Blockchain Technology for Data Privacy Management


: Overview of the Internet of Things and Ubiquitous ComputingIntroductionOverview of Ubiquitous ComputingTechnical FoundationsCharacteristics of a Ubiquitous Computing EnvironmentChallenges and Issues Associated with Ubiquitous ComputingFundamentals of the Internet of ThingsEnabling Technologies of the IoTChallenges and Issues of the IoTSecurity Issues of the IoTSecurity Requirements of the IoTCategories of Security IssuesLow-Level Security IssuesIntermediate-Level Security IssuesHigh-Level Security IssuesThe IoT’s Impact on Ubiquitous ComputingApplication Domains of Ubiquitous ComputingUbiquitous Computing in Health CareUbiquitous Computing for Cardiac Patient MonitoringUbiquitous Computing for Cognitive Training and AssessmentUbiquitous Computing for Rehabilitation AssessmentBehavior and Lifestyle AnalysisUbiquitous Computing in EducationUbiquitous Computing in HousesUbiquitous Computing for TransportationUbiquitous Computing in E-CommerceUbiquitous Computing in Environmental ControlBlockchain for IoT Security EnhancementBlockchain BackgroundPotential Blockchain SolutionsConclusionReferences: Case Study on Future Generation IoT: Secure Model for IoT-Based Systems—Health Care ExampleIntroductionIoT ChallengesSecurityPrivacyReview of Related WorkExisting IoT Security Models and Current IssuesSecure Model for IoT-Based Systems: Health Care ExampleIoT Case Study: Wearable Devices for Health CareIoT Layers and Health Care System ModelAWS PlatformEnhanced AWSACIoT ModelConclusion and Future WorkReferences: Spy-Bot: Controlling and Monitoring a Wi-Fi-Controlled Surveillance Robotic Car using Windows 10 IoT and Cloud ComputingIntroductionBackgroundSmart Parking SystemsSurveillance SystemsSpy-Bot: Wi-Fi Controlled Robotic CarBlock Diagram of Wi-Fi Controlled Robotic CarMajor Components UsedRaspberry Pi 2Digital Web CameraGeared DC MotorDual Full-Bridge L298N DriverUltrasonic SensorsMicrosoft Azure (Windows Cloud Platform)Flow DiagramExperimental ConditionsResults and DiscussionHardware ImplementationResultsConclusionFuture DevelopmentReferences: Multi-Antenna Communication Security with Deep Learning Network and Internet of ThingsIntroduction: BackgroundLiterature SurveyInternet of Things (IoT) with Multi-Antenna BeamRadio Frequency Identification System (RFID)Sensor TechnologySmart TechnologyNanotechnologyDeep Learning with Multi-Antenna BeamMulti-Antenna Beam with the IoT and Deep LearningMathematical BackgroundSecurity AssessmentTCP ScanSYN ScanFIN ScanConclusion and Future ScopeReferences: Security Vulnerabilities, Challenges, and Schemes in IoT-Enabled TechnologiesIntroductionIoT Architecture and Systemic ChallengesSensing Layer: Introduction and Challenges in End-NodesThreat Based on Network LayerService-Layer Based ThreatsApplication Interface LayerCross-Layer ChallengesChallenges and Associated Vulnerabilities in IoT-Enabled TechnologiesAuthentication- and Authorization-Related ChallengesInsecure Access ControlRole-Based Access Control SystemsAccess Control List-Based SystemsCapability-Based AccessChallenges in Access ControlPhysical Layer SecurityEncryption Based on Transport of DataTLS: Transport Layer SecurityHTTPSTransport Trust in IoTSecure Cloud and Web InterfaceSecure Software and FirmwareEstimating the Cost of a Cyber-Breach: Case Study on Intellectual Property Breach for the IoTExisting Cyber-Attack Detection Software and Security SchemesConventional Cyber-Security SchemesAccess Control TechnologiesSystem IntegrityCryptographyAudit and MonitoringConfiguration Management and Assurance ToolsEmbedded-Programming-BasedAgent-Based ApproachSoftware-Engineering- and Artificial-Intelligence-BasedConclusion and Open ChallengesReferences: Advanced Security Using Blockchain and Distributed Ledger TechnologyIntroductionBlockchain and Distributed Ledger Technology (DLT)Blockchain TypesPermissionless BlockchainPermissioned BlockchainHybrid BlockchainClassification SchemeBlockchain MechanismCryptographyPeer-to-Peer Distributed NetworkSmart ContractsStructural Difference between