Blockchain Application Analysis Based on IoT Data Flow
In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2022-12, Vol.11 (23), p.3907 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 23 |
container_start_page | 3907 |
container_title | Electronics (Basel) |
container_volume | 11 |
creator | Li, Juxia Zhang, Xing Shi, Wei |
description | In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given. |
doi_str_mv | 10.3390/electronics11233907 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2748519321</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A745598357</galeid><sourcerecordid>A745598357</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-7aba601d16c1777b0dd615ecc9dcc6ff188fd1b926d78e75366949ee68ec2ea73</originalsourceid><addsrcrecordid>eNptUE1LAzEUDKJg0f4CLwuet-ajm2yObbVaKHip55C-vGjqdrMmW6T_3i314MH3Dm8Y5g3DEHLH6EQITR-wQehTbANkxviJUhdkxKnSpeaaX_7B12Sc844Oo5moBR0ROW8ifMKHDW0x67omgO1DHHBrm2MOuZjbjK4YmFXcFI-2t8Wyid-35MrbJuP4996Qt-XTZvFSrl-fV4vZugQhWV8qu7WSMsckMKXUljonWYUA2gFI71lde8e2mkunalSVkFJPNaKsEThaJW7I_dm3S_HrgLk3u3hIQ7ZsuJrWFdOCs0E1OavebYMmtD72ycKwDvcBYos-DPxMTatK16I62YrzA6SYc0JvuhT2Nh0No-bUoPmnVPEDgNxr3A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2748519321</pqid></control><display><type>article</type><title>Blockchain Application Analysis Based on IoT Data Flow</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Li, Juxia ; Zhang, Xing ; Shi, Wei</creator><creatorcontrib>Li, Juxia ; Zhang, Xing ; Shi, Wei</creatorcontrib><description>In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics11233907</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Access to information ; Algorithms ; Blockchain ; Boards of directors ; Cryptography ; Data encryption ; Data processing ; Data security ; Data storage ; Digital currencies ; Fault tolerance ; Internet of Things ; Leakage ; Methods ; Network security ; Power ; Privacy ; Scientific visualization ; Security ; Social networks ; Visualization</subject><ispartof>Electronics (Basel), 2022-12, Vol.11 (23), p.3907</ispartof><rights>COPYRIGHT 2022 MDPI AG</rights><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-7aba601d16c1777b0dd615ecc9dcc6ff188fd1b926d78e75366949ee68ec2ea73</citedby><cites>FETCH-LOGICAL-c361t-7aba601d16c1777b0dd615ecc9dcc6ff188fd1b926d78e75366949ee68ec2ea73</cites><orcidid>0000-0003-0411-0381</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Li, Juxia</creatorcontrib><creatorcontrib>Zhang, Xing</creatorcontrib><creatorcontrib>Shi, Wei</creatorcontrib><title>Blockchain Application Analysis Based on IoT Data Flow</title><title>Electronics (Basel)</title><description>In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given.</description><subject>Access control</subject><subject>Access to information</subject><subject>Algorithms</subject><subject>Blockchain</subject><subject>Boards of directors</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Data processing</subject><subject>Data security</subject><subject>Data storage</subject><subject>Digital currencies</subject><subject>Fault tolerance</subject><subject>Internet of Things</subject><subject>Leakage</subject><subject>Methods</subject><subject>Network security</subject><subject>Power</subject><subject>Privacy</subject><subject>Scientific visualization</subject><subject>Security</subject><subject>Social networks</subject><subject>Visualization</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNptUE1LAzEUDKJg0f4CLwuet-ajm2yObbVaKHip55C-vGjqdrMmW6T_3i314MH3Dm8Y5g3DEHLH6EQITR-wQehTbANkxviJUhdkxKnSpeaaX_7B12Sc844Oo5moBR0ROW8ifMKHDW0x67omgO1DHHBrm2MOuZjbjK4YmFXcFI-2t8Wyid-35MrbJuP4996Qt-XTZvFSrl-fV4vZugQhWV8qu7WSMsckMKXUljonWYUA2gFI71lde8e2mkunalSVkFJPNaKsEThaJW7I_dm3S_HrgLk3u3hIQ7ZsuJrWFdOCs0E1OavebYMmtD72ycKwDvcBYos-DPxMTatK16I62YrzA6SYc0JvuhT2Nh0No-bUoPmnVPEDgNxr3A</recordid><startdate>20221201</startdate><enddate>20221201</enddate><creator>Li, Juxia</creator><creator>Zhang, Xing</creator><creator>Shi, Wei</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0003-0411-0381</orcidid></search><sort><creationdate>20221201</creationdate><title>Blockchain Application Analysis Based on IoT Data Flow</title><author>Li, Juxia ; Zhang, Xing ; Shi, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-7aba601d16c1777b0dd615ecc9dcc6ff188fd1b926d78e75366949ee68ec2ea73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Access to information</topic><topic>Algorithms</topic><topic>Blockchain</topic><topic>Boards of directors</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Data processing</topic><topic>Data security</topic><topic>Data storage</topic><topic>Digital currencies</topic><topic>Fault tolerance</topic><topic>Internet of Things</topic><topic>Leakage</topic><topic>Methods</topic><topic>Network security</topic><topic>Power</topic><topic>Privacy</topic><topic>Scientific visualization</topic><topic>Security</topic><topic>Social networks</topic><topic>Visualization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Juxia</creatorcontrib><creatorcontrib>Zhang, Xing</creatorcontrib><creatorcontrib>Shi, Wei</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Juxia</au><au>Zhang, Xing</au><au>Shi, Wei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blockchain Application Analysis Based on IoT Data Flow</atitle><jtitle>Electronics (Basel)</jtitle><date>2022-12-01</date><risdate>2022</risdate><volume>11</volume><issue>23</issue><spage>3907</spage><pages>3907-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics11233907</doi><orcidid>https://orcid.org/0000-0003-0411-0381</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2022-12, Vol.11 (23), p.3907 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2748519321 |
source | MDPI - Multidisciplinary Digital Publishing Institute; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Access control Access to information Algorithms Blockchain Boards of directors Cryptography Data encryption Data processing Data security Data storage Digital currencies Fault tolerance Internet of Things Leakage Methods Network security Power Privacy Scientific visualization Security Social networks Visualization |
title | Blockchain Application Analysis Based on IoT Data Flow |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T16%3A20%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blockchain%20Application%20Analysis%20Based%20on%20IoT%20Data%20Flow&rft.jtitle=Electronics%20(Basel)&rft.au=Li,%20Juxia&rft.date=2022-12-01&rft.volume=11&rft.issue=23&rft.spage=3907&rft.pages=3907-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics11233907&rft_dat=%3Cgale_proqu%3EA745598357%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2748519321&rft_id=info:pmid/&rft_galeid=A745598357&rfr_iscdi=true |