Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things

被引:124
作者
Ren, Yongjun [1 ,2 ]
Zhu, Fujian [1 ,2 ]
Sharma, Pradip Kumar [3 ]
Wang, Tian [4 ]
Wang, Jin [5 ,6 ]
Alfarraj, Osama [7 ]
Tolba, Amr [7 ,8 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Minist Educ, Engn Res Ctr Digital Forens, Sch Comp & Software, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Peoples R China
[3] Dongguk Univ, Dept Multimedia Engn, Seoul 04620, South Korea
[4] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[5] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410004, Peoples R China
[6] Fujian Univ Technol, Sch Informat Sci & Engn, Fuzhou 350118, Peoples R China
[7] King Saud Univ, Community Coll, Comp Sci Dept, Riyadh 11437, Saudi Arabia
[8] Menoufia Univ, Fac Sci, Math & Comp Sci Dept, Shibin Al Kawm 32511, Egypt
关键词
IoT data; blockchain; cloud storage; hash query; CLOUD; SECURITY; PRIVACY; SCHEME; TREE;
D O I
10.3390/s20010207
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In the IoT (Internet of Things) environment, smart homes, smart grids, and telematics constantly generate data with complex attributes. These data have low heterogeneity and poor interoperability, which brings difficulties to data management and value mining. The promising combination of blockchain and the Internet of things as BCoT (blockchain of things) can solve these problems. This paper introduces an innovative method DCOMB (dual combination Bloom filter) to firstly convert the computational power of bitcoin mining into the computational power of query. Furthermore, this article uses the DCOMB method to build blockchain-based IoT data query model. DCOMB can implement queries only through mining hash calculation. This model combines the data stream of the IoT with the timestamp of the blockchain, improving the interoperability of data and the versatility of the IoT database system. The experiment results show that the random reading performance of DCOMB query is higher than that of COMB (combination Bloom filter), and the error rate of DCOMB is lower. Meanwhile, both DCOMB and COMB query performance are better than MySQL (My Structured Query Language).
引用
收藏
页数:22
相关论文
共 56 条
  • [1] [Anonymous], P IEEE MSST DENV CO
  • [2] Methodological Approach to the Definition of a Blockchain System for the Food Industry Supply Chain Traceability
    Bettin-Diaz, Rafael
    Rojas, Alix E.
    Mejia-Moncayo, Camilo
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II, 2018, 10961 : 19 - 33
  • [3] A robust distance-based relay selection for message dissemination in vehicular network
    Cao, Dun
    Zheng, Bin
    Ji, Baofeng
    Lei, Zhengbao
    Feng, Chunhai
    [J]. WIRELESS NETWORKS, 2020, 26 (03) : 1755 - 1771
  • [4] Chang DC, 2017, ASIA-PAC NETW OPER M, P288, DOI 10.1109/APNOMS.2017.8094131
  • [5] Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy
    Chang, Yan
    Zhang, Shi-Bin
    Wan, Guo-gen
    Yan, Li-Li
    Zhang, Yan
    Li, Xue-Yang
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (07) : 2069 - 2080
  • [6] Esposito C, 2018, IEEE CLOUD COMPUT, V5, P31
  • [7] THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network
    Fang, Liming
    Li, Yang
    Yun, Xinyu
    Wen, Zhenyu
    Ji, Shouling
    Meng, Weizhi
    Cao, Zehong
    Tanveer, M.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 5745 - 5759
  • [8] A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine
    Fang, Liming
    Yin, Changchun
    Zhou, Lu
    Li, Yang
    Su, Chunhua
    Xia, Jinyue
    [J]. INFORMATION SCIENCES, 2020, 507 : 143 - 160
  • [9] Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Ge, Chunpeng
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1214 - 1226
  • [10] Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers
    Gong, Linming
    Yang, Bo
    Xue, Tao
    Chen, Jinguang
    Wang, Wei
    [J]. INFORMATION SCIENCES, 2018, 466 : 44 - 54