Proceedings of the Seventh International Conference on the Internet of Things 2017
DOI: 10.1145/3131542.3131563
|View full text |Cite
|
Sign up to set email alerts
|

IoT data privacy via blockchains and IPFS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
74
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 143 publications
(74 citation statements)
references
References 8 publications
0
74
0
Order By: Relevance
“…Blockchains, from a data structure perspective, are distributed databases with decentralized consensus on the entries being added to them. In applications involving data transfer, a blockchain can be used to create an immutable log of all data generation and access events, while smart contracts can be used to program responses to certain events or to enforce service level agreements [19]. Subsequently, this log can be used for transparency and accountability.…”
Section: Architecture Of the Rhm Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Blockchains, from a data structure perspective, are distributed databases with decentralized consensus on the entries being added to them. In applications involving data transfer, a blockchain can be used to create an immutable log of all data generation and access events, while smart contracts can be used to program responses to certain events or to enforce service level agreements [19]. Subsequently, this log can be used for transparency and accountability.…”
Section: Architecture Of the Rhm Systemmentioning
confidence: 99%
“…Towards a hybridization of on-chain and off-chain solutions, Enigma [28] introduced off-chain cloud-based storage and utilizes distributed-hash-tables for IoT data management. Further down into hybrid on-chain/off-chain solutions, [19] uses IPFS as a decentralized storage medium to share static data files, while maintaining records on blockchains.…”
Section: Related Workmentioning
confidence: 99%
“…Blockchain networks are very hard for a malicious attacker to gain control because they have an enormous price tag attached to such efforts. As a result, by securing IoT networks with blockchain technology, the developers and users can be safe from most attacks, except individuals or institutions that are willing to pay the price [37].…”
Section: Impact Of the Business Modelsmentioning
confidence: 99%
“…While public distributed ledgers are accessible to anybody, permissioned distributed ledgers require authentication and authorization within a consortium network. An approach to construct modular permissioned architectures for Blockchains are so-called sidechains [7,8]. The architecture consists of a central consortium Blockchain and a set of private subnets.…”
Section: Basicsmentioning
confidence: 99%