Advances, Systems and Applications
Reference | Target & contribution | Improvement in Blockchain | Solution to attack |
---|---|---|---|
[14] | Decentralized access control for privacy protect | / | / |
[81] | Trust management among IoT-related stakeholders by integrating blockchain and SDN [81] | proof-of-concept (PoC) | DDoS attacks on edge networks |
[82] | An IoT-Fog/Edge-Cloud integration framework to facilitate end-to-end operations on sensitive data | / | / |
[83] | Combination of blockchain, edge computing, cloud computing, SDN to construct a security framework for IoT applications | User registration, data confidentiality estimation, shortest path finding, attack detection and avoidance | probable single or cooperative security attacks |
[84] | IoT-Fog-Cloud hybrid framework for secure and efficient IoT applicaitons | delay aware tree construction (DATC) algorithm and a RSA-based EPID scheme | / |
[85] | A blockchain-based framework to manage data provenance of cloud including data collection, data storage and data validation [85] | / | / |
[86] | Distributed solution for large-scaled data storage and protection [86] | Blockchain transactions | / |
[87] | Three levels of requirements for system security [87] | / | / |
[88] | Trust management in IoT ecosystems, distributed management of the IoT device life cycle and data privacy | Smart contract logic | / |
[89] | A decentralized trust framework in vehicle networks to defend against malicious vehicles and RSUs [89] | / | Message spoofing attack, bad mouthing and ballot stuffing attack, compromised RSU |
[90] | A blockchain-based security framework for cloud file storage and solve the file block replica placement | / | / |
[91] | Incentive mechanisms for data sharing in multi-clouds systems | Combination of PoW, PoS, PBFT | / |
[92] | Blockchain-based data deletion scheme | / | / |
[93] | Blockchain-based time stamping scheme for cloud storage | / | malicious file owner, malicious competitor |
[94] | Hybrid data management model to achieve storage efficiency | User registration algorithm, voting and counting algorithm | User Collusion Attack |
[95] | Consortium blockchain to secure data management in VECONs, and a reputation-based data sharing scheme | Data Storage Smart Contract (DSSC), Information Sharing Smart Contract (ISSC) [90], combination of proof-of-storage and proof-of-work | abnormal vehicles |