison to existing literature.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"3 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure data access using blockchain technology through IoT cloud and fabric environment\",\"authors\":\"Sangeeta Gupta, Premkumar Chithaluru, May El Barachi, Manoj Kumar\",\"doi\":\"10.1002/spy2.356\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the current landscape, staying abreast of the latest technological advancements is a formidable challenge, especially given the deluge of data inundating the internet. The realization has dawned that effectively managing the surge in emerging data necessitates the integration of multiple technologies. In pursuit of this objective, the Internet of Things (IoT), renowned for its sensor‐based data capture capabilities, is frequently coupled with blockchain technology to ensure secure data storage and access. This amalgamation, in turn, leverages the cloud environment when data volume surpasses a machine's processing capacity, thus mitigating infrastructure and maintenance costs. This study endeavors to optimize data storage within the blocks of the blockchain (BCT) by storing an index that points to the actual data. This innovative approach not only conserves storage space but also enhances operational efficiency. Furthermore, it simplifies the task of identifying malicious or faulty nodes deployed at different locations for data capture within the prescribed time frame. To exemplify this implementation, a case study is presented, focusing on securing user votes through the creation of contracts. The results showcased underscore the preference for a permissioned blockchain, such as Fabric, over a permissionless one, like Ethereum, particularly in the context of security considerations. The findings reveal that as the number of operations (in this case, votes cast) increases, Ethereum's performance deteriorates, while Fabric exhibits exceptional robustness. Additionally, the study analyzes sensor data simulated via IoT nodes before and after the application of security algorithms to underscore the significance of the proposed Secure Cloud‐Based Blockchain (SCB2) model. The analysis encompasses various facets, including the creation, validation, and computation times of transactions and blocks within a node, and positions the model favorably in comparison to existing literature.\",\"PeriodicalId\":506233,\"journal\":{\"name\":\"SECURITY AND PRIVACY\",\"volume\":\"3 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"SECURITY AND PRIVACY\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/spy2.356\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"SECURITY AND PRIVACY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spy2.356","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure data access using blockchain technology through IoT cloud and fabric environment
In the current landscape, staying abreast of the latest technological advancements is a formidable challenge, especially given the deluge of data inundating the internet. The realization has dawned that effectively managing the surge in emerging data necessitates the integration of multiple technologies. In pursuit of this objective, the Internet of Things (IoT), renowned for its sensor‐based data capture capabilities, is frequently coupled with blockchain technology to ensure secure data storage and access. This amalgamation, in turn, leverages the cloud environment when data volume surpasses a machine's processing capacity, thus mitigating infrastructure and maintenance costs. This study endeavors to optimize data storage within the blocks of the blockchain (BCT) by storing an index that points to the actual data. This innovative approach not only conserves storage space but also enhances operational efficiency. Furthermore, it simplifies the task of identifying malicious or faulty nodes deployed at different locations for data capture within the prescribed time frame. To exemplify this implementation, a case study is presented, focusing on securing user votes through the creation of contracts. The results showcased underscore the preference for a permissioned blockchain, such as Fabric, over a permissionless one, like Ethereum, particularly in the context of security considerations. The findings reveal that as the number of operations (in this case, votes cast) increases, Ethereum's performance deteriorates, while Fabric exhibits exceptional robustness. Additionally, the study analyzes sensor data simulated via IoT nodes before and after the application of security algorithms to underscore the significance of the proposed Secure Cloud‐Based Blockchain (SCB2) model. The analysis encompasses various facets, including the creation, validation, and computation times of transactions and blocks within a node, and positions the model favorably in comparison to existing literature.