Advertisement

Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications

  • Truc D. T. NguyenEmail author
  • Hoang-Anh Pham
  • My T. Thai
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11280)

Abstract

In this paper, we present how blockchain can be leveraged to tackle data privacy issues in Internet of Things (IoT). With the aid of smart contracts, we have developed a system model featuring a trustless access control management mechanism to ensure that users have full control over their data and can track how data are accessed by third-party services. Additionally, we propose a firmware update scheme using blockchain that helps prevent fraudulent data caused by IoT device tampering. Finally, we discuss how our proposed solution can strengthen the data privacy as well as tolerate common adversaries.

Notes

Acknowledgment

This paper is partially supported by NSF CNS-1443905 and NSF EFRI 1441231.

References

  1. 1.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)Google Scholar
  2. 2.
  3. 3.
    Augur — a decentralized oracle & prediction market protocol. https://www.augur.net/
  4. 4.
    Status, a mobile ethereum os. https://status.im/
  5. 5.
    Evans, D.: The internet of things: how the next evolution of the internet is changing everything. CISCO White Pap. 1(2011), 1–11 (2011)Google Scholar
  6. 6.
    Brody, P., Pureswaran, V.: Device democracy: Saving the future of the internet of things. IBM, September 2014Google Scholar
  7. 7.
    Barcena, M.B., Wueest, C.: Insecurity in the internet of things. Security Response, Symantec (2015)Google Scholar
  8. 8.
    Mosenia, A., Jha, N.K.: A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586–602 (2017)CrossRefGoogle Scholar
  9. 9.
    Arias, O., Wurm, J., Hoang, K., Jin, Y.: Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2015)CrossRefGoogle Scholar
  10. 10.
    Hernandez, G., Arias, O., Buentello, D., Jin, Y.: Smart nest thermostat: A smart spy in your home, Black Hat USA (2014)Google Scholar
  11. 11.
    Miller, C.: Battery firmware hacking, Black Hat USA, pp. 3–4 (2011)Google Scholar
  12. 12.
    Benet, J.: IPFS-content addressed, versioned, P2P file system (2014). https://github.com/ipfs/papers
  13. 13.
  14. 14.
    Wilkinson, S., Boshevski, T., Brandoff, J., Buterin, V.: Storj a peer-to-peer cloud storage network (2014)Google Scholar
  15. 15.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998).  https://doi.org/10.1007/BFb0054122CrossRefGoogle Scholar
  16. 16.
    Egorov, M., Wilkison, M., Nuñez, D.: Nucypher kms: decentralized key management system. arXiv preprint arXiv:1707.06140 (2017)
  17. 17.
    Maymounkov, P., Mazières, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-45748-8_5CrossRefzbMATHGoogle Scholar
  18. 18.
    Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)CrossRefGoogle Scholar
  19. 19.
    Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)CrossRefGoogle Scholar
  20. 20.
    Kshetri, N.: Can blockchain strengthen the internet of things? IT Prof. 19(4), 68–72 (2017).  https://doi.org/10.1109/MITP.2017.3051335CrossRefGoogle Scholar
  21. 21.
    Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, IoTDI 2017, pp. 173–178. ACM, New York (2017).  https://doi.org/10.1145/3054977.3055003
  22. 22.
    Huckle, S., Bhattacharya, R., White, M., Beloff, N.: Internet of things, blockchain and shared economy applications. Procedia Comput. Sci. 98(C), 461–466 (2016)CrossRefGoogle Scholar
  23. 23.
    Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops (SPW), pp. 180–184. IEEE (2015)Google Scholar
  24. 24.
    Shafagh, H., Burkhalter, L., Hithnawi, A., Duquennoy, S.: Towards blockchain-based auditable storage and sharing of IoT data. In: Proceedings of the 2017 on Cloud Computing Security Workshop, pp. 45–50. ACM (2017)Google Scholar
  25. 25.
    Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, vol. 151, pp. 1–32 (2014)Google Scholar
  26. 26.
    Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Truc D. T. Nguyen
    • 1
    Email author
  • Hoang-Anh Pham
    • 2
  • My T. Thai
    • 1
  1. 1.Department of Computer and Information Science and EngineeringUniversity of FloridaGainesvilleUSA
  2. 2.Faculty of Computer Science and EngineeringHCMC University of Technology, VNU-HCMHo Chi Minh CityVietnam

Personalised recommendations