Traditional Databases and BlockchainImmutability of BlockchainPerformanceRobustness and DisintermediationBlockchain Technology as the Future of CybersecurityFuture Trends of BlockchainBlockchain beyond BitcoinThreat Management and DefenseDiscussionConclusionReferences: Blockchain Technology and Its Emerging ApplicationsIntroductionTerminologyBlockChainBlockchain LedgerNodeProof of WorkKeyInputOutputHash FunctionHistory and Working of Blockchain TechnologyHistory of Blockchain TechnologyWorking of Blockchain TechnologyCryptography of Private and Public KeysPublic Distributed Ledger (Peer-to-Peer Network)Program or Protocol (Rules)Types of BlockchainPublic BlockchainSemiprivate BlockchainPrivate BlockchainConsortium BlockchainAdvantages and Disadvantages of Blockchain TechnologyKey Characteristics/Advantages of Blockchain TechnologyDecentralizationImmutability/PersistenceHigher CapacityHigher SecurityAnonymityAuditabilityFaster ProcessingCheaper TransactionsTransparencyDisadvantages of Blockchain TechnologyBlockchain Technology Is NewBlockchain Technology Can Be ExpensiveBlockchain Technology Is UnregulatedSecurity RiskTechnological RiskIssues/Limitations of Blockchain TechnologyComplexityNecessity for Large NetworksNecessity of High-Quality InputSecurity FlawBehavioral ChangeScalingBootstrappingGovernment RegulationsFraudulent ActivitiesApplications of Blockchain TechnologyElections/Electronic VotingTraditional Financial Institutions: ImprovementsHealth Care TechnologyCross-Border Payments/RemittanceSmart ContractsCopyrighted ContentsIdentity of ThingsInternet of ThingsReal-World Examples of Blockchain Technology ApplicationsCybersecurityGuardTimeREMMEHealth CareGemMedRecSimplyVital HealthFinancial ServicesAbraBank HapoalimBarclaysMaerskAeternityAugurManufacturing and Industrial SectorsProvenanceJioCoinHijroGovernmental ServicesDubaiEstoniaSouth KoreaGovCoinFollowmyvote.comCharityRetail ServicesOpenBazaarLoyyalReal Estate ServicesTransportation and Tourism SectorsIBM Blockchain SolutionLazoozMedia ServicesKodakUjomusicConclusionReferences: Emergence of Blockchain Technology: A Reliable and Secure Solution for IoT SystemsIntroductionBlockchain MethodologyBlockchain CharacteristicsDigital WalletBlock StructureTypes of BlockchainPublic BlockchainPrivate BlockchainConsortium BlockchainHybrid BlockchainConsensus AlgorithmsProof of Work (PoW)Proof of Stake (PoS)Delegated Proof of Stake (DPoS)Proof of Burn (PoB)Practical Byzantine Fault Tolerance (PBFT)RippleSecuring the IoT using BlockchainIoT InfrastructureStage One: Sensors/ActuatorsStage 2: The Internet GatewaysStage 3: Edge IT and the CloudStage 4: Applications DomainSecurity Issues in the IoT and Solutions Using BlockchainData Privacy and Integrity (Unauthorized Access to Devices)IoT Device AuthenticationInsecure DevicesSybil AttacksSoftware Attack (Malware and Ransomware)RPL Routing AttackSinkhole and Wormhole AttackMalicious Code InjectionCongestion/JammingSpoofing AttackDeviation and Disruption of ProtocolsThe Exploitation of Misconfigurations (OS, Servers, Frameworks, etc.)Single Point of FailureApplications of BlockchainSmart Power UtilizationSmart CityHealth CareSmart ContractElectronic Voting SystemSmart IdentityCryptocurrencyWarranty and Insurance ClaimsTransparent Supply ChainsDocument VerificationConclusion and Future ScopeReferences: Internet of Things and Blockchain: Amalgamation, Requirements, Issues, and PracticesIntroductionBlockchainCurrently Employed MethodsPublic Key Cryptography (Asymmetric Cryptography)Rivest-Shamir-Adleman Encryption Technique (RSA)Why Blockchain Is the FutureComparisons between Encryption TechniquesThe Inner Workings/Blockchain ExplainedComponents of CryptographyThe Algorithm behind Blockchain ExplainedFinite FieldsElliptic Curve Cryptography (Ecc) over RPutting These TogetherElliptic Curves over Fp (Graphical Understanding)Signature GenerationSignature VerificationProof of the Signal VerificationProving the Space and Time ComplexitiesHash FunctionTraversal Time ComplexityElliptic Curve Discrete Logarithm Problem (Ecdlp)Distributed Consensus Mechanism Based on Proof of WorkRisk Analysis and Mathematical UnderstandingSatoshi Nakamoto’s AnalysisSatoshi’s False ApproximationMeni Rosenfeld’s CorrectionClosed-Form ApproachFiner Risk AnalysisBlockchain LimitationsExcessive Energy RequirementsDistribution and DuplicationInability to Adapt to User Base BurstLack of Oversight and Corresponding ManipulationsLack of Abstraction/PrivacyProof of WorkHybridization Need and ComplexityStorageNetwork Security RiskMitigating AttacksThe Sybil AttackRace AttackFinney AttackVector76 AttackConclusion and Future ProspectsReferences: Edge-Based Blockchain Design for IoT SecurityIntroductionOverallContributionsOrganizationRelated WorksChallengesScalability and InteroperabilityLimitation with Storage FacilityData Privacy and ConfidentialityAuthentication and AuthorizationEdge-Based Blockchain Architecture for IoT SecurityBlockchain System ArchitectureeBC System ArchitectureIoT Application Example ScenariosData Loss Abnormal (DLA)Long-Term Consumption Abnormal (LCA)Short-Term Consumption Abnormal (SCA)Experiments and DiscussionsPerformance EvaluationInformation SecurityConfidentialityIntegrityAvailabilitySecurity with VirtualizationConclusionsReferences: Blockchain for the Security and Privacy of IoT-Based Smart HomesIntroductionBlockchain Technology and Smart HomesSecurity and Privacy Threats to Smart HomesBlockchain as a Security SolutionCryptographic Aspects of BlockchainCase StudyFrameworkLayer 1: Primary Data LayerLayer 2: BC layerLayer 3: Applications LayerLayer 4: UI LayerProposed ModelSmart Home System: An IllustrationExperimental ResultsConclusionReferences: A Framework for a Secure e-Health Care System Using IoT-Based Blockchain TechnologyIntroductionRelated WorkDesignInformation Collector Using Sensors (IoT Techniques)Processing of Health Care Records in Fog NodesPreprocessing of Electronic Health Records (EHR)Extract Database EntriesDefine FeaturesProcess DataAssess Feature ValuesIntegrate Data ElementsEffective Analysis Using Machine LearningSecuring of Health Records Using BlockchainInitializationGenerating a New BlockVerifying the New BlockAppending the New BlockImplementation and ResultsSensors LayerFog Computing LayerCloud Computing LayerData PreprocessingEffective Analytics Using Machine LearningBuilding a Blockchain and CryptocurrencySHA-256 AlgorithmP2PByzantine Fault Tolerance (BFT)Proof of Work (PoW) ConsensusCreating Smart ContractsTruffle GanacheConclusionReferences: Blockchain in EHR: A Comprehensive Review and Implementation Using Hyperledger FabricsIntroductionBlockchain Technology Stack and ProtocolThe User Experience (UX)Application LayerThe Blockchain ProtocolInternetSmart ContractsBlockchain Protocol ProjectsBlockchain EcosystemMotivation and ContributionOrganization of ChapterReview of Privacy Preservation in Electronic Health RecordsHow Blockchain Solutions Can Address Health Care ChallengesBlockchain Implementation FrameworksBlockchain Development Platform and APIsEthereum PlatformHyperledger PlatformChallenges of BlockchainTechnological ChallengesBusiness Model ChallengesScandals and Public PerceptionGovernment RegulationPrimary Challenges for Personal RecordsConclusionReferences: Attacks, Vulnerabilities, and Blockchain-Based Countermeasures in Internet of Things (IoT) Systems IntroductionBackground of BlockchainHistory of BlockchainIngredients of BlockchainLedgerCryptographyPeer-to-Peer NetworkAssetsMerkle TreesConsensus AlgorithmsClassification of BlockchainPublic versus PrivatePermissioned versus PermissionlessChallenges in BlockchainSecurity Analysis of BlockchainAttacks in the IoTPhysical AttacksTamperingRF Interface/JammingFake Node InjectionSleep DenialNetwork AttacksTraffic Analysis AttackRFID SpoofingRouting Information AttacksMan-in-the-Middle AttackSoftware AttacksViruses, Worms, Trojan Horses, Spyware, and AdwareMalwareData AttacksData InconsistencyUnauthorized AccessData BreachBlockchain Applications for Smart Industrial AutomationIndustries 4.0Autonomous Vehicles (VANET)Smart HomeSmart CityHealth Care 4.0Unmanned Aerial Vehicles