Skip to main content

2019 | OriginalPaper | Buchkapitel

2. Blockchain and Internet of Things

verfasst von : Liehuang Zhu, Keke Gai, Meng Li

Erschienen in: Blockchain Technology in Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Bitcoin (Nakamoto, Bitcoin: A peer-to-peer electronic cash system [Online] (2009). https://​bitcoin.​org/​bitcoin.​pdf) has attracted extensive attentions from both academia and industry, which initiates a wave of cryptocurrency. It has been widely believed that Blockchain (Bonneau et al., SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies, in Proc. IEEE Symposium on Security and Privacy (S&P) (2015), pp. 104–121; Narayanan et al., Bitcoin and cryptocurrency technologies (2016), pp. 1–308. http://​www.​freetechbooks.​com/​bitcoin-and-cryptocurrency-technologies-t938.​html; Zhang et al., Int J Web Grid Serv 1–25, 2017; Dinh et al., IEEE Trans Knowl Data Eng 30(7):1366–1385, 2018) is the fundamental mechanism for running Bitcoin. Essentially speaking, blockchain technique used in Bitcoin is a public, distributed, and append-only ledger that is maintained and governed by a group of financially motivated miners who do not trust each other. In order to establish a trust environment, transactions (generated by users) are validated by miners and are recorded in a chain of blocks. Blocks are periodically created based on the consensus algorithms appended to the chain. This application formulates a few key characteristics of blockchain, such as distributed ledger storage, transparent operation, and tamper-resistant record.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
20.
Zurück zum Zitat J. Bonneau, A. Miller, J. Clark, A. Narayanan, J.A. Kroll, E.W. Felten, SoK: research perspectives and challenges for bitcoin and cryptocurrencies, in Proceedings of the IEEE Symposium on Security and Privacy (S&P) (2015), pp. 104–121 J. Bonneau, A. Miller, J. Clark, A. Narayanan, J.A. Kroll, E.W. Felten, SoK: research perspectives and challenges for bitcoin and cryptocurrencies, in Proceedings of the IEEE Symposium on Security and Privacy (S&P) (2015), pp. 104–121
22.
Zurück zum Zitat Z. Zhang, S. Xie, H. Dai, X. Chen, H. Wang, Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352 (2017) Z. Zhang, S. Xie, H. Dai, X. Chen, H. Wang, Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352 (2017)
24.
Zurück zum Zitat T.T.A. Dinh, R. Liu, M. Zhang, G. Chen, B.C. Ooi, J. Wang, Untangling blockchain a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2018)CrossRef T.T.A. Dinh, R. Liu, M. Zhang, G. Chen, B.C. Ooi, J. Wang, Untangling blockchain a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2018)CrossRef
25.
Zurück zum Zitat M. Li, L. Zhu, X. Lin, Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing. IEEE Internet Things J. PP(99), 1–13 (2018) M. Li, L. Zhu, X. Lin, Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing. IEEE Internet Things J. PP(99), 1–13 (2018)
26.
Zurück zum Zitat Z. Yang, K. Yang, L. Lei, K. Zheng, V.M. Leung, Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6(2), 1495–1505 (2019)CrossRef Z. Yang, K. Yang, L. Lei, K. Zheng, V.M. Leung, Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6(2), 1495–1505 (2019)CrossRef
27.
Zurück zum Zitat D. Tse, B. Zhang, Y. Yang, C. Cheng, H. Mu, Blockchain application in food supply information security, in Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) (2017), pp. 1357–1360 D. Tse, B. Zhang, Y. Yang, C. Cheng, H. Mu, Blockchain application in food supply information security, in Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) (2017), pp. 1357–1360
28.
Zurück zum Zitat Q. Xia, E.B. Sifah, K.O. Asamoah, J. Gao, X. Du, M. Guizani, MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5, 14757–14767 (2017)CrossRef Q. Xia, E.B. Sifah, K.O. Asamoah, J. Gao, X. Du, M. Guizani, MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5, 14757–14767 (2017)CrossRef
29.
Zurück zum Zitat E. Androulaki et al., Hyperledger fabric: a distributed operating system for permissioned blockchains, in Proceedings of the 13th European Conference on Computer Systems (EuroSys) (2018), pp. 1–15 E. Androulaki et al., Hyperledger fabric: a distributed operating system for permissioned blockchains, in Proceedings of the 13th European Conference on Computer Systems (EuroSys) (2018), pp. 1–15
31.
Zurück zum Zitat Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, Y. Zhang, Consortium blockchain for secure energy trading in industrial Internet of Things. IEEE Trans. Ind. Inf. (TII) 14(8), 1690–1700 (2018) Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, Y. Zhang, Consortium blockchain for secure energy trading in industrial Internet of Things. IEEE Trans. Ind. Inf. (TII) 14(8), 1690–1700 (2018)
32.
Zurück zum Zitat C. Garman, M. Green, I. Miers, Accountable privacy for decentralized anonymous payments, in International Conference on Financial Cryptography & Data Security (FC) (2016), pp. 1–28 C. Garman, M. Green, I. Miers, Accountable privacy for decentralized anonymous payments, in International Conference on Financial Cryptography & Data Security (FC) (2016), pp. 1–28
33.
Zurück zum Zitat A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, Hawk: the blockchain model of cryptography and privacy-preserving smart contracts, in Proceedings of the IEEE 37th Symposium on Security and Privacy (S&P) (2016), pp. 839–858 A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, Hawk: the blockchain model of cryptography and privacy-preserving smart contracts, in Proceedings of the IEEE 37th Symposium on Security and Privacy (S&P) (2016), pp. 839–858
34.
Zurück zum Zitat A. Dorri, M. Steger, S.S. Kanhere, R. Jurdak, BlockChain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 15(12), 119–125 (2017)CrossRef A. Dorri, M. Steger, S.S. Kanhere, R. Jurdak, BlockChain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 15(12), 119–125 (2017)CrossRef
35.
Zurück zum Zitat S. Hu, C. Cai, Q. Wang, C. Wang, X. Luo, K. Ren, Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization, in Proceedings of the 37th IEEE Conference on Computer Communications (INFOCOM) (2018), pp. 1–9 S. Hu, C. Cai, Q. Wang, C. Wang, X. Luo, K. Ren, Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization, in Proceedings of the 37th IEEE Conference on Computer Communications (INFOCOM) (2018), pp. 1–9
36.
Zurück zum Zitat K. Gai, M. Qiu, H. Zhao, J. Xiong, Privacy-aware adaptive data encryption strategy of big data in cloud computing, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 273–278 K. Gai, M. Qiu, H. Zhao, J. Xiong, Privacy-aware adaptive data encryption strategy of big data in cloud computing, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 273–278
37.
Zurück zum Zitat M. Andrychowicz, S. Dziembowski, D. Malinowski, Ł. Mazurek, Secure multiparty computations on bitcoin, in 2014 IEEE Symposium on Security and Privacy (2014), pp. 443–458 M. Andrychowicz, S. Dziembowski, D. Malinowski, Ł. Mazurek, Secure multiparty computations on bitcoin, in 2014 IEEE Symposium on Security and Privacy (2014), pp. 443–458
38.
Zurück zum Zitat A. Ouaddah, A.A. Elkalam, A.A. Ouahman, FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2017)CrossRef A. Ouaddah, A.A. Elkalam, A.A. Ouahman, FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2017)CrossRef
39.
Zurück zum Zitat L. Ma, L. Tao, Y. Zhong, K. Gai, RuleSN: research and application of social network access control model, in IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity) (IEEE, Piscataway, 2016), pp. 418–423 L. Ma, L. Tao, Y. Zhong, K. Gai, RuleSN: research and application of social network access control model, in IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity) (IEEE, Piscataway, 2016), pp. 418–423
40.
Zurück zum Zitat L. Ma, L. Tao, K. Gai, Y. Zhong, A novel social network access control model using logical authorization language in cloud computing. Concurrency Comput Pract. Experience 29(14), e3893 (2017)CrossRef L. Ma, L. Tao, K. Gai, Y. Zhong, A novel social network access control model using logical authorization language in cloud computing. Concurrency Comput Pract. Experience 29(14), e3893 (2017)CrossRef
41.
Zurück zum Zitat S. Azouvi, M. Al-Bassam, S. Meiklejohn, Who am I? Secure identity registration on distributed ledgers, in International Workshop on Data Privacy Management (2017), pp. 373–389 S. Azouvi, M. Al-Bassam, S. Meiklejohn, Who am I? Secure identity registration on distributed ledgers, in International Workshop on Data Privacy Management (2017), pp. 373–389
42.
Zurück zum Zitat L. Atzori, A. Iera, G. Morabito, The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)MATHCrossRef L. Atzori, A. Iera, G. Morabito, The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)MATHCrossRef
45.
Zurück zum Zitat A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347–2376 (2015)CrossRef A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347–2376 (2015)CrossRef
49.
Zurück zum Zitat K. Gai, J. Pan, Human resource management: a case study of the air traffic controller strike in 1981. China Manag. Informatization 12(15), 61–65 (2009) K. Gai, J. Pan, Human resource management: a case study of the air traffic controller strike in 1981. China Manag. Informatization 12(15), 61–65 (2009)
50.
Zurück zum Zitat K. Gai, M. Qiu, H. Zhao, W. Dai, Privacy-preserving adaptive multi-channel communications under timing constraints, in IEEE International Conference on Smart Cloud (SmartCloud) (IEEE, Piscataway, 2016), pp. 190–195 K. Gai, M. Qiu, H. Zhao, W. Dai, Privacy-preserving adaptive multi-channel communications under timing constraints, in IEEE International Conference on Smart Cloud (SmartCloud) (IEEE, Piscataway, 2016), pp. 190–195
51.
Zurück zum Zitat K. Gai, M. Qiu, H. Zhao, L. Qiu, Smart energy-aware data allocation for heterogeneous memory, in IEEE 18th International Conference on High Performance Computing and Communications (HPCC) (IEEE, Piscataway, 2016), pp. 136–143 K. Gai, M. Qiu, H. Zhao, L. Qiu, Smart energy-aware data allocation for heterogeneous memory, in IEEE 18th International Conference on High Performance Computing and Communications (HPCC) (IEEE, Piscataway, 2016), pp. 136–143
52.
Zurück zum Zitat K. Gai, A report about suggestions on developing e-learning in China, in 2010 International Conference on E-Business and E-Government (ICEE) (IEEE, Piscataway, 2010), pp. 609–613 K. Gai, A report about suggestions on developing e-learning in China, in 2010 International Conference on E-Business and E-Government (ICEE) (IEEE, Piscataway, 2010), pp. 609–613
53.
Zurück zum Zitat K. Gai, M. Qiu, H. Zhao, X. Sun, Resource management in sustainable cyber-physical systems using heterogeneous cloud computing. IEEE Trans. Sustain. Comput. 3(2), 60–72 (2018)CrossRef K. Gai, M. Qiu, H. Zhao, X. Sun, Resource management in sustainable cyber-physical systems using heterogeneous cloud computing. IEEE Trans. Sustain. Comput. 3(2), 60–72 (2018)CrossRef
65.
Zurück zum Zitat N. Szabo, Formalizing and securing relationships on public networks. First Monday 2(9) (1997) N. Szabo, Formalizing and securing relationships on public networks. First Monday 2(9) (1997)
66.
Zurück zum Zitat K. Christidis, M. Devetsikiotis, Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292–2303 (2016)CrossRef K. Christidis, M. Devetsikiotis, Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292–2303 (2016)CrossRef
72.
Zurück zum Zitat L. Lamport, R. Shostak, M. Pease, The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)MATHCrossRef L. Lamport, R. Shostak, M. Pease, The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)MATHCrossRef
74.
Zurück zum Zitat I. Bentov, C. Lee, A. Mizrahi, M. Rosenfeld, Proof of activity: extending bitcoin’s proof of work via proof of stake [extended abstract]. ACM SIGMETRICS Perform. Eval. Rev. 42(3), 34–37 (2014)CrossRef I. Bentov, C. Lee, A. Mizrahi, M. Rosenfeld, Proof of activity: extending bitcoin’s proof of work via proof of stake [extended abstract]. ACM SIGMETRICS Perform. Eval. Rev. 42(3), 34–37 (2014)CrossRef
75.
Zurück zum Zitat A. Kiayias, A. Russell, B. David, R. Oliynykov, Ouroboros: a provably secure proof-of-stake blockchain protocol, in International Cryptology Conference (2017), pp. 357–388 A. Kiayias, A. Russell, B. David, R. Oliynykov, Ouroboros: a provably secure proof-of-stake blockchain protocol, in International Cryptology Conference (2017), pp. 357–388
77.
Zurück zum Zitat M. Castro, B. Liskov, Practical Byzantine fault tolerance, in Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (1999), pp. 1–14 M. Castro, B. Liskov, Practical Byzantine fault tolerance, in Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (1999), pp. 1–14
80.
Zurück zum Zitat F. Tian, An agri-food supply chain traceability system for China based on RFID & blockchain technology, in Proceedings of the 13th International Conference on Service Systems and Service Management (ICSSSM) (2016), pp. 1–6 F. Tian, An agri-food supply chain traceability system for China based on RFID & blockchain technology, in Proceedings of the 13th International Conference on Service Systems and Service Management (ICSSSM) (2016), pp. 1–6
83.
Zurück zum Zitat A supply chain traceability system for food safety based on HACCP, blockchain & Internet of Things, in Proceedings of the 14th International Conference on Service Systems and Service Management (ICSSSM) (2017), pp. 1–6 A supply chain traceability system for food safety based on HACCP, blockchain & Internet of Things, in Proceedings of the 14th International Conference on Service Systems and Service Management (ICSSSM) (2017), pp. 1–6
85.
Zurück zum Zitat H. Yin, K. Gai, An empirical study on preprocessing high-dimensional class-imbalanced data for classification, in IEEE 17th International Conference on High Performance Computing and Communications (HPCC) (IEEE, Piscataway, 2015), pp. 1314–1319 H. Yin, K. Gai, An empirical study on preprocessing high-dimensional class-imbalanced data for classification, in IEEE 17th International Conference on High Performance Computing and Communications (HPCC) (IEEE, Piscataway, 2015), pp. 1314–1319
86.
Zurück zum Zitat N. Koshizuka, K. Sakamura, Ubiquitous ID: standards for ubiquitous computing and the Internet of Things. IEEE Pervasive Comput. 9(4), 98–101 (2010)CrossRef N. Koshizuka, K. Sakamura, Ubiquitous ID: standards for ubiquitous computing and the Internet of Things. IEEE Pervasive Comput. 9(4), 98–101 (2010)CrossRef
88.
Zurück zum Zitat P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, D. Culler, TinyOS: an operating system for sensor networks, in Ambient Intelligence (Springer, Berlin, 2005), pp. 115–148 P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, D. Culler, TinyOS: an operating system for sensor networks, in Ambient Intelligence (Springer, Berlin, 2005), pp. 115–148
89.
Zurück zum Zitat E. Baccelli, O. Hahm, M. Günes, M. Wählisch, T.C. Schmidt, RIOT OS: towards an OS for the Internet of Things, in Proceedings of the IEEE Conference on Computer Communications (INFOCOM) Workshops (2013), pp. 79–80 E. Baccelli, O. Hahm, M. Günes, M. Wählisch, T.C. Schmidt, RIOT OS: towards an OS for the Internet of Things, in Proceedings of the IEEE Conference on Computer Communications (INFOCOM) Workshops (2013), pp. 79–80
90.
Zurück zum Zitat Y. Li, K. Gai, M. Qiu, W. Dai, M. Liu, Adaptive human detection approach using FPGA-based parallel architecture in reconfigurable hardware. Concurrency Comput. Pract. Experience 29(14), e3923 (2017)CrossRef Y. Li, K. Gai, M. Qiu, W. Dai, M. Liu, Adaptive human detection approach using FPGA-based parallel architecture in reconfigurable hardware. Concurrency Comput. Pract. Experience 29(14), e3923 (2017)CrossRef
91.
Zurück zum Zitat H. Chan, A. Perrig, D. Song, Secure hierarchical in-network aggregation for sensor networks, in ACM Conference on Computer and Communications Security (CCS) (2006), pp. 1–10 H. Chan, A. Perrig, D. Song, Secure hierarchical in-network aggregation for sensor networks, in ACM Conference on Computer and Communications Security (CCS) (2006), pp. 1–10
92.
Zurück zum Zitat L. Zhu, M. Li, DoS-resilient secure data aggregation in wireless sensor networks, in Poster of the17th ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom) (2011), pp. 1–2 L. Zhu, M. Li, DoS-resilient secure data aggregation in wireless sensor networks, in Poster of the17th ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom) (2011), pp. 1–2
93.
Zurück zum Zitat An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks, in Proceedings of the IEEE International Performance Computing and Communications Conference (IPCCC), December 2011, pp. 1–6 An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks, in Proceedings of the IEEE International Performance Computing and Communications Conference (IPCCC), December 2011, pp. 1–6
94.
Zurück zum Zitat L. Zhu, Z. Yang, M. Li, D. Liu, An efficient data aggregation protocol concentrated on data integrity in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013(7), 1–9 (2013) L. Zhu, Z. Yang, M. Li, D. Liu, An efficient data aggregation protocol concentrated on data integrity in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013(7), 1–9 (2013)
95.
Zurück zum Zitat L. Zhu, Z. Yang, M. Wang, M. Li, ID list forwarding free confidentiality preserving data aggregation for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013(241261), 59–72 (2014) L. Zhu, Z. Yang, M. Wang, M. Li, ID list forwarding free confidentiality preserving data aggregation for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013(241261), 59–72 (2014)
96.
Zurück zum Zitat K. Gai, M. Qiu, H. Zhao, M. Liu, Energy-aware optimal task assignment for mobile heterogeneous embedded systems in cloud computing, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 198–203 K. Gai, M. Qiu, H. Zhao, M. Liu, Energy-aware optimal task assignment for mobile heterogeneous embedded systems in cloud computing, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 198–203
97.
Zurück zum Zitat M. Qiu, D. Cao, H. Su, K. Gai, Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G, Int. J. Commun. Syst. 29(16), 2364–2374 (2016)CrossRef M. Qiu, D. Cao, H. Su, K. Gai, Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G, Int. J. Commun. Syst. 29(16), 2364–2374 (2016)CrossRef
98.
Zurück zum Zitat X. Xing, J. Wang, M. Li, Services and key technologies of the Internet of Things. ZTE Commun. 2, 1–11 (2010) X. Xing, J. Wang, M. Li, Services and key technologies of the Internet of Things. ZTE Commun. 2, 1–11 (2010)
99.
Zurück zum Zitat M. Gigli, S. Koo, Internet of Things: services and applications categorization. Adv. Internet Things 1(2), 27–31 (2011)CrossRef M. Gigli, S. Koo, Internet of Things: services and applications categorization. Adv. Internet Things 1(2), 27–31 (2011)CrossRef
100.
Zurück zum Zitat R. Khan, S.U. Khan, R. Zaheer, S. Khan, Future Internet: the Internet of Things architecture, possible applications and key challenges, in Proceedings of the 10th International Conference on Frontiers of Information Technology (2012), pp. 257–260 R. Khan, S.U. Khan, R. Zaheer, S. Khan, Future Internet: the Internet of Things architecture, possible applications and key challenges, in Proceedings of the 10th International Conference on Frontiers of Information Technology (2012), pp. 257–260
101.
Zurück zum Zitat M. Qiu, Z. Ming, J. Li, K. Gai, Z. Zong, Phase-change memory optimization for green cloud genetic algorithm. IEEE Trans. Comput. 64(12), 3528–3540 (2015)MathSciNetMATHCrossRef M. Qiu, Z. Ming, J. Li, K. Gai, Z. Zong, Phase-change memory optimization for green cloud genetic algorithm. IEEE Trans. Comput. 64(12), 3528–3540 (2015)MathSciNetMATHCrossRef
102.
Zurück zum Zitat H. Zhao, M. Chen, M. Qiu, K. Gai, M. Liu, A novel pre-cache schema for high performance android system. Futur. Gener. Comput. Syst. 56, 766–772 (2016)CrossRef H. Zhao, M. Chen, M. Qiu, K. Gai, M. Liu, A novel pre-cache schema for high performance android system. Futur. Gener. Comput. Syst. 56, 766–772 (2016)CrossRef
103.
Zurück zum Zitat H. Zhao, M. Qiu, K. Gai, J. Li, X. He, Maintainable mobile model using pre-cache technology for high performance android system, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 175–180CrossRef H. Zhao, M. Qiu, K. Gai, J. Li, X. He, Maintainable mobile model using pre-cache technology for high performance android system, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 175–180CrossRef
104.
Zurück zum Zitat K. Gai, M. Qiu, H. Zhao, Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing. IEEE Trans. Cloud Comput. (2016) K. Gai, M. Qiu, H. Zhao, Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing. IEEE Trans. Cloud Comput. (2016)
105.
Zurück zum Zitat Y. Li, K. Gai, L. Qiu, M. Qiu, H. Zhao, Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103–115 (2017)CrossRef Y. Li, K. Gai, L. Qiu, M. Qiu, H. Zhao, Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103–115 (2017)CrossRef
106.
Zurück zum Zitat K. Gai, M. Qiu, H. Zhao, Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing. J. Parallel Distrib. Comput. 111, 126–135 (2018)CrossRef K. Gai, M. Qiu, H. Zhao, Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing. J. Parallel Distrib. Comput. 111, 126–135 (2018)CrossRef
107.
Zurück zum Zitat K. Gai, L. Qiu, M. Chen, H. Zhao, M. Qiu, Sa-east: security-aware efficient data transmission for its in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 60 (2017)CrossRef K. Gai, L. Qiu, M. Chen, H. Zhao, M. Qiu, Sa-east: security-aware efficient data transmission for its in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 60 (2017)CrossRef
108.
Zurück zum Zitat K. Gai, A. Steenkamp, Feasibility of a platform-as-a-service implementation using cloud computing for a global service organization, in Proceedings of the Conference for Information Systems Applied Research, vol. 2167 (2013), p. 1508 K. Gai, A. Steenkamp, Feasibility of a platform-as-a-service implementation using cloud computing for a global service organization, in Proceedings of the Conference for Information Systems Applied Research, vol. 2167 (2013), p. 1508
109.
Zurück zum Zitat L. Chen, Y. Duan, M. Qiu, J. Xiong, K. Gai, Adaptive resource allocation optimization in heterogeneous mobile cloud systems, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 19–24CrossRef L. Chen, Y. Duan, M. Qiu, J. Xiong, K. Gai, Adaptive resource allocation optimization in heterogeneous mobile cloud systems, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 19–24CrossRef
110.
Zurück zum Zitat K. Gai, A review of leveraging private cloud computing in financial service institutions: value propositions and current performances. Int. J. Comput. Appl. 95(3), 40–44 (2014) K. Gai, A review of leveraging private cloud computing in financial service institutions: value propositions and current performances. Int. J. Comput. Appl. 95(3), 40–44 (2014)
113.
Zurück zum Zitat F. Bonomi, R.A. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the Internet of Things, in Proceedings of the Workshop on Mobile Cloud Computing (MCC) (2012), pp. 13–16 F. Bonomi, R.A. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the Internet of Things, in Proceedings of the Workshop on Mobile Cloud Computing (MCC) (2012), pp. 13–16
114.
Zurück zum Zitat J. Shropshire, Extending the cloud with fog: security challenges and opportunities, in Proceedings of Information System (2014), pp. 1–10 J. Shropshire, Extending the cloud with fog: security challenges and opportunities, in Proceedings of Information System (2014), pp. 1–10
115.
Zurück zum Zitat J. Ni, K. Zhang, X. Lin, X. Shen, Securing fog computing for Internet of Things applications: challenges and solutions. IEEE Commun. Surv. Tutorials 20(1), 601–628 (2017)CrossRef J. Ni, K. Zhang, X. Lin, X. Shen, Securing fog computing for Internet of Things applications: challenges and solutions. IEEE Commun. Surv. Tutorials 20(1), 601–628 (2017)CrossRef
116.
Zurück zum Zitat C. Sheng, Y. Chang, J. Lin, M. Li, Z. Zhang, L. Zhu, A residential privacy mining scheme based on smart meter readings, in Proceedings of the 3rd International Symposium on Privacy Computing (PriCom), November 2017, pp. 1–6 C. Sheng, Y. Chang, J. Lin, M. Li, Z. Zhang, L. Zhu, A residential privacy mining scheme based on smart meter readings, in Proceedings of the 3rd International Symposium on Privacy Computing (PriCom), November 2017, pp. 1–6
117.
Zurück zum Zitat C. Asamoah, L. Tao, K. Gai, N. Jiang, Powering filtration process of cyber security ecosystem using knowledge graph, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 240–246CrossRef C. Asamoah, L. Tao, K. Gai, N. Jiang, Powering filtration process of cyber security ecosystem using knowledge graph, in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2016), pp. 240–246CrossRef
118.
Zurück zum Zitat Z. Zhang, Z. Qin, L. Zhu, J. Weng, K. Ren, Cost-friendly differential privacy for smart meters: exploiting the dual roles of the noise. IEEE Trans. Smart Grid 8(2), 619–626 (2017) Z. Zhang, Z. Qin, L. Zhu, J. Weng, K. Ren, Cost-friendly differential privacy for smart meters: exploiting the dual roles of the noise. IEEE Trans. Smart Grid 8(2), 619–626 (2017)
119.
Zurück zum Zitat L. Zhu, M. Li, Z. Zhang, Q. Zhan, ASAP: an anonymous smart-parking and payment scheme in vehicular networks. IEEE Trans. Dependable Secure Comput. PP(99), 1–12 (2018) L. Zhu, M. Li, Z. Zhang, Q. Zhan, ASAP: an anonymous smart-parking and payment scheme in vehicular networks. IEEE Trans. Dependable Secure Comput. PP(99), 1–12 (2018)
120.
Zurück zum Zitat A. Butowsky, K. Gai, M. Coakley, M. Qiu, C.C. Tappert, City of white plains parking app: case study of a smart city web application, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 278–282 A. Butowsky, K. Gai, M. Coakley, M. Qiu, C.C. Tappert, City of white plains parking app: case study of a smart city web application, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) (IEEE, Piscataway, 2015), pp. 278–282
Metadaten
Titel
Blockchain and Internet of Things
verfasst von
Liehuang Zhu
Keke Gai
Meng Li
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-21766-2_2