Online citations, reference lists, and bibliographies.

Cloud-based Vs. Blockchain-based IoT: A Comparative Survey And Way Forward

Raheel Ahmed Memon, Jian-Ping Li, Junaid Ahmed, Muhammad Irshad Nazeer, Muhammad Yusof Ismail, Khursheed Ali
Published 2020 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
The Internet of Things (IoT) has been evolving for more than a decade. Technological advancements have increased its popularity, but concerns and risks related to IoT are growing considerably along with the increased number of connected devices. In 2013, a new cryptography-based infrastructure called blockchain emerged with the potential to replace the existing cloud-based infrastructure of IoT through decentralization. In this article, we provide a taxonomy of the challenges in the current IoT infrastructure, and a literature survey with a taxonomy of the issues to expect in the future of the IoT after adopting blockchain as an infrastructure. The two architectures are compared based on their strengths and weaknesses. Then a brief survey of ongoing key research activities in blockchain is presented, which will have considerable impact on overcoming the challenges encountered in the applicability of blockchain in IoT. Finally, considering the challenges and issues in both infrastructures and the latest research activities, we propose a high-level hybrid IoT approach that uses the cloud, edge/fog, and blockchain together to avoid the limitations of each infrastructure.
This paper references
10.4018/978-1-5225-3445-7
Examining Cloud Computing Technologies Through the Internet of Things
Pradeep Tomar (2017)
10.1016/j.future.2017.11.022
IoT security: Review, blockchain solutions, and open challenges
M. Khan (2018)
Bitcoin-NG: A Scalable Blockchain Protocol
Ittay Eyal (2016)
10.1145/961268.961277
Low-power DoS attacks in data wireless LANs and countermeasures
G. Noubir (2003)
Consensus immutable agreement for the Internet of Value
S Seibold (2016)
Extending IoTs into the cloud
S Meghna (2017)
10.1007/978-1-4842-3444-0_6
Building an Ethereum DApp
Bikramaditya Singhal (2018)
A taxonomy and survey
BP Rimal (2009)
10.1145/2976749.2978341
On the Security and Performance of Proof of Work Blockchains
Arthur Gervais (2016)
10.1007/978-981-10-4035-1_17
Blockchain-Powered Internet of Things, E-Governance and E-Democracy
Renming Qi (2017)
10.1109/COMST.2015.2388550
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
J. Granjal (2015)
10.1007/978-3-642-34129-8_17
Outsourcing Encryption of Attribute-Based Encryption with MapReduce
J. Li (2012)
WAVE : A decentralised authorization system for IoT via blockchain smart contracts
J. Kolb (2017)
10.1145/2994581
Blockchain beyond bitcoin
Sarah Underwood (2016)
10.1109/AICCSA.2018.8612856
A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes
Randa Almadhoun (2018)
10.1109/CC.2017.7868163
An open IoT framework based on microservices architecture
Long Sun (2017)
10.1109/MCOM.2017.1700328
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems
M. Ficco (2017)
ENERGY CONSERVATION AND SECURITY ISSUES IN CLOUD COMPUTING: A REVIEW
Asmita Pandey (2014)
10.1109/ICCSIT.2010.5565120
The study and application of the IOT technology in agriculture
J. Zhao (2010)
10.6633/IJNS.201709.19(5).01
A Survey of Blockchain Security Issues and Challenges
I. Lin (2017)
10.1016/j.adhoc.2013.02.008
Efficient naming, addressing and profile services in Internet-of-Things sensory environments
C. Liu (2014)
10.1109/MCOM.2017.1600363CM
Security and Privacy for Cloud-Based IoT: Challenges
J. Zhou (2017)
10.24251/HICSS.2018.565
Blockchain Technology in Business Organizations: A Scoping Review
Yang Li (2018)
10.1049/CP.2011.0751
Medical application on Internet of Things
W. Zhao (2011)
10.1007/s11432-014-5209-2
Cyber-physical-social-thinking space based science and technology framework for the Internet of Things
Huangsheng Ning (2014)
10.1109/MCOM.2018.1701095
When Mobile Blockchain Meets Edge Computing
Zehui Xiong (2018)
An open IoT framework based
L Sun (2017)
10.1109/ICNP.2012.6459948
Evaluating sinkhole defense techniques in RPL networks
Kevin Weekly (2012)
10.1109/ICDCS.2011.19
Intelligent Placement of Datacenters for Internet Services
Iñigo Goiri (2011)
Smart Contracts : Building Blocks for Digital Markets
Nick Szabo (2018)
10.1109/LCNW.2012.6424089
End-to-end security for sleepy smart object networks
Mohit Sethi (2012)
Security for practical CoAP applications: issues and solution approaches. 10 th GI/ITG KuVS Fachgespraech Sensornetze
M Brachmann
10.4236/JSEA.2016.910036
Blockchain Platform for Industrial Internet of Things
Arshdeep Bahga (2016)
Free Lunch: Exploiting Renewable Energy for Computing
Sherif Akoush (2011)
10.1109/MITP.2017.3051335
Can Blockchain Strengthen the Internet of Things?
N. Kshetri (2017)
世界人口長期推計 = World population projections
河野 稠果 (1996)
10.1109/MCE.2017.2714695
Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks
Chi Yang (2017)
Cybercrime & the Internet of Threats. White Paper
J Moar (2017)
Blockchainbased database to ensure data integrity in cloud computing environments
E Gaetani (2017)
10.1007/978-3-642-38401-1_11
Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications
J. Granjal (2013)
10.1109/WF-IoT.2014.6803174
A survey of Internet-of-Things: Future vision, architecture, challenges and services
D. Singh (2014)
10.1109/COGINFOCOM.2016.7804547
Cognitive telemedicine IoT technology for dynamically adaptive eHealth content management reference framework embedded in cloud architecture
Abel Garai (2016)
10.1145/1721654.1721672
A view of cloud computing
M. Armbrust (2010)
Towards better scalability
P Bellavista (2016)
Fog computing and its
F Bonomi (2012)
10.1007/978-3-642-22540-6_27
A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network
T. Bhattasali (2012)
10.1109/ICCWAMTIP.2018.8632560
Modeling of Blockchain Based Systems Using Queuing Theory Simulation
R. A. Memon (2018)
SoK: research
A Miller (2015)
0x: an open protocol for decentralized exchange on the ethereum blockchain
W Warren
10.1109/RTSI.2016.7740614
Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP
Paolo Bellavista (2016)
10.1016/j.comnet.2014.11.008
Security, privacy and trust in Internet of Things: The road ahead
S. Sicari (2015)
10.1007/s00607-014-0407-8
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
A. Hameed (2014)
Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things
Parikshit Mahalle (2012)
10.1145/1062689.1062697
The feasibility of launching and detecting jamming attacks in wireless networks
W. Xu (2005)
10.1007/978-3-319-94370-1_11
Using Blockchain for IOT Access Control and Authentication Management
Abdallah Zoubir Ourad (2018)
10.1109/Trustcom/BigDataSE/ICESS.2017.236
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things
Martin Henze (2017)
Bitcoin: A Primer for Policymakers
J. Brito (2016)
10.1109/ICCE-CHINA.2017.7991140
On design issues and architectural styles for blockchain-driven IoT services
C. Liao (2017)
IoT and Blockchain Convergence: Benefits and Challenges
Ahmed Banafa (2017)
Cybercrime will cost businesses over $2 trillion by 2019. Press Releases
10.1109/SP.2015.14
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
J. Bonneau (2015)
10.15302/J-FEM-2017006
The outlook of blockchain technology for construction engineering management
J. Wang (2017)
10.1109/TIFS.2014.2341453
Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone
Seong Ho Chae (2014)
Enhanced secrecy
SH Chae (2014)
MQTT version 3
R J Cohn
10.1145/571637.571640
Practical byzantine fault tolerance and proactive recovery
Miguel Castro (2002)
10.1007/s10796-014-9489-2
The Internet of Things—A survey of topics and trends
A. Whitmore (2015)
10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102
Blockchain as a Service for IoT
Mayra Samaniego (2016)
10.1007/978-3-642-37291-9_14
The Architecture of Coupon-Based, Semi-off-Line, Anonymous Micropayment System for Internet of Things
D. Wilusz (2013)
End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication
J. Granjal (2013)
10.1109/TIFS.2009.2026454
Channel-Based Detection of Sybil Attacks in Wireless Networks
L. Xiao (2009)
Cryptocurrency and Blockchain Blueprint for Beginners: All You Need to Know about Bitcoin, Ethereum, Ripple, Litecoin and other Popular Cryptocurrencies
S M Nakano (2018)
Protocols for Secure Electronic Commerce (3 rd Ed
M H Sherif (2016)
Fog computing: issues
YF Wang (2015)
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
Eleftherios Kokoris-Kogias (2016)
10.1109/ACCESS.2016.2566339
Blockchains and Smart Contracts for the Internet of Things
K. Christidis (2016)
Energy and carbon footprintaware management of geo-distributed cloud data centers: a taxonomy, state of the art, and future directions
A Khosravi (2018)
10.1109/ICOCS.2012.6458569
Enhance security of cloud computing through fork virtual machine
Hasanli Elham (2012)
10.1016/j.jpdc.2019.08.005
LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy
A. Dorri (2019)
10.1007/978-981-10-7796-8_5
Comparative Requirements Analysis for the Feasibility of Blockchain for Secure Cloud
Irish Singh (2017)
10.1145/3318041.3355458
SoK: Consensus in the Age of Blockchains
S. Bano (2019)
10.1109/COMPSAC.2015.173
Fog Computing: Issues and Challenges in Security and Forensics
Yifan Wang (2015)
Blockchain basics
D Drescher (2017)
Gartner Says 8.4 Billion Connected "Things" will be in use in 2017
(2016)
Security analysis survey
KH Kim (2009)
10.1007/s11432-017-9294-5
A systematic framework to understand central bank digital currency
Qian Yao (2017)
IoT enabled Insurance Ecosystem - Possibilities Challenges and Risks
Jai Manral (2015)
10.1109/MC.2015.33
Attribute-Based Access Control
Vincent C. Hu (2015)
10.1109/IBCAST.2014.6778179
Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved
Mohammad Aazam (2014)
10.1016/j.jnca.2017.02.001
Security and privacy challenges in mobile cloud computing: Survey and way ahead
M. B. Mollah (2017)
10.1109/MASS.2011.76
VeRA - Version Number and Rank Authentication in RPL
Amit Dvir (2011)
Building an Ethereum DApp. In: Beginning Blockchain
B Singhal (2018)
10.1109/ICHIT.2008.261
Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer
Hyungon Kim (2008)
10.1007/3-540-48071-4_10
Pricing via Processing or Combatting Junk Mail
C. Dwork (1992)
10.1109/ICCCN.2012.6289309
The VIRTUS Middleware: An XMPP Based Architecture for Secure IoT Communications
Davide Conzon (2012)
10.1145/2462096.2462107
6LoWPAN fragmentation attacks and mitigation mechanisms
René Hummen (2013)
10.4018/978-1-5225-7149-0.CH003
Fog Computing and Its Role in the Internet of Things
C. Angeline (2019)
10.1007/s11432-016-9030-0
Attacking OpenSSL ECDSA with a small amount of side-channel information
W. Wang (2016)
Security Threats Classification in Blockchains
Jamal Hayat Mosakheil (2018)
Securing smart cities
K Biswas (2016)
10.1109/ICCT.2010.5688537
Study on the structure of “Internet of Things(IOT)” business operation support platform
Qian Xiaocong (2010)
10.1145/1376616.1376736
Multi-tenant databases for software as a service: schema-mapping techniques
Stefan Aulbach (2008)
10.1109/ICSA.2017.44
Comparing Blockchain and Cloud Services for Business Process Execution
Paul Rimba (2017)
10.23919/PICMET.2017.8125435
Internet of Things Technology Diffusion Forecasts
Y. Marinakis (2017)
10.1002/sec.1684
Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks
F. Ahmed (2016)
10.1109/FiCloud.2015.85
The Advantages of IoT and Cloud Applied to Smart Cities
Ciro Formisano (2015)
IoT security: review, blockchain
MA Khan (2018)
SAP announces first co-innovation customers, partners in blockchain initiative for Internet of Things
The 3Vs that define Big Data
D Soubra (2012)
A survey of recent intrusion
R Chaki (2011)
Fog computing the Internet of Things: extend the cloud to where the things are
Cisco (2015)
0x: an open protocol
W Warren (2017)
10.1109/CTS.2013.6567202
Big data: A review
S. Sagiroglu (2013)
10.1007/978-0-387-35568-9_18
PROOFS OF WORK AND BREAD PUDDING PROTOCOLS (EXTENDED ABSTRACT)
M. Jakobsson (1999)
10.1016/J.TELPOL.2017.09.003
Blockchain's roles in strengthening cybersecurity and protecting privacy
N. Kshetri (2017)
Dyn analysis summary of Friday
S Hilton
Announcing Amazon Elastic Compute Cloud (Amazon EC2) -beta
Amazon
Companies forge cooperative to explore blockchain-based IoT security
J Brown
In: eBusiness & eCommerce
H Stormer (2012)
10.1109/PERCOMW.2017.7917634
Blockchain for IoT security and privacy: The case study of a smart home
A. Dorri (2017)
10.1145/2063384.2063411
GreenSlot: Scheduling energy consumption in green datacenters
Iñigo Goiri (2011)
10.1109/MSP.2013.2256953
Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches
Y. Hong (2013)
10.1109/MCOM.2011.6069709
M2M-based metropolitan platform for IMS-enabled road traffic management in IoT
L. Foschini (2011)
Bitcoin : A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto (2009)
How to: Security
Internal (2010)
Cognitive telemedicine IoT
Á 2018. Garai (2016)
2017a. The road to scalable blockchain
S Bano (2017)
The study and application of the IoT technology in agriculture. 3 rd Int Conf on Computer Science and Information Technology
J C Zhao (2010)
Protocols for Secure Electronic Commerce (3 Ed.)
MH Sherif (2016)
Blockchain Enabled Applications: Understand the Blockchain Ecosystem and How to Make it Work for You
V. Dhillon (2017)
10.1007/S13369-017-2414-5
DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions
N. Z. Bawany (2017)
Authentication, Authorization and Accounting with Ethereum Blockchain
M. Thakur (2017)
Storj A Peer-to-Peer Cloud Storage Network
S. Wilkinson (2014)
ePayment. In: eBusiness
A Meier (2012)
Privacy on the blockchain
V Buterin (2016)
10.1145/3212998
Majority is not enough
Ittay Eyal (2018)
10.1007/978-3-319-21837-3_67
Security and Privacy Issues of Fog Computing: A Survey
S. Yi (2015)
10.1145/2976749.2978389
A Secure Sharding Protocol For Open Blockchains
Loi Luu (2016)
10.1145/2976749.2978309
Making Smart Contracts Smarter
Loi Luu (2016)
10.1109/JIOT.2015.2460333
Twenty Security Considerations for Cloud-Supported Internet of Things
J. Singh (2016)
10.1109/HPCC-SmartCity-DSS.2016.0198
Securing Smart Cities Using Blockchain Technology
K. Biswas (2016)
The Road to Scalable Blockchain Designs
S. Bano (2017)
Energy and carbon footprint
A Khosravi (2018)
Intelligent placement
K Le (2011)
10.1016/j.future.2016.11.031
Secure integration of IoT and Cloud Computing
C. Stergiou (2018)
10.1109/TPDS.2010.203
Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
Junbeom Hur (2011)
10.1109/ISADS.2009.5207373
Security analysis survey and framework design for IP connected LoWPANs
R. Riaz (2009)
10.3390/ELECTRONICS8020234
Simulation Model for Blockchain Systems Using Queuing Theory
R. A. Memon (2019)
10.1007/s11432-016-9164-1
Space-based information service in Internet Plus Era
D. Li (2016)
10.1109/NCM.2009.218
A Taxonomy and Survey of Cloud Computing Systems
B. P. Rimal (2009)
10.1016/J.FCIJ.2017.02.001
A survey of IoT cloud platforms
P. P. Ray (2016)
On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency
N. Courtois (2014)
10.1109/SAHCN.2007.4292831
Detecting and Localizing Wireless Spoofing Attacks
Y. Chen (2007)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar