34

Blockchain Technology

TABLE 3.2

Reviewed Research Contributions on Blockchain-based Privacy Mechanisms for IoT

Authors

Description

Security

Principle Affected

Trust

Privacy

C

I

A

R1:

(Aitzhan & Svetinovic, 2016)

Using group signatures and anonymous communication sources that are

authenticated off-chain to ensure anonymity in energy trading applications.

Using the techniques of Blockchain technology, i.e., distributed/

decentralization and flexibility in energy smart grids, an encrypted off-chain

communication network is established from users to manufacturers for

participating in Blockchain agreements.

R2:

(Dorri et al., 2017)

A multi-layer Blockchain infrastructure is used to exchange encrypted data

with all the participants. This is to ensure the throughput management ratio of

assigned values (Assigned Throughput Values) with total accessible

throughput.

R3:

(Cha et al., 2018)

Blockchain-linked gateways for handling existing IoT systems and transacting

data over the network. The Blockchain interface retains a sense of anonymity,

while the network holds immutable encrypted consumer preferences

information. So, the gateway improves protection with Bluetooth low-energy

devices on the IoT edge.

×

×

R4:

(Ouaddah et al., 2016)

Provides solutions where IoT owners have complete influence over how they

want to offer their IoT data exposure with tokenized approach. Enables private

IoT data ownership and offers a mechanism under which IoT owners retain

complete influence over how they want to allow access to their IoT data.

R5:

(Zyskind et al., 2015)

The proposed models offer applications for database management, which

focuses on Decentralized Hash Tables (DHT) and information received from

the decentralized Blockchain blocks. This model finetunes the access control

policies, which restricts the users who can manipulate data.

(Continued)