Skip to main content

Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications

  • Conference paper
  • First Online:
Computational Data and Social Networks (CSoNet 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11280))

Included in the following conference series:

Abstract

In this paper, we present how blockchain can be leveraged to tackle data privacy issues in Internet of Things (IoT). With the aid of smart contracts, we have developed a system model featuring a trustless access control management mechanism to ensure that users have full control over their data and can track how data are accessed by third-party services. Additionally, we propose a firmware update scheme using blockchain that helps prevent fraudulent data caused by IoT device tampering. Finally, we discuss how our proposed solution can strengthen the data privacy as well as tolerate common adversaries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)

    Google Scholar 

  2. Golem: https://golem.network/

  3. Augur — a decentralized oracle & prediction market protocol. https://www.augur.net/

  4. Status, a mobile ethereum os. https://status.im/

  5. Evans, D.: The internet of things: how the next evolution of the internet is changing everything. CISCO White Pap. 1(2011), 1–11 (2011)

    Google Scholar 

  6. Brody, P., Pureswaran, V.: Device democracy: Saving the future of the internet of things. IBM, September 2014

    Google Scholar 

  7. Barcena, M.B., Wueest, C.: Insecurity in the internet of things. Security Response, Symantec (2015)

    Google Scholar 

  8. Mosenia, A., Jha, N.K.: A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586–602 (2017)

    Article  Google Scholar 

  9. Arias, O., Wurm, J., Hoang, K., Jin, Y.: Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2015)

    Article  Google Scholar 

  10. Hernandez, G., Arias, O., Buentello, D., Jin, Y.: Smart nest thermostat: A smart spy in your home, Black Hat USA (2014)

    Google Scholar 

  11. Miller, C.: Battery firmware hacking, Black Hat USA, pp. 3–4 (2011)

    Google Scholar 

  12. Benet, J.: IPFS-content addressed, versioned, P2P file system (2014). https://github.com/ipfs/papers

  13. Swarm. https://swarm-gateways.net/bzz:/theswarm.eth/

  14. Wilkinson, S., Boshevski, T., Brandoff, J., Buterin, V.: Storj a peer-to-peer cloud storage network (2014)

    Google Scholar 

  15. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

  16. Egorov, M., Wilkison, M., Nuñez, D.: Nucypher kms: decentralized key management system. arXiv preprint arXiv:1707.06140 (2017)

  17. Maymounkov, P., Mazières, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_5

    Chapter  MATH  Google Scholar 

  18. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  19. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  20. Kshetri, N.: Can blockchain strengthen the internet of things? IT Prof. 19(4), 68–72 (2017). https://doi.org/10.1109/MITP.2017.3051335

    Article  Google Scholar 

  21. Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, IoTDI 2017, pp. 173–178. ACM, New York (2017). https://doi.org/10.1145/3054977.3055003

  22. Huckle, S., Bhattacharya, R., White, M., Beloff, N.: Internet of things, blockchain and shared economy applications. Procedia Comput. Sci. 98(C), 461–466 (2016)

    Article  Google Scholar 

  23. Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops (SPW), pp. 180–184. IEEE (2015)

    Google Scholar 

  24. Shafagh, H., Burkhalter, L., Hithnawi, A., Duquennoy, S.: Towards blockchain-based auditable storage and sharing of IoT data. In: Proceedings of the 2017 on Cloud Computing Security Workshop, pp. 45–50. ACM (2017)

    Google Scholar 

  25. Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, vol. 151, pp. 1–32 (2014)

    Google Scholar 

  26. Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310 (2016)

    Google Scholar 

Download references

Acknowledgment

This paper is partially supported by NSF CNS-1443905 and NSF EFRI 1441231.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Truc D. T. Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen, T.D.T., Pham, HA., Thai, M.T. (2018). Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications. In: Chen, X., Sen, A., Li, W., Thai, M. (eds) Computational Data and Social Networks. CSoNet 2018. Lecture Notes in Computer Science(), vol 11280. Springer, Cham. https://doi.org/10.1007/978-3-030-04648-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-04648-4_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-04647-7

  • Online ISBN: 978-3-030-04648-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics