Open Access   Article Go Back

The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions

B. Mukunthan1 , S. Govindaraju2 , S.K. Komagal Yallini3 , S. VibinChander4 , C. RanjithKumar5

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-1 , Page no. 179-186, Jan-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i1.179186

Online published on Jan 31, 2020

Copyright © B. Mukunthan, S. Govindaraju, S.K. Komagal Yallini, S. VibinChander, C. RanjithKumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Mukunthan, S. Govindaraju, S.K. Komagal Yallini, S. VibinChander, C. RanjithKumar, “The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.179-186, 2020.

MLA Style Citation: B. Mukunthan, S. Govindaraju, S.K. Komagal Yallini, S. VibinChander, C. RanjithKumar "The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions." International Journal of Computer Sciences and Engineering 8.1 (2020): 179-186.

APA Style Citation: B. Mukunthan, S. Govindaraju, S.K. Komagal Yallini, S. VibinChander, C. RanjithKumar, (2020). The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions. International Journal of Computer Sciences and Engineering, 8(1), 179-186.

BibTex Style Citation:
@article{Mukunthan_2020,
author = {B. Mukunthan, S. Govindaraju, S.K. Komagal Yallini, S. VibinChander, C. RanjithKumar},
title = {The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2020},
volume = {8},
Issue = {1},
month = {1},
year = {2020},
issn = {2347-2693},
pages = {179-186},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5018},
doi = {https://doi.org/10.26438/ijcse/v8i1.179186}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i1.179186}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5018
TI - The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions
T2 - International Journal of Computer Sciences and Engineering
AU - B. Mukunthan, S. Govindaraju, S.K. Komagal Yallini, S. VibinChander, C. RanjithKumar
PY - 2020
DA - 2020/01/31
PB - IJCSE, Indore, INDIA
SP - 179-186
IS - 1
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
187 272 downloads 125 downloads
  
  
           

Abstract

Block-Chain is referred as the list of transactions stored in multiple participating servers rather than on a central transaction server. Each and every participant in the Block-Chain network is granted access to an up-to-date copy of this encrypted catalog so they can read, write, and validate transactions. Block-Chains have recently gained a lot of attention in IoT solutions even though they are used mostly in the financial domain. Block-Chain can relatively support in accomplishing the vision of distributed IoT, facilitating transactions and coordination among interacting devices. The two technologies Block-Chain and IoT are used to build end to end automated and secured solutions. Internets of things (IoT) solutions are being effectively implemented in many different sectors, such as healthcare, warehousing, transportation, and logistics. Current unified, Cloud-based IoT solutions may not gauge and meet the network security defies faced by large-scale enterprises. The use of Block-Chain as a distributed catalog of transactions and peer-to-peer communication among contributing nodes can unravel such problems. This paper gives an idea of Block-Chain-enabled IoT solutions and shows how to use the Block-Chain platform for an IoT application in a multi partner environment.

Key-Words / Index Term

Cloud-based IoT; Network security; Block-Chain Services; Application Programming Interface; Messaging Protocol

