Blockchain Application Analysis Based on IoT Data Flow

In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2022-12, Vol.11 (23), p.3907
Hauptverfasser: Li, Juxia, Zhang, Xing, Shi, Wei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 23
container_start_page 3907
container_title Electronics (Basel)
container_volume 11
creator Li, Juxia
Zhang, Xing
Shi, Wei
description In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given.
doi_str_mv 10.3390/electronics11233907
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2748519321</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A745598357</galeid><sourcerecordid>A745598357</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-7aba601d16c1777b0dd615ecc9dcc6ff188fd1b926d78e75366949ee68ec2ea73</originalsourceid><addsrcrecordid>eNptUE1LAzEUDKJg0f4CLwuet-ajm2yObbVaKHip55C-vGjqdrMmW6T_3i314MH3Dm8Y5g3DEHLH6EQITR-wQehTbANkxviJUhdkxKnSpeaaX_7B12Sc844Oo5moBR0ROW8ifMKHDW0x67omgO1DHHBrm2MOuZjbjK4YmFXcFI-2t8Wyid-35MrbJuP4996Qt-XTZvFSrl-fV4vZugQhWV8qu7WSMsckMKXUljonWYUA2gFI71lde8e2mkunalSVkFJPNaKsEThaJW7I_dm3S_HrgLk3u3hIQ7ZsuJrWFdOCs0E1OavebYMmtD72ycKwDvcBYos-DPxMTatK16I62YrzA6SYc0JvuhT2Nh0No-bUoPmnVPEDgNxr3A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2748519321</pqid></control><display><type>article</type><title>Blockchain Application Analysis Based on IoT Data Flow</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Li, Juxia ; Zhang, Xing ; Shi, Wei</creator><creatorcontrib>Li, Juxia ; Zhang, Xing ; Shi, Wei</creatorcontrib><description>In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics11233907</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Access to information ; Algorithms ; Blockchain ; Boards of directors ; Cryptography ; Data encryption ; Data processing ; Data security ; Data storage ; Digital currencies ; Fault tolerance ; Internet of Things ; Leakage ; Methods ; Network security ; Power ; Privacy ; Scientific visualization ; Security ; Social networks ; Visualization</subject><ispartof>Electronics (Basel), 2022-12, Vol.11 (23), p.3907</ispartof><rights>COPYRIGHT 2022 MDPI AG</rights><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-7aba601d16c1777b0dd615ecc9dcc6ff188fd1b926d78e75366949ee68ec2ea73</citedby><cites>FETCH-LOGICAL-c361t-7aba601d16c1777b0dd615ecc9dcc6ff188fd1b926d78e75366949ee68ec2ea73</cites><orcidid>0000-0003-0411-0381</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Li, Juxia</creatorcontrib><creatorcontrib>Zhang, Xing</creatorcontrib><creatorcontrib>Shi, Wei</creatorcontrib><title>Blockchain Application Analysis Based on IoT Data Flow</title><title>Electronics (Basel)</title><description>In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given.</description><subject>Access control</subject><subject>Access to information</subject><subject>Algorithms</subject><subject>Blockchain</subject><subject>Boards of directors</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Data processing</subject><subject>Data security</subject><subject>Data storage</subject><subject>Digital currencies</subject><subject>Fault tolerance</subject><subject>Internet of Things</subject><subject>Leakage</subject><subject>Methods</subject><subject>Network security</subject><subject>Power</subject><subject>Privacy</subject><subject>Scientific visualization</subject><subject>Security</subject><subject>Social networks</subject><subject>Visualization</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNptUE1LAzEUDKJg0f4CLwuet-ajm2yObbVaKHip55C-vGjqdrMmW6T_3i314MH3Dm8Y5g3DEHLH6EQITR-wQehTbANkxviJUhdkxKnSpeaaX_7B12Sc844Oo5moBR0ROW8ifMKHDW0x67omgO1DHHBrm2MOuZjbjK4YmFXcFI-2t8Wyid-35MrbJuP4996Qt-XTZvFSrl-fV4vZugQhWV8qu7WSMsckMKXUljonWYUA2gFI71lde8e2mkunalSVkFJPNaKsEThaJW7I_dm3S_HrgLk3u3hIQ7ZsuJrWFdOCs0E1OavebYMmtD72ycKwDvcBYos-DPxMTatK16I62YrzA6SYc0JvuhT2Nh0No-bUoPmnVPEDgNxr3A</recordid><startdate>20221201</startdate><enddate>20221201</enddate><creator>Li, Juxia</creator><creator>Zhang, Xing</creator><creator>Shi, Wei</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0003-0411-0381</orcidid></search><sort><creationdate>20221201</creationdate><title>Blockchain Application Analysis Based on IoT Data Flow</title><author>Li, Juxia ; Zhang, Xing ; Shi, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-7aba601d16c1777b0dd615ecc9dcc6ff188fd1b926d78e75366949ee68ec2ea73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Access to information</topic><topic>Algorithms</topic><topic>Blockchain</topic><topic>Boards of directors</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Data processing</topic><topic>Data security</topic><topic>Data storage</topic><topic>Digital currencies</topic><topic>Fault tolerance</topic><topic>Internet of Things</topic><topic>Leakage</topic><topic>Methods</topic><topic>Network security</topic><topic>Power</topic><topic>Privacy</topic><topic>Scientific visualization</topic><topic>Security</topic><topic>Social networks</topic><topic>Visualization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Juxia</creatorcontrib><creatorcontrib>Zhang, Xing</creatorcontrib><creatorcontrib>Shi, Wei</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Juxia</au><au>Zhang, Xing</au><au>Shi, Wei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blockchain Application Analysis Based on IoT Data Flow</atitle><jtitle>Electronics (Basel)</jtitle><date>2022-12-01</date><risdate>2022</risdate><volume>11</volume><issue>23</issue><spage>3907</spage><pages>3907-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics11233907</doi><orcidid>https://orcid.org/0000-0003-0411-0381</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2022-12, Vol.11 (23), p.3907
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2748519321
source MDPI - Multidisciplinary Digital Publishing Institute; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Access control
Access to information
Algorithms
Blockchain
Boards of directors
Cryptography
Data encryption
Data processing
Data security
Data storage
Digital currencies
Fault tolerance
Internet of Things
Leakage
Methods
Network security
Power
Privacy
Scientific visualization
Security
Social networks
Visualization
title Blockchain Application Analysis Based on IoT Data Flow
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T16%3A20%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blockchain%20Application%20Analysis%20Based%20on%20IoT%20Data%20Flow&rft.jtitle=Electronics%20(Basel)&rft.au=Li,%20Juxia&rft.date=2022-12-01&rft.volume=11&rft.issue=23&rft.spage=3907&rft.pages=3907-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics11233907&rft_dat=%3Cgale_proqu%3EA745598357%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2748519321&rft_id=info:pmid/&rft_galeid=A745598357&rfr_iscdi=true