IEEE/CAA Journal of Automatica Sinica
Citation: | M. Qi, Z. Wang, Q.-L. Han, J. Zhang, S. Chen, and Y. Xiang, “Privacy protection for blockchain-based healthcare IoT systems: A survey,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 8, pp. 1757–1776, Aug. 2024. doi: 10.1109/JAS.2022.106058 |
To enable precision medicine and remote patient monitoring, internet of healthcare things (IoHT) has gained significant interest as a promising technique. With the widespread use of IoHT, nonetheless, privacy infringements such as IoHT data leakage have raised serious public concerns. On the other side, blockchain and distributed ledger technologies have demonstrated great potential for enhancing trustworthiness and privacy protection for IoHT systems. In this survey, a holistic review of existing blockchain-based IoHT systems is conducted to indicate the feasibility of combining blockchain and IoHT in privacy protection. In addition, various types of privacy challenges in IoHT are identified by examining general data protection regulation (GDPR). More importantly, an associated study of cutting-edge privacy-preserving techniques for the identified IoHT privacy challenges is presented. Finally, several challenges in four promising research areas for blockchain-based IoHT systems are pointed out, with the intent of motivating researchers working in these fields to develop possible solutions.
[1] |
M. A. Ferrag, L. Shu, and K. R. Choo, “Fighting COVID-19 and future pandemics with the internet of things: Security and privacy perspectives,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 9, pp. 1477–1499, 2021. doi: 10.1109/JAS.2021.1004087
|
[2] |
M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli, and M. H. Rehmani, “Applications of blockchains in the internet of things: A comprehensive survey,” IEEE Communications Surveys &Tutorials, vol. 21, no. 2, pp. 1676–1717, 2018.
|
[3] |
M. A. Ferrag and L. Shu, “The performance evaluation of blockchain-based security and privacy systems for the internet of things: A tutorial,” IEEE Internet of Things Journal, vol. 8, no. 24, pp. 17236–17260, 2021. doi: 10.1109/JIOT.2021.3078072
|
[4] |
W. Liang and N. Ji, “Privacy challenges of IoT-based blockchain: A systematic review,” Cluster Computing, vol. 25, no. 3, pp. 2203–2221, 2022.
|
[5] |
Z. Iftikhar, Y. Javed, S. Y. A. Zaidi, M. A. Shah, Z. Iqbal Khan, S. Mussadiq, and K. Abbasi, “Privacy preservation in resource-constrained IoT devices using blockchain—A survey,” Electronics, vol. 10, no. 14, p. 1732, 2021. doi: 10.3390/electronics10141732
|
[6] |
M. U. Hassan, M. H. Rehmani, and J. Chen, “Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions,” Future Generation Computer Systems, vol. 97, pp. 512–529, 2019. doi: 10.1016/j.future.2019.02.060
|
[7] |
S. Cha, T. Hsu, Y. Xiang, and K. Yeh, “Privacy enhancing technologies in the internet of things: Perspectives and challenges,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2159–2187, 2018.
|
[8] |
M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L. Maglaras, and H. Janicke, “Blockchain technologies for the internet of things: Research issues and challenges,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2188–2204, 2018.
|
[9] |
R. Thakore, R. Vaghashiya, C. Patel, and N. Doshi, “Blockchain-based IoT: A survey,” Procedia Computer Science, vol. 155, pp. 704–709, 2019. doi: 10.1016/j.procs.2019.08.101
|
[10] |
E. J. De Aguiar, B. S. Faiçal, B. Krishnamachari, and J. Ueyama, “A survey of blockchain-based strategies for healthcare,” ACM Computing Surveys (CSUR), vol. 53, no. 2, pp. 1–27, 2020. doi: 10.1145/3389414
|
[11] |
R. A. Kaur, S. Sharma, M. Shabaz, and G. Dhiman, “Application of blockchain and Internet of things in healthcare and medical sector: Applications, challenges, and future perspectives,” Journal of Food Quality, vol. 2021, no. 1, pp. 1–20, 2021.
|
[12] |
H. Hui, X. An, H. Wang, W. Ju, H. Yang, H. Gao, and F. Lin, “Survey on blockchain for internet of things,” Journal of Internet Services and Information Security, vol. 9, no. 2, pp. 1–30, 2019.
|
[13] |
G. Fortino, F. Messina, D. Rosaci, and G. M. Sarnè, “ResIoT: An IoT social framework resilient to malicious activities,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1263–1278, 2020. doi: 10.1109/JAS.2020.1003330
|
[14] |
O. Friha, M. A. Ferrag, L. Shu, L. A. Maglaras, and X. Wang, “Internet of things for the future of smart agriculture: A comprehensive survey of emerging technologies,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 4, pp. 718–752, 2021. doi: 10.1109/JAS.2021.1003925
|
[15] |
T. Wu, J. Redouté, and M. Yuce, “A wearable, low-power, real-time ECG monitor for smart T-shirt and IoT healthcare applications,” in Proc. Advances in Body Area Networks I, 2019, pp. 165–173.
|
[16] |
M. M. Ahmadi and G. A. Jullien, “A wireless-implantable microsystem for continuous blood glucose monitoring,” IEEE Trans. Biomedical Circuits and Systems, vol. 3, no. 3, pp. 169–180, 2009. doi: 10.1109/TBCAS.2009.2016844
|
[17] |
L. M. R. Tarouco, L. M. Bertholdo, L. Z. Granville, L. M. R. Arbiza, F. Carbone, M. Marotta, and J. J. C. De Santanna, “Internet of things in healthcare: Interoperatibility and security issues,” in Proc. Int. Conf. on Communications, 2012, pp. 6121–6125.
|
[18] |
A. J. Jara, M. A. Zamora-Izquierdo, and A. F. Skarmeta, “Interconnection framework for mhealth and remote monitoring based on the internet of things,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 47–65, 2013. doi: 10.1109/JSAC.2013.SUP.0513005
|
[19] |
E. C. Larson, T. Lee, S. Liu, M. Rosenfeld, and S. N. Patel, “Accurate and privacy preserving cough sensing using a low-cost microphone,” in Proc. 13th Int. Conf. Ubiquitous Computing, 2011, pp. 375–384.
|
[20] |
S. S. Nayak, Gupta, A. B. W. Upasana, and A. B. Wani, “Wheel chair with health monitoring system using IoT,” Int. Research Journal of Engineering and Technology (IRJET), vol. 4, no. 5, pp. 1063–1067, 2017.
|
[21] |
L. Yang, Y. Ge, W. Li, W. Rao, and W. Shen, “A home mobile healthcare system for wheelchair users,” in Proc. 18th Int. Conf. Computer Supported Cooperative Work in Design, 2014, pp. 609–614.
|
[22] |
Y. J. Fan, Y. H. Yin, L. Da Xu, Y. Zeng, and F. Wu, “IoT-based smart rehabilitation system,” IEEE Trans. Industrial Informatics, vol. 10, no. 2, pp. 1568–1577, 2014. doi: 10.1109/TII.2014.2302583
|
[23] |
G. Yang, J. Deng, G. Pang, et al., “An IoT-enabled stroke rehabilitation system based on smart wearable armband and machine learning,” IEEE Journal of Translational Engineering in Health and Medicine, vol. 6, pp. 1–10, 2018.
|
[24] |
C. Dobbins, R. Rawassizadeh, and E. Momeni, “Detecting physical activity within lifelogs towards preventing obesity and aiding ambient assisted living,” Neurocomputing, vol. 230, pp. 110–132, 2017. doi: 10.1016/j.neucom.2016.02.088
|
[25] |
J. Zhang, L. Pan, Q.-L. Han, C. Chen, S. Wen, and Y. Xiang, “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 3, pp. 377–391, 2021.
|
[26] |
A. D. Kounoudes and G. M. Kapitsaki, “A mapping of IoT user-centric privacy preserving approaches to the gdpr,” Internet of Things, vol. 11, p. 100179, 2020. doi: 10.1016/j.iot.2020.100179
|
[27] |
G. Lin, S. Wen, Q.-L. Han, J. Zhang, and Y. Xiang, “Software vulnerability detection using deep neural networks: A survey,” Proc. the IEEE, vol. 108, no. 10, pp. 1825–1848, 2020. doi: 10.1109/JPROC.2020.2993293
|
[28] |
S. Wachter, “Normative challenges of identification in the internet of things: Privacy, profiling, discrimination, and the gdpr,” Computer Law and Security Review, vol. 34, no. 3, pp. 436–449, 2018. doi: 10.1016/j.clsr.2018.02.002
|
[29] |
Y. Miao, C. Chen, L. Pan, Q.-L. Han, J. Zhang, and Y. Xiang, “Machine learning-based cyber attacks targeting on controlled information: A survey,” ACM Computing Surveys (CSUR), vol. 54, no. 7, pp. 1–36, 2021.
|
[30] |
S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized Business Review, p. 21260, 2008.
|
[31] |
I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, “Proof of activity: Extending bitcoin’s proof of work via proof of stake,” ACM SIGMETRICS Performance Evaluation Review, vol. 42, no. 3, pp. 34–37, 2014. doi: 10.1145/2695533.2695545
|
[32] |
Zhang, M. Zhou, Q. Zhao, A. Abusorrah, and O. O. Bamasag, “A performance-optimized consensus mechanism for consortium blockchains consisting of trust-varying nodes,” IEEE Trans. Network Science and Engineering, vol. 8, no. 3, pp. 2147–2159, 2021. doi: 10.1109/TNSE.2021.3079415
|
[33] |
M. Castro, B. Liskov, et al., “Practical byzantine fault tolerance,” in Proc. OsDI, vol. 99, no. 1999, 1999, pp. 173–186.
|
[34] |
F. M. Benčić and I. P. Žarko, “Distributed ledger technology: Blockchain compared to directed acyclic graph,” in Proc. 38th IEEE Int. Conf. Distributed Computing Systems, 2018, pp. 1569–1570.
|
[35] |
D. Mazieres, “The stellar consensus protocol: A federated model for internet-level consensus,” Stellar Development Foundation, vol. 32, pp. 1–45, 2015.
|
[36] |
T. H. Kim and J. Lampkins, “SSP: Self-sovereign privacy for internet of things using blockchain and mpc,” in Proc. IEEE Int. Conf. Blockchain, 2019, pp. 411–418.
|
[37] |
G. Srivastava, J. Crichigno, and S. Dhar, “A light and secure healthcare blockchain for IoT medical devices,” in Proc. Canadian Conf. Electrical and Computer Engineering, 2019, pp. 1–5.
|
[38] |
M. A. Uddin, A. Stranieri, I. Gondal, and V. Balasubramanian, “A decentralized patient agent controlled blockchain for remote patient monitoring,” in Proc. Int. Conf. Wireless and Mobile Computing, Networking and Communications, 2019, pp. 1–8.
|
[39] |
M. A. Uddin, A. Stranieri, I. Gondal, and V. Balasubramanian, “Blockchain leveraged decentralized IoT ehealth framework,” Internet of Things, vol. 9, p. 100159, 2020. doi: 10.1016/j.iot.2020.100159
|
[40] |
P. Ray, N. Kumar, and D. Dash, “BLWN: Blockchain-based lightweight simplified payment verification in IoT-assisted e-healthcare,” IEEE Systems Journal, vol. 15, no. 1, pp. 134–145, 2020.
|
[41] |
F. P. Oikonomou, G. Mantas, P. Cox, F. Bashashi, F. Gil-Castiñeira, and J. Gonzalez, “A blockchain-based architecture for secure IoT-based health monitoring systems,” in Proc. IEEE 26th Int. Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021, pp. 1–6.
|
[42] |
F. P. Oikonomou, J. Ribeiro, G. Mantas, J. M. C. Bastos, and J. Rodriguez, “A hyperledger fabric-based blockchain architecture to secure iot-based health monitoring systems,” in Proc. IEEE Int. Mediterranean Conf. Communications and Networking (MeditCom), 2021, pp. 186–190.
|
[43] |
K. Azbeg, O. Ouchetto, S. J. Andaloussi, L. Fetjah, and A. Sekkaki, “Blockchain and IoT for security and privacy: A platform for diabetes self-management,” in Proc. 4th IEEE Int. Conf. Cloud Computing Technologies and Applications, 2018, pp. 1–5.
|
[44] |
N. Rifi, E. Rachkidi, N. Agoulmine, and N. C. Taher, “Towards using blockchain technology for ehealth data access management,” in Proc. 4th IEEE Int. Conf. Advances in Biomedical Engineering, 2017, pp. 1–4.
|
[45] |
H. L. Pham, T. H. Tran, and Y. Nakashima, “A secure remote healthcare system for hospital using blockchain smart contract,” in Proc. IEEE Globecom Workshops, 2018, pp. 1–6.
|
[46] |
M. Muofhe, N. Dlodlo, and A. Terzoli, “An internet of things-based system integrated with blockchain to manage patient data in the healthcare sector,” in Proc. Open Innovations, 2019, pp. 97–103.
|
[47] |
X. Liang, J. Zhao, S. Shetty, J. Liu, and D. Li, “Integrating blockchain for data sharing and collaboration in mobile healthcare applications,” in Proc. 28th IEEE Annu. Int. Symp. Personal, Indoor, and Mobile Radio Communications, 2017, pp. 1–5.
|
[48] |
D. El Majdoubi, H. El Bakkali, and S. Sadki, “Smartmedchain: A blockchain-based privacy-preserving smart healthcare framework,” Journal of Healthcare Engineering, vol. 2021, 2021.
|
[49] |
O. Attia, I. Khoufi, A. Laouiti, and C. Adjih, “An IoT-blockchain architecture based on hyperledger framework for health care monitoring application,” in Proc. 10th IFIP Int. Conf. New Technologies, Mobility and Security, 2019, pp. 1–5.
|
[50] |
P. Ray, B. Chowhan, N. Kumar, and A. Almogren, “BIoTHR: Electronic health record servicing scheme in IoT-blockchain ecosystem,” IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10857–10872, 2021. doi: 10.1109/JIOT.2021.3050703
|
[51] |
R. Jabbar, N. Fetais, M. Krichen, and K. Barkaoui, “Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity,” in Proc. Int. Conf. Informatics, IoT, and Enabling Technologies, 2020, pp. 310–317.
|
[52] |
S. Jeong, J.-H. Shen, and B. Ahn, “A study on smart healthcare monitoring using IoT based on blockchain,” Wireless Communications and Mobile Computing, vol. 2021, 2021.
|
[53] |
N. Dilawar, M. Rizwan, F. Ahmad, and S. Akram, “Blockchain: Securing internet of medical things (IoMT),” Int. Journal of Advanced Computer Science and Applications, vol. 10, no. 1, pp. 82–89, 2019.
|
[54] |
P. Ray, B. Chowhan, N. Kumar, and A. Almogren, “BIoTHR: Electronic health record servicing scheme in IoT-blockchain ecosystem,” IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10857–10872, 2021. doi: 10.1109/JIOT.2021.3050703
|
[55] |
X. Cai, S. Geng, J. Zhang, D. Wu, Z. Cui, W. Zhang, and J. Chen, “A sharding scheme-based many-objective optimization algorithm for enhancing security in blockchain-enabled industrial internet of things,” IEEE Trans. Industrial Informatics, vol. 17, no. 11, pp. 7650–7658, 2021. doi: 10.1109/TII.2021.3051607
|
[56] |
M. Shukla, J. Lin, and O. Seneviratne, “BlockIoT: Blockchain-based health data integration using IoT devices,” in Proc. AMIA Annu. Symp. Proceedings, vol. 2021, 2021, p. 1119.
|
[57] |
A. Bhawiyuga, A. Wardhana, K. Amron, and A. P. Kirana, “Platform for integrating internet of things based smart healthcare system and blockchain network,” in Proc. 6th IEEE NAFOSTED Conf. Information and Computer Science, 2019, pp. 55–60.
|
[58] |
K. N. Griggs, O. Ossipova, C. Kohlios, A. N. Baccarini, E. A. Howson, and T. Hayajneh, “Healthcare blockchain system using smart contracts for secure automated remote patient monitoring,” Journal of Medical Systems, vol. 42, no. 7, pp. 1–7, 2018.
|
[59] |
A. D. Dwivedi, L. Malina, P. Dzurenda, and G. Srivastava, “Optimized blockchain model for internet of things based healthcare applications,” in Proc. 42nd IEEE Int. Conf. Telecommunications and Signal Processing, 2019, pp. 135–139.
|
[60] |
P. Ray, D. Dash, K. Salah, and N. Kumar, “Blockchain for IoT-based healthcare: Background, consensus, platforms, and use cases,” IEEE Systems Journal, vol. 15, no. 1, pp. 85–94, 2020.
|
[61] |
G. Srivastava, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo, “Data sharing and privacy for patient IoT devices using blockchain,” in Proc. Int. Conf. Smart City and Informatization, 2019, pp. 334–348.
|
[62] |
G. Tripathi, M. A. Ahad, and S. Paiva, “S2hs–a blockchain based approach for smart healthcare system,” Healthcare, vol. 8, no. 1, p. 100391, 2020. doi: 10.1016/j.hjdsi.2019.100391
|
[63] |
T. Dey, S. Jaiswal, S. Sunderkrishnan, and N. Katre, “Healthsense: A medical use case of internet of things and blockchain,” in Proc. IEEE Int. Conf. Intelligent Sustainable Systems, 2017, pp. 486–491.
|
[64] |
A. Ali Süzen and B. Duman, “Protecting the privacy of IoT-based health records using blockchain technology,” pp. 35–54, 2021.
|
[65] |
K. M. Hossein, M. E. Esmaeili, T. Dargahi, A. Khonsari, and M. Conti, “Bchealth: A novel blockchain-based privacy-preserving architecture for IoT healthcare applications,” Computer Communications, vol. 180, pp. 31–47, 2021. doi: 10.1016/j.comcom.2021.08.011
|
[66] |
G. Hameed, Y. Singh, S. Haq, and B. Rana, “Blockchain-based model for secure IoT communication in smart healthcare,” pp. 715–730, 2022.
|
[67] |
A. Al Omar, M. S. Rahman, A. Basu, and S. Kiyomoto, “Medibchain: A blockchain based privacy preserving platform for healthcare data,” in Proc. Int. Conf. Security, Privacy and Anonymity in Computation, Communication and Storage, 2017, pp. 534–543.
|
[68] |
G. Rathee, A. Sharma, H. Saini, R. Kumar, and R. Iqbal, “A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology,” Multimedia Tools and Applications, vol. 79, no. 15, pp. 9711–9733, 2020.
|
[69] |
J. Xu, K. Xue, S. Li, et al., “Healthchain: A blockchain-based privacy preserving scheme for large-scale health data,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8770–8781, 2019. doi: 10.1109/JIOT.2019.2923525
|
[70] |
S. Badr, I. Gomaa, and E. Abd-Elrahman, “Multi-tier blockchain framework for IOT-ehrs systems,” Procedia Computer Science, vol. 141, pp. 159–166, 2018. doi: 10.1016/j.procs.2018.10.162
|
[71] |
Z. Zulkifl, F. Khan, S. Tahir, M. Afzal, W. Iqbal, A. Rehman, S. Saeed, and A. M. Almuhaideb, “FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs,” IEEE Access, vol. 10, pp. 15 644–15 656, 2022.
|
[72] |
S. Jiang, J. Cao, H. Wu, Y. Yang, M. Ma, and J. He, “BlocHIE: A blockchain-based platform for healthcare information exchange,” in Proc. Int. Conf. Smart Computing, 2018, pp. 49–56.
|
[73] |
K. M. Hossein, M. E. Esmaeili, T. Dargahi, et al., “Blockchain-based privacy-preserving healthcare architecture,” in Proc. Canadian Conf. Electrical and Computer Engineering, 2019, pp. 1–4.
|
[74] |
G. Gunanidhi and R. Krishnaveni, “Improved security blockchain for IoT based healthcare monitoring system,” in Proc. 2nd Int. Conf. Artificial Intelligence and Smart Energy, 2022, pp. 1244–1247.
|
[75] |
N. Sun, J. Zhang, Rimba, S. Gao, L. Y. Zhang, and Y. Xiang, “Data-driven cybersecurity incident prediction: A survey,” IEEE Communications Surveys &Tutorials, vol. 21, no. 2, pp. 1744–1772, 2018.
|
[76] |
H. Lu, Y. Tang, and Y. Sun, “DRRS-BC: Decentralized routing registration system based on blockchain,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 12, pp. 1868–1876, 2021. doi: 10.1109/JAS.2021.1004204
|
[77] |
Z. Cui, X. Fei, S. Zhang, X. Cai, Y. Cao, W. Zhang, and J. Chen, “A hybrid blockchain-based identity authentication scheme for multi-WSN,” IEEE Trans. Services Computing, vol. 13, no. 2, pp. 241–251, 2020.
|
[78] |
M. T. Hammi, P. Bellot, and A. Serhrouchni, “BCTrust: A decentralized authentication blockchain-based mechanism,” in Proc. Wireless Communications and Networking Conf., 2018, pp. 1–6.
|
[79] |
A. Fayad, B. Hammi, R. Khatoun, and A. Serhrouchni, “A blockchain-based lightweight authentication solution for IoT,” in Proc. 3rd IEEE Cyber Security in Networking Conf., 2019, pp. 28–34.
|
[80] |
D. Li, W. Peng, W. Deng, and F. Gai, “A blockchain-based authentication and security mechanism for IoT,” in Proc. 27th IEEE Int. Conf. Computer Communication and Networks, 2018, pp. 1–6.
|
[81] |
S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain meets edge computing: A distributed and trusted authentication system,” IEEE Trans. Industrial Informatics, vol. 16, no. 3, pp. 1972–1983, 2019.
|
[82] |
K. Albalawi and M. M. A. Azim, “Cloud-based IoT device authentication scheme using blockchain,” in Proc. Global Conf. Internet of Things, 2019, pp. 1–7.
|
[83] |
R. Almadhoun, M. Kadadha, M. Alhemeiri, M. Alshehhi, and K. Salah, “A user authentication scheme of IoT devices using blockchain-enabled fog nodes,” in Proc. 15th IEEE Int. Conf. Computer Systems and Applications, 2018, pp. 1–8.
|
[84] |
S. S. Panda, U. Satapathy, B. K. Mohanta, D. Jena, and D. Gountia, “A blockchain based decentralized authentication framework for resource constrained IoT devices,” in Proc. 10th IEEE Int. Conf. Computing, Communication and Networking Technologies, 2019, pp. 1–6.
|
[85] |
C. H. Lau, K.-H. Y. Alan, and F. Yan, “Blockchain-based authentication in IoT networks,” in Proc. Conf. Dependable and Secure Computing, 2018, pp. 1–8.
|
[86] |
B. K. Mohanta, A. Sahoo, S. Patel, S. S. Panda, D. Jena, and D. Gountia, “Decauth: Decentralized authentication scheme for IoT device using ethereum blockchain,” in Proc. IEEE Region 10 Conf., 2019, pp. 558–563.
|
[87] |
I. Riabi, H. K. B. Ayed, and L. A. Saidane, “A survey on blockchain based access control for internet of things,” in Proc. 15th IEEE Int. Wireless Communications & Mobile Computing Conf., 2019, pp. 502–507.
|
[88] |
J. Qiu, J. Zhang, W. Luo, L. Pan, S. Nepal, and Y. Xiang, “A survey of android malware detection with deep neural models,” ACM Computing Surveys (CSUR), vol. 53, no. 6, pp. 1–36, 2020.
|
[89] |
Y. Zhang, S. Kasahara, Y. Shen, X. Jiang, and J. Wan, “Smart contract-based access control for the internet of things,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1594–1605, 2018.
|
[90] |
H. Al Breiki, L. Al Qassem, K. Salah, M. H. U. Rehman, and D. Sevtinovic, “Decentralized access control for IoT data using blockchain and trusted oracles,” in Proc. Int. Conf. Industrial Internet, 2019, pp. 248–257.
|
[91] |
B. S. Egala, A. K. Pradhan, V. Badarla, and S. Mohanty, “Fortified-chain: A blockchain-based framework for security and privacy-assured internet of medical things with effective access control,” IEEE Internet of Things Journal, vol. 8, no. 14, pp. 11717–11731, 2021. doi: 10.1109/JIOT.2021.3058946
|
[92] |
B. Chai, B. Yan, J. Yu, and G. Wang, “BHE-AC: A blockchain-based high-efficiency access control framework for Internet of things,” Personal and Ubiquitous Computing, vol. 26, no. 4, pp. 971–982, 2022.
|
[93] |
M. A. Islam and S. Madria, “A permissioned blockchain based access control system for IoT,” in Proc. Int. Conf. Blockchain, 2019, pp. 469–476.
|
[94] |
A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman, “Fairaccess: A new blockchain-based access control framework for the internet of things,” Security and Communication Networks, vol. 9, no. 18, pp. 5943–5964, 2016. doi: 10.1002/sec.1748
|
[95] |
R. Xu, Y. Chen, E. Blasch, and G. Chen, “BlendCAC: A blockchain-enabled decentralized capability-based access control for IoTs,” in Proc. IEEE Int. Conf. Internet of Things and IEEE Green Computing and Communications and IEEE Cyber, Physical and Social Computing and IEEE Smart Data, 2018, pp. 1027–1034.
|
[96] |
O. Novo, “Scalable access management in IoT using blockchain: A performance evaluation,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4694–4701, 2018.
|
[97] |
O. Novo, “Blockchain meets IoT: An architecture for scalable access management in IoT,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1184–1195, 2018. doi: 10.1109/JIOT.2018.2812239
|
[98] |
D. Hwang, J. Choi, and K.-H. Kim, “Dynamic access control scheme for IoT devices using blockchain,” in Proc. Int. Conf. Information and Communication Technology Convergence, 2018, pp. 713–715.
|
[99] |
S. Singh, K. Sharma, S. Y. Moon, and J. H. Park, “Advanced lightweight encryption algorithms for IoT devices: Survey, challenges and solutions,” Journal of Ambient Intelligence and Humanized Computing, pp. 1–18, 2017.
|
[100] |
B. B. Gupta, K.-C. Li, V. C. Leung, et al., “Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 12, pp. 1877–1890, 2021. doi: 10.1109/JAS.2021.1004003
|
[101] |
A. Manzoor, M. Liyanage, A. Braeke, S. S. Kanhere, and M. Ylianttila, “Blockchain based proxy re-encryption scheme for secure IoT data sharing,” in Proc. Int. Conf. Blockchain and Cryptocurrency, 2019, pp. 99–103.
|
[102] |
A. Abbas, R. Alroobaea, M. Krichen, S. Rubaiee, S. Vimal, and F. M. Almansour, “Blockchain-assisted secured data management framework for health information analysis based on internet of medical things,” Personal and Ubiquitous Computing, vol. 28, no. 1, pp. 59–72, 2024.
|
[103] |
Z. Zhang, L. Huang, R. Tang, T. Peng, L. Guo, and X. Xiang, “Industrial blockchain of things: A solution for trustless industrial data sharing and beyond,” in Proc. 16th IEEE Int. Conf. Automation Science and Engineering, 2020, pp. 1187–1192.
|
[104] |
A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Annu. Int. Conf. Theory and Applications of Cryptographic Technihques, 2005, pp. 457–473.
|
[105] |
Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and A. Kondoz, “Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption,” in Proc. Int. Conf. Advanced Networks and Telecommunications Systems, 2017, pp. 1–6.
|
[106] |
A. Wu, Y. Zhang, X. Zheng, R. Guo, Q. Zhao, and D. Zheng, “Efficient and privacy-preserving traceable attribute-based encryption in blockchain,” Annals of Telecommunications, vol. 74, no. 7, pp. 401–411, 2019.
|
[107] |
S. Liu, J. Yu, Y. Xiao, Z. Wan, S. Wang, and B. Yan, “BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT,” IEEE Internet of Things Journal, vol. 7, no. 9, pp. 7851–7867, 2020. doi: 10.1109/JIOT.2020.2993231
|
[108] |
L. Chen, W.-K. Lee, C.-C. Chang, K.-K. R. Choo, and N. Zhang, “Blockchain based searchable encryption for electronic health record sharing,” Future Generation Computer Systems, vol. 95, pp. 420–429, 2019. doi: 10.1016/j.future.2019.01.018
|
[109] |
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. Symp. Security and Privacy, 2007, pp. 321–334.
|
[110] |
Y. Zhang, D. He, and K.-K. R. Choo, “BaDS: Blockchain-based architecture for data sharing with ABS and CP-ABE in IoT,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–9, 2018.
|
[111] |
D. Han, J. Chen, G. Zang, X. Wang, and Y. Gao, “DSSPS: A data sharing security protection scheme based on consortium blockchain and ciphertext-policy attribute-based encryption,” in Proc. 2nd Int. Conf. Blockchain Technology and Applications, 2019, pp. 14–19.
|
[112] |
R. Canetti, S. Halevi, and J. Katz, “Chosen-ciphertext security from identity-based encryption,” in Proc. Int. Conf. Theory and Applications of Cryptographic Techniques, 2004, pp. 207–222.
|
[113] |
H. T. T. Truong, M. Almeida, G. Karame, and C. Soriente, “Towards secure and decentralized sharing of IoT data,” in Proc. Int. Conf. Blockchain, 2019, pp. 176–183.
|
[114] |
H. Zhao, J. Yan, X. Luo, and X. Gua, “Privacy preserving solution for the asynchronous localization of underwater sensor networks,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 6, pp. 1511–1527, 2020. doi: 10.1109/JAS.2020.1003312
|
[115] |
A. R. Shahid, N. Pissinou, L. Njilla, S. Alemany, A. Imteaj, K. Makki, and E. Aguilar, “Quantifying location privacy in permissioned blockchain-based internet of things (IoT),” in Proc. 16th EAI Int. Conf. Mobile and Ubiquitous Systems: Computing, Networking and Services, 2019, pp. 116–125.
|
[116] |
M. Yang, T. Zhu, K. Liang, W. Zhou, and R. H. Deng, “A blockchain-based location privacy-preserving crowdsensing system,” Future Generation Computer Systems, vol. 94, pp. 408–418, 2019. doi: 10.1016/j.future.2018.11.046
|
[117] |
S. Zou, J. Xi, G. Xu, M. Zhang, and Y. Lu, “CrowdHB: A decentralized location privacy-preserving crowdsensing system based on a hybrid blockchain network,” IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14803–14817, 2022.
|
[118] |
H. Li, L. Pei, D. Liao, G. Sun, and D. Xu, “Blockchain meets VANET: An architecture for identity and location privacy protection in VANET,” Peer-to-Peer Networking and Applications, vol. 12, no. 5, pp. 1178–1193, 2019. doi: 10.1007/s12083-019-00786-4
|
[119] |
S. Zou, J. Xi, H. Wang, and G. Xu, “CrowdBLPS: A blockchain-based location-privacy-preserving mobile crowdsensing system,” IEEE Trans. Industrial Informatics, vol. 16, no. 6, pp. 4206–4218, 2019.
|
[120] |
S. K. Lo, Q. Lu, C. Wang, H.-Y. Paik, and L. Zhu, “A systematic literature review on federated machine learning: From a software engineering perspective,” ACM Computing Surveys (CSUR), vol. 54, no. 5, pp. 1–39, 2021.
|
[121] |
M. Qi, Z. Wang, F. Wu, R. Hanson, S. Chen, Y. Xiang, and L. Zhu, “A blockchain-enabled federated learning model for privacy preservation: System design,” in Proc. Australasian Conf. Information Security and Privacy, 2021, pp. 473–489.
|
[122] |
Y. Lu, X. Huang, Y. Dai, S. Maharjan, and Y. Zhang, “Blockchain and federated learning for privacy-preserved data sharing in industrial IoT,” IEEE Trans. Industrial Informatics, vol. 16, no. 6, pp. 4177–4186, 2019.
|
[123] |
Y. Zhao, J. Zhao, L. Jiang, R. Tan, D. Niyato, Z. Li, L. Lyu, and Y. Liu, “Privacy-preserving blockchain-based federated learning for IoT devices,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1817–1829, 2021. doi: 10.1109/JIOT.2020.3017377
|
[124] |
Y. Qu, L. Gao, T. H. Luan, Y. Xiang, S. Yu, B. Li, and G. Zheng, “Decentralized privacy using blockchain-enabled federated learning in fog computing,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5171–5183, 2020. doi: 10.1109/JIOT.2020.2977383
|
[125] |
Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, “Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles,” IEEE Trans. Vehicular Technology, vol. 69, no. 4, pp. 4298–4311, 2020. doi: 10.1109/TVT.2020.2973651
|
[126] |
H. Chai, S. Leng, Y. Chen, and K. Zhang, “A hierarchical blockchain-enabled federated learning algorithm for knowledge sharing in internet of vehicles,” IEEE Trans. Intelligent Transportation Systems, vol. 22, no. 7, pp. 3975–3986, 2021. doi: 10.1109/TITS.2020.3002712
|
[127] |
A. C. Yao, “Protocols for secure computations,” in Proc. 23rd IEEE Annu. Symp. Foundations of Computer Science, 1982, pp. 160–164.
|
[128] |
H. Shrobe, D. L. Shrier, and A. Pentland, “Enigma: Decentralized computation platform with guaranteed privacy,” pp. 425–454, 2018.
|
[129] |
Z. Guan, X. Zhou, P. Liu, L. Wu, and W. Yang, “A blockchain based dual side privacy preserving multi party computation scheme for edge enabled smart grid,” IEEE Internet of Things Journal, 2021.
|
[130] |
Y. Yang, L. Wei, J. Wu, and C. Long, “Block-SMPC: A blockchain-based secure multi-party computation for privacy-protected data sharing,” in Proc. 2nd Int. Conf. Blockchain Technology, 2020, pp. 46–51.
|
[131] |
B. Jia, X. Zhang, J. Liu, Y. Zhang, K. Huang, and Y. Liang, “Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT,” IEEE Trans. Industrial Informatics, vol. 18, no. 6, pp. 4049–4058, 2022. doi: 10.1109/TII.2021.3085960
|
[132] |
T. H. Kim and J. Lampkins, “SSP: Self-sovereign privacy for internet of things using blockchain and MPC,” in Proc. Int. Conf. Blockchain, 2019, pp. 411–418.
|
[133] |
R. L. Rivest, A. Shamir, and Y. Tauman, “How to leak a secret,” in Proc. Int. Conf. Theory and Application of Cryptology and Information Security, 2001, pp. 552–565.
|
[134] |
C. Dwork, “Differential privacy: A survey of results,” in Proc. Int. Conf. Theory and Applications of Models of Computation, 2008, pp. 1–19.
|
[135] |
G. G. Dagher, J. Mohler, M. Milojkovic, and B. Marella, “Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology,” Sustainable Cities and Society, vol. 39, pp. 283–297, 2018. doi: 10.1016/j.scs.2018.02.014
|
[136] |
H. Wu and C. Tsai, “Toward blockchains for health-care systems: Applying the bilinear pairing technology to ensure privacy protection and accuracy in data sharing,” IEEE Consumer Electronics Magazine, vol. 7, no. 4, pp. 65–71, 2018. doi: 10.1109/MCE.2018.2816306
|
[137] |
S. Jiang, J. Cao, J. A. McCann, Y. Yang, Y. Liu, X. Wang, and Y. Deng, “Privacy-preserving and efficient multi-keyword search over encrypted data on blockchain,” in Proc. IEEE Int. Conf. Blockchain, 2019, pp. 405–410.
|
[138] |
X. Huang, D. Ye, R. Yu, and L. Shu, “Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 2, pp. 426–441, 2020. doi: 10.1109/JAS.2020.1003039
|