References

[1] A. Ukil, S. Bandyopadhyay and A. Pal, "IoT-Privacy: To be private or not to be private," in Computer Communications Workshops (INFOCOM WKSHPS)”, IEEE Conference on, Toronto, 2014.
[2] Almutairi, A., Sarfraz, M., Basalamah, S., Aref, W., & Ghafoor, A.”A distributed access control architecture for cloud computing. IEEE Software”, vol:29, PP.36–44, 2012.
[3] Atzoria, L., Ierab, A., &Morabitoc, G.”The internet of things: A survey. Computer Networks”, vol:54, 2787–2805, 2010.
[4] Chen, M., Gonzalez, S., Zhang, Y., & Leung, V. “Multi-agent Itinerary planning in wireless sensor networks”. In ICST QShine,Spain, November 23–25, 2009.
[5] Chen, M., Wan, J., & Li, F. “Machine-to-machine communications: architectures, standards, and applications”. KSII Transactions on Internet and Information Systems, vol.6, PP-480–497, 2011.
[6] Chen, Z., Xia, F., Huang, T., Bu, F., & Wang, H. “A localization method for the internet of things. Journal of Supercomputing”, vol.633, issue.3, PP.657–674, 2011.
[7] COMSafety technical conference report: D4.6 “Report on Results of EU-US Cooperation Seventh Framework Programme Directorate-General for Communications Networks Content and Technology Smart Cities and Sustainability”, 2014.
[8] Corcoran, P. M. “ Cloud computing and consumer electronics: A perfect match or a hidden storm?”, IEEE Consumer Electronics Magazine, vol.1, PP-14–19.
[9] Das, ManikLal, "Privacy and Security Challenges in Internet of Things," Distributed Computing and Internet Technology, “11th International Conference, ICDCIT” PP. 33-48, 2015.
[10] Filipponi, L., Vitaletti, A., Landi, G., Memeo, V., Laura, G., &Pucci, P. “Smart city: An event driven architecture for monitoring public spaces with heterogeneous sensors. In Proceedings of 2010 Fourth International Conference on Sensor Technologies and Applications”, Venice, Italy, PP. 281–286, 2010.
[11] Ge, X., Huang, K., Wang, C.-X., Hong, X., & Yang, X. “Capacity analysis of a multi-cell multi-antenna cooperative cellular network with co-channel interference”. IEEE Transactions on Wireless Communications, vol.10, PP.3298–3309, 2011.
[12] Ge, Y., Lamont, L., &Villasenor, L.. Hierarchical OLSR-A scalable proactive routing protocol for heterogeneous Ad Hoc networks. In Proceedings of IEEE WiMob’05, Aug pp. 17–23, 2005.
[13] Gurumurthi, S. “Architecting storage for the cloud computing era”. IEEE Micro, vol.29, PP.68–71, 2009.
[14] H. Gross; M. Holbl, D. Slamanig, and R. Spreitzer, "Privacy-Aware Authentication in the Internet of Things, Cryptology and Network Security”. Springer International Publishing, 14th International Conference on Cryptology and Network Security, PP. 32-39, Morocco, 2015.
[15] Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D. and Wagner, D."Smart locks: Lessons for securing commodity internet of things devices," in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. PP.461–472, 2016
[16] Isaac, J. T., Zeadally, S., & Sierra, J. C. “A lightweight secure mobile payment protocol for vehicular ad-hoc networks(VANETs)”. Electronic Commerce Research, vol.12, issue.1, PP.97–123, 2012.
[17] J. Buchmann, "Introduction to cryptography.," Springer Science & Business Media, 2013.
[18] J. Gubbi, "Internet of Things (loT): A Vision Architectural Elements and Future Directions", Future Generation Computer Systems, vol. 29, issue. 7, pp. 1645-60, 2013.
[19] J. Zhou, R. Qingyang, Y. Qian, "A Scalable Vehicular Network Architecture for Traffic Information Sharing", IEEE JSAC., vol. 31, issue. 9, pp. 85-93, 2013.
[20] K. Mershad, H. Artail, "Finding a Star in a Vehicular Cloud", IEEE Intell. Trenso. Syst. Maa., vol. 5, no. 2, pp. 55-68, 2013.
[21] Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys and Tutorials, 13, 584–616.
[22] Kato, S., Sugawa, S., Tokuda, K., Matsui, T., &Fujii, H. “Vehicle control algorithms for cooperative driving with automated vehicles and inter vehicle communications”. IEEE Transactions on Intelligent Transportation Systems, vol.3, PP.155–161, 2002.
[23] M. Abuelela, S. Olariu, "Taking VANET to the Cloud", Proc. ACM MoMM vol.10, pp. 6-13, 2010.
[24] M. Amoozadeh et al.,, "Security vulnerabilities of connected vehicle streams and their impact on cooperative driving," IEEE Communications Magazine, vol. 53, issue. 6, pp. 126-132, 2015.
[25] Pallis, G. “Cloud computing: The new frontier of internet computing”. IEEE Internet Computing ‘14, PP.70–73,2010.
[26] S. Bitam, A. Merlouk, "ITS-Cloud: Cloud Computing for Intelligent Transportation System", Proc. IEEE Global Communications Conference. (GLOBECOM), pp.2054-59, 2012.
[27] S. Ziegler, C. Crettaz, "loT6 Project in a Nutshell the Future of Internet", Lecture Notes in Computer Science, vol. 7858, pp. 353-55, 2013.
[28] Sheth, A., &Ranabahu, A. “Semantic modeling for cloud computing”. IEEE Internet Computing, 14, pp.81–83, 2010.
[29] Skarmeta, AntonioF., JoseL. Hernandez-Ramos, and M. Moreno., "A decentralized approach for security and privacy challenges in the internet of things," internet of Things, IEEE World Forum on, 2014.
[30] Suo, H., Wan, J., Huang, L., &Zou, C. (2012). “Issues and challenges of wireless sensor networks localization in emerging applications”. Proceedings of 2012 International Conference on Computer Science and Electronic Engineering, pp. 447–451, Hangzhou, China, 2012.
[31] Takabi, H., Joshi, J. B. D., &Ahn, G. “Security and privacy challenges in cloud computing environments”. IEEE Security & Privacy, vol.8, pp.24–31, 2010.
[32] Wan, J., Zhang, D., Sun, Y., Lin, K., Zou, C., &Cai, “VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing”. ACM/SpringerMobile Networks and Applications, vol.19, issue.2, pp.153–160, 2015
[33] Y. Qian, N. Moayeri, "Desiqn of Secure and Application-Oriented VANETs", Proc. IEEE Vehicular Technology Coni., pp. 2794-99, 2008.
[34] Zhang, D., Wan, J., Liang, X., Guan, X., Liu, Q., &Ji, G. “Taxonomy of agent technologies for ubiquitous computing environments”. KSII Transactions on Internet and Information Systems, vol.6, issue.2, pp.547–565, 2012.
[35] B.Mukunthan, N.Nagaveni. “Identification of unique repeated patterns, location of mutation in DNA finger printing using artificial intelligence technique”. IJBRA, vol.10, issue.2, pp:157-176, 2014.
[36] B.Mukunthan, N.Nagaveni. “Automating Identification of Unique Patterns, Mutation in Human DNA using Artificial Intelligence Technique”. IJCA: vol.25, issue.2, pp:26-34, 2011.
[37] L.Jaya Singh Dhas , B.Mukunthan (2019). Kleinberg’s Hyper-Richness Based Fuzzy Partition Clustering for Efficient Bi-Temporal Data. IJITEE: 8(10):2422-2430
[38] K.G.Krishnakumar,B.Mukunthan(2016). Cross Layer Based Adaptive Routing Approach for VANET. IJCTA: 9(28):1-9.
[39] Macha Shanker, “Use Case: Smart Contract for Lease Agreements using Blockchain Technology”, Vol.7 , Issue.6 , pp.1-9, 2019.
[40] Lubdha M. Bendale, Roshani. Jain,Gayatri D. Patil “Study of Various Routing Protocols in Mobile Ad-Hoc Networks”, Vol.06, Special Issue.01, pp.1-5, 2018.
[41] B.Mukunthan, “Efficient Synergetic Filtering in Big Dataset Using Neural Network Technique”, International Journal of Recent Technology and Engineering”, Vol.8, Issue.5, 2020.