Ajou University repository

A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devicesoa mark
  • Saad, Muhammad ;
  • Bhutta, Muhammad Raheel ;
  • Kim, Jongik ;
  • Chung, Tae Sun
Citations

SCOPUS

2

Citation Export

Publication Year
2024-01-01
Publisher
Tech Science Press
Citation
Computers, Materials and Continua, Vol.78, pp.4263-4282
Keyword
anonymityblockchainIoTPrivacysmart contracts
Mesh Keyword
AnonymityBlock-chainClosed circuit televisionContract conditionsOne-timePrivacyPropertyProposed architecturesSecurity camerasTrade off
All Science Classification Codes (ASJC)
BiomaterialsModeling and SimulationMechanics of MaterialsComputer Science ApplicationsElectrical and Electronic Engineering
Abstract
With the increase in IoT (Internet of Things) devices comes an inherent challenge of security. In the world today, privacy is the prime concern of every individual. Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage. The challenge is keeping confidentiality and continuing to make the person innominate throughout the system. To address this, we present our proposed architecture where we manage IoT devices using blockchain technology. Our proposed architecture works on and off blockchain integrated with the closed-circuit television (CCTV) security camera fixed at the rental property. In this framework, the CCTV security camera feed is redirected towards the owner and renter based on the smart contract conditions. One entity (owner or renter) can see the CCTV security camera feed at one time. There is no third-party dependence except for the CCTV security camera deployment phase. Our contributions include the proposition of framework architecture, a novel smart contract algorithm, and the modification to the ring signatures leveraging an existing cryptographic technique. Analyses are made based on different systems’ security and key management areas. In an empirical study, our proposed algorithm performed better in key generation, proof generation, and verification times. By comparing similar existing schemes, we have shown the proposed architectures’ advantages. Until now, we have developed this system for a specific area in the real world. However, this system is scalable and applicable to other areas like healthcare monitoring systems, which is part of our future work.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/34066
DOI
https://doi.org/10.32604/cmc.2024.047132
Fulltext

Type
Article
Funding
This work was supported by Institute of Information & Communications Technology Planning & Evaluation (IITP) under the Artificial Intelligence Convergence Innovation Human Resources Development (IITP-2023-RS-2023-00255968) Grant and the ITRC (Information Technology Research Center) Support Program (IITP-2021-0-02051) funded by the Korea government (MSIT).Funding Statement: This work was supported by Institute of Information & Communications Technology Planning & Evaluation (IITP) under the Artificial Intelligence Convergence Innovation Human Resources Development (IITP-2023-RS-2023-00255968) Grant and the ITRC (Information Technology Research Center) Support Program (IITP-2021-0-02051) funded by the Korea government (MSIT).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Chung, Tae-Sun Image
Chung, Tae-Sun정태선
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.