Cloud based Secure Service Providing for IoTs using Blockchain

被引:46
作者
Rehman, Mubariz [1 ]
Javaid, Nadeem [1 ]
Awais, Muhammad [1 ]
Imran, Muhammad [2 ]
Naseer, Nidal [3 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad 44000, Pakistan
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh 11451, Saudi Arabia
[3] Alfaisal Univ, Coll Engn, Riyadh, Saudi Arabia
来源
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2019年
关键词
Internet of Things; Cloud Computing; Fog Computing; Proof of Work; Proof of Authority; Light Weight Clients; ARCHITECTURE;
D O I
10.1109/globecom38437.2019.9013413
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoTs) is widely growing domain of the modern era. With the advancement in technologies, the use of IoTs devices also increases. However, security risks regarding service provisioning and data sharing also increases. There are many existing security approaches. However, these approaches are not suitable for IoTs devices due to their limited storage and computation resources. These secure approaches also require a specific hardware. With the invention of blockchain technologies, many security risks are eliminated. Blockchain also supports data sharing mechanism. In this paper, we proposed a secure service providing mechanism for IoTs using blockchain. We introduced cloud nodes for maintaining the validity states of edge service providers. The edge node reputation is considered as a service rating given by end users. Incentive is given to edge servers after validation of service codes. Incentive is in the form of cryptocurrency. Incentive and edge node reputation values are stored in cloud node and are updated with respect to time. Smart contract is proposed to check the validity state of the edge servers. Smart contract is also used for the comparison and verification of the service codes provided by edge servers. In our proposed system, we perform service authentication at both cloud and edge server layer. Moreover, Proof of Authority (PoA) is used as a consensus mechanism. PoA enhanced overall performance of our proposed system. By experimental analysis, it is shown that our proposed model is suitable for resource constrained devices.
引用
收藏
页数:7
相关论文
共 20 条
[1]   CSN: A network protocol for serving dynamic queries in large-scale wireless sensor networks [J].
Ali, M ;
Uzmi, ZA .
SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, :165-174
[2]  
Kushch S., 2018, ARXIV180611399
[3]   Data Transmission Scheme Considering Node Failure for Blockchain [J].
Li, Jiao .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (01) :179-194
[4]   Blockchain Consensus Based User Access Strategies in D2D Networks for Data-Intensive Applications [J].
Lin, Di ;
Tang, Yu .
IEEE ACCESS, 2018, 6 :72683-72690
[5]  
Middleton P., 2013, GARTNER RES
[6]  
Nakamoto S., 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
[7]   Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT [J].
Novo, Oscar .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02) :1184-1195
[8]  
Pan Jianli, 2018, IEEE INTERNET THINGS
[9]  
Parker D, 2005, P 38 ANN HAW INT C S
[10]   Blockchain and IoT-Based Cognitive Edge Framework for Sharing Economy Services in a Smart City [J].
Rahman, Md Abdur ;
Rashid, Md Mamunur ;
Hossain, M. Shamim ;
Hassanain, Elham ;
Alhamid, Mohammed F. ;
Guizani, Mohsen .
IEEE ACCESS, 2019, 7 :18611-18621