Skip to main content

Towards an End-to-End IoT Data Privacy-Preserving Framework Using Blockchain Technology

  • Conference paper
  • First Online:
Web Information Systems Engineering – WISE 2018 (WISE 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11233))

Included in the following conference series:

Abstract

Internet of Things-based environments collect and generate huge amounts of data about users, their activities, and their surroundings, which can disclose some sensitive information and threaten their privacy. Hence, the user’s collected and handled data by IoT-based applications need to be exploited and secured in an appropriate way to protect personal data and user’s privacy. Therefore, we aim at improving the data ownership, transparency, and auditability for users. To this end, we propose an end-to-end privacy-preserving framework for the IoT data using blockchain technology. The smart contract use in our framework will hence enforce the privacy requirement compliance according to the user’s (i.e., data owner) privacy preferences and end-user’s (i.e., data consumer) requests. To do so, we detail the design of the system architecture by introducing its core components and functionalities and highlight through an example of how it operates in a real-world use-case.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://sites.google.com/view/privblockchain-protocols.

References

  1. Bertino, E.: Data security and privacy in the IoT. In: EDBT, vol. 2016, pp. 1–3 (2016)

    Google Scholar 

  2. Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1392–1393. IEEE (2016)

    Google Scholar 

  3. Buterin, V., et al.: A next-generation smart contract and decentralized application platform. White paper (2014)

    Google Scholar 

  4. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  5. Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 173–178. ACM (2017)

    Google Scholar 

  6. Ethereum project’s Solidity Team: Solidity language (2016). http://solidity.readthedocs.io/en/develop/. Accessed 10 Aug 2018

  7. Hashemi, S.H., Faghri, F., Rausch, P., Campbell, R.H.: World of empowered IoT users. In: 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 13–24. IEEE (2016)

    Google Scholar 

  8. International Organization for Standardization: Information technology security techniques privacy framework, ISO/IEC 29100 (2011)

    Google Scholar 

  9. Landman, D.: Arduino Library for AES Encryption (2017). https://github.com/DavyLandman/AESLib. Accessed 10 Aug 2018

  10. Maddox, T.: The dark side of wearables: how they’re secretly jeopardizing your security and privacy (2015). https://www.techrepublic.com/article/the-dark-side-of-wearables-how-theyre-secretly-jeopardizing-your-security-and-privacy/. Accessed 10 Aug 2018

  11. MyEtherWallet Team: Myetherwallet (2015). https://www.myetherwallet.com/. Accessed 10 Aug 2018

  12. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  13. Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: Fairaccess: a new blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)

    Article  Google Scholar 

  14. Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology (2005)

    Google Scholar 

  15. Regulation, General Data Protection: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46. Off. J. Eur. Union (OJ) 59, 1–88 (2016)

    Google Scholar 

  16. Singla, A., Mudgerikar, A., Papapanagiotou, I., Yavuz, A.A.: HAA: hardware-accelerated authentication for Internet of Things in mission critical vehicular networks. In: 2015 IEEE Military Communications Conference, MILCOM 2015, pp. 1298–1304. IEEE (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Faiza Loukil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Loukil, F., Ghedira-Guegan, C., Boukadi, K., Benharkat, A.N. (2018). Towards an End-to-End IoT Data Privacy-Preserving Framework Using Blockchain Technology. In: Hacid, H., Cellary, W., Wang, H., Paik, HY., Zhou, R. (eds) Web Information Systems Engineering – WISE 2018. WISE 2018. Lecture Notes in Computer Science(), vol 11233. Springer, Cham. https://doi.org/10.1007/978-3-030-02922-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02922-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02921-0

  • Online ISBN: 978-3-030-02922-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics