Application of Internet of Things and Blockchain in Information Security and Privacy Protection of Global Organizations

Application of Internet of Things and Blockchain in Information Security and Privacy Protection of Global Organizations

Shuya Fang, Qingquan Liu, Fengrui Zhang, Ningyan Chen, Xin Li
Copyright: © 2023 |Pages: 16
DOI: 10.4018/JOEUC.323192
Article PDF Download
Open access articles are freely available for download

Abstract

Access control data will continue to be exposed to the threat of privacy leakage even if blockchain technology currently offers a new solution for the security and privacy of the internet of things (IoT). However, its usability and privacy are not completely leveraged. This paper first discusses the IoT and blockchain technology and then examines each technology's structural models in order to address the issue of information security and privacy protection for the global organization IoT based on blockchain. Second, the information security and privacy guarantee system based on blockchain is built with ZKP and TEE at its heart after problems with zero-knowledge proof (ZKP) and trusted execution environment (TEE) in information security guarantee based on blockchain are investigated. By comparing the simulation trials, the proposed system's viability is finally confirmed. The results demonstrate that the suggested algorithm's evidence generation time is 352 ms when it reaches the experiment's highest node 28, which is clearly faster than previous techniques.
Article Preview
Top

Introduction

The Internet of Things (IoT) has increased worldwide thanks to the development of smart gadgets and the fifth-generation mobile communication network. It has so far been utilized in the fields of transportation, intelligent manufacturing, health care, finance, petrochemical and other businesses, and urban infrastructure, and it is having an ever-growing impact on the market (Li et al., 2021). The scale of management devices may come from millions to hundreds of organizations, enterprises, or institutions due to the widespread dissemination of IoT devices. Using the traditional method of user name and password to log in to the system is a huge amount of work and a significant risk of password leakage (Khando et al., 2021). In the IoT, access control is a security mechanism to prevent the leakage of resources, which is used to grant or cancel access rights to specific users for the specified IoT resources. The traditional centralized access control system is suitable for human-machine oriented internet scenes, the devices are in the same trust domain, which cannot meet the access control requirements of the IoT, and the traditional access control model has problems such as single point of failure (Mohammed, 2021). Aiming at this problem, blockchain technology provides a new solution for access control and security protection of the IoT. Blockchain presents a decentralized architecture for the IoT through peer-to-peer networks. Data can no longer be managed and controlled by large centralized servers. A large amount of data in the IoT will be encrypted before transmission so that users' information and privacy will be more secure.

Academics have conducted many studies on the IoT's information security and privacy protection. Ferrag et al. proposed a security and protection system for basic federated learning, one type of IoT technology, and also discussed new technologies like blockchain and malware/attack using essential federated learning as basic IoT technology. They also proposed three deep learning technologies, including a recursive neural network (RNN), a convolutional neural network (CNN), and deep neural network (DNN) with a recursive architecture. Experimental analysis of the collaborative deep learning approach for network security in IoT applications reveals that it is more effective than traditional/centralized machine learning in protecting the privacy of IoT device data and at detecting assaults (Ferrag et al., 2021). The study uses deep learning technology to ensure the privacy of the data of IoT devices. Ferrag and Shu summarized the existing investigations on the security of the IoT network blockchain, reviewed the security and privacy systems of four IoT applications based on blockchain, compared nine attributes of various consensus algorithms, including delay, throughput, calculation, storage and communication costs, scalability, attack model, advantages and disadvantages, etc. They also analyzed the performance indicators, blockchain test platform and cryptography library used in the performance evaluation of the IoT network security and privacy system based on blockchain.

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing