The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions

Authors

  • Mukunthan B Dept. of Computer Science, School of Computing, Sri Rama Krishna College of Arts and Science, Nava India, Coimbatore, Tamil Nadu, India
  • Govindaraju S School of Computing, Sri Rama Krishna College of Arts and Science, Nava India, Coimbatore, Tamil Nadu, India
  • Komagal Yallini SK School of Computing, Sri Rama Krishna College of Arts and Science, Nava India, Coimbatore, Tamil Nadu, India
  • VibinChander S Dept. of Computer Application, School of Computing, Sri Rama Krishna College of Arts and Science, Nava India, Coimbatore, Tamil Nadu, India
  • RanjithKumar C Dept. of Computer Science, School of Computing, Sri Rama Krishna College of Arts and Science, Nava India, Coimbatore, Tamil Nadu, India

DOI:

https://doi.org/10.26438/ijcse/v8i1.179186

Keywords:

Cloud-based IoT, Network securit, Block-Chain Services;, Application Programming Interface, Messaging Protocol.

Abstract

Block-Chain is referred as the list of transactions stored in multiple participating servers rather than on a central transaction server. Each and every participant in the Block-Chain network is granted access to an up-to-date copy of this encrypted catalog so they can read, write, and validate transactions. Block-Chains have recently gained a lot of attention in IoT solutions even though they are used mostly in the financial domain. Block-Chain can relatively support in accomplishing the vision of distributed IoT, facilitating transactions and coordination among interacting devices. The two technologies Block- Chain and IoT are used to build end to end automated and secured solutions. Internets of things (IoT) solutions are being effectively implemented in many different sectors, such as healthcare, warehousing, transportation, and logistics. Current unified, Cloud-based IoT solutions may not gauge and meet the network security defies faced by large-scale enterprises. The use of Block-Chain as a distributed catalog of transactions and peer-to-peer communication among contributing nodes can unravel such problems. This paper gives an idea of Block-Chain-enabled IoT solutions and shows how to use the Block-Chain platform for an IoT application in a multi partner environment.

References

[1] A. Ukil, S. Bandyopadhyay and A. Pal, "IoT-Privacy: To be private or not to be private," in Computer Communications Workshops (INFOCOM WKSHPS)”, IEEE Conference on, Toronto, 2014.

[2] Almutairi, A., Sarfraz, M., Basalamah, S., Aref, W., & Ghafoor, A.”A distributed access control architecture for cloud computing. IEEE Software”, vol:29, PP.36–44, 2012.

[3] Atzoria, L., Ierab, A., &Morabitoc, G.”The internet of things: A survey. Computer Networks”, vol:54, 2787–2805, 2010.

[4] Chen, M., Gonzalez, S., Zhang, Y., & Leung, V. “Multi-agent Itinerary planning in wireless sensor networks”. In ICST QShine,Spain, November 23–25, 2009.

[5] Chen, M., Wan, J., & Li, F. “Machine-to-machine communications: architectures, standards, and applications”. KSII Transactions on Internet and Information Systems, vol.6, PP-480–497, 2011.

[6] Chen, Z., Xia, F., Huang, T., Bu, F., & Wang, H. “A localization method for the internet of things. Journal of Supercomputing”, vol.633, issue.3, PP.657–674, 2011.

[7] COMSafety technical conference report: D4.6 “Report on Results of EU-US Cooperation Seventh Framework Programme Directorate-General for Communications Networks Content and Technology Smart Cities and Sustainability”, 2014.

[8] Corcoran, P. M. “ Cloud computing and consumer electronics: A perfect match or a hidden storm?”, IEEE Consumer Electronics Magazine, vol.1, PP-14–19.

[9] Das, ManikLal, "Privacy and Security Challenges in Internet of Things," Distributed Computing and Internet Technology, “11th International Conference, ICDCIT” PP. 33-48, 2015.

[10] Filipponi, L., Vitaletti, A., Landi, G., Memeo, V., Laura, G., &Pucci, P. “Smart city: An event driven architecture for monitoring public spaces with heterogeneous sensors. In Proceedings of 2010 Fourth International Conference on Sensor Technologies and Applications”, Venice, Italy, PP. 281–286, 2010.

[11] Ge, X., Huang, K., Wang, C.-X., Hong, X., & Yang, X. “Capacity analysis of a multi-cell multi-antenna cooperative cellular network with co-channel interference”. IEEE Transactions on Wireless Communications, vol.10, PP.3298–3309, 2011.

[12] Ge, Y., Lamont, L., &Villasenor, L.. Hierarchical OLSR-A scalable proactive routing protocol for heterogeneous Ad Hoc networks. In Proceedings of IEEE WiMob’05, Aug pp. 17–23, 2005.

[13] Gurumurthi, S. “Architecting storage for the cloud computing era”. IEEE Micro, vol.29, PP.68–71, 2009.

[14] H. Gross; M. Holbl, D. Slamanig, and R. Spreitzer, "Privacy-Aware Authentication in the Internet of Things, Cryptology and Network Security”. Springer International Publishing, 14th International Conference on Cryptology and Network Security, PP. 32-39, Morocco, 2015.

[15] Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D. and Wagner, D."Smart locks: Lessons for securing commodity internet of things devices," in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. PP.461–472, 2016

[16] Isaac, J. T., Zeadally, S., & Sierra, J. C. “A lightweight secure mobile payment protocol for vehicular ad-hoc networks(VANETs)”. Electronic Commerce Research, vol.12, issue.1, PP.97–123, 2012.

[17] J. Buchmann, "Introduction to cryptography.," Springer Science & Business Media, 2013.

[18] J. Gubbi, "Internet of Things (loT): A Vision Architectural Elements and Future Directions", Future Generation Computer Systems, vol. 29, issue. 7, pp. 1645-60, 2013.

[19] J. Zhou, R. Qingyang, Y. Qian, "A Scalable Vehicular Network Architecture for Traffic Information Sharing", IEEE JSAC., vol. 31, issue. 9, pp. 85-93, 2013.

[20] K. Mershad, H. Artail, "Finding a Star in a Vehicular Cloud", IEEE Intell. Trenso. Syst. Maa., vol. 5, no. 2, pp. 55-68, 2013.

[21] Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys and Tutorials, 13, 584–616.

[22] Kato, S., Sugawa, S., Tokuda, K., Matsui, T., &Fujii, H. “Vehicle control algorithms for cooperative driving with automated vehicles and inter vehicle communications”. IEEE Transactions on Intelligent Transportation Systems, vol.3, PP.155–161, 2002.

[23] M. Abuelela, S. Olariu, "Taking VANET to the Cloud", Proc. ACM MoMM vol.10, pp. 6-13, 2010.

[24] M. Amoozadeh et al.,, "Security vulnerabilities of connected vehicle streams and their impact on cooperative driving," IEEE Communications Magazine, vol. 53, issue. 6, pp. 126-132, 2015.

[25] Pallis, G. “Cloud computing: The new frontier of internet computing”. IEEE Internet Computing ‘14, PP.70–73,2010.

[26] S. Bitam, A. Merlouk, "ITS-Cloud: Cloud Computing for Intelligent Transportation System", Proc. IEEE Global Communications Conference. (GLOBECOM), pp.2054-59, 2012.

[27] S. Ziegler, C. Crettaz, "loT6 Project in a Nutshell the Future of Internet", Lecture Notes in Computer Science, vol. 7858, pp. 353-55, 2013.

[28] Sheth, A., &Ranabahu, A. “Semantic modeling for cloud computing”. IEEE Internet Computing, 14, pp.81–83, 2010.

[29] Skarmeta, AntonioF., JoseL. Hernandez-Ramos, and M. Moreno., "A decentralized approach for security and privacy challenges in the internet of things," internet of Things, IEEE World Forum on, 2014.

[30] Suo, H., Wan, J., Huang, L., &Zou, C. (2012). “Issues and challenges of wireless sensor networks localization in emerging applications”. Proceedings of 2012 International Conference on Computer Science and Electronic Engineering, pp. 447–451, Hangzhou, China, 2012.

[31] Takabi, H., Joshi, J. B. D., &Ahn, G. “Security and privacy challenges in cloud computing environments”. IEEE Security & Privacy, vol.8, pp.24–31, 2010.

[32] Wan, J., Zhang, D., Sun, Y., Lin, K., Zou, C., &Cai, “VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing”. ACM/SpringerMobile Networks and Applications, vol.19, issue.2, pp.153–160, 2015

[33] Y. Qian, N. Moayeri, "Desiqn of Secure and Application-Oriented VANETs", Proc. IEEE Vehicular Technology Coni., pp. 2794-99, 2008.

[34] Zhang, D., Wan, J., Liang, X., Guan, X., Liu, Q., &Ji, G. “Taxonomy of agent technologies for ubiquitous computing environments”. KSII Transactions on Internet and Information Systems, vol.6, issue.2, pp.547–565, 2012.

[35] B.Mukunthan, N.Nagaveni. “Identification of unique repeated patterns, location of mutation in DNA finger printing using artificial intelligence technique”. IJBRA, vol.10, issue.2, pp:157-176, 2014.

[36] B.Mukunthan, N.Nagaveni. “Automating Identification of Unique Patterns, Mutation in Human DNA using Artificial Intelligence Technique”. IJCA: vol.25, issue.2, pp:26-34, 2011.

[37] L.Jaya Singh Dhas , B.Mukunthan (2019). Kleinberg’s Hyper-Richness Based Fuzzy Partition Clustering for Efficient Bi-Temporal Data. IJITEE: 8(10):2422-2430

[38] K.G.Krishnakumar,B.Mukunthan(2016). Cross Layer Based Adaptive Routing Approach for VANET. IJCTA: 9(28):1-9.

[39] Macha Shanker, “Use Case: Smart Contract for Lease Agreements using Blockchain Technology”, Vol.7 , Issue.6 , pp.1-9, 2019.

[40] Lubdha M. Bendale, Roshani. Jain,Gayatri D. Patil “Study of Various Routing Protocols in Mobile Ad-Hoc Networks”, Vol.06, Special Issue.01, pp.1-5, 2018.

[41] B.Mukunthan, “Efficient Synergetic Filtering in Big Dataset Using Neural Network Technique”, International Journal of Recent Technology and Engineering”, Vol.8, Issue.5, 2020.

Downloads

Published

2020-01-31
CITATION
DOI: 10.26438/ijcse/v8i1.179186
Published: 2020-01-31

How to Cite

[1]
B. Mukunthan, S. Govindaraju, S. Komagal Yallini, S. VibinChander, and C. RanjithKumar, “The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions”, Int. J. Comp. Sci. Eng., vol. 8, no. 1, pp. 179–186, Jan. 2020.

Issue

Section

Research Article