34
Blockchain Technology
TABLE 3.2
Reviewed Research Contributions on Blockchain-based Privacy Mechanisms for IoT
Authors
Description
Security
Principle Affected
Trust
Privacy
C
I
A
R1:
(Aitzhan & Svetinovic, 2016)
Using group signatures and anonymous communication sources that are
authenticated off-chain to ensure anonymity in energy trading applications.
Using the techniques of Blockchain technology, i.e., distributed/
decentralization and flexibility in energy smart grids, an encrypted off-chain
communication network is established from users to manufacturers for
participating in Blockchain agreements.
√
√
√
√
√
R2:
(Dorri et al., 2017)
A multi-layer Blockchain infrastructure is used to exchange encrypted data
with all the participants. This is to ensure the throughput management ratio of
assigned values (Assigned Throughput Values) with total accessible
throughput.
√
√
√
√
√
R3:
(Cha et al., 2018)
Blockchain-linked gateways for handling existing IoT systems and transacting
data over the network. The Blockchain interface retains a sense of anonymity,
while the network holds immutable encrypted consumer preferences
information. So, the gateway improves protection with Bluetooth low-energy
devices on the IoT edge.
√
×
√
×
√
R4:
(Ouaddah et al., 2016)
Provides solutions where IoT owners have complete influence over how they
want to offer their IoT data exposure with tokenized approach. Enables private
IoT data ownership and offers a mechanism under which IoT owners retain
complete influence over how they want to allow access to their IoT data.
√
√
√
√
√
R5:
(Zyskind et al., 2015)
The proposed models offer applications for database management, which
focuses on Decentralized Hash Tables (DHT) and information received from
the decentralized Blockchain blocks. This model finetunes the access control
policies, which restricts the users who can manipulate data.
√
√
√
√
√
(Continued)