Conventional Internet of Things(IoT)ecosystems involve data streaming from sensors,through Fog devices to a centralized Cloud server.Issues that arise include privacy concerns due to third party management of Cloud se...Conventional Internet of Things(IoT)ecosystems involve data streaming from sensors,through Fog devices to a centralized Cloud server.Issues that arise include privacy concerns due to third party management of Cloud servers,single points of failure,a bottleneck in data flows and difficulties in regularly updating firmware for millions of smart devices from a point of security and maintenance perspective.Blockchain technologies avoid trusted third parties and safeguard against a single point of failure and other issues.This has inspired researchers to investigate blockchain’s adoption into IoT ecosystem.In this paper,recent state-of-the-arts advances in blockchain for IoT,blockchain for Cloud IoT and blockchain for Fog IoT in the context of eHealth,smart cities,intelligent transport and other applications are analyzed.Obstacles,research gaps and potential solutions are also presented.展开更多
As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a...As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledgedsecure digital world,secure implementations of more commercial activity primitives are required. In this paper,we present asecure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem,which can be used inmany e-commerce applications such as e-voting,e-bidding/auction,and privacy-preserving data mining. These two schemes areexistentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it isbased on factoring,the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus,these twoschemes are practical for integration in modularized secure multi-party protocols.展开更多
文摘Conventional Internet of Things(IoT)ecosystems involve data streaming from sensors,through Fog devices to a centralized Cloud server.Issues that arise include privacy concerns due to third party management of Cloud servers,single points of failure,a bottleneck in data flows and difficulties in regularly updating firmware for millions of smart devices from a point of security and maintenance perspective.Blockchain technologies avoid trusted third parties and safeguard against a single point of failure and other issues.This has inspired researchers to investigate blockchain’s adoption into IoT ecosystem.In this paper,recent state-of-the-arts advances in blockchain for IoT,blockchain for Cloud IoT and blockchain for Fog IoT in the context of eHealth,smart cities,intelligent transport and other applications are analyzed.Obstacles,research gaps and potential solutions are also presented.
文摘As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledgedsecure digital world,secure implementations of more commercial activity primitives are required. In this paper,we present asecure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem,which can be used inmany e-commerce applications such as e-voting,e-bidding/auction,and privacy-preserving data mining. These two schemes areexistentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it isbased on factoring,the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus,these twoschemes are practical for integration in modularized secure multi-party protocols.