Blockchain: Basics, Applications, Challenges and Opportunities
Blockchain: Basics, Applications, Challenges and Opportunities
net/publication/348307266
CITATIONS READS
0 415
5 authors, including:
P.H.J. Chong
Auckland University of Technology
282 PUBLICATIONS 3,716 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Network Coding for Network Load Reduction for V2X Communication Networks View project
All content following this page was uploaded by Akhilendra pratap Singh on 07 January 2021.
ABSTRACT
Today, centralized systems are more common, and the reversibility of the
process and transparency are kept hidden due to the ownership of a single
authority. The consistency is difficult to maintain as the network is
centralized, and the central server is responsible for managing overall
traffic. Blockchain brings out the new features like decentralization,
distribution, immutable, consistent and security by cryptographer hash
algorithms. Blockchain technology is based on the consensus which hires
distributed ledgers for enabling parties who do not fully trust each other
to maintain a set of global states. The intermediaries work to maintain
trust and the reduced number of intermediaries can make the process
easier, faster, transparent and cheaper. The consensus mechanism is used
to validate the transactions, and privacy is maintained by having multiple
account addresses. This chapter presents the basics of Blockchain
technology, applications, research challenges and opportunities in the
*
Corresponding Author’s Email: [email protected].
2 Jaswant Arya, Arun Kumar, Akhilendra Pratap Singh et al.
I. INTRODUCTION
address. Also, a central party does not ask for the private data of a
user.
4. Transparency: Blockchain network provides transparency for the
whole network by enabling distributed and consistent transaction
records. In the supply chain and logistics industry, the requirement
of transparency cannot be ignored. Blockchain network reduces the
number of frauds by establishing a transparent system.
5. Auditability: The blockchain network includes the timestamp that
can be used to trace the transaction detail, and the user can verify
the transaction easily. The higher auditability is proved by the
transparency and traceability of the transactions.
6. Time reduction: Each software in the blockchain network has
consistent information and therefore removing the lengthy process
of verification. The only single version of agreed can reduce the
time by avoiding the need for a lengthy process of verification,
settlement, and clearance.
A. Block
A block is the data structure which contains a hash of the parent block,
transactions, Merkle root, timestamp, etc. The first block of a blockchain is
called Genesis Block. Block version indicates the set of block validation
rules to follow. The previous block of any block is called Parent Block,
and the Hash of the parent block is called parent Hash.
hash. For making cryptographic hash secured, the highly complex hash
algorithm like SHA-256 can be used [11]. For instance, MD2 hash
produces the following results-
Input: jaswant
Hash Output:d2ebbf629b8c2d492321eda2e6d3ef6b
Input: jaswanu
Hash Output: 964910d763b8ffbd35631e7b74a375f1
The hash function is created in such a way that a single change in data
leads to a drastic shift in output hash value. It is impossible to assume the
input data based on the hash value. Also, more than one input data cannot
give the same hash value.
C. Time Stamp
D. Difficulty
E. Nonce
Nonce stands for a pseudo-random number used only once during the
process of mining. In Bitcoin blockchain, a nonce is a number proceeding a
certain number of zeros. During the mining process, the nonce is found
spending the energy to process the algorithms. Thus replay attack can be
exhibited in block creation.
F. Block Header
nonce value, multiple transactions and Merkle root formed by the hashes of
transactions.
In the Merkle tree, the hash of the parent node is calculated by
appending the hash of the right node to the left node and then hashing to
generate the hash of the parent node. All the underlying transactions are
combined and hashed together to form the Merkle tree.
Nonce
manage the data of money or assets records etc. Finally, the application
layer provides different applications and use cases of blockchain.
H. Digital Signature
Every block consists of the hash value of the previous block similar to
the singly linked list. The new transactions are kept in these blocks. Figure
3 illustrates the established peer to peer network between six nodes ranging
from N1 to N6 with each node having its ledger to verify the consistency of
transaction records. The higher security is achieved by sequential and
unidirectional traversing connectivity of the blocks.
yes
he/she gets the right to create the new block and store the transaction into
the block according to the decreasing order of the transaction fees. Then
this block is broadcasted into the blockchain network. Other nodes can
accept or reject after verifying the transactions of the block. They can
accept the block by appending it to their chain. The consensus process
starts with the competition to take a right to pack the new transactions and
continues until the block acceptance.
Proof of work mechanism is applied to distribute the time stamp server
to the entire blockchain network. In this mechanism, a hash value is
calculated having n number of zero bits by scanning the Nonce. The Nonce
is incremented until its scanned value puts the required number of bits for
the block hash. The CPU effort is spent on every calculation of this work.
This calculation requires the work exponential in the number of bits
required. Each block is uniquely linked to its previous block except the
genesis block and hence redoing the work for any block directs to redo the
work for subsequent blocks. Therefore it is challenging to change any
block and its subsequent block. Proof of work consensus mechanism is
based on one CPU, one vote concept to verify the transaction and to accept
the longest chain. The exact and accurate chain can only be created by an
honest node and form the longest chain. If an attacker alters the transaction
in a single block by redoing the proof of work, he has to redo the proof of
work for each subsequently linked block. The hardware speed is controlled
by creating the difficulty as a target value to perform proof of work. If
blocks are generated fast, this difficulty target increases to compensate the
hardware speed and hence, a specific increasing time is consumed to
acquire the proof of work. An attacker can gain the 51% power of the
network, and this scenario ends up the blockchain use. The authors in [13]
proposed the hybrid consensus mechanism of proof of work and proof of
stake.
to receive 2/3 rd favor nodes to enter in the commit phase from the
preparation phase again. Thus the consensus process is completed in three
subprocesses. The node should be active while voting to receive the
agreement from each node. The nodes can ask their neighbor nodes for any
information for such as voting process or consensus process. The weight of
votes for a few nodes might be higher or lower depending on the network
node types. Hyperledger Fabric uses PBFT consensus for creating its
product based on blockchain technology [64].
Disk space can be another choice to select the miners because of the
more disk space, the more probability to mine a block successfully. By
initializing the dedicated disk space to mine, the block can be energy
efficient. The unused disk space can be reused by the miners to make the
miner process cheaper.
If a miner node mine the block unsuccessfully then he would not lose
the much higher energy like proof of work. Thus, Proof of space has a very
high economic advantage, and every node always can invest unused disk
space [16].
Blockchain 17
F. Proof of Authority
G. Ripple
H. Tendermint
therefore, the private industry can create its network of nodes to be secured
and be more auditable.
Table I. Comparison between different consensus algorithms
Simulated
Consensus Implementation Puzzle Practical
Description Random
Algorithm Purpose Design Example
Function
Proof of Sybil attack [54] Calculating Used Single task Bitcoin and
Work hash Litcoin [55]
repeatedly
Proof of Distributed No interaction Can be Two-step Permacoin
Retrievably Storage using Fiat used task [56],
Shamir KopperCoin
transformation [57]
and random
Merkle proofs
Proof of Decentralised Redoing the May be Two-step Filecoin
space [16] Storage market PoR over time used or process [58]
may not
be
Equihash ASIC resistance Time Used Memory hard Zcash
[61] complexity
trade-off in
proof
generation
Ethash [60] ASIC resistance Calculation of Used Sequential Ethereum
cryptographic and memory- [26]
hash hard
algorithm
Proof of Easier Random Used Two-step SpaceMint
space participation in Merkle proof process and
Consensus measurement
of proof
quality
To save the disk space, the transactions contained by the blocks are
discarded, but the block hash remains unchanged. If the root hash is
achieved, then the branch hashes are stubbed off from the old blocks.
Initially, there is no issue to store the blockchain of a smaller number of
transaction. But, in future, the increasing number of transactions may
require a higher speed of block-creation and the massive disk space. The
complexity of block creation deduces the wastage of time and may trigger
the situation of insufficient disk space. The older transactions might not be
required, and then they must be discarded to save the disk space as well as
Blockchain 19
Nonce
Nonce
Figure 6. Blockchain Block Structure after stubbing off the branches to diminish
transaction 0, 1 and 2 [1].
20 Jaswant Arya, Arun Kumar, Akhilendra Pratap Singh et al.
A. Public Blockchain
B. Private Blockchain
V. BLOCKCHAIN VERSIONS
A. Blockchain 1.0
B. Blockchain 2.0
C. Blockchain 3.0
Cryptocurrency Objective
Bitcoin Cash [50] Time reduction by increasing the block size
Zilliqa [51] Higher security by using the more powerful cryptographic
techniques zero-knowledge proof
Ethereum Enhance the programmability of the Blockchain network,
smart contracts and Dapps
USDT maintain the stability between the national currency and
cryptocurrency
Peercoin innovative consensus mechanism
EOS innovative consensus mechanism
IOTA created for the Internet of things
Ripple created for global financial settlement
Augur prediction of market application
VI. CRYPTOCURRENCY
more than $330 billion. Among all the cryptocurrencies, Bitcoin has the
highest market cap around $210 billion. Few of them are listed in table II
in the decreasing order of their market cap [47]. Centralized service
providers or government-controlled the earlier digital currencies, but
Cryptocurrencies are entirely decentralized and controlled by distributed
consensus algorithms among the different nodes of the peer to peer
network. The identity of a person is kept hidden by using the address
instead of a user name or any other data. In the centralized system, the user
information is always preserved by the service providers.
A. Bitcoin
The traditional electronic cash systems do not use the address, but as
an email, Bitcoin uses the address to hide the identity. Bitcoin network can
circulate a maximum of 21 million Bitcoin to avoid inflation or deflation.
Unlike traditional digital currency, Bitcoin source codes are open, and
anyone can see and understand how Bitcoins are generated.
The value of Bitcoin is directly proportional to its active users in the
network. Unlike the issuance of the currency by the centralized authority,
the Bitcoin is created by the mining process named Proof of work. After
the successful creation of the block, the miner is rewarded with few
Bitcoin. This incentive maintains the encouragement among the minors to
join the network, contribute their CPU energy, and get Bitcoin as a reward.
Transactions are hashed and encrypted using the secured hash algorithm or
SHA-256 if all the minor validate the transactions.
The first genesis block of Bitcoin generated when Nakamoto sent ten
Bitcoins to the noted programmer Finney and completed the first
transaction. First time Florida bought $25 worth two pizzas in the
exchange of 10k Bitcoin [49]. Now Bitcoin market cap is more than $210
billion [47]. Bitcoin is the digital currency generated in the distributed
nodes. Bitcoin transactions are stored in public shared ledger in a
distributed peer to peer network. The consensus process and the incentive
mechanism makes it the most popular cryptocurrency among investors.
Blockchain 27
The minors can participate in the competition individually, or they can join
the mining pool to get more probability to win. The investor can also buy
the goods from a merchant with an exchange of Bitcoin. Both the seller
and buyer can use the Bitcoin software to record the exchange of Bitcoin
and goods. The transactions are initiated, and their hash value is calculated.
The transactions are broadcasted throughout the network. The block is
created, and the transactions are combined into that valid block. The
timestamp is used to verify the existence of transactions to prevent double-
spending. Now the current block is hashed. The target is to find hash such
that hash must have a fixed number of zeros as the prefix. To achieve this,
the Nonce is used. This task is the difficulty to create the new hash of the
block [65]. This mechanism consumes the energy but also verifies the
block easily [66].
Bitcoin software can be downloaded on the computer and request a
wallet. In a blockchain network, nodes can validate transactions by solving
the complex algorithms, add them into their ledger, and broadcast the new
block to the bitcoin network. After every 10 minutes, a block which
contains the accepted transactions is created and added to the bitcoin
blockchain network. This block is published to all nodes, without requiring
any central oversight. Miners keep consistency in the network. The size of
the bitcoin network block is 1 MB. This bitcoin protocol includes a higher
level of security from the attacks like unauthorized spending, double
spending, race attack, history modification, deanonymisation of clients.
Bitcoin’s implementation of public-private key cryptography removes
unauthorized spending. For example; when A sends a bitcoin to B, B
becomes the new owner of the bitcoin. C observing this transaction want to
spend the bitcoin B just received, but C cannot sign the transaction without
the knowledge of B’s private key. Double spending is the case when a user
sends the same currency to more than one user. This situation is solved by
using a timestamp and tracking the transaction in the ledger in the
blockchain network. Race attack is when two transactions are created with
the same funds at the same time, intending to spend those funds twice.
Memory and computational power are required for proof construction. This
requirement of proof restricts the number of transactions to be validated in
28 Jaswant Arya, Arun Kumar, Akhilendra Pratap Singh et al.
a given period. Each mined block produces new currency units, the total of
which is finite. It is necessary to slow down the rate of production to
prevent untimely exhaustion. In the case of Bitcoin, the number of newly
produced bitcoins is halved every 210,000 blocks. Therefore, at most, there
can be 21 million Bitcoins [1]. The success of Bitcoin has inspired the
industry to create many other cryptocurrencies for a specific purpose or for
multi-purpose.
B. Bitcoin Cash
C. Zilliqa
Zilliqa has the mechanism to divide the task of mining to the sharded
blockchain network. The blockchain network is divided into subnetworks
called a shard. The mining process is performed on this shard in parallel.
Thus the validation and verification can be done in parallel in the
effectively lesser time. It can get a higher efficiency if there are a very high
number of transaction to be mined [51].
Blockchain 29
D. ZCash
ZCash has higher security and privacy rather than Bitcoin. It has more
powerful cryptographic techniques zero-knowledge proof [53], [54].
E. USDT
F. Litecoin
There are only a few differences between Bitcoin and Litecoin like
Litecoin uses the script and its average block creation time is 2.5 minute
and allows the faster block confirmation. Litecoin is more complicated
than Bitcoin.
G. Peercoin
H. Permacoin
I. Ethereum
and Edge computing. The other sectors are economics and markets,
business solution, smart contract and automation, traceability in supply
chains, medical informatics, communications and networking, and others.
The smart devices using IoT have shown their potential in the different
sectors. These devices are capable of working for a different purpose. Still,
the system is not capable of handling huge data and the problematic
complex computing mechanism such as described in [67-74]. The
electronic devices such as sensors are increasing in the number, but their
capability to collect and transmit the data is not efficient. The blockchain
can be applied to the distributed devices to increase the security and
privacy in IoT. Figure 10 shows the various sectors where the Blockchain
technology can be applied.
Price Year
S. No. Cryptocurrency Abbreviation Market Cap
(USD) Introduced
42 Pundi X NPXS $125.73 M $0.000536 2018
43 0x ZRX $117.12 M $0.195178 2017
44 Nano NANO $143.72 M $1.08 2017
45 Augur REP $120.97 M $11.00 2015
46 Bytom BTM $106.96 M $0.106690 2017
47 Bytecoin BCN $91.57 M $0.000497 2014
48 Huobi Token HT $253.53 M $5.07 2018
Islands
49 RIF Token RIF $66.47 M $0.14 2019
50 Elastos ELA $49.51 M $3.13 2018
51 Horizen ZEN $47.91 M $6.79 2017
52 Electroneum ETN $45.59 M $0.004669 2017
53 SOLVE SOLVE $43.99 M $0.134472 2019
54 Revain R $43.93 M $0.090672 2017
55 Ecoreal Estate ECOREAL $43.61 M $0.208019 2018
56 Stratis STRAT $44.68 M $0.449327 2016
57 Decentraland MANA $43.44 M $0.041368 2017
58 Zilliqa ZIL $76.20 M $0.008771 2018
59 BitShares BTS $122.43 M $0.044707 2014
60 Aurora AOA $120.00 M $0.018341 2018
61 DigiByte DGB $119.03 M $0.009818 2014
62 MonaCoin MONA $123.14 M $1.87 2014
63 KuCoin Shares KCS $162.37 M $1.83 2017
64 ICON ICX $108.51 M $0.221242 2017
65 HyperCash HC $98.30 M $2.26 2017
66 Komodo KMD $97.58 M $0.845725 2017
67 Insight Chain INB $102.89 M $0.294060 2018
68 Paxos Standard PAX $202.03 M $1.00 2018
Token
69 GXChain GXC $104.78 M $1.61 2017
70 Verge XVG $83.42 M $0.005257 2014
71 HedgeTrade HEDG $265.24 M $0.919703 2019
72 IOST IOST $125.07 M $0.010411 2018
73 Aeternity AE $78.85 M $0.283804 2017
74 Siacoin SC $104.75 M $0.002509 2015
75 Steem STEEM $68.14 M $0.200765 2016
76 Ardor ARDR $63.59 M $0.063659 2016
77 THETA THETA $108.54 M $0.124691 2018
78 ABBC Coin ABBC $92.40 M $0.166698 2018
79 Egretia EGT $178.72 M $0.042369 2018
80 Mixin XIN $102.00 M $223.95 2018
81 Nash Exchange NEX $108.25 M $2.99 2019
82 Enjin Coin ENJ $52.63 M $0.067815 2017
83 VestChain VEST $64.70 M $0.009141 2018
34 Jaswant Arya, Arun Kumar, Akhilendra Pratap Singh et al.
Price Year
S. No. Cryptocurrency Abbreviation Market Cap
(USD) Introduced
84 aelf ELF $48.99 M $0.098024 2017
85 Status STF $70.05 M $0.020184 2017
86 Zcoin XZC $66.82 M $8.25 2016
87 Crypto.com MCO $62.26 M $3.94 2017
88 MaidSafeCoin MAID $80.60 M $0.178101 2014
89 Golem GNT $54.48 M $0.056493 2016
90 Energi NRG $136.63 M $7.03 2018
91 WAX WAX $59.54 M $0.063148 2017
92 Dai DAI $77.12 M $1.00 2017
93 Grin GRIN $53.37 M $3.03 2019
94 Project Pai PAI $41.57 M $0.028565 2018
95 Maximine Coin MXM $52.90 M $0.03 2018
96 NULS NULS $35.07 $0.475384 2017
97 Waltonchain WTC $64.42 M $1.53 2017
98 ODEM ODE $51.34 M $0.22 2018
99 Clipper Coin CCCX $52.15 M $0.013 2018
100 NEXT NET $69.45 M $1.38 2013
Edge computing, the processing of the data at the network edge, has
shown its potential to improve the response time, battery life, bandwidth,
data safety, and privacy. The services of the cloud is pushed into the edge
network. The research work [82], [77] has listed the edge computing for
smart home, smart city, and the data sharing and collaboration between
networks of long-distance. However, it suffers from the challenges of
system integration, resource management, the programmability of edge
computing, naming mechanism, security and privacy issues in
transmission, storage and computation, etc. The authors [82-85] proposed
the cloud computing-based system for enhancing the cybersecurity for
large enterprise networks with reduced operational delays and can detect
threats by parallel cloud computation for both the signature and anomaly-
based detection. Cloud and edge computing both have a significant
application, but with blockchain the distribution mechanism and the
consensus process, the challenges of cloud and edge computing are
resolved. The service contract management of blockchain for cloud and
edge computing allows the programmability for the users. Blockchain for
the distributed centralized large datacenters brought the consensus and
decentralized layer.
The authors [86] proposed the cloud architecture based on blockchain
technology with fog computing and software-defined networking for the
efficient management of the data produced by the cloud and edge
computing. This proposed blockchain-based architecture provides high
security. Scalability and resiliency with the very low latency between the
computing resources and IoT devices. The cloud computing cost and the
number of trusted third parties can be reduced significantly by this
architecture.
The authors in [87] have shown the data unavailability, higher
operational cost, and data security issues in the traditional cloud storage
and brought a blockchain-based model with keyword search services to
solve all these issues. The encrypted client data is distributed to the cloud
nodes to ensure the data availability using cryptographic algorithms with
Blockchain 37
the private keyword search feature for the owner. They built a system to
enable the outsourcing of data storage to a distributed network by using the
proof of retrievability consenses. Blockchain is used to process and prove
the anonymous credential with the private keyword search feature. The
work [88] has enlighted the edge devices less efficient for computational
resources and the available bandwidth leading to fog or cloud. By
measuring the network latency, they have shown that the use of fog and
cloud to make the IoT application with the blockchain technology.
E. Industry Perspective
A. Scalability
The prefixed block size and block creation time are efficient for a fixed
number of transactions processing, but a high number of transactions can
cause slower transaction processing. Several blockchain applications are
suffering from the scalability issue such as Bitcoin block size is 1MB and
average block confirmation time is 10 minutes, whereas Ethereum has the
average block confirmation time 16 seconds [94-95]. For the high number
of transaction processing, the block confirmation time must be low, but to
have the security from being attacked by the attacker, this average time
should be high. To solve this problem, there are a few solutions proposed
by the researchers. The authors [7] proposed the solutions like on-chain to
change on main, off the chain for change on the main chain after
transaction processing. Also, side chain to change the assets of the
different side chain, child chain to record the result in parent chain and
interchain for the communication between the chains. In [97], the authors
have proposed solutions like lighting protocols, sharding, etc. This work
[100] has analyzed the better performance of Ethereum by managing the
scalability issues.
40 Jaswant Arya, Arun Kumar, Akhilendra Pratap Singh et al.
There is an urgent need to research for tor offers and beyond tor such
that the privacy issues can be tackled in blockchain [97]. To create and
manage the digital identities, the rules and policies are to be restricted to
keep the privacy for controls and ownership while accepting the
blockchain model.
C. Storage Management
D. Consensus Performance
E. Resource Management
The resources used to mine the block are less in the beginning as there
are very fewer transactions, but for the vast number of transactions, the
spent resources are very high. If miners spend the resources, they must get
a satisfactory reward. Therefore it becomes a challenge to maintain
Blockchain 41
F. Conditions Inflexibility
IX. CONCLUSION
42 Jaswant Arya, Arun Kumar, Akhilendra Pratap Singh et al.
REFERENCES
[1] Nakamoto, Satoshi. ―Bitcoin: A peer-to-peer electronic cash system.‖
(2008).
[2] Dinh, TTA; Liu, R; Zhang, M; Chen, G; Ooi, BC; Wang, J.
―Untangling blockchain: A data processing view of blockchain
systems,‖ IEEE Transactions on Knowledge and Data Engineering,
vol. 30, no. 7, pp. 1366-1385, 2018.
[3] Tschorsch, F; Scheuermann, B. ―Bitcoin and beyond: A technical
survey on decentralized digital currencies,‖ IEEE Communications
Surveys Tutorials, vol. 18, no. 3, pp. 2084-2123, 2016.
[4] Kosba, A; Miller, A; Shi, E; Wen, Z; Papamanthou, C. ―Hawk: The
blockchain model of cryptography and privacy-preserving smart
contracts,‖ in IEEE Symposium on Security and Privacy (SP), San
Jose, CA, May 2016, pp. 839-858.
[5] Bonneau, J; Miller, A; Clark, J; Narayanan, A; Kroll, JA; Felten,
EW. ―Sok: Research perspectives and challenges for bitcoin and
cryptocurrencies‖, in IEEE Symposium on Security and Privacy, San
Jose, CA, May 2015, pp. 104-121.
Blockchain 43
[71] Ming Zhao, Arun Kumar, Tapani Ristaniemi, Peter Han Joo Chong,
―Machine-to-Machine Communication and Research Challenges: A
Survey‖, in Wireless Personal Communications, Springer, pp. 1-17,
2017.
[72] Arun Kumar, Ming Zhao, Kai-Juan Wong, Liang Yong Guan, Peter
Han Joo Chong, ―A Comprehensive Study of IoT and WSN MAC
Protocols: Research Issues, Challenges and Opportunities‖, IEEE
Access, Vol. 6, pp. 76228 – 76262, November 2018.
[73] Minglong Zhang, Nawaz Ali, Peter Han Joo Chong, Boon-Chong
Seet, Arun Kumar, ―A Novel Hybrid MAC Protocol for Safety
Message Broadcasting in Vehicular Networks”, IEEE Transactions
on Intelligent Transportation Systems, September 2019.
[74] Dorri, A; Kanhere, SS; Jurdak, R; Gauravaram, P. ―Blockchain for
IoT security and privacy: The case study of a smart home.‖ In IEEE
International Conference on Pervasive Computing and
Communications Workshops (PerCom Workshops), pp. 618-623,
March 2017.
[75] Xu, C; Wang, K; Guo, M. ―Intelligent resource management in
blockchain-based cloud datacenters.‖ IEEE Cloud Computing, 4(6),
50-59, November 2017.
[76] Liang, F; Yu, W; An, D; Yang, Q; Fu, X; Zhao, W. ―A survey on big
data market: Pricing, trading and protection.‖ IEEE Access, 6, 15132-
15154, 2018.
[77] Hatcher, WG; Yu, W. ―A survey of deep learning: Platforms,
applications and emerging research trends.‖ IEEE Access, vol. 6,
pages 24411-24432, 2018.
[78] Karafiloski, E; Mishev, A. ―Blockchain solutions for big data
challenges: A literature review.‖ In 17th International Conference on
Smart Technologies (IEEE EUROCON’17), pages 763-768, July
2017.
[79] Kiyomoto, S; Rahman, MS; Basu, A. ―On blockchain-based
anonymized dataset distribution platform.‖ In IEEE 15th
International Conference on Software Engineering Research,
Management and Applications (SERA), pages 85-92, June 2017.
50 Jaswant Arya, Arun Kumar, Akhilendra Pratap Singh et al.
[80] Jung, MY; Jang, JW. ―Data management and searching system and
method to provide increased security for IoT platform.‖ In
International Conference on Information and Communication
Technology Convergence (ICTC), pages 873-878, Oct 2017.
[81] Jeong, Jun Woo, Bo Youn Kim, Ju Wook Jang, ―Security and Device
Control Method for Fog Computer using Blockchain.‖ ACM
Proceedings of the International Conference on Information Science
and System, 2018.
[82] Shi, W; Cao, J; Zhang, Q; Li, Y; Xu, L. ―Edge computing: Vision
and challenges.‖ IEEE Internet of Things Journal, 3(5), 637-646, Oct
2016.
[83] Yu, W; Liang, F; He, X; Hatcher, WG; Lu, C; Lin, J; Yang, X. A
survey on the edge computing for the Internet of Things. IEEE
Access, 6:6900-6919, 2018.
[84] Yu, W; Guobin Xu, Zhijiang Chen, Moulema, P. ―A cloud
computing based architecture for cyber security situation awareness.‖
In IEEE Conference on Communications and Network Security
(CNS), pages 488-492, October 2013.
[85] Ming Zhao, Arun Kumar, G. G. Md. Nawaz Ali, Peter H. J. Chong,
―A Cloud-based Network Architecture for Big Data Services‖, in
Proceedings of the 2nd IEEE International Conference on Big Data
Intelligence and Computing (DataCom’16), Auckland, New Zealand,
August 8-12, 2016.
[86] Sharma, PK; Chen, MY; Park, JH. ―A software defined fog node
based distributed blockchain cloud architecture for IoT.‖ IEEE
Access, vol. 6, 115-124, 2018.
[87] Do, HG; Ng, WK. ―Blockchain-based system for secure data storage
with private keyword search.‖ In IEEE World Congress on Services
(SERVICES), pages 90-93, June 2017.
[88] Samaniego, M; Deters, R. ―Blockchain as a service for IoT‖, In IEEE
International Conference on Internet of Things (iThings) and IEEE
Green Computing and Communications (GreenCom) and IEEE
Cyber, Physical and Social Computing (CPSCom) and IEEE Smart
Data (SmartData), pages 433-436, December 2016.
Blockchain 51